An intelligence-based security model

June 2018 Editor's Choice, Security Services & Risk Management

“We have a problem,” says Locstat’s Hallam Ford. “South Africa has one of the highest crime rates in the world yet our up to R45 billion per annum security industry is not containing and or solving the problem. It could do though; we have the power to take back our communities, regain the initiative and prevent and reduce crime in South Africa. We need a new model and a different approach”.

Most of us subscribe to a multi-layered security approach. This starts with the wall around your property, builds through all your mechanical enhancements and then expands into your technological and procedural elements including your armed response subscription.

We are then either all members or patrollers of our local neighbourhood watch. Some of us even live in communities where we have taken things further by bringing in force-multipliers like licence plate recognition (LPR). More privileged communities pay for tactical teams to be on call. These are all great and fundamentally necessary layers. We need them all. But we still have the problem. Criminals still operate with near impunity.

Criminals these days are capable, agile, intelligent and highly adaptable. They innovate on-the-fly and easily manoeuvre around our security layers.

“The problem,” Ford argues, “is the model, its response-based. When something happens, we react. The armed response (AR) model is a good example. We need AR, but it is no panacea and has reached its current ceiling – it can’t innovate. We need something that makes our existing layers more efficient and effective and opens up new innovations.”

What criminals can’t do is manoeuvre around the fact that when they strike, they leave a mark, like a fingerprint, in the environment they have targeted. That ‘fingerprint’ is valuable when converted into data. Crime is seldom random.

“The missing layer is situational awareness,” says Ford.

All about intelligence

No military general goes to war without intelligence; No business is successful without market research; No doctor prescribes treatment without patient history and test results. We all use and rely on data in our professional lives, yet when it comes to the issue most dear to us – the safety and security of our families and possessions – why are we not using data as a force-multiplier?

Without credible data, we have weak situational awareness. We are blind, guessing, making decisions based on opinion instead of objective, credible facts. Without the patterns and trends that data provides, our approach can only ever be to just respond. It’s time for a paradigm shift in our security model.

“We need situational awareness and to exploit the products that a data-driven approach brings. We need to change and become pro-active and ultimately predictive if we are going to solve the problem.”

Historically we were unable to be pro-active as there was little credible data. The situation has changed, Ford says. Technology is available to now gather information, record incidents, geolocate them, categorise them, store then, analyse and visualise them, track resources and ultimately attain situational awareness.

Once we have situational awareness we enable the shift as we can now become pro-active based on patterns and trends. Through the use of further, more advanced capabilities such as Repeat and Near Repeat Victimisation Analysis (RNRV), we can then even become predictive. Importantly, now that we have data, we can measure the effect of our actions.

Cloud-based intelligence

Locstat is one of these new capabilities which exploits technology to enable this data-driven approach by offering useful information to many through its cloud-based services. Through Locstat Cx, communities become empowered, credible and capable. The private security industry, through Locstat Sx can also adopt a new model, including achieving Industry 4.0 standards.

Ford explains that Locstat Cx is the basic service the company provides. It offers users functions such as heatmaps, statistics, tracking and visualisations in real time. Moreover, the service is offered free to communities, such as neighbourhood watches, and members can access it via a PC or mobile device.

Locstat Sx is an advanced version of the service that is sold to security service providers, municipalities, utilities and others. It includes the features of the Cx version, as well as RNRV, reports from armed response officers, tracking and more.

Ford adds that the benefits include:

• Dominating the security agenda through:

- Disruption, deterrence and denial

- Restricting criminal ability to manoeuvre

- Re-taking the initiative

- Hardening against risk

- Being pro-active and predictive instead of reactive

• Increased capability through:

- Situational awareness

- A more secure community

- Credible and empowered communities/security providers

- Validation and return on investment

- Innovation

• Collaboration between:

- Community, security providers and law enforcement

“By becoming pro-active, we can now regain the initiative and start to dictate the security agenda in our communities,” Ford concludes. “Currently the criminals hold most of the cards, we can change this.

“Data-driven technologies like Locstat aren’t a threat to the security industry. On the contrary, they look to empower it to achieve its true potential.”

For more information contact Locstat, +27 (0)21 683 3624, info@locstat.co.za, www.locstat.co.za





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

The same security assessment for different reasons
Issue 7 2020, Alwinco , Editor's Choice
Like everything else in life, a security risk assessment also has two sides: one is the proactive approach, and the other is the approach taken ‘after the fact’.

Read more...
Risk intelligence the key to a sustainable future
Issue 7 2020 , Editor's Choice
Only by building risk intelligent organisations will leaders be able to overcome six distinct global threats identified by the Institute of Risk Management South Africa (IRMSA).

Read more...
Profile D for access control peripherals
Issue 7 2020 , Editor's Choice
Profile D provides interoperability for devices such as locks, credential/biometric readers, PIN pads, LPR cameras, door phones, sensors and displays.

Read more...
Security investments and culture
Issue 7 2020 , Editor's Choice
Organisations must embed security into the culture of the company and approach security investments with this culture in mind.

Read more...
Elastic storage pricing
Issue 7 2020 , Editor's Choice
With elastic pricing, users can switch from one storage model to another without having to pay a premium or a penalty, and without having to physically move any data.

Read more...
Use technology as a differentiator
Issue 7 2020 , Editor's Choice
Juni Yan, director of Transport, Logistics and Automotive at BT, shares her insights on how logistics companies can leverage digital transformation to become a real market differentiator – no matter the state of the pandemic.

Read more...
Management of PPE allocation made simple
Issue 7 2020, Powell Tronics, Technews Publishing , Editor's Choice
Of all the roadblocks and challenges COVID-19 has introduced us to over the past few months, one of the tasks organisations have to manage is the issuing of PPE to staff.

Read more...
Robots in warehousing and freight, a security perspective
Issue 7 2020, FSK Electronics , Editor's Choice
The logistics industry needs support from technology to meet its ongoing demands and ongoing security concerns.

Read more...
The new training normal
Issue 7 2020, Leaderware , Editor's Choice
Insights from running my first CCTV Surveillance Skills and Body Language and Advanced courses at physical training venues since COVID-19 started.

Read more...
An exciting journey in security
Issue 7 2020, Technews Publishing, BTC Training Africa , Editor's Choice
Errol Peace describes his 40-plus year career in the security industry where he was and is a great proponent of training as an “exceptionally exciting journey”.

Read more...