Securing Xstrata Copper's Mount Isa mines

Access & Identity Management Handbook 2011 Access Control & Identity Management, Mining (Industry)

Mining giant opts for Cardax FT.

Located in mineral-rich north-west Queensland, in the sun-baked heart of Australia, ‘the Isa’ has the distinction of being one of the few places in the world where four metals (copper, zinc, lead and silver) are found and mined.

Xstrata Copper's Mount Isa Mines, operates one of the largest underground mines in the world. The Enterprise underground copper mine, the most recent copper ore source at Mount Isa, is Australia's deepest mine, with an internal shaft that reaches 1800 m deep.

Mount Isa Mines also mines and processes zinc, lead and silver and runs these operations on behalf of Xstrata Zinc. Xstrata Copper is one of four commodity businesses within the major global diversified mining group Xstrata plc. Along with Mount Isa Mines, acquired in 2003, Xstrata Copper’s operations comprise the Townsville copper refinery and Bowen Coke works, the Ernest Henry open pit copper-gold mine and the Townsville Port facilities. It also operates the Alumbrera copper-gold mine in the Catamarca Province in Argentina, South America.

The company’s mining and smelting complex at Mount Isa produces copper anode and lead bullion containing silver and zinc concentrate. Copper anode is transported for refining at the company’s copper refinery in Townsville, while lead bullion is transported for refining at the company’s lead-silver refinery in England. Zinc concentrate is sold directly to customers in Australia and overseas.

Safety and security

Handling explosives, operating machinery and working as deep as 1800 metres below ground require first class safety and security systems. Because Xstrata Copper is committed to providing a safe, productive and healthy work environment, the company is diligent in protecting its employees from unnecessary risks while striving for a zero-harm goal.

Sjeff Klaassen, from Xstrata Copper’s security partner ADT Queensland said ongoing security reviews and upgrades had become an integral part of the business planning process with a range of safety management and improvement systems being implemented in line with Xstrata Copper’s Safety and Health policies. This was confirmed by Mount Isa Mines Emergency and Protective Services Superintendent, Darren Bracey who said the complex mix of mining, processing and smelting at Mount Isa presented numerous challenges when it came to ensuring the safety of employees and the general public.

“We must allow for movement of authorised personnel with a minimum of effort, while ensuring all the necessary training, induction and other entry requirements are current,” he said. “We must also be able to ensure that personnel who are not authorised to access certain areas are prevented from doing so. Another challenge for us is having the ability to account for personnel in the event of an incident, particularly in our underground environment.”

Bracey said collection and management of all the associated data was a significant issue in itself – and aligning this with access requests complicated it even more. To cope with the movements of personnel at Mount Isa Mines and establish a safe and secure environment, the Mine originally installed the Cardax Unix access control system including Cardax Commander architecture at its copper mining site in 1990. Today, the site boasts security systems technology in the form of Cardax FT, a comprehensive Windows-based security system.

State-of-the-art security systems

The site has been able to extend the life of its five legacy Commanders through the Cardax FT Commander Interface, enabling the site to migrate to Cardax FT hardware architecture over time. Already, 20 Cardax FT Controller 5000s, complemented by three Controller 3000s for integrated intruder alarms management have been installed. The Controllers utilise the company’s existing LAN/WAN, reducing the overall labour component of Cardax FT installations.

Ten workstations enable the system to be used as an efficient tool by authorised staff on site, each of whom is assigned operator privileges to report and perform a multitude of functions. The Cardax system employed at Mount Isa Mines has several integration applications including an interface with the CCTV management system. It is integrated with reporter software packaged to provide a customised reporting tool to monitor the whereabouts of underground staff. As well as being interfaced to the company’s HR management system, the Cardax system also monitors alarms including environmental, fire, intrusion and production alarms and domestic site-associated alarm systems.

In addition to on-site alarms management, the system’s field controllers support dial-up to a remote alarm monitoring company for backup.

Cardax FT Cardholder Import enables cardholder data to be imported from other systems using an XML interface. There’s also PhotoID for image capture, card design and printing of Photo ID cards and Challenge, a feature that enables a cardholder’s image from their CCTV system to be checked against the cardholder image in the Cardax FT system.

