Two-way radios crucial to mine security

May 2002 Infrastructure

Theft is the one of the major problems facing the mining industry. It is an industry where the cost of production is extremely high, so in order to survive, mines have to ensure maximum levels of productivity and implement stringent security measures.

Strict access control and constant monitoring of all areas of the mine is required, to ensure staff safety and to protect the mine's assets. Aside from CCTV, two-way radios play a crucial role in mine safety and security.

According to Francois Cronje, group technical co-ordinator for BOSASA, a company specialising in security for the mining industry, two-way radios are the communications tool of choice because they provide instant group communication and they operate in tough environments, withstanding rough usage. "The mining environment is extremely harsh, with lots of dust, hazardous chemicals, high temperatures and explosive devices," explains Cronje. "Due to the risks inherent in this work environment and the high value of the raw material, we have to control access and have 24-hour guarding in areas such as the smelter house and metallurgical plant." In addition to these two areas, two-way radios provide vital communications between all security points - from the outside post to the shafts, explosives magazines, mine stores and offices where senior management is based. Mobile radios are fitted in all security vehicles for reaction teams and roaming patrols.

"The noise level in certain areas of a mine is generally quite high, making it difficult to hear communications," adds Matthew Skey, owner of Motorola authorised dealer LA Radio. "We have a wide range of accessories, from voice-activated features for hands-free operation to walkman-style ear buds for discreet audio and heavy-duty microphones for rugged environments. These allow users to customise the radios according to their specific requirements."

BOSASA has standardised on Motorola two-way radios. The benefits of two-way radios are not only applicable to security in the mining environment: many mines use two-way radio for the management of the mine and co-ordination of remote work teams and activities. "The applications of two-way radio in the mining industry are numerous. From communication with remote work teams to co-ordinating various activities across the mine, radios play an important role in streamlining operations by providing rapid group communication that is cost-effective," concludes Skey.





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

The global state of physical security
Genetec News & Events Infrastructure
Physical security has become a strategic business function, improving IT collaboration and decision-making. Moreover, interest in AI has more than doubled among users, and organisations seek flexibility to deploy workloads on-premises, in the cloud, or hybrid.

Read more...
SA availability of immutable backup storage appliance
CASA Software Infrastructure Security Services & Risk Management
CASA Software has launched the newly released Nexsan VHR-Series, a fully integrated, enterprise-class, immutable backup storage appliance purpose-built for Veeam software environments, with usable capacity ranging from 64 TB to 3,3 PB.

Read more...
What is your ‘real’ security posture?
BlueVision Editor's Choice Information Security Infrastructure AI & Data Analytics
Many businesses operate under the illusion that their security controls, policies, and incident response plans will hold firm when tested by cybercriminals, but does this mean you are really safe?

Read more...
What is your ‘real’ security posture? (Part 2)
BlueVision Editor's Choice Information Security Infrastructure
In the second part of this series of articles from BlueVision, we explore the human element: social engineering and insider threats and how red teaming can expose and remedy them.

Read more...
Onsite AI avoids cloud challenges
SMART Security Solutions Technews Publishing Editor's Choice Infrastructure AI & Data Analytics
Most AI programs today depend on constant cloud connections, which can be a liability for companies operating in secure or high-risk environments. That reliance exposes sensitive data to external networks, but also creates a single point of failure if connectivity drops.

Read more...
Short-range indoor LiDAR sensor
OPTEX Perimeter Security, Alarms & Intruder Detection Infrastructure Products & Solutions
The REDSCAN Lite RLS-1010L has been developed to provide comprehensive coverage and protect high-risk security zones and vulnerable, narrow indoor spaces that are difficult to protect with traditional sensors.

Read more...
Understanding shared responsibility
Infrastructure
Data management is increasingly coming under the governance spotlight, yet a significant vulnerability often goes unnoticed. Many businesses operating on Microsoft 365 assume their data is comprehensively backed up.

Read more...
Direct-to-cloud surveillance platform
Surveillance Infrastructure
Oncam has announced a forthcoming end-to-end, direct-to-cloud video platform that combines AI-enabled cameras, intelligent IoT devices, and cloud-integrated video management software to deliver smarter performance with reduced complexity.

Read more...
Local-first data security is South Africa's new digital fortress
Infrastructure Information Security
With many global conversations taking place about data security and privacy, a distinct and powerful message is emerging from South Africa: the critical importance of a 'local first' approach to data security.

Read more...
Software security is a team sport
Information Security Infrastructure
Building and maintaining secure software is not a one-team effort; it requires the collective strength and collaboration of security, engineering, and operations teams.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.