SMART Mining Security 2024

mining securi y 2024 A guide to protecting and managing people and assets in digitally transforming mines Distributed Radiant System: Redundant fibre optic ring Quality Underground Communications TECHNOLOGY Sole supplier in Africa U Q O M M

Intelligent solutions for mining The mining industry sector has always been ranked amongst the ones that have the most dangerous working environments. It is a hazardous operation and consists of considerable health and safety risks to mining personnel. Each year, a large number of injuries and deaths are recorded from mining accidents globally, including leaks of natural gases, collapsing of stopes, dust explosions, flooding, or general mechanical errors. • Reduced administration – no need to manually distribute keys or log usage. • Monitor user activity – each user is uniquely identified through PIN, access badge or biometrics. • Better control – allocate specific items to authorised users at specific times, and allow custom access rules such as double or triple authorisations as needed. • Reliable and robust – our nickel-plated brass iFobs are designed to IP67 rating to provide years of proven maintenance-free use. • Increased visibility – real-time and centralised activity reporting, with email notifications and alarms to instantly alert administrators of important events. • Deep integration functions – can integrate with third-party databases and systems to reduce administration, and drive process. • Compliance – meeting the stringent requirements from major regulatory bodies for system configuration and equipment control. Our intelligent key management solutions and electronic key management systems secure, manage and audit the use of every key. Traka ensures that only authorised staff are allowed access to the custom key cabinets and only then, to designated keys. The high-security key management system provides a full audit trail of who removed the key, when it was taken and when it was returned, keeping your staff accountable at all times. Beyond securing and managing access to keys, Traka solutions can generate unique workflows that support the important processes of your business – require a secondary authorisation for master keys, pair key sets to guarantee the lockout of hazardous systems during maintenance, or set curfews which automatically send notifications to administrators, managers or users. Expect more from an integrated key and asset management solution by Traka How do intelligent keys help drive an intelligent business? What does this mean to your business? Improved control over critical processes to maximise their effectiveness, efficiency and safety. Beyond giving you total control over your keys and valuable assets, Traka can be a vital tool in affecting the way your facility, equipment, and personnel collectively operate Health & safety Health and safety of workers remain a challenge in the industry. A well-designed process workflow is crucial for the business to manage operational risk, meet fiduciary and regulatory requirements. Sustainability Mining companies have to address an increasing list of demands from a wide range of stakeholders to be not only profitable and productive, but also responsible and sustainable. Miners are focusing on efficiencies by streamlining business processes. Compliance Mining sites possess unique challenges and risks in the areas of safety and security. Keys and asset control policies are critical in the mining environment. It is heavily regulated, and operators must be 100% compliant to ensure high security and safety levels, minimising consequences and mitigating vulnerability which could lead to significant penalties and costs for the business.

Challenges & solutions: Compliance, control and cost-efficient Keep your assets where they are needed most Your organisation’s assets are critical to its success, and should be managed to maximise its effectiveness. Traka locker solutions provide centralised control over your important items, allowing you to determine who has access, and when. Our industry-leading integration options make administration effortless, and present unique opportunities for your assets to help drive critical processes. Asset identification options, such as RFID tagging, provide the most detailed tracking and asset usage data possible, maximising efficient day-to-day operations. Whether you need simple, temporary storage for a single facility, or enterprise-level control over thousands of devices around the globe, Traka builds a locker solution to suit the needs of your organisation. With Traka, your assets become more secure, more functional, and more valuable to your business. Traka is the global leader in intelligent management solutions for keys and equipment. Our solutions help all types of organisations control their important assets, improving productivity and accountability, and reducing risk in critical processes. Full audit trails Every event/action that takes place at the cabinet is a complete audit trail. Service & maintenance request Generate request automatically to ensure all equipment is operational and ready-to-use. Complete history Able to retain a complete history and report of all key cabinet, locker and user transactions. Exception reporting Reports overdue key, change to access rights, unauthorised access attempts, and deleted users. Challenge #3: How to ensure compliance with governing authority? Traka Solution: Full audit trail & customisable reports Challenge #2: How to streamline operation process while keeping it safe? Traka Solution: Personnel safety & process automation Fault logging Allows users to record an issue or fault against items. Faulty item exchange Allows users to deposit a faulty item into an empty locker and obtain a replacement device. Reason logging User must log the reason as to why they need that key. Seamless integration Able to integrate with existing third-party systems. Asset return assurance Assurance that keys and assets never leave the facility. Challenge #1: How to ensure only qualified staff has access to keys & equipment? Traka Solution: Secure access Multiple authorisations Ensures dual control over vault keys/combinations and other critical assets. Fleet management Control access to, and be able to log vehicle’s location, mileage and fuel level, to ensure efficient fleet usage. Curfew management Curfew can be set on any asset to enforce its return by a certain time. Email notification Email notifications to alert users of specific key/asset movements, events and overdue curfews. Decentralised assets, centralised control TrakaWEB is a browser-based administration suite for centrally managing Traka Touch key and locker systems from any authorised device on your network, anywhere in the world. It enables you to easily manage users and items from central or distributed locations, and can readily integrate with an existing database to automatically enrol users, credentials, and access permissions. It can support unlimited keys or items, allowing systems to be expanded to thousands of key cabinets or locker systems across the globe that can be locally and centrally managed through a secure network. By integrating with your existing HR, access control or other third-party platforms, Traka can extend the reach of these systems to offline openings, vehicles, electronic devices, tools, and equipment. Gain total visibility of these assets from your central security desk, and take better control over the processes that affect your bottom line. • Automatically enrol users and define security settings based on employee status or department assignment. • Prevent users from exiting a facility or clocking out until keys are returned. • Restrict access to hazardous areas until the proper safety equipment is checked out. +27 11 761 5025 www.traka.com

