Keeping an eye on valuable cargo

November 2016 Transport (Industry), Access Control & Identity Management, Asset Management, Security Services & Risk Management

Extremely valuable cargo is generally tracked using tracking tags which are placed on or in the cargo as well as a transmitter that is fitted to the vehicle carrying the cargo. This provides fleet owners and controllers with the ability to determine the location of the vehicle and cargo. However, in the event of theft or hijacking, the response is reactive rather than proactive.

While some tracking companies claim recovery success rates of up to 95%, prevention is always better than cure. One of the major obstacles encountered by fleet owners when goods are in transit, is the accelerated use of signal jamming devices. By jamming communication signals, criminals prevent the vehicle’s occupants from contacting fleet controllers and security companies, thereby placing the vehicle, its cargo and its occupants at risk, since they are basically incommunicado. Signal jamming devices render the total communication and vehicle tracking network of a company useless during activation.

Proactive interception

Andre Du Venage, MD of Secure Logistics.
Andre Du Venage, MD of Secure Logistics.

Andre Du Venage, MD of Secure Logistics, says that the company deploys a number of covert escort vehicles which move in unison with a customer’s vehicle carrying valuable cargo. Both the cargo vehicle and the escort vehicle are fitted with signal jamming detection and prevention equipment to ensure that any attempts to jam communication signals are detected and intercepted proactively and timeously.

Once signal jamming equipment has been detected, the Secure Logistics team enters a high alert phase and contingency measures are activated. Since both vehicles utilise the same equipment, the escort vehicle does not need to have the cargo vehicle in its sights. This provides the company with the element of surprise, since neither the cargo drivers nor the criminals are aware of the presence of the escort vehicle and attacks on the escort vehicle are generally eliminated.

Insider job

A staggering 95% of hijackings and cargo theft are facilitated through insider information. The challenge says Du Venage is that there are often many parties involved in the clearing and forwarding process and to finally move the cargo to its destination and therefore the information related to the cargo is available to a number of people. How the team reacts in the event of a potential or actual hijacking is therefore critical.

A covert escort service addresses the concerns that companies have in terms of signal jamming by nullifying its effect to a large extent. Early detection provides fleet owners and controllers with the upper hand and forms part of a chain of actions that result in minimal risk to the cargo as well as the transport vehicle’s occupants.

For more information contact Andre Du Venage, Secure Logistics, +27 (0)11 391 6268, andre.duvenage@securelogistics.co.za





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Verification is reshaping South Africa’s labour market
Security Services & Risk Management Asset Management Commercial (Industry)
Hiring faster, trusting less: in a labour market defined by both constraint and potential, the ability to hire with confidence may well become one of the most important competitive advantages.

Read more...
Africa’s opportunity to shape the future of human-centred AI
AI & Data Analytics Security Services & Risk Management
Across the Global South, countries are not yet locked into decades of legacy AI systems, energy-intensive infrastructure, or governance frameworks designed for a different technological era. That creates something rare in technology development: a cleaner slate.

Read more...
AURA appoints Taryn Winer as global head of people
News & Events Security Services & Risk Management
Following its €13,5 million Series B funding round last year and accelerating international expansion, particularly across the United States, AURA has appointed Taryn Winer as global head of people.

Read more...
95% do not have full trust in cybersecurity vendors
Information Security Security Services & Risk Management
Trust in cybersecurity vendors is fragile, difficult to measure, and increasingly shaping risk posture at both operational and board levels. Lack of verifiable transparency undermines cybersecurity decision-making, according to Sophos-backed research.

Read more...
Understanding the Shared Responsibility Model
Infrastructure Security Services & Risk Management
While the cloud can certainly be a growth enabler in many ways, it can also introduce new security risks. Companies want to have a clear understanding of where their security duties end and where their cloud service provider’s begin.

Read more...
Driving down fleet management costs
Asset Management Transport (Industry) Logistics (Industry)
As we move into the latter part of the first quarter of 2026, businesses operating fleets can expect expenses to increase from the procurement stage through to termination, due to various local and international factors.

Read more...
Centurion raises the bar at HomeSec Expo
Centurion Systems News & Events Access Control & Identity Management Residential Estate (Industry) Smart Home Automation Commercial (Industry)
Centurion Systems unveiled its latest product lines at HomeSec Expo 2026, introducing SMART+, a simpler way for installers and end users to manage their Centurion installations - as well as a few new products.

Read more...
“This Is Theft!” SASA slams Mafoko Security
News & Events Security Services & Risk Management Associations
The Security Association of South Africa (SASA) has issued a stark warning that the long-running Mafoko Security Patrols scandal is no longer an isolated case of employer misconduct, but evidence of a systemic failure in South Africa’s regulatory and governance structures.

Read more...
Making a mesh for security
Information Security Security Services & Risk Management
Credential-based attacks have reached epidemic levels. For African CISOs in particular, the message is clear: identity is now the perimeter, and defences must reflect that reality with coherence and context.

Read more...
From friction to trust
Information Security Security Services & Risk Management Financial (Industry)
Historically, fraud prevention has been viewed as a trade-off between robust security and a seamless customer journey, with security often prevailing. However, this can impair business functionality or complicate the customer journey with multiple logins and authentication steps.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.