Technology secures mines

May 2010 Integrated Solutions, Mining (Industry)

Mine security can be enhanced with the correct application of the appropriate technology.

One of South Africa’s largest producers and employers, the country’s mining sector is being relentlessly battered by crime. According to Zane Greeff, technical director of Elvey Security Technologies, it is critical for the mining sector to embrace new security technology if it is to stem ongoing, profit-pounding product and equipment theft.

In its own right, the mining sector is South Africa’s second biggest contributor to the country’s GDP after the agricultural sector. Home to one of the world’s largest reserves of chrome, gold, vanadium, manganese and PGMs (propylene glycol monostearates), it is also the seat of the majority of Africa’s metal and mineral production (according to Statistics SA).

“The mining sector employs more than 500 000 people, whose livelihoods are increasingly at stake as a result of the theft of precious metals and equipment. Throughout the sector, profitability is being undermined to the point where some operations have stopped production and laid off their workers,” says Greeff.

While praising initiatives such as educational workshops which are being implemented to address the problem and hopefully discourage at least some of the criminally-inclined among employees, he says crime – much of it driven by insiders – shows little sign of abating.

Complex areas

The challenges of securing a complex site such as a mine are extreme. “Mines, which are often located in remote areas without power cables or telephones, require specialised security products capable of sending wireless alarm signals through to the control room. These same devices also need to be able to detect motion and react to it immediately by videoing the event and then sending it back to the control room or relevant cellphone or e-mail,” says Greeff.

Fortunately, on the back of recent and huge technological strides within the security industry, mine owners have access to top-of-the-range solutions that are crammed with crime-busting features. Particularly impressive are those that boast fully waterproof, anti-tamper cameras with CMOS (complementary metal oxide semiconductor) black and white sensors, 85° wide-angle lenses, 320 x 240 pixel video resolution and two infrared LEDs to provide night illumination up to 12 m. Through their PIR (passive infrared) ability to detect movement, they are able to activate sophisticated Fresnel lenses to begin recording in less than 100 milliseconds. Because these systems are completely wireless, they can be installed anywhere, and in minutes. Testimony to their effectiveness is documented proof of cameras transmitting over a distance of 300 m to communicator panels.

He recommends the same type of solution for abandoned mine shafts, which he says are the hunting grounds of illegal miners chasing residual minerals. Although these shafts are no longer officially in production, they are serious headaches for the mine holding company, which invariably ends up having to foot the bill for security guards to patrol the area and notify the control room in the event of any disturbance.

Boundary protection

Mine owners desperate to protect entire boundaries or pinpoint spots where criminals have tried to gain entry are bound to be impressed by the latest in microwave cable perimeter intrusion detection systems. “One of the most impressive and sophisticated perimeter security systems on the market,” says Greeff, “protects more than 2,1 million metres of perimeter fencing worldwide.

“Prospective users will be interested to know that the sensor is a volumetric, terrain-following sensor able to reliably detect and precisely locate walking, running or crawling intruders along the perimeter,” he notes. “The cable technology can detect any fence disturbance and narrow it down to within 3 m. This it does through the use of proprietary digital signal processing (DSP) algorithms, which can pick up any attempt to cut or climb the fence while ignoring noise from wind, rain and heavy vehicles. What is more, the microwave cable transmits alarm signals and operating power to all modules and auxiliary sensors along the perimeter, which eliminates the need for extra wiring.”

The software interfaces directly with a personal computer which becomes the alarm monitoring display and graphic map. The result is a system that not only provides unparalleled performance and eliminates the extremely irritating problem of false alarms which plagues most other fence sensors but also offers measurable cost savings.

For more information contact Kenny Chiu, Elvey, +27 (0)11 401 6700, [email protected]



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Digitising security solutions with AI and smart integration
Regal Security Distributors SA Technews Publishing Integrated Solutions
The Regal Projects Team’s decades of experience and commitment to integration have brought the digital security guard to life as a trusted force for safer, smarter living.

Read more...
Smart cities and the role of video security
Surveillance Integrated Solutions
As cities around the world continue to embrace smart technology, including IoT that not only connects to people, but also the surrounding activity, the integration of advanced video security systems is crucial to ensure safety and efficiency in environments.

Read more...
Surveillance to unjam the traffic
Integrated Solutions Transport (Industry)
Traffic is a challenge that affects urban areas across Africa. The city of Johannesburg, South Africa’s most populous city, experiences severe traffic resulting from a confluence of issues, including power outages, faulty traffic lights, and infrastructure theft.

Read more...
Managing mining physical security risks
Zulu Consulting Security Services & Risk Management Mining (Industry) Facilities & Building Management
[Sponsored] Risk-IO, a web app from Zulu Consulting, is designed to assist risk managers in automating and streamlining enterprise risk management processes, ensuring no steps are skipped and everything is securely documented.

Read more...
The future of the surveillance channel
Duxbury Networking Technews Publishing Elvey Security Technologies SMART Security Solutions Surveillance
The video surveillance market has evolved from camera-based specifications to integrated solutions that solve customers’ problems. Moreover, the growth of AI and cloud has changed the channel even more, with more to come.

Read more...
The benefits of offsite control rooms
Astrosec Surveillance Integrated Solutions
As the security landscape grows more intricate, control rooms – the crucial hub of security operations – need to adapt. With escalating costs, mounting threats, and a heightened demand for immediate responses, many organisations are reassessing the operations of their control rooms.

Read more...
edgE:Tower video analytics integrated with SEON
Surveillance Integrated Solutions AI & Data Analytics
Sentronics has announced a new integration between its edgE:Tower advanced AI-driven video analytics solution and SEON, a Central Monitoring Software (CMS) platform. This integration enhances real-time situational awareness and automated threat detection for control rooms.

Read more...
Security industry embraces mobile credentials, biometrics and AI
AI & Data Analytics Access Control & Identity Management Integrated Solutions
As organisations navigate an increasingly complex threat landscape, security leaders are making strategic shifts toward unified platforms and emerging technologies, according to the newly released 2025 State of Security and Identity Report from HID.

Read more...
Insurance provider uses Net2 For access management
Paxton Access Control & Identity Management Integrated Solutions Healthcare (Industry)
BestMed selected Paxton Net2 for its access control requirements because of its simplicity of installation and ease of navigation for end users, as well as the 5-year warranty.

Read more...
The power of knowing your client
Ideco Biometrics Access Control & Identity Management Integrated Solutions
One of the most effective ways to combat the threat of fraud, identity theft, and financial crime threats is through a robust Know Your Client (KYC) process, which safeguards both businesses and clients.

Read more...