Andrew SMART Mining Security 2024 LETTERS TO THE EDITOR Letters to the Editor should be addressed to Andrew Seldon at [email protected]. Sending material to this publication will be considered automatic permission to use in full or in part in our Letters column. Be sure to include your name, e-mail address, city and postal code. We reserve the right to edit all letters. All rights reserved. No part of this publication may be reproduced, adapted, stored in a retrieval system or transmitted in any form or by any means, electronic, mechanical, photocopying, recording or otherwise, without the prior written permission of Technews Publishing (Pty) Ltd, Reg No. 2005/034598/07 A division of Technews Publishing (Pty) Ltd Wild Fig Business Park, Block B, Unit 21, 1494 Cranberry Street, Honeydew Tel: +27 11 543 5800 ISSN 1562-952X Editor Andrew Seldon: [email protected] Contributors Dr Craig Donald Johan van Wyk Advertising sales Tracy Wolter: [email protected] Heidi Hargreaves: [email protected] Subscription Services For address changes, orders, renewal status or missing issues, e-mail: [email protected] Subscribe online: www.technews.co.za Design and layout: Technews Production Department Disclaimer While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements, inserts and company contact details are printed as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material. FROM THE EDITOR’S DESK www.securitysa.com Published by Welcome to the 2024 edition of SMART Security Solutions’ Mining Handbook. Mining is a challenging industry for security professionals, although security is a challenge on this continent, no matter your industry. Mines, however, much like the CIT sector, are faced with increasing levels of extreme violence along with the increased criminality the current government seems to encourage. In some markets, we joke that security is a grudge purchase (in which industry is it not?), and we raise an eyebrow at companies that pay less than the minimum wage and have untrained security personnel on the job. Mines no longer have the luxury of simply having any old guards at the gate. Their security teams today are well-trained and armed tactical forces with body armour and armoured vehicles, and the crime syndicates sometimes still outman and outgun them. In the handbook, we chat with Nash Lutchman, a leader in the industry for 20 years. Nash tells us how the security operations on mines have changed from an internal focus on preventing insider crime to a strategic approach in dealing with highly organised mafias. Nash is a mine of information (pun intended), so we have only been able to pass on a few of his thoughts, but it makes a fascinating (perhaps horrifying) read to see how things have changed. The old ‘body on patrol’ is certainly not a feature in mines focused on security and successful operations. We also spoke to some clever IT people about digital transformation at mines. Sometimes, it seems strange that dusty mines with decades-old equipment would be in the digital transformation game. Still, they definitely are, as while there are no shortages of old industrial equipment, there is also a plethora of new technology in all areas of operations (including security). However, while digital transformation may be the ‘in thing’, the process is complex. It’s not about technology but the convergence of processes, people, technology and strategy into a new world. Something old and something new We also include a brief introduction to our mining round table, which went off course as the people involved in risk and security on mines started talking about what matters to them. Unsurprisingly, while technology is a critical factor in mine security, their challenges mean they need more than cool tech. We only touch on the beginning of the round table, but we will publish an audio review of the whole event – keep an eye on our LinkedIn page or the www.securitysa.com home page for a link. Of course, we couldn’t have a publication without a few articles focused on technology. The handbook should be seen as a good start because we will host a SMART Mining Security Conference in Johannesburg later this year. We have only started planning, but it looks set to be very interesting. Once again, keep an eye on our home page, LinkedIn, and the news briefs for more information. On the topic of conferences, SMART Security Solutions will be hosting the Seminar Theatre at this year’s Securex from June 11 to 13. In the coming months, we will do some selfpromotion to let you know what to expect. It will definitely be worth a visit.

