A unique challenge

June 2012 Security by Industry Sector, Mining (Industry)

Mines employ hundreds and sometimes thousands of staff. They are typically found in remote locations and may cover many kilometres of remote, harsh terrain. The companies that operate mines have a duty of care to ensure the well-being of their communities, which include not only staff but contractors, partners and other visitors, and the general public.

This requires always knowing who is on site and where they are at any given time. It requires restricting access to high-risk areas and ensuring that the general public cannot accidentally access hazardous areas such as underground sites, explosives store rooms or operating machinery rooms.

It is not just a duty of care either. There are occupational health and safety implications involving security. In certain circumstances, only staff with a proper level of training and expertise should be allowed to access given areas and they must be properly equipped.

For many mines, perimeter security is perhaps the most difficult concern. Keeping unauthorised people out is vitally important to the mining organisation in terms of protecting and securing staff, resources and equipment. And given the specialised, expensive equipment on site, theft is always a potential issue.

While some general security principles are common across the industry, the primary security needs of one mine will always differ from those of the next, depending on the nature of the operation. A high value mine, for instance, will require extremely high levels of security to protect its products, whereas a coalmine is more likely to focus on operational and management efficiency to ensure that productivity remains on track and staff behaviour remains within acceptable parameters.

The challenge is to put in place a suitable infrastructure to quickly and positively identify all individuals on site, to issue each individual with the required credentials, and to restrict movements on-site according to the access rights demanded by the individual role and corresponding credentials. This has to be achieved despite the admittedly difficult physical characteristics of mining operations. Access card readers, for example, may need to be installed underneath a roof-line in a workshop. It is not likely that the location will be completely enclosed, so there is the risk of all-enveloping dust. Therefore, readers must be able to withstand harsh operating environments.

Communications and power are additional yet common problems. Excessive cabling is not feasible over vast mining sites. Instead, mining security managers tend to prefer devices that can port into pits or nodes wherever infrastructure exists.

Changing technologies, changing strategies

In the past, mining organisations relied on multiple credentials and access control systems to fulfil different tasks, resulting in the proliferation of single-purpose systems running in parallel. In addition to being resource-intensive, disparate access control and security systems do not scale and can be costly to integrate. A consolidated strategy was therefore crucial.

Consolidated strategies entail more than simply the credential and the reader. To ensure a balance between convenience and security, access rights should be centrally managed, with a holistic approach that integrates operational support systems, network infrastructure and facility management solutions should be taken. Today, the focus has moved to converged systems capable of securing a wide range of sensitive sites and assets, including heavy equipment and transportation. Three main categories of solutions have emerged:

1. IP-based access control solutions

By connecting an IP-based controller with a host PC via a TCP/IP network, the administrator can perform all execution commands including tracking, changing access card data, managing access authority, tracking staff and visitor flow and controlling access to remote areas (including remotely opening and closing doors and activating or deactivating alarm signals to prevent potential security risks).

The beauty of IP-based solutions is that they seamlessly integrate with other sub-systems for monitoring and response. For example, security managers can configure alarm messages for safety management. In the event of an emergency, the system can determine the incident type and location and unlock emergency doors for evacuation.

IP-based solutions are also convenient. They require less wiring:

Today, 16 wires are required per door and with IP, only a single CAT 5/6 is needed and that is often already in place. They use off-the-shelf equipment including standardised power supplies and enclosures. When combining IP-based access control with other IP solutions such as video surveillance, hardware can be shared for multiple applications including storage, networking, wiring and battery back-up. Users can even integrate their current access control solution and migrate to IP as doors are added.

IP is easily scalable from one access point to thousands. And some IP access controllers can utilise Power over Ethernet (PoE)-enabled technology, which means that only one cable is required for both network and power.

2. Contactless smartcard technology

Solutions using contactless smartcards offer single, dual or three-factor authentication, enabling companies to match the level of security to the sensitivity of a given area. With single factor authentication, using the card on its own will give a user access to a system or open a door. Dual factor authentication provides an extra level of security in the form of a PIN (personal identification number). Three-factor authentication goes one step further, requiring a PIN and an extra security measure such as a biometric scan.

Although contactless smartcards have traditionally been used for physical access control, their ease of use and adaptability for different security levels is fuelling their adoption for logical access control as well.

Flexibility is another big benefit of contactless cards. They make it possible to restrict access to specific areas at specific times; for example, excluding personnel from blast zones during times of danger or conversely, authorising personnel to enter critical zones. Temporary visitor badges can be set to allow entry to specific areas and staff access levels can be set according to job title.

Because the cards record data, they lend themselves to other uses. Training records can be kept on the worker’s access card, making it easier to ensure that training remains in sync with physical access rights in different areas and when accessing specialised equipment. Similarly, the cards can be used for equipment vending. By tapping the card at the equipment vending machines, the company can keep track of who has taken what safety equipment and from where they have been taken. With the help of a back-end software system, this information can then be used to generate reports and facilitate equipment usage analysis.

