Keeping guarding personnel on mines safe

October 2018 Mining (Industry), Security Services & Risk Management, Products & Solutions

They patrol your property in the dead of the night, often risking life and limb to ensure that your assets are secure from the clutches of the criminal element. Hi-Tech Security Solutions spoke to a few local companies about how technology is providing mine operators with the tools to keep patrolling security officers safe.

The first order of business is the ability to track exactly where security officers are at any point in time. Laura Pretorius of Instacom, says that it has a solution called Mission Critical Locate (MCL) that enables live and historical tracking of all staff on ruggedised mobile devices. This also enables the dispatch of a response team that knows the right location to resolve any situation before anyone gets hurt. This live monitoring of staff is conducted in a control room environment from anywhere in the country.

The tracking app also provides security officers with a panic function that works together with the tracking application. Should the security officer press this panic button (located on his or her mobile device), the control room will be notified by an audible alarm. The PC software will then pinpoint the location of the officer and establish what team members are in the vicinity to assist with the event. The control room operator can view the map, and see if there is traffic en route to the incident, thereby minimising reaction time and maximising the safety of the security officer.

Once the panic button has been pressed, an incident may be recorded automatically by the device and saved to the cloud in case this information needs to be retrieved for investigation. The controller has the ability to listen in and thereby determine whether the event is an actual panic or merely a false alarm.

An electronic occurrence book/incident reporting system enables the security officer to actively capture an incident and record what he sees via voice. This provides him with enhanced safety since he no longer has to physically write a comment, allowing him to stay alert and record the incident. The incident message is then sent to all relevant parties.

Automatic discovery and dispatch

Keith Lawrence of BetaTrac, cites the company’s eGuard as an alternative to a handheld device. The eGuard is a GPS-enabled tracking device within an armband worn on the security officer’s left upper arm. This effectively keeps the officer’s hands free and the unit is located out of harm’s way. “When we designed the eGuard, the main focus was on the safety of the patrolling security officer, so it has a panic button and is linked via GPS for accurate positioning every 30 seconds. This regularly relayed signal differentiates the device from those which only emit a signal at the security touchpoints or when a panic button is pressed.”

Because mine properties are very large, with a correspondingly extensive patrol area, security officers need the reassurance that no matter where they are on the property, they will have instant access to a response team via the control room when they activate the panic button.

Lawrence explains that when BetaTrac developed the eGuard in 2010, there were no other body-worn devices available. Combined with the company’s AIMSS (Analytical Intelligent Mobile Security System), which sits on the back-end in the control room, eGuard enables the security company response vehicle to be directly linked to the eGuard duress panic position (via the RapidTrac vehicle module). This eliminates the stress of locating the nearest dispatch vehicle, thereby reducing the critical time to respond, since mere seconds may save a life.

Not only does RapidTrac provide information on the nearest vehicle to a panic situation, it also assists management with an overview of vehicle events such as the vehicle’s location, excessive and harsh braking, and all stop-start incidences. It also enables the most efficient and rapid deployment of vehicles when a security officer activates a panic button.

“Both the eGuard and RapidTrac come with full daily, weekly and monthly autonomous reporting, highlighting performance of all involved. In addition, daily status reports show the real-time status of all the modules in the field. All violations and necessary alerts that are sent to the control room are also mirrored to mobile phones and emails, notifying management at any level selected. eGuard is always on duty in the field as a battery swap-out takes approximately only 30 seconds and it never needs to be docked for recharging,” states Lawrence.

Using RFID

Casey de Villiers and Steve Boulton of Active Track, believe that it is advisable to place RFID tags at key points in facilities such as access and egress points, fence lines, machinery stores, and areas where extraction, sorting, crushing and screening takes place. This will serve companies from both a security and safety perspective. In the first instance, a security officer will be provided with a predetermined patrol route and the times required for him to conduct his patrols at these RFID tag points, whether they be external or internal points.

Boulton adds that a device, such as the Active Track, used together with RFID tags in key safety areas, will maximise adherence to occupational health and safety (OHS) regulations through the provision of a record of regular safety checks. The reports that are generated are completely independent and cannot be changed, thereby verifying their validity and objectivity, and providing accountability.

Active Track has online software which supports its device. As it is GPS-enabled, an accurate time and date stamp confirms events. Should a scanning event be later than scheduled, or even completely missed, an alarm will be triggered and a notification will be sent via SMS or email to a responder and a call made to the security officer on the device to establish the officer’s status.

Boulton points out that most mines today outsource their security in order to contain operational costs. Active Track can be used to determine whether the security officer is patrolling according to the required SLA. The reports generated can be used for disciplinary hearings and will provide protection for both an aggrieved client or for a security officer who has been wrongly accused.

De Villiers says that in addition to a panic button, the Active Track device contains both a shock sensor and a call-in function. The shock sensor is activated when the device is dropped and it places a silent call to either the client or a call centre/control room that can then listen in on the event.