Further expansion

At the time of writing, a further two software applications were being installed to assist in contractor management. The applications mean business managers can directly control the access periods given to each contractor for specific areas. These applications help ensure contractor compliance for site access and generate reports on times spent in a defined area by a person, contract company or other defined unit.

Bracey is quick to praise the Cardax FT system. “The advanced technology of the Cardax FT system is flexible enough to meet the changing mining environment. It has enabled better management of contractors. The development of electronic tagging to manage firing (of explosives) underground has significantly reduced risk of injury, as well as reducing the cost of miss-firings often experienced using the old manual tag board systems.

“The system has many different types of hardware that can be adapted to suit the site’s needs, while the powerful software lends itself well to integration with other third party software applications to allow better management of security, health, safety, access control and contractor management.”

For more information contact Gallagher Security Management Systems, +27 (0)11 974 4740, lyndp@gallaghersms.com





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Paxton set to launch game-changing new system
Paxton Access Control & Identity Management News & Events
Access control is evolving fast. Installers and end users are looking for systems that are simple to install, easy to manage remotely, and flexible enough to scale. In response, Paxton is exploring how emerging technologies can reshape access control.

Read more...
NEC XON secures mobile provider’s hybrid identities
NEC XON Access Control & Identity Management Information Security Commercial (Industry)
For a leading South African telecommunications operator, identity protection has become a strategic priority as identity-centric attacks proliferate across the industry. The company faced mounting pressure to secure both human and non-human identities across complex hybrid environments.

Read more...
Cloud security in visitor management and access control
SA Technologies Access Control & Identity Management Infrastructure Residential Estate (Industry) Commercial (Industry)
Cloud has become the default platform for modern security operations, from visitor management portals and remote access control to incident logging, reporting, analytics, and integrations. But “in the cloud” does not mean “someone else is securing it for us”.

Read more...
Centurion raises the bar at HomeSec Expo
Centurion Systems News & Events Access Control & Identity Management Residential Estate (Industry) Smart Home Automation Commercial (Industry)
Centurion Systems unveiled its latest product lines at HomeSec Expo 2026, introducing SMART+, a simpler way for installers and end users to manage their Centurion installations - as well as a few new products.

Read more...
What’s in store for PAM and IAM?
Access Control & Identity Management Information Security
Leostream predicts changes in Identity and Access Management (IAM) and Privileged Access Management (PAM) in the coming year, driven by evolving cybersecurity realities, hybridisation, AI, and more.

Read more...
Protecting citizens’ identities: a shared responsibility
Access Control & Identity Management
A blind spot in identity authentication today is still physical identity documents. Identity cards, passports, and driver’s licences, biometric or not, are broken, forged, or misused, fueling global trafficking networks and undermining public trust in institutions.

Read more...
The challenges of cybersecurity in access control
Technews Publishing SMART Security Solutions Access Control & Identity Management Information Security
SMART Security Solutions summarises the key points dealing with modern cyber risks facing access control systems, from Mercury Security’s white paper “Meeting the Challenges of Cybersecurity in Access Control: A Future-Ready Approach.”

Read more...
Access as a Service is inevitable
Technews Publishing SMART Security Solutions ATG Digital Access Control & Identity Management Infrastructure
When it comes to Access Control as a Service (ACaaS), most organisations (roughly 90% internationally) plan to move, or are in the process of moving to the cloud, but the majority of existing infrastructure (about 70%) remains on-premises for now.

Read more...
From surveillance to insight across Africa
neaMetrics TRASSIR - neaMetrics Distribution Access Control & Identity Management Surveillance Products & Solutions
TRASSIR is a global developer of intelligent video management and analytics solutions, delivering AI-driven platforms that enable organisations to monitor, analyse, and respond to events across complex physical environments.

Read more...
Securing your access hardware and software
SMART Security Solutions Technews Publishing RBH Access Technologies Access Control & Identity Management Information Security
Securing access control technology is critical for physical and digital security. Every interaction between readers, controllers, and host systems creates a potential attack point for those with nefarious intent.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.