Perimeter protection in Ghana

October 2019 Mining (Industry), Perimeter Security, Alarms & Intruder Detection

Protecting the perimeter of a mine is difficult, primarily because of the size of the property and subsequently the length of the perimeter. Due to these constraints and the difficulty associated in verifying alarm conditions, protecting large perimeters effectively is a difficult and expensive process.

On the other hand, it is more feasible and practical to protect strategic sites and process areas where perimeters are more manageable and security personnel can verify and respond to alarms in a reasonable time.

This concept has been implemented at a gold mine in Ghana where the client has erected a dual fence with AcoustAlert PIDS fence detection on both inner and outer fence lines. The fence has been split into eight zones of up to 300 metres each, affording detection of an intrusion into their critical processing plant area. The dual perimeter fence is approximately 2400 metres long and the AcoustAlert field processors are housed in specially manufactured steel kiosks around the perimeter, between the two fence lines in the dead-man’s zone.

One concern from the client was our initial proposal to use fibre-optic cable around the site in order to LAN link all AcoustAlert field processors. The difficulty in a place like Ghana is getting technical guys to splice and maintain the fibre LAN network infrastructure. To solve this problem, AcoustAlert used two-wire copper Ethernet extenders which can extend Ethernet over many hundreds of metres over a normal two core cable. This removed the difficulty around maintenance. Specific lightning protection was implemented for the two-wire copper connection along with lightning protection on the incoming mains.

All field processors are linked over the two-wire Ethernet infrastructure back to a central control room. All field processors are managed by the AcoustAlert site manager software, which besides handling and managing the AcoustAlert field processor can also monitor alarm input conditions and switch outputs which are mapped to inputs in the software.

The operator also has several soft outputs which can be controlled on the user interface to open or close gates, or switch lights on and off, manually or automatically. This I/O control makes linking alarm inputs (from AcoustAlert or other devices or conditions) to CCTV and other alarm/access systems to switch cameras, and so on.

For more information contact Cliff Rose, AcoustAlert,,


Share this article:
Share via emailShare via LinkedInPrint this page

Further reading:

Securing perimeters of secure locations
November 2019, Axis Communications SA, Modular Communications, Hikvision South Africa, Nemtek Electric Fencing Products, Technews Publishing, Stafix , Government and Parastatal (Industry), Perimeter Security, Alarms & Intruder Detection, Integrated Solutions
Hi-Tech Security Solutions asked a number of companies offering perimeter security solutions for their insights into protecting the boundaries of national key points.

Effectively securing large mines
October 2019, Veracitech, Technews Publishing, Dallmeier Electronic Southern Africa , Mining (Industry), Integrated Solutions
The vast areas covered by mining operations present security challenges such as the ability to provide effective perimeter protection and surveillance, while maintaining reliable communications between remote areas and control rooms.

Improving mining safety through technology
September 2019 , Mining (Industry), Integrated Solutions
There is a strong connection between technology, cybersecurity and the physical safety of mineworkers; the more mining operations automate, the higher the cybersecurity risk.

Enhanced biometric technology for mines
September 2019, ZKTeco , Mining (Industry), Access Control & Identity Management
Biometric identification and authentication are currently used at various mines in South Africa and in the SADC region.

Multitude of solutions available for mining operations
October 2019, Axis Communications SA , Mining (Industry), CCTV, Surveillance & Remote Monitoring
Mines need to spend money on security just like all businesses do, and the economies of scale that apply to mining operations make some of the most advanced and expensive technologies somewhat more attainable than in many other applications.

Improving access in mines
October 2019, Astra Fasteners , Mining (Industry), Access Control & Identity Management, Products
The VP1 controller provides full access control and remote monitoring of intelligent locks without having to wire into a network or install, manage and maintain software.

Adding value to mining security
October 2019, Cathexis Technologies , Mining (Industry), CCTV, Surveillance & Remote Monitoring
Cathexis offers users the ability to make key-decisions, based on intelligent information processing and take automated actions.

Perimeter security in high EMF environments
October 2019, AcoustAlert , Perimeter Security, Alarms & Intruder Detection
Testing AcoustAlert PIDS on extra high tension sites like power stations and power generating gas turbine plants.

Security workforce compliance tool
September 2019, Bloodhound Technologies , Security Services & Risk Management, Mining (Industry)
To maintain service excellence across a security workforce is impossible without the help of information systems and technology.

AI is transforming the security industry
September 2019, Fidelity ADT , Perimeter Security, Alarms & Intruder Detection
Artificial intelligence (AI) is no longer a futuristic, fictional concept. The truth is we are living the future now.