“We train security officers and control room personnel to calmly and methodically handle panic situations and we brief customers on what solutions are best suited to lone worker protection. The location of the event is precisely pinpointed via GPS and a notification is issued to a predetermined recipient. The Active Track device can function with as little as 7% Internet connectivity and still allow the movement of the device to be viewed as the security officer patrols.”

Additional safety mechanisms

Another aid to security officer protection is the deployment of duress RFID tags. De Villiers explains that these tags are not scanned during a ‘normal’, patrol but when the security officer is being held under threat when he/she is trained to scan the standard as well as the duress tags. This action sends an alert to recipients and reaction teams can be deployed to assist him.

Lawrence says that eGuard is adding another element to the safety of all security personnel working on an opencast mine. With many large vehicles moving around a site, it is important for officers to be aware of their presence. “We have leveraged the Internet of Things (IoT) by adding an active RF tag to the eGuard so that all the vehicles fitted with a transponder will send an alert to people in specific predefined zones within their vicinity. This buzzer alert instantly notifies the security officer when the vehicle is nearby.”

Pretorius says that, in order to ensure security officer safety, it is imperative that one has secure and reliable communication, such as PTT. “Conventional two-way radios just don’t do the trick anymore, especially when it comes to range and clarity. When it is time to patrol, our devices are tracked, and a patrol alarm will be emitted, ensuring the employee has not fallen asleep. Should the security officer not accept the patrol alarm, the control room will be notified immediately, so that they can act accordingly, either contacting the guard or tapping into the device and listening in.”



Credit(s)





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Banking’s AI reckoning
Commercial (Industry) Surveillance Access Control & Identity Management Fire & Safety Perimeter Security, Alarms & Intruder Detection Information Security Asset Management News & Events Integrated Solutions Infrastructure Security Services & Risk Management Education (Industry) Entertainment and Hospitality (Industry) Financial (Industry) Healthcare (Industry) Industrial (Industry) Mining (Industry) Residential Estate (Industry) Retail (Industry) Transport (Industry) Conferences & Events Products & Solutions Associations Videos Training & Education Smart Home Automation Agriculture (Industry) Logistics (Industry) AI & Data Analytics Facilities & Building Management IoT & Automation Power Management
From agentic commerce disputes to quantum-powered risk modelling, SAS experts offer a ‘banker’s dozen,’ 13 industry-defining predictions that will separate institutions that master intelligent banking from those still struggling with the basics.

Read more...
Identity-led security in banking
Secutel Technologies Access Control & Identity Management Products & Solutions
Traditional keys, cards, and siloed systems are no longer sufficient in a world where security, compliance, and operational efficiency must work together seamlessly. In 2026, the focus is firmly on smart access.

Read more...
SA availability of immutable backup storage appliance
CASA Software Infrastructure Security Services & Risk Management
CASA Software has launched the newly released Nexsan VHR-Series, a fully integrated, enterprise-class, immutable backup storage appliance purpose-built for Veeam software environments, with usable capacity ranging from 64 TB to 3,3 PB.

Read more...
Beagle Watch named best security company in Johannesburg
News & Events Security Services & Risk Management
Beagle Watch Armed Response has been named Johannesburg’s Best Security Company in the 2025 Best of Joburg Awards, surpassing about 26 nominated private security firms in the greater Johannesburg region, thanks to overwhelming public support.

Read more...
Proactively enhancing campus safety
Surveillance Products & Solutions
Strengthening security management and proactive alerting have become priorities for schools. To address risks such as expansive campuses, multiple entry points, blind spots, and potential intrusions.

Read more...
From the editor's desk: The beginning of the end
Technews Publishing News & Events
            As we come to the final issue of SMART Security Solutions, we can look back on a tough year: long decision-making cycles, squeezed budgets and the expectation of miracles on a shoestring. SMART Security ...

Read more...
AI and automation are rewriting the cloud security playbook
Technews Publishing AI & Data Analytics
Old-school security relied on rules-based systems that flagged only what was already known. AI flips the script: it analyses massive volumes of data in real-time, spotting anomalies that humans or static rules would miss.

Read more...
Onsite AI avoids cloud challenges
SMART Security Solutions Technews Publishing Editor's Choice Infrastructure AI & Data Analytics
Most AI programs today depend on constant cloud connections, which can be a liability for companies operating in secure or high-risk environments. That reliance exposes sensitive data to external networks, but also creates a single point of failure if connectivity drops.

Read more...
Cybersecurity operations done right
LanDynamix SMART Security Solutions Technews Publishing Information Security
For smaller companies, the costs associated with acquiring the necessary skills and tools can be very high. So, how can these organisations establish and maintain their security profile amid constant attacks and evolving technology?

Read more...
Syndicates exploit insider vulnerabilities in SA
Information Security Security Services & Risk Management
Today’s cyber criminals do not just exploit vulnerabilities in your systems; they exploit your people, turning trusted team members into unwitting accomplices or deliberate collaborators in their schemes.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.