Securing mines - high value, high risk

March 2008 Integrated Solutions

Securing a mine is a challenge. The industry features many unique requirements that are vastly different to those in a corporate environment.

On the local front, we have a few extra challenges to deal with: we have a higher crime rate than most countries, and mines form a key component of the health of our economy, reinforcing the need for effective security solutions to prevent and eliminate the threat of theft and/or sabotage in this sector.

What differentiates mines from corporate environments is that they are usually located in geographically dispersed areas; feature high-value commodities such as gold, platinum and diamonds; and cover a huge footprint.

This gives rise to many crimes that are a result of collusion. For example, people from the same town and neighbourhood are likely to work in a mine that provides employment to communities in geographically dispersed areas.

This creates a higher risk profile for mines as crime by individuals is replaced by two or more individuals that collaborate. These are key issues that need to be considered when assessing a mine's security requirements.

In addition, mines are under pressure to deliver more products, faster and more efficiently. This requires more attention to security as higher throughput means there is more risk.

A 'layered' approach is required when assessing the risks in mining. This is usually done by area, the risk associated with each area and the people that work there. For example, the raw product might be difficult to pilfer, as it needs to be extracted as with gold, platinum and diamonds. However, as the product enters the 'sorting' process, this significantly increases the risk.

Security measures therefore need to increase with the higher risk. Having a risk profile of staff will assist to reduce theft and other crimes in a mining environment.

It is also important to know where staff members are situated. Rather than regarding this as a 'big brother' approach, it is critical to maintain high safety levels in a mine and being able to establish where workers are situated is crucial. Asset tracking therefore becomes part of the security agenda.

Considering the above, mines often follow a path of identifying a niche security requirement and fulfilling it with a niche, individual solution.

Technology has been a big driver in this area as advancements have seen a shift from physical guarding to automated solutions. However, the way to properly secure a mine with technology is to create an integrated environment that delivers a highly sophisticated security solution made up of interlinked components that deliver more functionality and control.

Interfacing with products such as access control, CCTV, alarms, X-ray machines and risk-analysis software can greatly enhance the individual capabilities of these systems. For example, behavioural patterns can lead to identifying a potential threat by coupling the functionality of access control and CCTV. Access control of employees can be segmented with zones - high, medium and low risk - and individuals allowed access to certain areas according to their job requirement and role. If an individual enters an unauthorised area, the CCTV camera can be triggered and an alarm to security personnel generated.

However, this can be taken one step further. Profiles developed with CCTV, access control and risk-profile software can be used to monitor irregular behaviour. If, perhaps, a person's behaviour changes such as their movements reflect anxiety or they deviate from their everyday behaviour, the systems can flag an alert or alarm, highlighting a potential crime or threat before it occurs.

The concept of adapting to a mining environment's unique needs through the integration of a plethora of individual security solutions is not new. It is in practice in a few mining companies and working well.

So rather than taking an isolated approach, mines should look towards solutions that are built on an open architecture and can be integrated with other solutions.

Neil Cameron is the systems divisional manager at Johnson Controls Systems & Service

For more information contact Johnson Controls, +27 (0)11 921 7100, [email protected], www.johnsoncontrols.com



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Acronis and Metrofile Cloud announce partnership
Infrastructure Integrated Solutions
Acronis has appointed Metrofile Cloud as its premier disaster recovery (DR) partner in southern Africa, combining Acronis' technologies with Metrofile Cloud's local expertise to deliver secure and adaptable disaster recovery solutions for businesses across the region.

Read more...
The real cost of DHA’s verification fee
Ideco Biometrics Integrated Solutions
South Africa’s Department of Home Affairs has proposed a significant increase in its online ID-verification fee, which could have severe unintended consequences, potentially undermining the progress made in anti-money laundering initiatives and exposing individuals to greater risk of identity fraud.

Read more...
Digitising security solutions with AI and smart integration
Regal Security Distributors SA Technews Publishing Integrated Solutions
The Regal Projects Team’s decades of experience and commitment to integration have brought the digital security guard to life as a trusted force for safer, smarter living.

Read more...
Smart cities and the role of video security
Surveillance Integrated Solutions
As cities around the world continue to embrace smart technology, including IoT that not only connects to people, but also the surrounding activity, the integration of advanced video security systems is crucial to ensure safety and efficiency in environments.

Read more...
Surveillance to unjam the traffic
Integrated Solutions Transport (Industry)
Traffic is a challenge that affects urban areas across Africa. The city of Johannesburg, South Africa’s most populous city, experiences severe traffic resulting from a confluence of issues, including power outages, faulty traffic lights, and infrastructure theft.

Read more...
The benefits of offsite control rooms
Astrosec Surveillance Integrated Solutions
As the security landscape grows more intricate, control rooms – the crucial hub of security operations – need to adapt. With escalating costs, mounting threats, and a heightened demand for immediate responses, many organisations are reassessing the operations of their control rooms.

Read more...
edgE:Tower video analytics integrated with SEON
Surveillance Integrated Solutions AI & Data Analytics
Sentronics has announced a new integration between its edgE:Tower advanced AI-driven video analytics solution and SEON, a Central Monitoring Software (CMS) platform. This integration enhances real-time situational awareness and automated threat detection for control rooms.

Read more...
Security industry embraces mobile credentials, biometrics and AI
AI & Data Analytics Access Control & Identity Management Integrated Solutions
As organisations navigate an increasingly complex threat landscape, security leaders are making strategic shifts toward unified platforms and emerging technologies, according to the newly released 2025 State of Security and Identity Report from HID.

Read more...
Insurance provider uses Net2 For access management
Paxton Access Control & Identity Management Integrated Solutions Healthcare (Industry)
BestMed selected Paxton Net2 for its access control requirements because of its simplicity of installation and ease of navigation for end users, as well as the 5-year warranty.

Read more...
The power of knowing your client
Ideco Biometrics Access Control & Identity Management Integrated Solutions
One of the most effective ways to combat the threat of fraud, identity theft, and financial crime threats is through a robust Know Your Client (KYC) process, which safeguards both businesses and clients.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.