Combatting crime, simply

Residential Estate Security Handbook 2018 Security Services & Risk Management, Residential Estate (Industry)

As is the case with many residential estates, there is a guard on duty at the entrance gate 24 hours per day. In this case, a security officer was stationed in the guard room at the entrance to a newly-built residential complex in the northern suburbs of Johannesburg. During his shift, he was alerted to two men making their way up the road leading to the complex.

Upon enquiring whether they were visiting residents of the complex, the two men stormed the guard room and assaulted the officer. During the scuffle, the officer dropped his Active Track device. However, the assailants took little notice of this and proceeded to remove the CCTV equipment, the officer’s possessions and finally the dropped device. One of the attackers fled down the road and into a waiting vehicle, while the other climbed the gate and proceeded towards the apartments.

Unbeknown to the assailants, the Active Track device has a built-in alarm ­function which is triggered when the device is dropped. All alarms are linked to the Active Track 24-hour call centre which allows the support team to respond to the alarm events. Often, the appropriate action is to place a silent call to the device to listen in on the scene and thereafter notify the security company of the findings. This is made possible by the Active Track’s GSM, GPRS and GSM capabilities, working in conjunction with Active Track’s cloud-based support software.

In following with its processes, the call centre placed a silent call to the device which resulted in the officer’s employer dispatching a reaction vehicle to the complex. The call centre was also able to provide the device’s live GPS location which showed that the Active Track had left the complex and was approaching the highway.

Within minutes, the security company had arrived on site to intercept and arrest the assailant in the complex, which it successfully did. However, on searching the him, none of the stolen property was found.

A call from the support centre confirmed that the Active Track had become stationery and was located on the shoulder of the highway, evidently discarded by the assailants. While the CCTV equipment and officer’s cell phone were badly damaged, the Active Track device was in good working order largely due to its rugged and water-poof design.

Pursuant to the SAPS’ swift response, the attackers were arrested and charged for their actions.



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Background checks: risk levels and compliance
iFacts Access Control & Identity Management Security Services & Risk Management
Conducting background checks is a vital step in the hiring process for employers or when engaging service providers; however, it is crucial to understand the legal framework and regulations governing these checks.

Read more...
Smart access for a safer community
neaMetrics Suprema Access Control & Identity Management Residential Estate (Industry) Products & Solutions Commercial (Industry)
Suprema has released its BioEntry W3 facial authentication access control device with multiple authentication options, including RFID cards as well as mobile credentials, designed for durability and resilience.

Read more...
Federated identity orchestration
Technews Publishing SMART Security Solutions Editor's Choice Access Control & Identity Management Security Services & Risk Management AI & Data Analytics
Understanding exactly who resides at the end of a digital device is key, and simple identity number verification by the Department of Home Affairs is no longer a viable solution on its own.

Read more...
Balancing security and ease-of-use
Technews Publishing SMART Security Solutions Access Control & Identity Management Security Services & Risk Management
Fraud incidents have financial repercussions and erode consumer trust, leading businesses to become more aware, though this awareness does not necessarily translate into confidence in their identity authentication processes.

Read more...
Identity and authentication
Technews Publishing SMART Security Solutions Access Control & Identity Management Information Security Security Services & Risk Management
Identity authentication is a crucial aspect of both physical security and cybersecurity. SMART Security Solutions obtained insights into the topic and the latest developments from three companies.

Read more...
Boost revenue streams for MNOS
News & Events Security Services & Risk Management Financial (Industry)
ReveNet has introduced its new solution, designed to safeguard and potentially boost revenue streams in an increasingly challenging landscape for MNOS. The new platform combines advanced analytics and is built on trust, transparency, and sustainability principles.

Read more...
Risk-IO manages mining security risks
Zulu Consulting Security Services & Risk Management Mining (Industry)
[Sponsored] A local mining company with three large operations experienced increased security costs. The liability included no standardised risk assessment, poor management of the efforts to mitigate hazards, and unauthorised access with subsequent theft. The reactive approach to security was not only expensive but also wasteful in the sense that the costs were poorly managed, and there were no metrics to show improvement or trends in incidents.

Read more...
NIS2 compliance amplifies skills shortages and resource strain
Information Security Security Services & Risk Management
A new Censuswide survey, commissioned by Veeam Software reveals the significant impact on businesses as they adapt to this key cybersecurity directive, with 95% of EMEA businesses siphoning other budgets to try and meet compliance deadline.

Read more...
SA company develops world-first safe K9 training for drug detection
Editor's Choice News & Events Security Services & Risk Management Government and Parastatal (Industry)
The Braveheart Bio-Dog Academy recently announced the results of its scientific research into training dogs to accurately detect drugs and explosives without harming either the dogs or their handlers.

Read more...
Understanding South Africa’s Cybercrimes Act
Information Security Security Services & Risk Management
The Cybercrimes Act No.19 of 2020 is a comprehensive legislative response to the evolving landscape of cyberthreats in South Africa. Its effectiveness, however, relies on enforcement, which relies on implementation, international cooperation, and collaboration between the public and private sectors.

Read more...