Protecting remote mobile sites

June 2016 Editor's Choice, Surveillance, Access Control & Identity Management, Asset Management, Security Services & Risk Management

After an ODET Perimeter Intrusion Detection System (PIDS) has been installed for a period of one year, no incidence of theft and vandalism has occurred at a mobile operator’s tower infrastructure site, located remotely on a hill.

This is remarkable, considering that this particular site was targeted by thieves more than once, destroying equipment shelters, removing batteries and cutting ‘baseband’ or ‘IF’ copper cables from the shelters to the radio equipment, located on the mast.

Cables to radio units cut and stolen.
Cables to radio units cut and stolen.

The perpetrators always gained access to this site by forcing the palisade fencing apart. Because of the remoteness of this site, these criminals had enough time to completely ransack the installation. Alarm systems that were installed inside the enclosures only triggered after the enclosure was breached. This alarm was relayed to a security company, who blindly responded to this event not knowing the exact nature of this incident. Sending out a security officer and his colleague to such an alarm might be dangerous as they would not know the number of perpetrators involved in this break-in and the threat level they might pose.

ODET Systems Africa evaluated the situation at this site, considering the classic approach of the Five D’s namely:

• Denying access by the visible barrier of the repaired palisade fence.

• Detecting tampering with the palisade fence and access gate to site (ODET PIDS).

• Deterring the perpetrator/s by activating a light/alarm in conjunction with a video camera, sending the alarm event detail with a picture to a network operation centre (NOC), as well as to other interested parties via an message on a smart phone (ODET PIDS).

• Delaying the perpetrator by making ingress into the site a difficult as possible thereby buying time to:

• Defend the site by sending out a security response team geared for the threat level posed by the alarm incident.

ODET’s PIDS proved to be a reliable and valuable component to a layered security approach in countering this security treat.

The ODET system deployed in this application consists of an ODET 1 single zone processing unit, available in a nineteen inch rack mount format. A multimode fibre optical cable is used as a sensing medium, which is mounted on the fence and gate. The system also provides input/output contacts for further configurations if required. One such contact output, switch on a LED floodlight and alarm, if an alarm event is triggered (deterring function). The ODET system also connects to a fish-eye video camera, allowing control of the picture/video feed.

Perpetrator is left in picture at gate.
Perpetrator is left in picture at gate.

The alarm events, video feed and other functions are transmitted via an IP network connection to a security management system at the NOK. System maintenance and other analytics pertaining to this site, is also communicated via this network.

The image shows alarm events caught and recorded by the ODET system. All these events were of an unauthorised nature and these individuals were deterred by the alarm and lights the system triggered.

ODET is of the opinion that this particular system’s configuration and deployment caused confusion and doubt in the minds of potential criminals, thereby completely deterring any further attempts at vandalising this site. The company says this technology can form an important part in the continuing fight against lawlessness in South Africa and elsewhere, especially regarding the threat mobile network operators, telecommunication companies and other infrastructure operators, having remote locations, face daily.

For more information contact ODET Systems Africa, +27 (0)10 492 0897, info@odetsa.com





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Access trends for 2026
Technews Publishing SMART Security Solutions RR Electronic Security Solutions Enkulu Technologies IDEMIA neaMetrics Editor's Choice Access Control & Identity Management Infrastructure
The access control and identity management industry has been the cornerstone of organisations of all sizes for decades. SMART Security Solutions asked local integrators and distributors about the primary trends in the access and identity market for 2026.

Read more...
Access data for business efficiency
Continuum Identity Editor's Choice Access Control & Identity Management AI & Data Analytics Facilities & Building Management
In all organisations, access systems are paramount to securing people, data, places, goods, and resources. Today, hybrid systems deliver significant added value to users at a much lower cost.

Read more...
Beyond the fence
Technews Publishing Fang Fences & Guards SMART Security Solutions Perimeter Security, Alarms & Intruder Detection Access Control & Identity Management
In a threat landscape characterised by sophisticated syndicates, harsh environmental conditions, and unstable power grids, a static barrier is no longer a defence; it is merely a brief delay.

Read more...
Zero Trust access control
Technews Publishing SMART Security Solutions CASA Software NEC XON Editor's Choice Access Control & Identity Management Information Security
Zero Trust Architecture enforces the rule of ‘never trust, always verify’. It changes an organisation’s security posture by assuming that threats exist both inside and outside the perimeter, and it applies to information and physical security.

Read more...
Unified, AI-powered security platform
Suprema neaMetrics Access Control & Identity Management Surveillance Products & Solutions
Suprema recently announced the launch of BioStar X, its advanced unified security platform. BioStar X unifies biometric access control and video surveillance into a single, scalable platform.

Read more...
Axis signs CISA Secure by Design pledge
Axis Communications SA News & Events Surveillance Information Security
Axis Communications has signed the United States Cybersecurity & Infrastructure Security Agency’s (CISA) Secure by Design pledge, signalling the company’s commitment to upholding and transparently communicating the cybersecurity posture of its products.

Read more...
Five key technology trends for the security sector in 2026
Axis Communications SA News & Events Surveillance
Axis Communications examines trends it considers important for 2026, as technology and customer requirements continue to evolve, but the basic security needs of end users remain constant.

Read more...
2026 Industry Trends Report calls out security’s next opportunity
Integrated Solutions Access Control & Identity Management Perimeter Security, Alarms & Intruder Detection
Gallagher Security has released its 2026 Security Industry Trends Report, drawing on insights from end users, channel partners, consultants, and technology stakeholders; highlighting a growing opportunity for security to play a more strategic, value-driven role across organisations worldwide.

Read more...
AI agent suite for control rooms
Milestone Systems News & Events Surveillance AI & Data Analytics
Visionplatform.ai announced the public launch of its new visionplatform.ai Agent Suite for Milestone XProtect, adding reasoning, context and assisted decision-making on top of existing video analytics and events — without sending video to the cloud.

Read more...
Smarter access, stronger defence
Secutel Technologies Security Services & Risk Management Access Control & Identity Management Retail (Industry)
The holiday season brings excitement, increased foot traffic and, unfortunately, a spike in criminal activity targeting retail environments. Taking a proactive approach to security is essential in ensuring staff and assets remain safe.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.