Securing mines - high value, high risk

March 2008 Integrated Solutions

Securing a mine is a challenge. The industry features many unique requirements that are vastly different to those in a corporate environment.

On the local front, we have a few extra challenges to deal with: we have a higher crime rate than most countries, and mines form a key component of the health of our economy, reinforcing the need for effective security solutions to prevent and eliminate the threat of theft and/or sabotage in this sector.

What differentiates mines from corporate environments is that they are usually located in geographically dispersed areas; feature high-value commodities such as gold, platinum and diamonds; and cover a huge footprint.

This gives rise to many crimes that are a result of collusion. For example, people from the same town and neighbourhood are likely to work in a mine that provides employment to communities in geographically dispersed areas.

This creates a higher risk profile for mines as crime by individuals is replaced by two or more individuals that collaborate. These are key issues that need to be considered when assessing a mine's security requirements.

In addition, mines are under pressure to deliver more products, faster and more efficiently. This requires more attention to security as higher throughput means there is more risk.

A 'layered' approach is required when assessing the risks in mining. This is usually done by area, the risk associated with each area and the people that work there. For example, the raw product might be difficult to pilfer, as it needs to be extracted as with gold, platinum and diamonds. However, as the product enters the 'sorting' process, this significantly increases the risk.

Security measures therefore need to increase with the higher risk. Having a risk profile of staff will assist to reduce theft and other crimes in a mining environment.

It is also important to know where staff members are situated. Rather than regarding this as a 'big brother' approach, it is critical to maintain high safety levels in a mine and being able to establish where workers are situated is crucial. Asset tracking therefore becomes part of the security agenda.

Considering the above, mines often follow a path of identifying a niche security requirement and fulfilling it with a niche, individual solution.

Technology has been a big driver in this area as advancements have seen a shift from physical guarding to automated solutions. However, the way to properly secure a mine with technology is to create an integrated environment that delivers a highly sophisticated security solution made up of interlinked components that deliver more functionality and control.

Interfacing with products such as access control, CCTV, alarms, X-ray machines and risk-analysis software can greatly enhance the individual capabilities of these systems. For example, behavioural patterns can lead to identifying a potential threat by coupling the functionality of access control and CCTV. Access control of employees can be segmented with zones - high, medium and low risk - and individuals allowed access to certain areas according to their job requirement and role. If an individual enters an unauthorised area, the CCTV camera can be triggered and an alarm to security personnel generated.

However, this can be taken one step further. Profiles developed with CCTV, access control and risk-profile software can be used to monitor irregular behaviour. If, perhaps, a person's behaviour changes such as their movements reflect anxiety or they deviate from their everyday behaviour, the systems can flag an alert or alarm, highlighting a potential crime or threat before it occurs.

The concept of adapting to a mining environment's unique needs through the integration of a plethora of individual security solutions is not new. It is in practice in a few mining companies and working well.

So rather than taking an isolated approach, mines should look towards solutions that are built on an open architecture and can be integrated with other solutions.

Neil Cameron is the systems divisional manager at Johnson Controls Systems & Service

For more information contact Johnson Controls, +27 (0)11 921 7100, [email protected], www.johnsoncontrols.com



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Digitising security solutions with AI and smart integration
Regal Security Distributors SA Technews Publishing Integrated Solutions
The Regal Projects Team’s decades of experience and commitment to integration have brought the digital security guard to life as a trusted force for safer, smarter living.

Read more...
Smart cities and the role of video security
Surveillance Integrated Solutions
As cities around the world continue to embrace smart technology, including IoT that not only connects to people, but also the surrounding activity, the integration of advanced video security systems is crucial to ensure safety and efficiency in environments.

Read more...
Surveillance to unjam the traffic
Integrated Solutions Transport (Industry)
Traffic is a challenge that affects urban areas across Africa. The city of Johannesburg, South Africa’s most populous city, experiences severe traffic resulting from a confluence of issues, including power outages, faulty traffic lights, and infrastructure theft.

Read more...
The benefits of offsite control rooms
Astrosec Surveillance Integrated Solutions
As the security landscape grows more intricate, control rooms – the crucial hub of security operations – need to adapt. With escalating costs, mounting threats, and a heightened demand for immediate responses, many organisations are reassessing the operations of their control rooms.

Read more...
edgE:Tower video analytics integrated with SEON
Surveillance Integrated Solutions AI & Data Analytics
Sentronics has announced a new integration between its edgE:Tower advanced AI-driven video analytics solution and SEON, a Central Monitoring Software (CMS) platform. This integration enhances real-time situational awareness and automated threat detection for control rooms.

Read more...
Security industry embraces mobile credentials, biometrics and AI
AI & Data Analytics Access Control & Identity Management Integrated Solutions
As organisations navigate an increasingly complex threat landscape, security leaders are making strategic shifts toward unified platforms and emerging technologies, according to the newly released 2025 State of Security and Identity Report from HID.

Read more...
Insurance provider uses Net2 For access management
Paxton Access Control & Identity Management Integrated Solutions Healthcare (Industry)
BestMed selected Paxton Net2 for its access control requirements because of its simplicity of installation and ease of navigation for end users, as well as the 5-year warranty.

Read more...
The power of knowing your client
Ideco Biometrics Access Control & Identity Management Integrated Solutions
One of the most effective ways to combat the threat of fraud, identity theft, and financial crime threats is through a robust Know Your Client (KYC) process, which safeguards both businesses and clients.

Read more...
Managing identities for 20 years
Ideco Biometrics Technews Publishing SMART Security Solutions Access Control & Identity Management Integrated Solutions IoT & Automation
Many companies are now more aware of the risks associated with unauthorised access to locations and sensitive data and are investing in advanced identity authentication technologies to mitigate these threats.

Read more...
Cost-effective and reliable remote connectivity
Agriculture (Industry) Integrated Solutions Infrastructure
Companies that operate in hard-to-connect areas now have access to reliable connectivity due to a collaboration between MTN South Africa, Vox and Tarana technology.

Read more...