www.securitysa.com 3 mining securi y2024 mining securi y2024 Leaky Feeder networks UQOMM designed a DRS system especially for underground mines and confined spaces, allowing it to reliably carry any band below 1 GHz through any type of tunnel. The DRS system simultaneously allows more than one band on the same underground network infrastructure. The Master unit captures the signal on the surface and distributes it through fibre optics to the remote equipment located in the tunnels. OUR COVER 21 mining securi y 2024 A guide to protecting and managing people and assets in digitally transforming mines Distributed Radiant System: Redundant fibre optic ring Quality Underground Communications TECHNOLOGY Sole supplier in Africa U Q O M M CONTENTS Editor’s note..........................................................................2 Trends & Opinion Enhance control rooms with surveillance and intelligence........ 6 A long career in mining security.......................................................8 Future trends for electronic safety and security in mining.........14 Unlocking enhanced security for mining....................................15 Mining Round Table...........................................................16 Attacks from every side: the basic reality for overwhelmed security teams on mines. Digital Transformation......................................................22 Digital transformation has been hyped to death, but is a reality all companies in all industries need to address, including the mining sector. Fire Safety...........................................................................26 FS Systems discusses fire safety risks and solutions as they pertain to mining. Information Security..........................................................30 No particular industry is immune to cyberattacks like phishing, CEO fraud, and financial scams, and this includes the mining sector. Access Control Key and asset management for mining........................................32 Mines require proof of performance.............................................33 Container conversions for access control....................................34 Effective access control for peace of mind..................................34 Enhancing overall access control....................................................34 Traffic control and volume analysis................................................35 The future of access control is mobile...........................................36 Perimeter Security Perimeter and open spaces protection........................................38 Optimising safety and security in mining....................................39 Products & Solutions Fewer cameras, less infrastructure, more security....................40 Key concepts in lithium-ion batteries...........................................41 NECRT units supplied to copper mine in the DRC....................42 Real-time physical threat detection solution.............................43 Safety & Environment........................................................44 South African mining safety legislation has made strides towards incorporating the use of, and reliance on, technology, but this does not come without challenges. Directory of product and solution suppliers to the mining industry.......................................................46

UNLOCKING THE POWER OF US IN MINING SECURITY Responsive, adaptable security solutions tailored for the mining sector In the challenging mining industry, Thorburn Security shines with top-tier safety standards. As a Level 1 B-BBEE organisation, we offer dynamic security solutions tailored to the industry’s needs. With our expertise, we prioritise safety for production, staff, and assets. We also engage in partnerships to foster community development, job creation, and corporate social responsibility, reflecting our commitment to collective impact. Our Comprehensive Security Solutions Include: ■ 24/7/365 Guarding ■ Armed Response and Tactical Teams ■ Advanced Access Control Systems ■ CCTV, Intrusion Detection, Maintenance, and Installation ■ Electric Fence Line Installation ■ Dedicated Electronic Technical Teams ■ Specialised Strike Action and Crowd Control Units ■ Air Support Surveillance (Drone and Helicopter) ■ Intelligence and Investigation Services ■ Onsite Central Monitoring Centre & Offsite National Command and Control Centre ■ Speed Monitoring Systems ■ Comprehensive COVID-19 Management ■ Cutting-edge Cyber Management Systems Ranesh Ranjith, Sales and Marketing Director – Mining [email protected] | [email protected] Scan the QR code to discover how Thorburn Security can transform your mining operation’s security landscape. Intelligent Protection www.thorburn.co.za

ENHANCING WORKPLACES ACROSS AFRICA WITH INTEGRATED SOLUTIONS Experience the power of integrated workplace management With 50+ years of experience, Tsebo Solutions Group leads in Integrated Workplace Management Solutions in Africa. Our sector-spanning expertise delivers cost-effective, risk-reducing solutions that boost quality, efficiency, and productivity. We prioritise health, safety, and well-being, fostering a skilled workforce dedicated to understanding clients’ needs, embodying “The Power of Us.” Our Services Include: ■ Catering ■ Facilities Management ■ Cleaning and Hygiene ■ Pest Control ■ Protection Services ■ Energy Solutions ■ Procurement ■ Workspace Design ■ Engineering Services ■ Remote Camps Management Sales Queries: +27 87 820 4146 [email protected] | www.tsebo.com Scan the QR code to learn more about how Tsebo can revolutionise your workplace management. “With our dedication to sustainable development and equal opportunity employment, Tsebo emerges as a forwardthinking leader in Africa’s corporate realm”. A workplace that works for you

TRENDS & OPINION Mines are typically focused on a core product, such as gold, diamonds, platinum, copper or other minerals. The extraction and production process typically involves a large area of mining, as well as processing and refining facilities that need to be protected. The focus on security typically intensifies; the value of the material increases as one gets to the finished product, with high-risk areas having the major security provisions. Simply put, stealing finished or near-finished products has the most impact on profitability. However, criminals are prepared to go down the value chains to get anything they can, so security needs to be applied throughout the process. Mines also represent opportunities for theft of a whole range of equipment, facilities, fuel, and infrastructure components such as cables, IT resources, tools, electrical equipment, vehicles, and even scrap that can impact profitability and operational capacity. I have made the point in a previous article on why situational awareness of operators is so important to CCTV detection (www.securitysa.com/19326r). Even so, the sheer size of mines, the dispersion of assets, and the diversity of targets that can get stolen make mining environments one of the most difficult places to do CCTV surveillance. How well CCTV can perform in detecting the most critical threats is a combination of risk analysis, experience, and, most importantly, information or, specifically, intelligence. Intelligence and investigation information are important in directing surveillance resources to the most critical hotspots, people, and targets. By combing assessed risk from certain people or vehicles, and relating this to potential high-risk target areas at certain times or locations, the ability to detect and apprehend suspects increases dramatically. Combining information and surveillance In the early days of CCTV implementation, investigation departments where one of the main lines of pursuing and convicting suspects. They were exclusive, and sometimes reluctant to share any information with anyone. This often led to CCTV gathering of information being a one-way street, with operators not even knowing the outcomes By Dr Craig Donald. Using intelligence and smart surveillance to assist control rooms in dealing with mining environments’ size and dispersed nature. Enhance control rooms with surveillance and intelligence

