360-degree perimeter protection

March 2017 Editor's Choice, Surveillance, Perimeter Security, Alarms & Intruder Detection, Security Services & Risk Management

Mining security and safety has become a critical focus area across Africa. Today, it is directly linked to production targets, and ultimately profit. One of Africa’s greatest safety challenges is illegal miners who do not understand the potential hazards on site, and as a result find themselves in safety-compromising situations.

Secu-Systems offers mines a security solution that guarantees a significant reduction in illegal mining activity, specifically in the open-cast mining sector.

Secu-Systems was established to provide high-end turnkey solutions for the mining sectors, ports and harbours and border controls. Its robust, mobile and advanced security solution, named Spotter, allows companies to overcome perimeter breaches quickly and with the least danger to employees.

Spotter has already proven itself in three of the world’s largest gold producers – at mines in Tanzania, Guinea and South Africa – and can deliver similar safety/security benefits to any open-cast mining facility.

Once the Secu-Sytems solution was installed and operational on-site in Tanzania, the results were immediate, revealing the staggering numbers of illegal miners entering the site on a daily basis. This has enabled the mine to implement a process to find and remove these miners from site immediately.

“Their intruder capture rate has improved and the risk for security personnel is lower. In addition, because all footage is recorded, the client can ensure that the entire incident – from capture to handover of the intruder – is handled strictly according to security policy,” explains Charles Harrison, MD of Secu-Systems. “At peak times, arrests reached a staggering 75 to 100 intruders per week.”

Designed for zero-infrastructure operations

The Spotter security solution is designed specifically for remote regions with no supportive infrastructure. It is based on a standalone, self-sustaining ‘green’ system, comprising a wireless, mobile 20-foot container which securely houses all peripheral intrusion and detection equipment.

This includes external, passive infrared detectors; high-pressure pepper systems that trigger on activation of the security systems, or can be remotely detonated upon verification, as well as FLIR thermal cameras that can detect motion within a six kilometre radius from nominal ground level.

The military-specified container solutions are fitted with their own power reticulation, which includes solar panels mounted to the roof of the container and battery banks installed within the container. Security systems are integrated with the camera solution and include wall-top and/or additional freestanding electric fencing with energisers operating off the internal power reticulation. All sides of the container are equipped with nozzles and high-pressure hydraulic piping. This includes wireless communication back to a centralised control room (as long as line-of-site can be attained).

“We describe our solution as a completely self-sufficient, virtual perimeter camera solution which tracks real-time movement using thermal cameras on a moving background. It uses Movement Target Indicators (MTI) software developed in Australia for military aircraft,” adds Harrison. “By comparison, traditional analytics work on a fixed background with a static camera.”

The streaming cameras can easily detect movement in as little as four pixels. Moreover, where conventional perimeter intrusion detection systems (PIDS) detect intrusions at the perimeter only, Spotter can track intruders from the perimeter and throughout the mine.

With high-powered, single PTZ thermal cameras placed on high sites, intruders cannot hide and are followed throughout the location until removed, thus giving management complete 360-degree situational awareness and peace of mind.

For more information, contact Secu-Systems, +27 (0)11 794 7834, charles@secusytems.co.za, www.secusystems.co.za





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

“This Is Theft!” SASA slams Mafoko Security
News & Events Security Services & Risk Management Associations
The Security Association of South Africa (SASA) has issued a stark warning that the long-running Mafoko Security Patrols scandal is no longer an isolated case of employer misconduct, but evidence of a systemic failure in South Africa’s regulatory and governance structures.

Read more...
Coordinated efforts lead to successful crime response
News & Events Surveillance Integrated Solutions
A synchronised operation involving Vumacam’s control room operators, the Johannesburg Metropolitan Police Department (JMPD), and 24/7 Drone Force, resulted in the successful identification and apprehension of a suspect linked to a reported theft case.

Read more...
Exhibitions across the security spectrum
News & Events Perimeter Security, Alarms & Intruder Detection Smart Home Automation
HomeSec Expo has become the security industry’s premier trade event. Visitors will experience a live showcase of how different aspects of the security spectrum come together under one roof.

Read more...
A clear vision for a safer, smarter future
News & Events Perimeter Security, Alarms & Intruder Detection Smart Home Automation
With its authoritative lineup of sponsors and exhibitors, HomeSec Expo 2026 embodies an authoritative, yet pragmatic vision, for the security industry. It is a vision that recognises both the urgency of current threats and the excitement of technological innovation.

Read more...
South African counter-drone system completes trials
Products & Solutions Perimeter Security, Alarms & Intruder Detection IoT & Automation
Pretoria-based military engineering company Centauri Technologies has announced that its TriAD counter-drone system successfully completed integrated, multi-layered C-UAS (counter-unmanned aerial system) capability trials in a vehicle-mounted configuration.

Read more...
Making a mesh for security
Information Security Security Services & Risk Management
Credential-based attacks have reached epidemic levels. For African CISOs in particular, the message is clear: identity is now the perimeter, and defences must reflect that reality with coherence and context.

Read more...
From surveillance to insight across Africa
neaMetrics TRASSIR - neaMetrics Distribution Access Control & Identity Management Surveillance Products & Solutions
TRASSIR is a global developer of intelligent video management and analytics solutions, delivering AI-driven platforms that enable organisations to monitor, analyse, and respond to events across complex physical environments.

Read more...
Navigating a modern, layered security landscape
News & Events Perimeter Security, Alarms & Intruder Detection Smart Home Automation
The convergence of perimeter control and access automation is driving demand for solutions that work together. This is the focus of HomeSec Expo 2026, which takes place on 4th and 5th March 2026 at the Gallagher Convention Centre in Johannesburg.

Read more...
From friction to trust
Information Security Security Services & Risk Management Financial (Industry)
Historically, fraud prevention has been viewed as a trade-off between robust security and a seamless customer journey, with security often prevailing. However, this can impair business functionality or complicate the customer journey with multiple logins and authentication steps.

Read more...
Security ready to move out of the basement
AI & Data Analytics Security Services & Risk Management
Panaseer believes that in 2026, a board member at a major corporation will lose their job amid rising breaches and legal scrutiny, as organisations recognise that cyber risk is a business risk that CISOs cannot shoulder alone.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.