360-degree perimeter protection

March 2017 Editor's Choice, Surveillance, Perimeter Security, Alarms & Intruder Detection, Security Services & Risk Management

Mining security and safety has become a critical focus area across Africa. Today, it is directly linked to production targets, and ultimately profit. One of Africa’s greatest safety challenges is illegal miners who do not understand the potential hazards on site, and as a result find themselves in safety-compromising situations.

Secu-Systems offers mines a security solution that guarantees a significant reduction in illegal mining activity, specifically in the open-cast mining sector.

Secu-Systems was established to provide high-end turnkey solutions for the mining sectors, ports and harbours and border controls. Its robust, mobile and advanced security solution, named Spotter, allows companies to overcome perimeter breaches quickly and with the least danger to employees.

Spotter has already proven itself in three of the world’s largest gold producers – at mines in Tanzania, Guinea and South Africa – and can deliver similar safety/security benefits to any open-cast mining facility.

Once the Secu-Sytems solution was installed and operational on-site in Tanzania, the results were immediate, revealing the staggering numbers of illegal miners entering the site on a daily basis. This has enabled the mine to implement a process to find and remove these miners from site immediately.

“Their intruder capture rate has improved and the risk for security personnel is lower. In addition, because all footage is recorded, the client can ensure that the entire incident – from capture to handover of the intruder – is handled strictly according to security policy,” explains Charles Harrison, MD of Secu-Systems. “At peak times, arrests reached a staggering 75 to 100 intruders per week.”

Designed for zero-infrastructure operations

The Spotter security solution is designed specifically for remote regions with no supportive infrastructure. It is based on a standalone, self-sustaining ‘green’ system, comprising a wireless, mobile 20-foot container which securely houses all peripheral intrusion and detection equipment.

This includes external, passive infrared detectors; high-pressure pepper systems that trigger on activation of the security systems, or can be remotely detonated upon verification, as well as FLIR thermal cameras that can detect motion within a six kilometre radius from nominal ground level.

The military-specified container solutions are fitted with their own power reticulation, which includes solar panels mounted to the roof of the container and battery banks installed within the container. Security systems are integrated with the camera solution and include wall-top and/or additional freestanding electric fencing with energisers operating off the internal power reticulation. All sides of the container are equipped with nozzles and high-pressure hydraulic piping. This includes wireless communication back to a centralised control room (as long as line-of-site can be attained).

“We describe our solution as a completely self-sufficient, virtual perimeter camera solution which tracks real-time movement using thermal cameras on a moving background. It uses Movement Target Indicators (MTI) software developed in Australia for military aircraft,” adds Harrison. “By comparison, traditional analytics work on a fixed background with a static camera.”

The streaming cameras can easily detect movement in as little as four pixels. Moreover, where conventional perimeter intrusion detection systems (PIDS) detect intrusions at the perimeter only, Spotter can track intruders from the perimeter and throughout the mine.

With high-powered, single PTZ thermal cameras placed on high sites, intruders cannot hide and are followed throughout the location until removed, thus giving management complete 360-degree situational awareness and peace of mind.

For more information, contact Secu-Systems, +27 (0)11 794 7834, [email protected], www.secusystems.co.za





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Pentagon appointed as Milestone distributor
Elvey Security Technologies News & Events Surveillance
Milestone Systems appointed Pentagon Distribution (an Elvey Group company within the Hudaco Group of Companies) as a distributor. XProtect’s open architecture means no lock-in and the ability to customise the connected video solution that will accomplish the job.

Read more...
AI-enabled tools reducing time to value and enhancing application security
Editor's Choice
Next-generation AI tools are adding new layers of intelligent testing, audit, security, and assurance to the application development lifecycle, reducing risk, and improving time to value while augmenting the overall security posture.

Read more...
2024 State of Security Report
Editor's Choice
Mobile IDs, MFA and sustainability emerge as top trends in HID Global’s 2024 State of Security Report, with artificial intelligence appearing in the conversation for the first time.

Read more...
Cyberthreats facing SMBs
Editor's Choice
Data and credential theft malware were the top two threats against SMBs in 2023, accounting for nearly 50% of all malware targeting this market segment. Ransomware is still the biggest threat.

Read more...
Are we our own worst enemy?
Editor's Choice
Sonja de Klerk believes the day-to-day issues we face can serve as opportunities for personal growth and empowerment, enabling us to contribute to creating a better and safer environment for ourselves and South Africa.

Read more...
How to spot a cyberattack if you are not a security pro
Editor's Choice
Cybersecurity awareness is straightforward if you know what to look for; vigilance and knowledge are our most potent weapons and the good news is that anyone can grasp the basics and spot suspicious activities.

Read more...
Protecting IP and secret data in the age of AI
Editor's Choice
The promise of artificial intelligence (AI) is a source of near-continuous hype for South Africans. However, for enterprises implementing AI solutions, there are some important considerations regarding their intellectual property (IP) and secret data.

Read more...
Super election year increases risks of political violence
Editor's Choice
Widening polarisation is expected in many elections, with terrorism, civil unrest, and environmental activism risks intensifying in a volatile geopolitical environment. Multinational businesses show an increasing interest in political violence insurance coverage in mitigation.

Read more...
Deception technology crucial to unmasking data theft
Information Security Security Services & Risk Management
The ‘silent theft’ of data is an increasingly prevalent cyber threat to businesses, driving the ongoing leakage of personal information in the public domain through undetected attacks that cannot even be policed by data privacy legislation.

Read more...
Proactive strategies against payment fraud
Financial (Industry) Security Services & Risk Management
Amid a spate of high-profile payment fraud cases in South Africa, the need for robust fraud payment prevention measures has never been more apparent, says Ryan Mer, CEO of eftsure Africa.

Read more...