www.securitysa.com 7 mining securi y2024 TRENDS & OPINION Dr Craig Donald is a human factors specialist in security and CCTV. He is a director of Leaderware, which provides instruments for the selection of CCTV operators, X-ray screeners and other security personnel in major operations around the world. He also runs CCTV Surveillance Skills and Body Language, and Advanced Surveillance Body Language courses for CCTV operators, supervisors and managers internationally, and consults on CCTV management. He can be contacted on +27 11 787 7811 or [email protected] of incident information they passed on. This balance was partly addressed by having specialised surveillance functions, sometimes referred to as third tier, which is targeted, focused or dedicated surveillance, where investigations worked more closely with CCTV operator personnel to share and mutually gather intelligence to aid in detection and conviction. The model worked and continues to work well, but there has been an increasing general recognition that intelligence needs to be shared more widely with smart surveillance contributing, and local and big data systems providing clues for operators to focus on as part of their normal daily duties. Increasingly, we are seeing the combination of intelligence with smart surveillance and traditional CCTV functions in order to pick up potential threats in a series of zones around and within the mine as soon as possible during the incident cycle. The more sources of information and the more widely spread they are, the better the prediction of events, incidents, and surveillance targets can be established. This requires greater quality of CCTV around high-risk surveillance points, as well as an understanding of crime tactics and techniques to look out for combined with an awareness of vehicles and vehicle movement; also of people of interest internally and externally. For example, a person being dropped off by a car on a mine perimeter should be briefly checked if it is in an unusual area, but a known suspect getting dropped off on a public road from a car linked to previous crime incidents, near a sensitive section of the perimeter, would immediately create a critical viewing alert for operators. Similarly, cars stopping, or people being dropped off, in areas where there is typically little activity would also be an alert. These kinds of notifications are becoming increasingly possible with integrated analytics capabilities and AI, although the current status of systems still seems well below potential. With technology like drones and links to surrounding camera sources, this information can be increasingly picked up from zones wider and further away from the central risk area, resulting in improved forewarning, threat analysis, and response preparation. Pattern variations like unusual movements, concentrations of people, closeness to risk areas at unusual times, direction of movement, unusual postures, carrying objects, etc., are all aspects that should be responded to. The widespread nature of mining operations means that not only is early detection important, but the extent of a timeous response and capacity for extended pursuit also comes into play, and the more prepared security can be to deal with this kind of issue, the better. Information confidentiality One of the issues in the distribution and sharing of information has always been, how the confidentiality of information can be secured. Investigators are very reluctant to give information away if it leads to people of interest becoming aware they are on investigation lists. Similarly, intelligence information that gets divulged may end up changing suspects’ behaviour or tactics around weaknesses in detection systems. Ideally, one would hope all such information to be strictly confidential. Criminal syndicates have a strong thrust to infiltrate control room personnel across many, if not all, mining operations. This can lead to information being leaked. This is not necessarily all bad, and knowing they are being looked at does have possible disruptive effects on syndicates and their members. It is likely to interrupt their activities as people avoid showing suspect behaviour or suspend crime operations for a while. Indeed, sudden changes in behaviour may confirm suspicions about targeted people. Syndicates may also feel the need to cycle through other people or vehicles to maintain a presence, and this use of more people may also set off warning indicators. It also potentially enlarges the group being looked at, and the connections could facilitate further investigations. The company can also release deliberately misleading information to disrupt syndicates as long as it does not impact innocent people. Smart surveillance technology and the use of big data in combination with conventional CCTV control room strategies increase the potential for security service delivery. This is not only for increased detection opportunities, but also for confirmation and verification of alarms and operator observations. This means that operators can work more smartly and adapt more easily to criminal strategies, even in such a spread-out mining environment. Given the need for confidentiality of certain key investigation or intelligence information, access to information does need to be protected to allow access to only certain CCTV functions, such as specialists or third-tier parties. These would be selected personnel who would work closely with investigations to help target people of interest or to review particular combinations of people and areas of high risk. Nevertheless, there is extensive information that can be used in the day-to-day control room operations to assist in viewing strategies and enhance operator performance.

