classic | mobile
Follow us on:
Follow us on Facebook  Share via Twitter  Share via LinkedIn
 

Search...
Hi-Tech Security Solutions Business Directory
Residential Estate Security Handbook 2017


Integrated border management
November 2017, This Week's Editor's Pick, Perimeter Security, Alarms & Intruder Detection, Integrated Solutions, Government and Parastatal (Industry)

Border management is complex and multifaceted as it involves multiple government departments, including national and provincial authorities responsible for agriculture, health, revenue and tax, state security and transport services. Integrated Border Management (IBM), a concept first used by the European Union in the early 2000s, calls on the collaboration between these various key government departments to improve border management.

IBM states that individual border authorities are generally more effective when cooperation is in place. This translates to cooperation between the various departments involved in border management in the same country as well as cooperation with the border authorities of neighbouring countries.

In the SADC region, South Africa’s borders, for example, are managed by five different departments. With the Border Management Authority Bill, the government intends to establish one centralised authority to handle all matters of border management, including policing and customs. The Bill clearly states that “There is a need for integrated and coordinated border management that facilitates secure travel and legitimate trade in accordance with the Constitution, [and] international and domestic law.” Although the Bill was passed by the National Assembly in June this year, it has been criticised by opposition parties, who argue that setting up and operating the authority could be fraught with complexities.”

While some countries have merged border agencies and others have set up formal structures for cooperation, the aim of these integrated border management systems tend to be the same: facilitating legitimate travel and commerce while preventing illegal cross-border activities.

Physical border security

With the growing threat of terrorism, syndicated crime, poaching and smuggling, and the unlawful movement of people, drugs and contraband, protecting national borders is a priority. One of the key components of border management is physical border security. With proven experience of border protection solutions around the world, Betafence has established specialised physical security solutions that have been specifically configured for border security.

To provide effective protection against the multiple and diverse threats faced by border authorities, comprehensive border security would mirror the idea put forth by Integrated Border Management: the combination of various systems into one integrated solution. For border security, an integrated solution would ideally consist of the following components:

• Physical perimeter

• Long range surveillance systems

• Perimeter intrusion detection systems (PIDS)

• Access control

• Integration and maintenance

The physical perimeter of a border comprises the actual demarcation of the international boundary and provides a physical barrier against illegal crossing. Depending on the risk factors of each individual border area, fencing solutions can provide hardened protection against cut and climb attempts, hostile and unauthorised vehicles, and even ballistic and rocket-propelled grenade attacks.

A critical feature required from border fencing is good visibility that enables border protection officers to perform surveillance. Fence visibility is also important for camera surveillance. When integrated into a total solution, long range radar, CCTV and security lighting offer reliable detection and surveillance, which aids border officers in accurately assessing situations and responding effectively to potential threats.

A vital security system that will ensure that teams are deployed in time, is Perimeter Intrusion Detection Systems (PIDS). PIDS augments the physical perimeter to provide early warnings of breach attempts (climbing, cutting and bending of fence fabric) and triggers alarms, cameras and lighting for effective detection and inspection.

Lawful crossings

For the control and management of lawful border crossings, border authorities use access control systems at authorised border checkpoints. The physical barriers and structures employed at border checkpoints include vehicle wedges, bollards, tyre killers, turnstiles, gates and guard houses. The design of a checkpoint must include access control in such a way that: border officers are protected and supported in performing their duties; vehicle traffic and speeds are managed; unauthorised entry is prevented.

Where hostile vehicles pose a threat to security, crash-rated barriers can provide mitigation. Wherever crash-rated solutions are used, border authorities need to verify that the systems have been tested and certified according to relevant standards.

The final component in the deployment of a physical security solution is the integration of all of these systems into one solution. This ultimately enables border authorities to assess the intelligence gathered from the different components to effectively respond and report any and every security event. The purpose of an effective border security solution is not only to prevent illegal cross-border activities, but also to empower border authorities with the ability to detect and react to breach attempts and facilitate legal crossing at designated checkpoints.

As miscreants become more sophisticated, security systems must be a step ahead to anticipate, detect and mitigate against threats to protect our citizens, infrastructure and economy.

This article was supplied by Betafence.


