Protecting remote mobile sites

June 2016 Editor's Choice, Surveillance, Access Control & Identity Management, Asset Management, Security Services & Risk Management

After an ODET Perimeter Intrusion Detection System (PIDS) has been installed for a period of one year, no incidence of theft and vandalism has occurred at a mobile operator’s tower infrastructure site, located remotely on a hill.

This is remarkable, considering that this particular site was targeted by thieves more than once, destroying equipment shelters, removing batteries and cutting ‘baseband’ or ‘IF’ copper cables from the shelters to the radio equipment, located on the mast.

Cables to radio units cut and stolen.
Cables to radio units cut and stolen.

The perpetrators always gained access to this site by forcing the palisade fencing apart. Because of the remoteness of this site, these criminals had enough time to completely ransack the installation. Alarm systems that were installed inside the enclosures only triggered after the enclosure was breached. This alarm was relayed to a security company, who blindly responded to this event not knowing the exact nature of this incident. Sending out a security officer and his colleague to such an alarm might be dangerous as they would not know the number of perpetrators involved in this break-in and the threat level they might pose.

ODET Systems Africa evaluated the situation at this site, considering the classic approach of the Five D’s namely:

• Denying access by the visible barrier of the repaired palisade fence.

• Detecting tampering with the palisade fence and access gate to site (ODET PIDS).

• Deterring the perpetrator/s by activating a light/alarm in conjunction with a video camera, sending the alarm event detail with a picture to a network operation centre (NOC), as well as to other interested parties via an message on a smart phone (ODET PIDS).

• Delaying the perpetrator by making ingress into the site a difficult as possible thereby buying time to:

• Defend the site by sending out a security response team geared for the threat level posed by the alarm incident.

ODET’s PIDS proved to be a reliable and valuable component to a layered security approach in countering this security treat.

The ODET system deployed in this application consists of an ODET 1 single zone processing unit, available in a nineteen inch rack mount format. A multimode fibre optical cable is used as a sensing medium, which is mounted on the fence and gate. The system also provides input/output contacts for further configurations if required. One such contact output, switch on a LED floodlight and alarm, if an alarm event is triggered (deterring function). The ODET system also connects to a fish-eye video camera, allowing control of the picture/video feed.

Perpetrator is left in picture at gate.
Perpetrator is left in picture at gate.

The alarm events, video feed and other functions are transmitted via an IP network connection to a security management system at the NOK. System maintenance and other analytics pertaining to this site, is also communicated via this network.

The image shows alarm events caught and recorded by the ODET system. All these events were of an unauthorised nature and these individuals were deterred by the alarm and lights the system triggered.

ODET is of the opinion that this particular system’s configuration and deployment caused confusion and doubt in the minds of potential criminals, thereby completely deterring any further attempts at vandalising this site. The company says this technology can form an important part in the continuing fight against lawlessness in South Africa and elsewhere, especially regarding the threat mobile network operators, telecommunication companies and other infrastructure operators, having remote locations, face daily.

For more information contact ODET Systems Africa, +27 (0)10 492 0897, info@odetsa.com





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Impro announces Primo update
News & Events Access Control & Identity Management Integrated Solutions
Impro Technologies recently held a launch event in which it introduced a series of new products, from new readers through to its updated Primo access management software.

Read more...
Five signs your storage is holding you back
Infrastructure Surveillance
In the drive for business growth, organisations across South Africa are investing heavily in talent, applications, and strategy. Yet the foundational technology that underpins every digital interaction - data storage - is often overlooked.

Read more...
Dahua expands wireless 4G security monitoring
Products & Solutions Surveillance Smart Home Automation
Dahua Technology has launched a new wireless 4G security camera under its WITHS series, designed to deliver simplified deployment, continuous monitoring, and dependable performance in remote and power-limited environments.

Read more...
Smart port monitoring and automated container tracking
LD Africa AI & Data Analytics Surveillance Logistics (Industry)
A leading shipping port set out to improve visibility, security, and operational efficiency across its site, turning to an advanced monitoring solution powered by Axxon PSIM.

Read more...
957 women killed in three months
News & Events Security Services & Risk Management
Despite years of summits, task teams and public commitments, South Africa’s femicide rate remains around five times higher than the global average, and too few are using the legal lifelines available.

Read more...
Verification is reshaping South Africa’s labour market
Security Services & Risk Management Asset Management Commercial (Industry)
Hiring faster, trusting less: in a labour market defined by both constraint and potential, the ability to hire with confidence may well become one of the most important competitive advantages.

Read more...
Africa’s opportunity to shape the future of human-centred AI
AI & Data Analytics Security Services & Risk Management
Across the Global South, countries are not yet locked into decades of legacy AI systems, energy-intensive infrastructure, or governance frameworks designed for a different technological era. That creates something rare in technology development: a cleaner slate.

Read more...
AURA appoints Taryn Winer as global head of people
News & Events Security Services & Risk Management
Following its €13,5 million Series B funding round last year and accelerating international expansion, particularly across the United States, AURA has appointed Taryn Winer as global head of people.

Read more...
Genetec launches Cloudlink 2210
Genetec Infrastructure Surveillance
New cloud-managed appliance addresses the practical challenges when adopting a cloud-managed model at scale, including storage costs, support for devices that do not enable direct-to-cloud connectivity, and the need to maintain local operation during connectivity disruptions

Read more...
95% do not have full trust in cybersecurity vendors
Information Security Security Services & Risk Management
Trust in cybersecurity vendors is fragile, difficult to measure, and increasingly shaping risk posture at both operational and board levels. Lack of verifiable transparency undermines cybersecurity decision-making, according to Sophos-backed research.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.