An intelligence-based security model

June 2018 Editor's Choice, Security Services & Risk Management

“We have a problem,” says Locstat’s Hallam Ford. “South Africa has one of the highest crime rates in the world yet our up to R45 billion per annum security industry is not containing and or solving the problem. It could do though; we have the power to take back our communities, regain the initiative and prevent and reduce crime in South Africa. We need a new model and a different approach”.

Most of us subscribe to a multi-layered security approach. This starts with the wall around your property, builds through all your mechanical enhancements and then expands into your technological and procedural elements including your armed response subscription.

We are then either all members or patrollers of our local neighbourhood watch. Some of us even live in communities where we have taken things further by bringing in force-multipliers like licence plate recognition (LPR). More privileged communities pay for tactical teams to be on call. These are all great and fundamentally necessary layers. We need them all. But we still have the problem. Criminals still operate with near impunity.

Criminals these days are capable, agile, intelligent and highly adaptable. They innovate on-the-fly and easily manoeuvre around our security layers.

“The problem,” Ford argues, “is the model, its response-based. When something happens, we react. The armed response (AR) model is a good example. We need AR, but it is no panacea and has reached its current ceiling – it can’t innovate. We need something that makes our existing layers more efficient and effective and opens up new innovations.”

What criminals can’t do is manoeuvre around the fact that when they strike, they leave a mark, like a fingerprint, in the environment they have targeted. That ‘fingerprint’ is valuable when converted into data. Crime is seldom random.

“The missing layer is situational awareness,” says Ford.

All about intelligence

No military general goes to war without intelligence; No business is successful without market research; No doctor prescribes treatment without patient history and test results. We all use and rely on data in our professional lives, yet when it comes to the issue most dear to us – the safety and security of our families and possessions – why are we not using data as a force-multiplier?

Without credible data, we have weak situational awareness. We are blind, guessing, making decisions based on opinion instead of objective, credible facts. Without the patterns and trends that data provides, our approach can only ever be to just respond. It’s time for a paradigm shift in our security model.

“We need situational awareness and to exploit the products that a data-driven approach brings. We need to change and become pro-active and ultimately predictive if we are going to solve the problem.”

Historically we were unable to be pro-active as there was little credible data. The situation has changed, Ford says. Technology is available to now gather information, record incidents, geolocate them, categorise them, store then, analyse and visualise them, track resources and ultimately attain situational awareness.

Once we have situational awareness we enable the shift as we can now become pro-active based on patterns and trends. Through the use of further, more advanced capabilities such as Repeat and Near Repeat Victimisation Analysis (RNRV), we can then even become predictive. Importantly, now that we have data, we can measure the effect of our actions.

Cloud-based intelligence

Locstat is one of these new capabilities which exploits technology to enable this data-driven approach by offering useful information to many through its cloud-based services. Through Locstat Cx, communities become empowered, credible and capable. The private security industry, through Locstat Sx can also adopt a new model, including achieving Industry 4.0 standards.

Ford explains that Locstat Cx is the basic service the company provides. It offers users functions such as heatmaps, statistics, tracking and visualisations in real time. Moreover, the service is offered free to communities, such as neighbourhood watches, and members can access it via a PC or mobile device.

Locstat Sx is an advanced version of the service that is sold to security service providers, municipalities, utilities and others. It includes the features of the Cx version, as well as RNRV, reports from armed response officers, tracking and more.

Ford adds that the benefits include:

• Dominating the security agenda through:

- Disruption, deterrence and denial

- Restricting criminal ability to manoeuvre

- Re-taking the initiative

- Hardening against risk

- Being pro-active and predictive instead of reactive

• Increased capability through:

- Situational awareness

- A more secure community

- Credible and empowered communities/security providers

- Validation and return on investment

- Innovation

• Collaboration between:

- Community, security providers and law enforcement

“By becoming pro-active, we can now regain the initiative and start to dictate the security agenda in our communities,” Ford concludes. “Currently the criminals hold most of the cards, we can change this.

“Data-driven technologies like Locstat aren’t a threat to the security industry. On the contrary, they look to empower it to achieve its true potential.”

For more information contact Locstat, +27 (0)21 683 3624, [email protected], www.locstat.co.za





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

2024 Southern Africa OSPAs winners announced
Editor's Choice
The 2024 Southern Africa Outstanding Security Performance Awards (OSPAs) winners were revealed on Tuesday, June 11th, at the Securex South Africa Seminar Theatre hosted by SMART Security Solutions.

Read more...
Local manufacturing is still on the rise
Hissco Editor's Choice News & Events Security Services & Risk Management
HISSCO International, Africa's largest manufacturer of security X-ray products, has recently secured a multi-continental contract to supply over 55 baggage X-ray screening systems in 10 countries.

Read more...
NEC XON shares lessons learned from ransomware attacks
NEC XON Editor's Choice Information Security
NEC XON has handled many ransomware attacks. We've distilled key insights and listed them in this article to better equip companies and individuals for scenarios like this, which many will say are an inevitable reality in today’s environment.

Read more...
Detecting humans within vehicles without opening the doors
Flow Systems News & Events Security Services & Risk Management
Flow Systems has introduced its new product, which detects humans trying to hide within a vehicle, truck, or container. Vehicles will be searched once they have stopped before one of Flow Systems' access control boom barriers.

Read more...
Cybercriminals embracing AI
Information Security Security Services & Risk Management
Organisations of all sizes are exploring how artificial intelligence (AI) and generative AI, in particular, can benefit their businesses. While they are still figuring out how best to use AI, cybercriminals have fully embraced it.

Read more...
The future of digital identity in South Africa
Editor's Choice Access Control & Identity Management
When it comes to accessing essential services, such as national medical care, grants and the ability to vote in elections to shape national policy, a valid identity document is critical.

Read more...
Do you need a virtual CIO?
Editor's Choice News & Events Infrastructure
If you have a CIO, rest assured that your competitors have noticed and will come knocking on their door sooner or later. A Virtual CIO service is a compelling solution for businesses navigating tough economic conditions.

Read more...
AI-enabled tools reducing time to value and enhancing application security
Editor's Choice
Next-generation AI tools are adding new layers of intelligent testing, audit, security, and assurance to the application development lifecycle, reducing risk, and improving time to value while augmenting the overall security posture.

Read more...
Perspectives on personal care monitoring and smart surveillance
Leaderware Editor's Choice Surveillance Smart Home Automation IoT & Automation
Dr Craig Donald believes smart surveillance offers a range of options for monitoring loved ones, but making the right choice is not always as simple as selecting the latest technology.

Read more...
AI enables security solutions to define business strategies
Regal Distributors SA Editor's Choice
While allowing technologies to do exactly what they should do with even more efficiency and precision, AI is also empowering these same technologies to break through their traditional boundaries and create an ecosystem where one interface delivers outcomes across highly segmented verticals.

Read more...