Gold fingerprinting

May 2010 Security Services & Risk Management, Mining (Industry)

Illegal or illicit mining is now so prolific an industry in South Africa that it has become a national pandemic that will have enormous repercussions for the South African economy if serious steps are not taken to curb it. Many tried and tested solutions have been brought to the table in an effort to weed out the villains fuelling the trade. Some are effective, some not. Hi-Tech Security Solutions examines one particular solution that is quietly making waves in the industry.

It does no’t take a brain surgeon to conceptualise the enormity of the country’s illegal mining crisis. The headlines are abundant:

* '200 illegal miners arrested in Mpumalanga'.

* 'Dying for gold'.

* 'Tragedy in Welkom has not deterred illegal miners from going back underground'.

* 'I’ll go down, I’m not scared to die ...'

* '... suspends 57 workers over gold theft'.

* 'Bodies of 76 illegal miners recovered from abandoned shaft'.

* '... confirms bodies of another 15 illegal miners brought to surface at its Eland shaft'.

* 'Illegal mining: ‘We need to target the syndicates'.

With gold prices hitting record highs over the years, the precious metals mining industry is an ever more attractive option for organised illegal mining syndicates and desperate unemployed individuals who willingly risk their lives to better their circumstances. As the world’s fourth-largest gold producing nation, the industry is rife with opportunists, whose activities are costing the taxpayer, the economy and the mining houses billions.

South Africa is littered with abandoned pits and mineshafts, many of which have long been plagued with illegal miners – some opting to live underground for months at depths of up to 1,4 km. Smuggling gold, the precious metal that together with platinum theft, is fuelling the illegal mining trade in South Africa, is very lucrative. It has to be, when considering the life-threatening risks involved. One of the problems with illegal mining is that it is very difficult to quantify the extent of the activities, because it is unknown how many people are underground. Illegal miners can sneak past security at one mine and exit from one owned by a different company kilometres away.

Companies like Harmony, the world’s number five gold producer, are particularly exposed to plundering by illegal miners. Harmony was built on a strategy of buying older, less profitable gold shafts and mines. Many of the country’s mines cannot afford to deploy their own employees on underground searches, as the abandoned shafts are left in hazardous conditions thanks to illicit mining activities. Abandoned mines lack infrastructure and safety equipment. Fire is a hazard. Rocks can fall, suffocation is a reality and carbon monoxide poisoning is common.

Catching the illegal miner and eradicating the syndicates who are behind the trade is therefore extremely difficult. The Department of Mineral Resources is grappling with the escalating safety crisis because a lack of required staff needed to inspect disused mines, not to mention the fact that illegal miners are often armed. Because of these difficulties, other solutions are being investigated in an effort to eradicate the problem.

Some mining operations have had to completely revamp their access control systems to their underground operations by installing biometric access control systems on all access points to shafts. Others have had to step up their security operations in their underground operations, in some cases at costs of up to R200 000 a month. Other mining houses have chosen even tougher measures such as starvation tactics. They work on the fact that illegal miners spend weeks underground, relying on illegal underground food trading. In 2008, Rand Uranium initiated a complete ban on food being taken underground as a means of cutting the lifeline of illegal mining. While not popular with some human rights lobbyists, the tactic proved successful with large numbers of miners being arrested whilst attempting to leave the mine to find food. Another solution is to determine from where illegal gold is being mined.

The National Precious Metals Forum

South Africa has become a global leader in the investigation of illegal mining syndicates and illicit mining activity. One forum making strides with its investigations is The National Precious Metals Forum which deals specifically with finding solutions to curb precious metals theft. The forum was voluntarily established between the mining industry, the police and other law enforcement agencies. The forum’s stakeholders include the Chamber of Mines, the major precious metal mining companies and the SAPS, both its investigative arm and the Forensic Science Laboratory.

Anton van Achterbergh says the forum works very well with government and has had great success. “The biggest breakthrough has been that all the role players are now increasingly working together on the precious metals theft crisis.”

The mining industry has also recognised the importance of using a collaborative approach to address the organised crime threat it faces. Consequently, a joint initiative between the mining industry and the police, namely the Joint Investigation Group (JIG), was established in February 2002 under the National Precious Metals Forum. The function and role of the JIG is to investigate and analyse the activities of high-ranking syndicates involved in the theft of precious metals.

Because illegal mining activity differs from mine to mine, each battle has its own unique set of challenges, says Van Achterbergh. So, while mining houses are working together, each has its own battles to fight. Syndicates are complex: the Joint Investigation Group has classified precious metal smuggling syndicates into five levels, Level 5 being at the top of the hierarchy and Level 1 at the bottom. Level five syndicates are based outside South Africa and Levels 4 through 1 operate within South Africa.