3. Wireless access control readers

Wireless technologies use readers with WiFi connectivity to create a wireless access control system between readers and control panels. Although not likely to be effective across a large operation, they are a highly suitable alternative for difficult or niche areas in mine sites and may be best used as a complement to other solutions.

A pipeline of practical solutions

There is no ‘one size fits all’ approach to a mine site security. There will always be a host of factors such as specific vulnerabilities, the level and type of threats faced, and the physical environment that will help to dictate which technology is most appropriate for a given site.

What is clear is that security technology is becoming more sophisticated by the day. The current generation of IP-based access control solutions represent less downtime, less maintenance and no catastrophic failures. Unlike traditional systems, IP solutions conduct constant health checks, immediately notifying the user whenever a problem is identified. And as a software-based solution, upgrade costs are effectively minimised. End users can maximise their investment by using the latest hardware technologies and leveraging their existing IP infrastructure.

Over the past decade, organisations have become savvier when evaluating security solutions. They are looking beyond the initial product cost to make total cost of ownership decisions that include operational expenses. When doing this, there are several lifecycle management issues to consider, including the equipment’s expected useful life; its scalability for additional applications; and the technology’s migration path. For example, contactless smartcards can be used to support multiple identity-driven applications including logical access, time and attendance, cashless payment, local public transportation and others, providing an opportunity to realise significant cost savings by maximising the uses of a single card.

Large mining companies should consider requirements based on the national and or worldwide footprint of their facilities. For these organisations, an identification and access management system must be capable of being deployed across multiple continents; integrated with a wide variety of host systems; and adaptable to include additional country or site-specific security measures.

The importance of securing mining assets will not diminish in the years ahead. Indeed, as some resources grow scarce, the need to secure information and limit physical access to assets will become greater. The challenge is to achieve the required level of security without foregoing convenience and efficiency, and this is where the value of today’s converging security technologies will become increasingly apparent.

For more information contact HID Global, +27 (0)82 449 9398, RTruter@hidglobal.com, www.hidglobal.com





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Effectively securing large mines
October 2019, Veracitech, Technews Publishing, Dallmeier Electronic Southern Africa , Mining (Industry), Integrated Solutions
The vast areas covered by mining operations present security challenges such as the ability to provide effective perimeter protection and surveillance, while maintaining reliable communications between remote areas and control rooms.

Read more...
Security workforce compliance tool
September 2019, Bloodhound Technologies , Security Services & Risk Management, Mining (Industry)
To maintain service excellence across a security workforce is impossible without the help of information systems and technology.

Read more...
Keeping guarding personnel on mines safe
October 2018, Betatrac Telematic Solutions, Technews Publishing, Instacom, Active Track , Mining (Industry), Security Services & Risk Management, Products
They patrol your property in the dead of the night, often risking life and limb, but what can mining companies do to offer their security guards some safety while fulfilling their dangerous duties?

Read more...
RFID solution for mining
October 2018 , Editor's Choice, Asset Management, EAS, RFID, Mining (Industry)
Aury Africa has introduced a radio-frequency identification (RFID) audit and ­inspection solution aimed at mining applications.

Read more...
Measurable policies and multi-layered approach hit the mother lode
October 2017 , Editor's Choice, Integrated Solutions, Mining (Industry)
Securing mines is often a logistical nightmare as threats from common thieves to illegal miners are added to the inherent safety and security risks synonymous with mine complexes.

Read more...
PDS for Sasol coal mines
October 2017 , Editor's Choice, Perimeter Security, Alarms & Intruder Detection, Asset Management, EAS, RFID, Mining (Industry)
Monitech Mining Monitoring Systems was recently commissioned to supply and install a proximity detection system to a number of Sasol Mining’s underground operations.

Read more...
Mining fire protection
August 2017 , Fire & Safety, Mining (Industry)
Recent tests conducted by Sasol and I-CAT have proven conclusively that dry chemical powder extinguishers are ineffective against rubber fires and conveyor belt and tyre fires.

Read more...
Partnership to streamline metallurgical security risk management in mines
June 2017 , News, Security Services & Risk Management, Mining (Industry), Training & Education
GC Consultancy Services and Crest Advisory Africa have announced a partnership designed to improve the risk management processes of the security metallurgical standards in mines.

Read more...
Fire system 2,6 km underground
February 2017, Spero Sensors & Instruments , Fire & Safety, Mining (Industry)
Sperosens was recently tasked to design, supply, deliver, install and commission conveyor fire suppression systems on a South African gold mine.

Read more...
Stellenbosch University secures access
Access & Identity Management Handbook 2017, Turnstar Systems , Access Control & Identity Management, Education (Industry), Security by Industry Sector
Stellenbosch University controls access to computer labs with five Speedgate Secure Lanes installed at strategic access points.

Read more...