Monitoring human traffic

December 2006 Access Control & Identity Management

One of the major problems facing the countries that will be affected by the FIFA 2010 Soccer World Cup will be the monitoring of passengers arriving at the major airports in the region as well as those entering through land borders, sea ports and those arriving by train.

Many passengers may travel with false documentation and this presents a major threat to the security of South Africa and its neighbours. A sharp increase in asylum seekers and opportunistic syndicate activities can be expected before, during and after the Soccer World Cup.

The most common modus operandi will be for these passengers to enter South Africa on both good and bad documents, destroy these documents to either fade into the background until they create a new identity by filing for a late registration of birth or to fraudulently obtain South African documentation and become a South African citizen.

These practices have the potential to economically ruin South Africa and could mean the collapse of the already over stretched medical, social and pension services of the state. A huge financial burden on the country that could last for generations is imminent if we do not invest in preventive security and control measures.

The way to effectively deal with this potential problem is to ensure that infrastructure is in place at all ports of entry that allows for the scanning and recording of the passport details of all visitors.

The scanned details and images of the person are recorded on entry and transferred to a central database. The system could even require that a visitor upon checking in at the hotel, guest house or other accommodation, has their passport scanned again for record purposes.

On departure once the World Cup is over, the details should be captured once again to give the authorities an overall picture of who entered the country, where they stayed and when they left. Should a visitor elect not to leave, they can be traced because the authorities have details and pictures of them and thus know what the person looks like.

There is no doubt that a huge number of people will descend upon South Africa and its neighbours for the World Cup and if we are going to ensure that visitors are not abusing this event as an excuse to travel to South Africa and simply disappear into the system then infrastructure, trained personnel and the correct equipment has to be in place to prevent this.

Headquartered in Centurion, the Veridoc Group offers a wide array of unique products and services.

The establishment in 2004 of the Veridoc Group, based in Centurion, was necessitated by the growing need world-wide to verify and authenticate documentation, control the access and movement of people, and the world-wide drive to address terrorism, organised crime, the smuggling of illegal substances and the detection of fraud.

The group provides a comprehensive range of specialised forensic science products and services: security paper and related security printing; access control systems and biometric scanning equipment; security vehicles; digital medical and security X-ray equipment; industrial and environmental analysers as well as integrated specialised software solutions. Veridoc is also able to provide additional forensic services to its clients through strategic associations with its business partners.

The company has concluded exclusive distribution agreements with various companies in Belarus, Russia and Hungary. These agreements make provision for Veridoc to operate in the whole of Africa, certain Middle East Countries and the whole of South America, Canada, Mexico and certain countries in Asia.

For more information contact Veridoc, +27 (0) 861 837 436, [email protected], www.veridoc.co.za





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Defending against SIM swap fraud
Access Control & Identity Management
Mobile networks must not be complacent about SIM swap fraud, and they need to prioritise the protection of customers, according to Gur Geva, Founder and CEO of iiDENTIFii.

Read more...
Access Selection Guide 2024
Access Control & Identity Management
The Access Selection Guide 2024 includes a range of devices geared specifically for the access control and identity management market.

Read more...
Biometrics Selection Guide 2024
Access Control & Identity Management
The Biometrics Selection Guide 2024 incorporates a number of hardware and software biometric identification systems aimed at the access and identity management market of today.

Read more...
Smart intercoms for Sky House Projects
Nology Access Control & Identity Management Residential Estate (Industry)
DNAKE’s easy and smart intercom solution has everything in place for modern residential buildings. Hence, the developer selected DNAKE video intercoms to round out upmarket apartment complexes, supported by the mobile app.

Read more...
Authentic identity
HID Global Access Control & Identity Management
As the world has become global and digital, traditional means for confirming authentic identity, and understanding what is real and what is fake have become impractical.

Read more...
Research labs secured with STid Mobile ID
Access Control & Identity Management
When NTT opened its research centre in Silicon Valley, it was looking for a high-security expert capable of protecting the company’s sensitive data. STid readers and mobile ID solutions formed part of the solution.

Read more...
Is voice biometrics in banking secure enough?
Access Control & Identity Management AI & Data Analytics
As incidents of banking fraud grow exponentially and become increasingly sophisticated, it is time to question whether voice banking is a safe option for consumers.

Read more...
Unlocking efficiency and convenience
OPTEX Access Control & Identity Management Transport (Industry)
The OVS-02GT vehicle detection sensor is the newest member of Optex’s vehicle sensor range, also known as ‘virtual loop’, and offers reliable motion detection of cars, trucks, vans, and other motorised vehicles using microwave technology.

Read more...
Protecting our most vulnerable
NEC XON Access Control & Identity Management Products & Solutions
In a nation grappling with the distressing rise in child kidnappings, the need for innovative solutions to protect our infants has never been more critical. South Africa finds itself in the throes of a child abduction pandemic.

Read more...
Understanding the power of digital identity
Access Control & Identity Management Security Services & Risk Management Financial (Industry)
The way we perceive business flourishing is undergoing a paradigm shift, as digital identity and consumer consent redefine the dynamics of transactions, says Shanaaz Trethewey.

Read more...