8 www.securitysa.com mining securi y2024 A long career in mining security SMART Security Solutions talks to Nash Lutchman about his career in risk and security management. Nash Lutchman recently retired from a security and law enforcement career, initially as a police officer for some 17 years, and for the past 20 years as a leader of risk and security operations in the mining industry – in diamond, platinum, and gold mining, to be specific. With all the challenges mines face under the banner of ‘risk management’, into which we place physical security and various other risk mitigation measures, SMART Security Solutions approached Nash early in his first year of retirement to find out how he has seen the security operations in mines change over the years. Summing up a 20-year journey of security operations in one article means we can only touch on a few subjects without going into any real depth. However, the tour of duty that Nash has been on clearly indicates how the risks have changed or evolved and how security operations have consequently had to change and continue to change to meet these challenges. TRENDS & OPINION Insider threats When Nash entered the mining sector, he says mining security programmes were primarily inward-focused. In the late 1990s and early 2000s mines put time and money into managing insider threats from an operational safeguarding perspective. In terms of capital investment to create secure environments for its precious minerals and stones and to monitor and maintain these environments, mines invested heavily in leading-edge physical and technology-driven security measures. From an operational security perspective, however, the emphasis was on managing the insider threat by typically ‘policing’ employees. This was achieved largely through designing processes, procedures, and industrial environments to deter employees and contractors working with, or in the vicinity of precious minerals, thus limiting the pilfering of the product. Access control systems were designed to strictly control which employees entered or worked in areas where precious minerals were present. Industrial environments were largely designed and engineered to minimise contact between people and minerals. Areas within processing and reduction plants were zoned in terms of low risk, medium risk, and high risk. Employees were ‘zoned’ accordingly to access or work in these areas. The layered approach saw physical barriers restricting entrance to different areas, with more stringent security protocols added on as the risk classification increased. Access was primarily managed through turnstiles, magnetic locks, and proximity cards. In some instances, access was managed through rules-based access control measures. This means that access to certain areas, or equipment for that matter, was managed according to a set of predetermined rules and permissions. If a maintenance worker was scheduled to enter the area and replace a pump, for example, the mine would have AI-generated image from DeepAI.org

www.securitysa.com 9 mining securi y2024 TRENDS & OPINION used past experience to know that the job would take a certain amount of time. The system would automatically flag an anomaly if the job took too long or if the individual left too early. This would result in mine security applying more robust controls to the incident, such as conducting a more stringent search of the person when they exited the restricted area, reviewing video footage to see if the task had been completed correctly, or even registering the individual as a person of interest with the investigation team. Interestingly, Nash says that even in the early 2000s, a rudimentary form of facial recognition was used in some instances to control access to high-risk areas. He provides an example of how this worked. When a worker had a reason to enter a high-risk zone, he would swipe his proximity card at the card reader. This would activate the ‘picture comparison’ control, meaning that the worker’s photograph would come up on a screen in the control room. An operator in the control room would then ask the worker to look into the CCTV camera, and the operator would then compare the live image on the monitor to the photograph image on file. On this basis, the operator would decide whether to grant access or not. Clearly not a foolproof control. On the point of facial recognition, Nash chuckles as he recalls stories related to him about homing pigeons being used to smuggle diamonds out of processing plants, almost like one would use drones today. Allegedly, dishonest employees would put stolen Nash Lutchman. diamonds in a bag, hang them over a pigeon’s neck, and literally fly the diamonds out. As the urban legend goes, this innovative way of using homing pigeons to breach high fences and large tracts of ‘no man’s land’ was discovered when an apparent overzealous employee had put too many diamonds into the bag, weighing the pigeon down, causing it to settle inside the perimeter of the processing plant where it was discovered by mining security. Expanded focus to deal with additional threats It should be noted that mines did not avoid dealing with external risks in the past, as service providers selling physical security can attest, it was simply not the primary focus. On reflection, Nash agrees that the risk landscape at that time warranted this inward focus, but the industry soon realised that more effort was needed in addressing external threats, which escalated over the last two decades. At the time, mines experienced a spate of petty or nuisance crimes, mostly manifesting in individuals scavenging mine sites to pick up something of value they could use or flog to the scrap dealers. Generally, these scavengers were pretty harmless, submitting to mine security and very seldom resisting apprehension. Furthermore, appropriate safeguarding measures were in place when precious metals and stones were transferred from vaults onto armoured cars, helicopters, and aeroplanes, primarily to resist armed attacks on the precious cargo. These days, hostile attacks on mines, led by mobs armed with high-calibre weapons and even armour-piercing ammunition, are now commonplace in South Africa as security conditions continue to deteriorate in the country. The rampant crime rate, the widespread corruption, and our poorly performing state organs drive organised crime activities, which manifest as high levels of serious and violent crime. This threat is external and is much more sinister and dangerous than employee pilferage. These days, security officers on the ground who form a line of defence against these attacks must be physically and emotionally fit, well-trained, and well-equipped. The image of a security Continued on page 10

