Protecting remote mobile sites

June 2016 Editor's Choice, Surveillance, Access Control & Identity Management, Asset Management, Security Services & Risk Management

After an ODET Perimeter Intrusion Detection System (PIDS) has been installed for a period of one year, no incidence of theft and vandalism has occurred at a mobile operator’s tower infrastructure site, located remotely on a hill.

This is remarkable, considering that this particular site was targeted by thieves more than once, destroying equipment shelters, removing batteries and cutting ‘baseband’ or ‘IF’ copper cables from the shelters to the radio equipment, located on the mast.

Cables to radio units cut and stolen.
Cables to radio units cut and stolen.

The perpetrators always gained access to this site by forcing the palisade fencing apart. Because of the remoteness of this site, these criminals had enough time to completely ransack the installation. Alarm systems that were installed inside the enclosures only triggered after the enclosure was breached. This alarm was relayed to a security company, who blindly responded to this event not knowing the exact nature of this incident. Sending out a security officer and his colleague to such an alarm might be dangerous as they would not know the number of perpetrators involved in this break-in and the threat level they might pose.

ODET Systems Africa evaluated the situation at this site, considering the classic approach of the Five D’s namely:

• Denying access by the visible barrier of the repaired palisade fence.

• Detecting tampering with the palisade fence and access gate to site (ODET PIDS).

• Deterring the perpetrator/s by activating a light/alarm in conjunction with a video camera, sending the alarm event detail with a picture to a network operation centre (NOC), as well as to other interested parties via an message on a smart phone (ODET PIDS).

• Delaying the perpetrator by making ingress into the site a difficult as possible thereby buying time to:

• Defend the site by sending out a security response team geared for the threat level posed by the alarm incident.

ODET’s PIDS proved to be a reliable and valuable component to a layered security approach in countering this security treat.

The ODET system deployed in this application consists of an ODET 1 single zone processing unit, available in a nineteen inch rack mount format. A multimode fibre optical cable is used as a sensing medium, which is mounted on the fence and gate. The system also provides input/output contacts for further configurations if required. One such contact output, switch on a LED floodlight and alarm, if an alarm event is triggered (deterring function). The ODET system also connects to a fish-eye video camera, allowing control of the picture/video feed.

Perpetrator is left in picture at gate.
Perpetrator is left in picture at gate.

The alarm events, video feed and other functions are transmitted via an IP network connection to a security management system at the NOK. System maintenance and other analytics pertaining to this site, is also communicated via this network.

The image shows alarm events caught and recorded by the ODET system. All these events were of an unauthorised nature and these individuals were deterred by the alarm and lights the system triggered.

ODET is of the opinion that this particular system’s configuration and deployment caused confusion and doubt in the minds of potential criminals, thereby completely deterring any further attempts at vandalising this site. The company says this technology can form an important part in the continuing fight against lawlessness in South Africa and elsewhere, especially regarding the threat mobile network operators, telecommunication companies and other infrastructure operators, having remote locations, face daily.

For more information contact ODET Systems Africa, +27 (0)10 492 0897, info@odetsa.com





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Visual Intelligence for driver and vehicle safety
News & Events Asset Management Transport (Industry)
Webfleet, Bridgestone’s fleet management solution, and Peregrine.ai, a Berlin-based startup transforming mobility through AI-powered vision systems, announced the launch of a next-generation driver assistance solution.

Read more...
What is your ‘real’ security posture?
BlueVision Editor's Choice Information Security Infrastructure AI & Data Analytics
Many businesses operate under the illusion that their security controls, policies, and incident response plans will hold firm when tested by cybercriminals, but does this mean you are really safe?

Read more...
What is your ‘real’ security posture? (Part 2)
BlueVision Editor's Choice Information Security Infrastructure
In the second part of this series of articles from BlueVision, we explore the human element: social engineering and insider threats and how red teaming can expose and remedy them.

Read more...
ONVIF to end support for Profile S
News & Events Surveillance
ONVIF has announced that it will end support for ONVIF Profile S and recommends using its successor, Profile T. Profile S is the first-ever profile introduced by ONVIF in 2011.

Read more...
IQ and AI
Leaderware Editor's Choice Surveillance AI & Data Analytics
Following his presentation at the Estate Security Conference in October, Craig Donald delves into the challenge of balancing human operator ‘IQ’ and AI system detection within CCTV control rooms.

Read more...
Onsite AI avoids cloud challenges
SMART Security Solutions Technews Publishing Editor's Choice Infrastructure AI & Data Analytics
Most AI programs today depend on constant cloud connections, which can be a liability for companies operating in secure or high-risk environments. That reliance exposes sensitive data to external networks, but also creates a single point of failure if connectivity drops.

Read more...
Toxic combinations
Editor's Choice
According to Panaseer’s latest research, 70% of major breaches are caused by toxic combinations: overlapping risks that compound and amplify each other, forming a critical vulnerability to be exploited.

Read more...
Global hub for predictive road safety intelligence
News & Events Asset Management Transport (Industry)
One year since its formation, Netstar’s advanced Global Fleet Bureau is more than an operational facility for international fleet management, it has become a big-data nerve centre delivering unprecedented value to clients.

Read more...
Syndicates exploit insider vulnerabilities in SA
Information Security Security Services & Risk Management
Today’s cyber criminals do not just exploit vulnerabilities in your systems; they exploit your people, turning trusted team members into unwitting accomplices or deliberate collaborators in their schemes.

Read more...
New Edge AI Plus PTZ cameras with analytics
Products & Solutions Surveillance
IDIS has unveiled two new PTZ cameras that are NDAA-compliant, delivering AI auto-tracking, rapid 40x zoom, EIS image stabilisation, and advanced automated AI functionality.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.