Gold fingerprinting

One of the key projects that the National Precious Metals Forum has been integrally involved in is gold fingerprinting. While gold fingerprinting is a known science – it has been around for 20 years – it is a relatively new technology being applied to the identification of precious metals. Gold fingerprinting is essentially the elemental profiling of gold.

The technique, which was developed in Australia, has been further developed in South Africa to identify the source of stolen gold and other unwrought precious metals, in order to secure convictions. The process, whereby forensic analysts identify a piece of gold through its chemical composition, can be accurate enough to determine which area and mine the metal originated from, before it was mined.

The very nature of the gold mining industry makes it vulnerable to theft: the product is easy to identify and to mine, it is relatively easy to sell and it can be mixed with legitimately acquired gold that is used in legal businesses. According to statistics revealed by the SAP (ISS report 2006), it is estimated that 0,8% to 1,6% of the world’s gold production gets stolen in South Africa annually and that only 1,4% to 2,8% of stolen gold is recovered. In the gold mining industry, anything from ore to commercial products are stolen and the source of the gold thus has to be identified despite different beneficiation procedures by companies and illegal syndicates. The blending of ores from different reefs or vein systems further complicates the identification process. Thus, the aim with gold profiling is to determine a fingerprint which will remain identifiable through the beneficiation process.

We spoke to Colonel Roger Dixon, the commander of the Materials Analysis section of the South African Police Service’s Forensic Science Laboratory in Silverton, Pretoria, on the subject of gold profiling. Dixon, a forensic analyst – or alchemist – as he refers to himself, is improving the methodology of fingerprinting precious metal specimens, in order to work out whether they are of illicit origin, and if so, from which mine or mining company they were stolen.

Dixon explains the concept. “Every material has a unique composition,” he says. “If you take a piece of gold, for example, from one place and another piece from somewhere quite different, you will find that the chemical composition will be different in each piece. Each piece of gold will have chemical properties, a profile, that reflects its origin.”

Once the different samples have been analysed, they are added to a database that stores samples collected from a wide variety of different terrains. The Precious Metals Act in South Africa requires that the Forensic Science Laboratory keeps a database of precious metals where samples can be analysed on an ongoing basis. The more you have on record from an area, the better the fingerprint database. “It has taken 20 years to develop this technology, to collect the samples, to analyse them and show that illegal mining is definitely an extensive and ongoing process,” says Dixon. “After a while the evidence from the database starts to reveal the commonalities. As more samples are added to the database, so the accuracy increases with which we can determine which area – and mine – from which these samples originate.”

South Africa is currently the only country that has introduced legislative provisions requiring the establishment and maintenance of databases. In order for the fingerprinting technique to be truly effective, Dixon says countries from around the globe need to dovetail their legislation to create an international database collaboration in which law enforcement can operate in a combined effort to successfully prosecute offenders illegally dealing in precious metals.

Dixon explains that gold contained in rock mined from the Wits basin, South Africa’s prime source of gold, comes with a unique profile. Gold from Barberton and Welkom for example, exhibit different profiles indicative of different environments of formation. A profile will also indicate what has been done to that gold after it was mined.

“If gold is extracted by a certain company, using a certain process, its profile will reflect that process. Our database will pick up these commonalities. So, if gold is stolen from underground and concentrated by illegal miners using their own unique process, that gold will have a different composition to the gold mined from legal mining procedures. Our methodology has been developed to enable us to determine the original composition of the gold and ultimately, match the stolen gold to that produced by a specific mine. In this way we can assist with the criminal investigation, as well as return the stolen gold to its rightful owner,” explains Dixon.

Dixon believes that the solution is certainly a credible one. “Where the catch comes in for South Africa, however, is that whilst most of the world’s gold deposits tend to be of a simple origin, the Wits basin is more complex because it is based on a sedimentary succession. Mineshafts get ore from different reefs resulting in gold with different profiles from each reef. Thanks to our years of research using fingerprinting technology, we are now able to identify gold from different gold mining locations within the Wits basin.”

Difficulties

Dixon says the illegal miners are not the only culprits fuelling the illegal precious metals trade. “A number of businesses and individuals in possession of recovery licences will buy knowing that it comes from suspect origins. But because it is cheaper, they bypass the law. If questioned, they will often claim that what they purchased was old and scrap jewellery, and reclaimed gold from electrical components. These businesses provide another step in the illicit mining process.” A benefit of the profiling process is that such claims can be disputed and proven false, as the composition of unrefined mine gold and such jewellery scrap is distinctly different.