Continued on page 12 officer of the past with a baton and a whistle has shifted to one that is combat-ready, armed, and tactically prepared to respond to imminent hostilities. Armoured vehicles have now replaced soft-skinned vehicles, and the focus of mining security programmes has now shifted from employee pilferage to dealing with external threats such as armed robberies, illegal mining, damage to, and theft of copper infrastructure, violence and extortion at mining sites, civil disobedience, cybercrimes, and corruption. Back in the day, as part of external risk management, mines vetted potential employees, contractors, and vendors in an effort to pre-empt any risk that could be unwittingly injected into the business. These days, the vetting processes are much more vigorous and have been broadened to consider an array of multifaceted risk features. Over and above third-party verification of identity, qualifications, criminal records, civil and financial judgements, and legal competencies, amongst others, the vetting process used today usually includes selfdeclarations as well. The internal risks have also evolved from a pilferage focus to include jobs for sale, embezzlement, and procurement-related offences, amongst others. For example, people working in sensitive positions could create ghost workers, override controls, process fake invoices, manipulate tenders, or supply sensitive information to syndicates. Mining security programmes have evolved from being largely guarding in nature to include specialised risk and governance control functions, security risk intelligence, working with big data, analytics, and these programmes are technologies enabled as well, boasting unmanned aerial vehicles, artificial intelligence, machine learning, as well as augmented and virtual reality amongst others. Increasing violence Ethnic violence, or faction fights, also fuelled by and against foreign nationals working on mines, were very much part of the mining landscape from the 1880s and persisted into the 1980s. Many mining houses equipped themselves with ‘riot’ vehicles and ‘riot’ teams to manage incidents of ethnic violence and riots on their mines. In the mid 1980s, labour unions also took up the struggle for worker rights in a more militant fashion, and on-mine strikes became more violent. This period also saw the birth of NUM in 1982 and COSATU in 1985 and forced mining houses to adapt their security programmes to deal Continued from page 9 TRENDS & OPINION with public disorder and crowd control on their mining rights. After the new South Africa’s honeymoon period and the promise of a probable rainbow nation, and whilst not widely reported, the social chaos that marked the first decade of the 21st century saw mining houses forced to adapt their security programmes to deal with violent community unrests and community action against their operations. By this time the Public Order Policing Unit of the South African Police Service was a mere shadow of its former self, fast showing signs of bleeding expertise and labouring under a lack of specialised resources to deal with widespread community-led activism and labour strikes, leaving businesses to fend for themselves. The July 2021 civil disobedience, particularly in KwaZulu-Natal, and the subsequent looting and destruction exposed the state’s inability to manage civil disobedience swiftly and effectively. ESG and sustainable development programmes, amongst others, also compelled mines to embark on a process to reimagine and reinvent the mining sector. As an example, this saw many mines changing how they housed and supported the social structure of workers – creating sustainable towns for mine workers and their families instead of the hostels, which served as accommodation for many in the past. Unfortunately, to some extent, this came at a time when South Africa had fallen down the global gold producers ranking and in an economic environment where precious metals producers are price takers. Increasing overhead costs, regulatory uncertainty, and waning investor confidence are also factors that contribute to the economically challenging environment that mines operate in. This contributes to job losses, impairs business development, and puts pressure on security budgets, which subsequently undermines efficiency in any security programme. All this created a melting pot that dramatically changed the risk operations on mines. It also gave rise to more sophisticated syndicate threats. Criminal syndicates were always present in the mining industry – it is where the money is. However, the melting pot and loss of jobs as South Africa’s gold output started falling, matched by the seemingly everincreasing unemployment rate in the country, added fuel to the criminal syndicate fire. The state of widespread corruption with impunity and poorly performing official criminal justice structures makes it ‘safe’ for

