360-degree perimeter protection

March 2017 Editor's Choice, Surveillance, Perimeter Security, Alarms & Intruder Detection, Security Services & Risk Management

Mining security and safety has become a critical focus area across Africa. Today, it is directly linked to production targets, and ultimately profit. One of Africa’s greatest safety challenges is illegal miners who do not understand the potential hazards on site, and as a result find themselves in safety-compromising situations.

Secu-Systems offers mines a security solution that guarantees a significant reduction in illegal mining activity, specifically in the open-cast mining sector.

Secu-Systems was established to provide high-end turnkey solutions for the mining sectors, ports and harbours and border controls. Its robust, mobile and advanced security solution, named Spotter, allows companies to overcome perimeter breaches quickly and with the least danger to employees.

Spotter has already proven itself in three of the world’s largest gold producers – at mines in Tanzania, Guinea and South Africa – and can deliver similar safety/security benefits to any open-cast mining facility.

Once the Secu-Sytems solution was installed and operational on-site in Tanzania, the results were immediate, revealing the staggering numbers of illegal miners entering the site on a daily basis. This has enabled the mine to implement a process to find and remove these miners from site immediately.

“Their intruder capture rate has improved and the risk for security personnel is lower. In addition, because all footage is recorded, the client can ensure that the entire incident – from capture to handover of the intruder – is handled strictly according to security policy,” explains Charles Harrison, MD of Secu-Systems. “At peak times, arrests reached a staggering 75 to 100 intruders per week.”

Designed for zero-infrastructure operations

The Spotter security solution is designed specifically for remote regions with no supportive infrastructure. It is based on a standalone, self-sustaining ‘green’ system, comprising a wireless, mobile 20-foot container which securely houses all peripheral intrusion and detection equipment.

This includes external, passive infrared detectors; high-pressure pepper systems that trigger on activation of the security systems, or can be remotely detonated upon verification, as well as FLIR thermal cameras that can detect motion within a six kilometre radius from nominal ground level.

The military-specified container solutions are fitted with their own power reticulation, which includes solar panels mounted to the roof of the container and battery banks installed within the container. Security systems are integrated with the camera solution and include wall-top and/or additional freestanding electric fencing with energisers operating off the internal power reticulation. All sides of the container are equipped with nozzles and high-pressure hydraulic piping. This includes wireless communication back to a centralised control room (as long as line-of-site can be attained).

“We describe our solution as a completely self-sufficient, virtual perimeter camera solution which tracks real-time movement using thermal cameras on a moving background. It uses Movement Target Indicators (MTI) software developed in Australia for military aircraft,” adds Harrison. “By comparison, traditional analytics work on a fixed background with a static camera.”

The streaming cameras can easily detect movement in as little as four pixels. Moreover, where conventional perimeter intrusion detection systems (PIDS) detect intrusions at the perimeter only, Spotter can track intruders from the perimeter and throughout the mine.

With high-powered, single PTZ thermal cameras placed on high sites, intruders cannot hide and are followed throughout the location until removed, thus giving management complete 360-degree situational awareness and peace of mind.

For more information, contact Secu-Systems, +27 (0)11 794 7834, charles@secusytems.co.za, www.secusystems.co.za





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Pentagon appointed as Milestone distributor
Elvey Security Technologies News & Events Surveillance
Milestone Systems appointed Pentagon Distribution (an Elvey Group company within the Hudaco Group of Companies) as a distributor. XProtect’s open architecture means no lock-in and the ability to customise the connected video solution that will accomplish the job.

Read more...
Re-imagining business operations with the power of AI
AI & Data Analytics Surveillance
inq., a Convergence Partners company, has introduced a range of artificial intelligence (AI) solutions to assist organisations across industry verticals in optimising business operations and improving internal efficiencies.

Read more...
Enhance control rooms with surveillance and intelligence
Leaderware Editor's Choice Surveillance Mining (Industry)
Dr Craig Donald advocates the use of intelligence and smart surveillance to assist control rooms in dealing with the challenges of the size and dispersed nature common in all mining environments.

Read more...
A long career in mining security
Technews Publishing Editor's Choice Mining (Industry) Risk Management & Resilience
Nash Lutchman recently retired from a security and law enforcement career, initially as a police officer, and for the past 16 years as a leader of risk and security operations in the mining industry.

Read more...
A constant armed struggle
Technews Publishing XtraVision Editor's Choice Integrated Solutions Mining (Industry) IoT & Automation
SMART Security Solutions asked a few people involved in servicing mines to join us for a virtual round table and give us their insights into mine security today. A podcast of the discussion will be released shortly-stay tuned.

Read more...
Risk management: There's an app for that
Editor's Choice News & Events Risk Management & Resilience
Zulu Consulting has streamlined the corporate risk management process with the launch of Risk-IO, a web-based app designed to consolidate and guide risk managers through the process, monitoring progress as one proceeds.

Read more...
Integrated information platform for risk management
Editor's Choice News & Events Risk Management & Resilience
Online Intelligence recently launched version 7 of its CiiMS risk and security platform. Speaking to SMART Security Solutions after the launch event, the company’s Arnold van den Bout described the enhancements in version 7.

Read more...
Unlocking Africa's AI potential
Editor's Choice News & Events AI & Data Analytics
Africa's AI market is set to grow exponentially; by investing in AI education, training, and ethical practices, African nations can harness the power of AI to transform the continent and create a brighter future for its people.

Read more...
The CIPC hack has potentially serious consequences
Editor's Choice Information Security
A cyber breach at the South African Companies and Intellectual Property Commission (CIPC) has put millions of companies at risk. The organisation holds a vast database of registration details, including sensitive data like ID numbers, addresses, and contact information.

Read more...
Global Identity Fraud Report revealing eight-month ‘mega-attack’
Editor's Choice Risk Management & Resilience
AU10TIX recently released its Q4 Global Identity Fraud Report, with the research identifying two never-before-seen attack patterns, with the worst case involving 22 000+ AI-generated variations of a single U.S. passport.

Read more...