The platinum industry is also not immune to large-scale theft. Gold and platinum involve totally different forms of extraction. With platinum, the theft takes place above ground in the refineries and smelters – during the extraction process. Gold, on the other hand, is stolen before it gets to the refinery. Platinum can only be removed from its natural state through the complicated processes of refining and extraction, in contrast to gold where the valuable metals can be easily extracted. The platinum ores contain not only the precious metals such as platinum, rhodium, iridium, palladium and ruthenium, but also copper, chrome and nickel, with some minor gold and other elements. Specialised knowledge and equipment is therefore needed to refine platinum group metals (PGM) into a commercially tradable commodity. The material that is usually stolen is not sold, but used in the refining process, and is the property of the refiner.

In South Africa, six smelters process almost all of the platinum ore in the country. Once the ore concentrate has gone through the plant, it goes through the smelter, resulting in a metal-rich matte. Each smelter uses a different process from the others and receives its ore concentrates from different sources, resulting in a product that is distinctive to the particular smelter. Identifying stolen PGM involves a process whereby the product is analysed to determine where in the world it comes from and who produced it. Matte (the product stolen before it gets refined and exported) goes mostly to destinations in Europe and Canada.

“We can now tell if that product or matte comes from South Africa, Russia or America,” explains Dixon. “But while the methodology for identifying stolen gold has been going on for some time, the platinum profiling methodology is still relatively new. The refiners in Europe have now been made aware that some of the platinum-containing material they have been buying is stolen. We are now able to tell them what is indicative of stolen material because all legitimate products will come from matte unique to a specific smelter.”

There are many solutions currently in operation to try and tackle South Africa’s alarming illegal trade in precious metals. While fingerprinting technology may not solve the problem, it will at least help trace where the metals are coming from. Just another solution added to the pot of sciences and technologies being applied to help bring under control the number of miners operating lucratively ‘down under’.





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Rewriting the rules of reputation
Technews Publishing Editor's Choice Security Services & Risk Management
Public Relations is more crucial than ever in the generative AI and LLMs age. AI-driven search engines no longer just scan social media or reviews, they prioritise authoritative, editorial content.

Read more...
How can South African organisations fast-track their AI initiatives?
AI & Data Analytics Security Services & Risk Management
While the AI market in South Africa is anticipated to grow by nearly 30% annually over the next five years, tapping into the promise and potential of AI is not easy.

Read more...
Efficient, future-proof estate security and management
Technews Publishing ElementC Solutions Duxbury Networking Fang Fences & Guards Secutel Technologies OneSpace Technologies DeepAlert SMART Security Solutions Editor's Choice Information Security Security Services & Risk Management Residential Estate (Industry) AI & Data Analytics IoT & Automation
In February this year, SMART Security Solutions travelled to Cape Town to experience the unbelievable experience of a city where potholes are fixed, and traffic lights work; and to host the Cape Town SMART Estate Security Conference 2025.

Read more...
Stallion repositions itself as a services provider
News & Events Security Services & Risk Management
Stallion has rebranded as Stallion Integrated Solutions to reflect its expanded capabilities beyond traditional security services to delivering integrated solutions that enhance safety, asset management, and operational efficiency.

Read more...
Seven tips to help ensure your backup batteries work
Power Management Security Services & Risk Management
Load shedding is back, officially or not. Lance Dickerson offers seven tips to prolong the life of your power backup systems and ensure they perform as intended when needed.

Read more...
Cybersecurity best practice
Information Security Security Services & Risk Management
Breach and attack simulation has become an essential element of cybersecurity strategies in any modern business by allowing companies to actively detect and resolve vulnerabilities through real-world attack simulations.

Read more...
Historic Collaboration cuts ATM Bombings by 30%
Online Intelligence Editor's Choice News & Events Security Services & Risk Management
Project Big-Bang, a collaborative industry-wide task team, has successfully reduced ATM bombings in South Africa by 30,7% during the predetermined measurement period of November, December and January 2024/5.

Read more...
Keeping safety central to enterprise risk management
Zulu Consulting Security Services & Risk Management
[Sponsored] As employee safety becomes an ever-more critical aspect of corporate risk management, Risk-IO assists risk managers in ensuring a safe working environment, whether in an industrial setting, an office, or anywhere.

Read more...
Empower individuals to control their biometric data
Information Security Access Control & Identity Management Security Services & Risk Management
What if your biometrics, now embedded in devices, workplaces, and airports, promising seamless access and enhanced security, was your greatest vulnerability in a cyberattack? Cybercriminals are focusing on knowing where biometric data is stored.

Read more...
Strategies for combating insider threats
Information Security Security Services & Risk Management
In Africa, insider threats pose an increasingly significant risk to businesses, driven by economic uncertainty, labour disputes, and rapid digital transformation. These threats can arise from various sources, including disgruntled employees and compromised third-party service providers

Read more...