12 www.securitysa.com mining securi y2024 TRENDS & OPINION criminal syndicates to act more brazenly, no longer feeling the need to operate ‘under the radar’. Today’s illegal mining operations are one of the symptoms of this chaos and have become operations that have grown from something that happened only here and there to an organised criminal enterprise with its own investment streams, supply chains and support structures. Nash adds that mining executives and security alike did not expect this rapid growth of illegal mining activities in operating mines due to the complexity and safety challenges inherent to any mining operations, but illegal syndicates are not concerned about the health and safety of their illegal miners. As a result, you will find them in the depths of the mines that are not safe for security and proto teams to venture into to track and retrieve illegal miners. Employee collusion and corruption is perhaps the single biggest factor seeing illegal mining activities in operating mines continue unabated. There are many successes in apprehending illegal miners and removing them from the mine; they just keep coming back. If one looks at the methodology employed by mines, one can understand the temptation to illegal mining syndicates. In the Gauteng gold fields, for example, rich deposits of gold were mined, and when the profits declined to a certain point in mining areas no longer commercially viable to mine, the miners moved to new areas offering a richer yield. There was still gold to mine, but not in the volumes required. Additionally, safe mining requires the mines to leave rich deposits untouched, serving as pillars to prevent ground collapse in the area. These locations are where illegal miners focus their attention, making use of abandoned shafts and mines without the safety or environmental concerns legitimate mines take cognisance of. Naturally, turf wars are a reality among criminal gangs, which adds to mining risk management’s complexity. Lethal violence has grown over time and reached ridiculous levels, necessitating mining security to deploy tactical response units that are well-armed and well-trained to defend against the criminal onslaught. Response teams take on the task The violent crimes faced by mines are not limited to illegal mining. Every mine has a wealth of equipment and infrastructure that can be stolen – such as copper – which can be profitably disposed of through supposedly legitimate recycling businesses (approximately 150 000 tonnes of copper scrap is legally traded in South Africa each year, with a value of over R 10 billion – www.securitysa.com/*mine7). There are naturally other stealable products, and the use of violence to attack mining operations has become more of a standard operating procedure than any other method of crime. Tactical teams and armoured vehicles are now the norm and are often outnumbered and out-gunned by the syndicates – state law enforcement services are, to be polite, inefficient. Therefore, knowing the situation tactical teams are being called to is critical to ensure their safety in hazardous situations, which is where security technology can assist. However, criminals know this and often attack electrical and fibre installations before attacking a specific location to keep their numbers and capabilities secret from surveillance cameras and other security technologies. Surveillance cameras have become vital in mine security, but trained professionals must support the technology. This training applies not only to tactical response teams, but also to the control room operators who need to provide a situational report to the response personnel. A harmful error some mines bought into for a while was that if you had the latest and greatest IP cameras with clever analytics, you could reduce the number of security personnel onsite. Nash says this was a good selling point, but does not apply in the world of real mining security management. Another error is to view security as a grudge purchase and only a cost item on the budget. Security is an investment Nash says security is an investment. Make the right investment and cover your mine (or any business) effectively by considering all the risks you face and developing a strategic plan. The results will be evident in the bottom line through better control of costs and profits. It is also essential for the security lead to have a seat on the executive committee of smaller companies and on the C-suite of bigger and multi-national companies, with access to the board. The alternative is that non-security executives make ill-informed decisions on security budgets, strategies, and approaches. Budgets are a reality, and there will never be enough money for all the security requirements one wants to have in place; however, being part of the executive allows for a realistic cost-benefit-risk discussion that deals with the security and business requirements more logically. Leaving it to a finance person alone, or a non-security professional, will not have the best result as different goals drive them. Moreover, squeezing security budgets in a cost-cutting exercise will see organisations adopting what Nash calls a ‘Frankensteined’ security programme with many blind spots. These often go unnoticed for a long time and grow as you lose small indicators that could suggest criminal activity in a specific area. However, eventually, they will be exploited, and the impact will be considerable. While he is now officially retired, Nash foresees more volatility in 2024 since it is a hotly contested election year. Security personnel in all areas of the industry will find themselves under increased pressure and will be expected to do more. This is not unique to mining, but the violence and personal risk in this industry are extreme. If mines do not look after their people, the pressure will see more people looking for jobs outside the sector as they lose motivation. This loss of motivation will also impact those still on the job as they plod along and tick boxes in doing their jobs, instead of being engaged and alert. Sadly, Nash does not see the situation improving over the next five years unless something dramatic happens. As he sees it in the current situation, violence will increase, and the state will be even less able (or willing) to deal with the issues. Economic pressures are likely to result in more budget pressure, which could impact security programmes, resulting in them being poorly designed, poorly funded, and poorly executed. In conclusion, Nash says that new technologies are fundamental to the risk operations in mines. They will be used for more investigative purposes, picking up signs and indicators rather than simply looking for someone crossing a perimeter line. Additionally, he repeats an earlier statement, noting that guards are still critical to a security plan. However, they need to be better trained to understand the situation they operate in and the rules associated with it. Most importantly, they should not be seen as a body on patrol or at the gate, but must be integrated as a functional team that is a core component of the security programme, with each individual knowing they are an important part of the team. Nash Lutchman can be contacted at [email protected] Continued from page 10