Credit(s)
Supplied By: Betafence South Africa
Tel: +27 21 868 7300
Fax: +27 21 868 7301
Email: info@betafence.co.za
www: www.betafence.co.za
  Share via Twitter   Share via LinkedIn      

Further reading:

  • Anticipated trends in CCTV for 2018
    February 2018, Leaderware, This Week's Editor's Pick, CCTV, Surveillance & Remote Monitoring
    One of the trends for 2018 in South Africa is questioning by top management of the value of CCTV systems.
  • What lies ahead in 2018?
    February 2018, Axis Communications SA, Cathexis Technologies, Forbatt SA, Milestone Systems, neaMetrics, Suprema, ZKTeco, G4S South Africa, This Week's Editor's Pick, CCTV, Surveillance & Remote Monitoring, Access Control & Identity Management, Cyber Security, Integrated Solutions
    To find out what the physical security industry is expecting in 2018, Hi-Tech Security Solutions asked a few of the leading players what they expect in 2018 in South and southern Africa.
  • Cybersecurity trends 2018
    February 2018, Technews Publishing, This Week's Editor's Pick, Cyber Security
    Cybersecurity will remain a key issue for everyone in every industry this year. Here’s what some experts on the topic have to say.
  • Let me out of here
    February 2018, Technews Publishing, This Week's Editor's Pick, Fire & Safety
    Hi-Tech Security Solutions looks at designing a system that addresses the safe exit of people from a burning building.
  • Campus security must not fall
    February 2018, CAMPROSA (Campus Protection Society of Southern Af, This Week's Editor's Pick, Integrated Solutions, Conferences & Events, Associations
    The Campus Protection Society of Southern Africa (Camprosa) held its annual conference in the second half of 2017 at the Kwa Maritane Bush Lodge in the Pilanesburg Game Reserve.
  • TAPA SA conference 2017
    February 2018, This Week's Editor's Pick, Asset Management, EAS, RFID, Integrated Solutions, Security Services & Risk Management
    TAPA held its South African conference at Emperor’s Palace late last year. Hi-Tech Security Solutions was there to cover the event.
  • Decrypting encryption
    February 2018, Technews Publishing, This Week's Editor's Pick, Cyber Security, Integrated Solutions
    Encryption is undoubtedly useful, but has it advanced to the stage where it is also easily usable in business and consumer settings?
  • Tomorrow’s surveillance – today’s reality
    February 2018, Technews Publishing, Leaderware, This Week's Editor's Pick, CCTV, Surveillance & Remote Monitoring, Cyber Security, News, Integrated Solutions
    The Crowne Plaza in Rosebank, Johannesburg, was the setting for the 2017 iLegal conference, a joint venture between Dr Craig Donald and Hi-Tech Security Solutions.
  • Hikvision and Paxton create seamless vehicle entry system
    February 2018, Hikvision South Africa, News, CCTV, Surveillance & Remote Monitoring, Access Control & Identity Management, Integrated Solutions
    Hikvision has announced the successful integration of the Hikvision automatic number plate recognition system into Paxton’s Net2 access control system.
  • Powerful Android surveillance software
    February 2018, This Week's Editor's Pick, News
    Kaspersky Lab researchers have uncovered an advanced mobile implant, active since 2014 and designed for targeted cyber-surveillance, possibly as an ‘offensive security’ product.
  • Security tech trends for 2018
    February 2018, Axis Communications SA, CCTV, Surveillance & Remote Monitoring, Integrated Solutions
    As a result of the largest data breach in South Africa’s history, as well as a record number of armed robberies against businesses recorded in 2017, security is a New Year’s resolution for most local businesses.
  • Home and neighbourhood security
    February 2018, This Week's Editor's Pick, Perimeter Security, Alarms & Intruder Detection, Products
    The Fynoti home alarm system is a standalone, wireless device that users can place unobtrusively in their homes. It is ideal for a shelf or small table, for example.

 
 
         
Contact:
Technews Publishing (Pty) Ltd
1st Floor, Stabilitas House
265 Kent Ave, Randburg, 2194
South Africa
Publications by Technews
Dataweek Electronics & Communications Technology
Electronic Buyers Guide (EBG)

Hi-Tech Security Solutions
Hi-Tech Security Business Directory (HSBD)

Motion Control in Southern Africa
Motion Control Buyers’ Guide (MCBG)

South African Instrumentation & Control
South African Instrumentation & Control Buyers’ Guide (IBG)
Other
Terms & conditions of use, including privacy policy
PAIA Manual
         
    Mobile | Classic

Copyright © Technews Publishing (Pty) Ltd. All rights reserved.