Technology secures mines

May 2010 Integrated Solutions, Mining (Industry)

Mine security can be enhanced with the correct application of the appropriate technology.

One of South Africa’s largest producers and employers, the country’s mining sector is being relentlessly battered by crime. According to Zane Greeff, technical director of Elvey Security Technologies, it is critical for the mining sector to embrace new security technology if it is to stem ongoing, profit-pounding product and equipment theft.

In its own right, the mining sector is South Africa’s second biggest contributor to the country’s GDP after the agricultural sector. Home to one of the world’s largest reserves of chrome, gold, vanadium, manganese and PGMs (propylene glycol monostearates), it is also the seat of the majority of Africa’s metal and mineral production (according to Statistics SA).

“The mining sector employs more than 500 000 people, whose livelihoods are increasingly at stake as a result of the theft of precious metals and equipment. Throughout the sector, profitability is being undermined to the point where some operations have stopped production and laid off their workers,” says Greeff.

While praising initiatives such as educational workshops which are being implemented to address the problem and hopefully discourage at least some of the criminally-inclined among employees, he says crime – much of it driven by insiders – shows little sign of abating.

Complex areas

The challenges of securing a complex site such as a mine are extreme. “Mines, which are often located in remote areas without power cables or telephones, require specialised security products capable of sending wireless alarm signals through to the control room. These same devices also need to be able to detect motion and react to it immediately by videoing the event and then sending it back to the control room or relevant cellphone or e-mail,” says Greeff.

Fortunately, on the back of recent and huge technological strides within the security industry, mine owners have access to top-of-the-range solutions that are crammed with crime-busting features. Particularly impressive are those that boast fully waterproof, anti-tamper cameras with CMOS (complementary metal oxide semiconductor) black and white sensors, 85° wide-angle lenses, 320 x 240 pixel video resolution and two infrared LEDs to provide night illumination up to 12 m. Through their PIR (passive infrared) ability to detect movement, they are able to activate sophisticated Fresnel lenses to begin recording in less than 100 milliseconds. Because these systems are completely wireless, they can be installed anywhere, and in minutes. Testimony to their effectiveness is documented proof of cameras transmitting over a distance of 300 m to communicator panels.

He recommends the same type of solution for abandoned mine shafts, which he says are the hunting grounds of illegal miners chasing residual minerals. Although these shafts are no longer officially in production, they are serious headaches for the mine holding company, which invariably ends up having to foot the bill for security guards to patrol the area and notify the control room in the event of any disturbance.

Boundary protection

Mine owners desperate to protect entire boundaries or pinpoint spots where criminals have tried to gain entry are bound to be impressed by the latest in microwave cable perimeter intrusion detection systems. “One of the most impressive and sophisticated perimeter security systems on the market,” says Greeff, “protects more than 2,1 million metres of perimeter fencing worldwide.

“Prospective users will be interested to know that the sensor is a volumetric, terrain-following sensor able to reliably detect and precisely locate walking, running or crawling intruders along the perimeter,” he notes. “The cable technology can detect any fence disturbance and narrow it down to within 3 m. This it does through the use of proprietary digital signal processing (DSP) algorithms, which can pick up any attempt to cut or climb the fence while ignoring noise from wind, rain and heavy vehicles. What is more, the microwave cable transmits alarm signals and operating power to all modules and auxiliary sensors along the perimeter, which eliminates the need for extra wiring.”

The software interfaces directly with a personal computer which becomes the alarm monitoring display and graphic map. The result is a system that not only provides unparalleled performance and eliminates the extremely irritating problem of false alarms which plagues most other fence sensors but also offers measurable cost savings.

For more information contact Kenny Chiu, Elvey, +27 (0)11 401 6700, [email protected]



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Security industry embraces mobile credentials, biometrics and AI
AI & Data Analytics Access Control & Identity Management Integrated Solutions
As organisations navigate an increasingly complex threat landscape, security leaders are making strategic shifts toward unified platforms and emerging technologies, according to the newly released 2025 State of Security and Identity Report from HID.

Read more...
edgE:Tower video analytics integrated with SEON
Surveillance Integrated Solutions AI & Data Analytics
Sentronics has announced a new integration between its edgE:Tower advanced AI-driven video analytics solution and SEON, a Central Monitoring Software (CMS) platform. This integration enhances real-time situational awareness and automated threat detection for control rooms.

Read more...
Insurance provider uses Net2 For access management
Paxton Access Control & Identity Management Integrated Solutions Healthcare (Industry)
BestMed selected Paxton Net2 for its access control requirements because of its simplicity of installation and ease of navigation for end users, as well as the 5-year warranty.

Read more...
The power of knowing your client
Ideco Biometrics Access Control & Identity Management Integrated Solutions
One of the most effective ways to combat the threat of fraud, identity theft, and financial crime threats is through a robust Know Your Client (KYC) process, which safeguards both businesses and clients.

Read more...
Smarter ways to secure your space
Elvey Security Technologies Access Control & Identity Management Products & Solutions
Ensuring the safety of people and assets has become more crucial than ever, and access control systems provide essential tools to regulate and monitor who can enter specific areas or access sensitive resources.

Read more...
Managing identities for 20 years
Ideco Biometrics Technews Publishing SMART Security Solutions Access Control & Identity Management Integrated Solutions IoT & Automation
Many companies are now more aware of the risks associated with unauthorised access to locations and sensitive data and are investing in advanced identity authentication technologies to mitigate these threats.

Read more...
Risk-IO manages mining security risks
Zulu Consulting Security Services & Risk Management Mining (Industry)
[Sponsored] A local mining company with three large operations experienced increased security costs. The liability included no standardised risk assessment, poor management of the efforts to mitigate hazards, and unauthorised access with subsequent theft. The reactive approach to security was not only expensive but also wasteful in the sense that the costs were poorly managed, and there were no metrics to show improvement or trends in incidents.

Read more...
Elvey to distribute Tiandy
Elvey Security Technologies Editor's Choice Surveillance News & Events
Tiandy’s presence in South Africa was boosted in November with the announcement that Elvey Security Technologies will distribute a broad range of Tiandy equipment through its channel partners and provide project assistance.

Read more...
Partnership addresses fire hazard mitigation
Brigit Fire (a Division of Hudaco Trading) Elvey Security Technologies Fire & Safety Security Services & Risk Management
Brigit Fire has partnered with the Elvey Group. The collaboration will see Brigit Fire distributing both the advanced C-TEC addressable fire detection systems (CAST Technology) and GreenMist lithium extinguishers.

Read more...
Watermist suppression in mining
FS Systems Fire & Safety Mining (Industry) Products & Solutions
Watermist suppression systems are highly effective in suppressing flames and controlling heat spread, especially in confined spaces commonly found in mining environments, by generating fine droplets with an increased surface area, enabling rapid heat absorption and cooling during fire incidents.

Read more...