14 www.securitysa.com mining securi y2024 As always, and as expected, the mining industry is ever evolving, driven by technological advancements and the growing need for enhanced safety and security measures. One specific area that is seeing significant innovation is turnkey electronic security for mining operations that are expanding into even more remote and challenging environments. Hence, the need for more robust security solutions becomes even more critical. In this article, we will explore some of the key trends shaping the future of electronic security in mining. Wearable technology Wearable technology, such as body cameras, smart helmets and vests, are being used to enhance safety and security for mines and mining personnel. These devices can monitor vital signs, provide real-time location tracking, and send distress signals and live streaming of video in case of emergency, improving overall safety and security for workers. Autonomous security vehicles Autonomous vehicles are being increasingly used for security patrols in mining operations. These vehicles can patrol predefined routes, Johan van Wyk. Future trends for electronic safety and security in mining By Johan van Wyk, FANG Fences and Guards. The future of electronic security in mining is promising, with technology playing a crucial role in enhancing security and safety. monitor for security threats, and alert security personnel when intervention is required. This technology can enhance the efficiency and effectiveness of security patrols, particularly in large and remote mining sites. Sensor and radar technology Sensor and radar technology is evolving rapidly, with sensors becoming smaller, more accurate, and more affordable. These advancements are enabling mining companies to deploy a wide range of sensors to monitor various aspects of their operations, from equipment health to personnel safety and the ever-present security risks. Implementation of geofencing Geofencing technology is being used to create virtual boundaries around mining sites, adding another layer of security to the physical barrier on the perimeter. This technology can alert security personnel when a boundary is breached, allowing for immediate and accurate response to an attempted breach. Expansion of biometric security Access card and fingerprint biometric security has always, and in some cases, still serves its purpose, but touchless facial recognition technology is crucial in mining operations today. Facial recognition technology can match a human face from a digital image or a video frame against a database of faces to confirm an individual’s identity, and it is often favoured because of its contactless nature. Multi-factor authentication Mining companies are adopting multi-factor authentication (MFA) systems to strengthen access control measures. MFA requires users to provide multiple forms of verification, such as a password and a facial scan, before granting access. This adds an extra layer of security and reduces the risk of unauthorised access. Enhanced communication systems Effective communication is essential for maintaining security in mining operations. Mining companies are investing in advanced communication systems, such as satellite communication and mesh networks, to ensure seamless communication between security personnel and central command, even in remote areas with limited connectivity. Remote monitoring technologies Remote monitoring technologies, such as surveillance cameras and autonomous or piloted drones, are increasingly used to enhance mining operations’ security. These technologies provide real-time monitoring of mining sites, allowing security personnel to respond quickly to security threats. All the above can be managed via the onsite security operations centre (SOC); however, it is recommended that an independent, offsite monitoring company be contracted to not only further complement the implemented solution and technology, but also address the risk of possible staff collusion. Integration of artificial intelligence AI is not a silver bullet and must be logically implemented to address the identified risks. AI-powered systems can analyse vast amounts of data from surveillance cameras, drones, and sensors to detect anomalies and potential security threats. These systems can also automate responses, such as alerting security personnel or activating barriers/emergency lockdowns, thereby improving response times and the overall security effectiveness of mining operations. However, wrongly or poorly implemented AI can be the cause of a false sense of safety and security. Technology will continue to play a crucial role in enhancing security and safety. As mining operations become more complex and challenging, mining companies will continue investing in innovative security solutions to protect their personnel, assets, and the environment. For more information, contact Fang Fences & Guards, +27 21 905 1204, [email protected], www.fang.co.za TRENDS & OPINION

www.securitysa.com 15 mining securi y2024 TRENDS & OPINION In the dynamic landscape of African mining, security remains of paramount concern for industry stakeholders. As threats evolve and challenges persist, mining companies are seeking innovative solutions to safeguard their operations, assets, and personnel. Syntell’s Joint Information System Portfolio is a comprehensive suite of products poised to impact mining security and operational efficiency; coming from a background of proactive security technology and automatic numberplate recognition systems (ANPR) with strengths in providing real-time information on vehicles of interest from law enforcement and private security. The focus is on driving innovation and growth within the security technology vertical in order to move the industry to a more tech-savvy, tactically equipped security focus with world-class technology at its disposal. At the heart of Syntell’s offerings lies the promise of seamless integration and robust functionality. With the ability to integrate into third-party back-end accounting software, weigh-bridge solutions, and vehicular-based advanced surveillance, mining companies can now streamline their security operations, while ensuring compliance with financial regulations. This integration not only enhances transparency and accountability, but also facilitates real-time monitoring of financial transactions, enabling proactive risk management and fraud detection through its extensive back-end capabilities. Moreover, Syntell goes beyond traditional security measures by addressing critical occupational health and safety issues. Speed Dave Rampersad. Unlocking enhanced security for mining By Dave Rampersad, Syntell Group. The mining industry continues to navigate complex security challenges. enforcement solutions, a key component of Syntell’s portfolio, is to provide mining companies with the tools to enforce speed limits and promote safer working environments, combat illegal mining, as well as better secure cargo in transit and facilities, bringing down the overall risk. By leveraging advanced technology such as ANPR, GPS tracking, and telemetry, these solutions enable real-time monitoring of vehicles of interest, both static and mobile, along with fixed speed monitoring solutions for facilities, automatic alerts for violations, and comprehensive reporting capabilities. As a result, mining companies can mitigate the risk of accidents, reduce liability exposure, and prioritise the well-being of their workforce, aligning with the focus of the National Occupational Safety Association (NOSA), the entity established by the South African government, which has been at the forefront of occupational health and safety for over seven decades. One of the features of the Joint Information System Portfolio is its advanced back-end reporting functionality. This functionality allows for accountability and a diverse array of reporting capabilities to track incoming and outgoing deliveries and various other vehicle related checkpoints. Whether it is monitoring the movement of valuable assets, tracking vehicle maintenance schedules, or analysing driver behaviour patterns, Syntell’s reporting capabilities provide mining companies with actionable insights to optimise their operations and enhance overall security measures. Syntell’s’ Joint Information System Portfolio offers a holistic approach to mining security, empowering companies to proactively identify and address potential risks, while enhancing operational efficiency. With its seamless integration capabilities, comprehensive functionality, and focus on occupational health and safety, Syntell is poised to redefine the future of mining security in Africa and beyond. In conclusion, as the mining industry continues to navigate complex security challenges, Syntell emerges as a trusted partner in driving innovation and transformation. By harnessing the power of the Joint Information System Portfolio, mining companies can unlock new levels of security, efficiency, and sustainability. For more information, contact Syntell, +27 11 582 2500, [email protected], www.syntell.co.za

RkJQdWJsaXNoZXIy MjEzMjU=