High-tech security for mines

March 2006 Integrated Solutions

Maintaining tight security is a fundamental and critical requirement in mines. Unlike corporates, where the assets at risk are generally tools that enable the workforce to deliver a core service (eg, PCs, manufacturing equipment), a mining house's greatest assets are highly compressed forms of wealth - ie, gems or precious metals - which are also its core business. Proven, flexible, open, high-performance and highly reliable security solutions that can adapt to meet a mine's specific needs are crucial.

Security solutions that meet the needs of the corporate market are rarely suited to mining environments where employees work directly with precious metals and minerals, necessitating regular physical searches. Mining houses cannot abuse these measures however, as they must meet health, human rights and human resource guidelines and regulations.

Technologically driven security solutions for mines include access control, perimeter intrusion detection and alarm systems, as well as closed circuit TV cameras. Functionality, quality of solution and reporting requirements for these solutions extend beyond the standards usually supplied, however.

CCTV solutions that 'will do' for corporates do not have the magnification or image quality needed to see the small shiny glare of stolen gems or metals. Mines are also rough, dusty, often corrosive environments and security equipment must thus be robust and very securely mounted to withstand these conditions. A fingerprint/biotechnology solution, for example, may fail if it cannot withstand the hand 'abuse' it will be subject to.

Mines are rated strictly on the security policy and procedures they implement to manage risk. Reporting for statistical analysis purposes is particularly important. To define risk and accurately measure losses, the measurement process must be auditable through detailed reporting. The risk ratios in any single environment in a mine can, for example, be directly correlated to its asset value (richness of mineral or gem vein) versus the number or workers in that space or moving through it.

Signal monitoring is critical as 'downtime' on, say, a camera due to physical damage or other malfunction escalates risk exposure exponentially. An additional concern is tailoring security solutions to function within the limitations of the remote areas in which mines are situated, such as restriction to low-bandwidth satellite connections for access or other controls.

Tough security measures

Illustrating the tight security in mines, a typical procedure in a high security zone may require all who enter to strip down and put on the mines' clothing. On leaving, they may be searched and, sometimes, X-rayed. Health and human rights requirements limit the exposure of any individual to the amount of gamma radiation from X-rays, as well as the number of searches they must undergo, however, and sophisticated software is essential to track the movements and search procedures carried out on individual employees.

Open security systems are essential to allow for the development of specific functionality, such as security searches and integration with other products such as X-ray machines and barriers. The system will also need to keep an accurate record of which employees have been searched and exposed to radiation. For example, the mine needs to establish how many 'free walks' (entry without being searched) employees have had. In addition, the system needs to feature speed of operation as check areas must allow access for many employees at a time. Johnson Controls' CardKey access solution, for example, allows for complex calculations that ensure regular checks are executed on individual employees over a wide period of time and that X-rays are regulated to limit over-exposure.

Stringent solution assessment criteria

Mines must apply stringent assessment criteria to the selection of products. These should include global representation, research and development, size of company, technical abilities and integration. Using proven technology is a must. Using a solution provider that will be able to adapt the solution to a unique environment and enable specific security policies and integration of various solutions is critical.

While boxed solutions may offer a lower initial cost, the high level of functionality in more sophisticated, open products ensures lower total cost of ownership and an improved long-term return on investment. Above all, the solution must be reliable and capable of flexible, high performance levels.

Neil Cameron, Johnson Controls
Neil Cameron, Johnson Controls

For more information contact Neil Cameron, Johnson Controls, 011 438 1600, [email protected]





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Digitising security solutions with AI and smart integration
Regal Security Distributors SA Technews Publishing Integrated Solutions
The Regal Projects Team’s decades of experience and commitment to integration have brought the digital security guard to life as a trusted force for safer, smarter living.

Read more...
Smart cities and the role of video security
Surveillance Integrated Solutions
As cities around the world continue to embrace smart technology, including IoT that not only connects to people, but also the surrounding activity, the integration of advanced video security systems is crucial to ensure safety and efficiency in environments.

Read more...
Surveillance to unjam the traffic
Integrated Solutions Transport (Industry)
Traffic is a challenge that affects urban areas across Africa. The city of Johannesburg, South Africa’s most populous city, experiences severe traffic resulting from a confluence of issues, including power outages, faulty traffic lights, and infrastructure theft.

Read more...
The benefits of offsite control rooms
Astrosec Surveillance Integrated Solutions
As the security landscape grows more intricate, control rooms – the crucial hub of security operations – need to adapt. With escalating costs, mounting threats, and a heightened demand for immediate responses, many organisations are reassessing the operations of their control rooms.

Read more...
edgE:Tower video analytics integrated with SEON
Surveillance Integrated Solutions AI & Data Analytics
Sentronics has announced a new integration between its edgE:Tower advanced AI-driven video analytics solution and SEON, a Central Monitoring Software (CMS) platform. This integration enhances real-time situational awareness and automated threat detection for control rooms.

Read more...
Security industry embraces mobile credentials, biometrics and AI
AI & Data Analytics Access Control & Identity Management Integrated Solutions
As organisations navigate an increasingly complex threat landscape, security leaders are making strategic shifts toward unified platforms and emerging technologies, according to the newly released 2025 State of Security and Identity Report from HID.

Read more...
Insurance provider uses Net2 For access management
Paxton Access Control & Identity Management Integrated Solutions Healthcare (Industry)
BestMed selected Paxton Net2 for its access control requirements because of its simplicity of installation and ease of navigation for end users, as well as the 5-year warranty.

Read more...
The power of knowing your client
Ideco Biometrics Access Control & Identity Management Integrated Solutions
One of the most effective ways to combat the threat of fraud, identity theft, and financial crime threats is through a robust Know Your Client (KYC) process, which safeguards both businesses and clients.

Read more...
Managing identities for 20 years
Ideco Biometrics Technews Publishing SMART Security Solutions Access Control & Identity Management Integrated Solutions IoT & Automation
Many companies are now more aware of the risks associated with unauthorised access to locations and sensitive data and are investing in advanced identity authentication technologies to mitigate these threats.

Read more...
Cost-effective and reliable remote connectivity
Agriculture (Industry) Integrated Solutions Infrastructure
Companies that operate in hard-to-connect areas now have access to reliable connectivity due to a collaboration between MTN South Africa, Vox and Tarana technology.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.