Protecting remote mobile sites

June 2016 Editor's Choice, Surveillance, Access Control & Identity Management, Asset Management, Security Services & Risk Management

After an ODET Perimeter Intrusion Detection System (PIDS) has been installed for a period of one year, no incidence of theft and vandalism has occurred at a mobile operator’s tower infrastructure site, located remotely on a hill.

This is remarkable, considering that this particular site was targeted by thieves more than once, destroying equipment shelters, removing batteries and cutting ‘baseband’ or ‘IF’ copper cables from the shelters to the radio equipment, located on the mast.

Cables to radio units cut and stolen.
Cables to radio units cut and stolen.

The perpetrators always gained access to this site by forcing the palisade fencing apart. Because of the remoteness of this site, these criminals had enough time to completely ransack the installation. Alarm systems that were installed inside the enclosures only triggered after the enclosure was breached. This alarm was relayed to a security company, who blindly responded to this event not knowing the exact nature of this incident. Sending out a security officer and his colleague to such an alarm might be dangerous as they would not know the number of perpetrators involved in this break-in and the threat level they might pose.

ODET Systems Africa evaluated the situation at this site, considering the classic approach of the Five D’s namely:

• Denying access by the visible barrier of the repaired palisade fence.

• Detecting tampering with the palisade fence and access gate to site (ODET PIDS).

• Deterring the perpetrator/s by activating a light/alarm in conjunction with a video camera, sending the alarm event detail with a picture to a network operation centre (NOC), as well as to other interested parties via an message on a smart phone (ODET PIDS).

• Delaying the perpetrator by making ingress into the site a difficult as possible thereby buying time to:

• Defend the site by sending out a security response team geared for the threat level posed by the alarm incident.

ODET’s PIDS proved to be a reliable and valuable component to a layered security approach in countering this security treat.

The ODET system deployed in this application consists of an ODET 1 single zone processing unit, available in a nineteen inch rack mount format. A multimode fibre optical cable is used as a sensing medium, which is mounted on the fence and gate. The system also provides input/output contacts for further configurations if required. One such contact output, switch on a LED floodlight and alarm, if an alarm event is triggered (deterring function). The ODET system also connects to a fish-eye video camera, allowing control of the picture/video feed.

Perpetrator is left in picture at gate.
Perpetrator is left in picture at gate.

The alarm events, video feed and other functions are transmitted via an IP network connection to a security management system at the NOK. System maintenance and other analytics pertaining to this site, is also communicated via this network.

The image shows alarm events caught and recorded by the ODET system. All these events were of an unauthorised nature and these individuals were deterred by the alarm and lights the system triggered.

ODET is of the opinion that this particular system’s configuration and deployment caused confusion and doubt in the minds of potential criminals, thereby completely deterring any further attempts at vandalising this site. The company says this technology can form an important part in the continuing fight against lawlessness in South Africa and elsewhere, especially regarding the threat mobile network operators, telecommunication companies and other infrastructure operators, having remote locations, face daily.

For more information contact ODET Systems Africa, +27 (0)10 492 0897, [email protected]





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Pentagon appointed as Milestone distributor
Elvey Security Technologies News & Events Surveillance
Milestone Systems appointed Pentagon Distribution (an Elvey Group company within the Hudaco Group of Companies) as a distributor. XProtect’s open architecture means no lock-in and the ability to customise the connected video solution that will accomplish the job.

Read more...
AI-enabled tools reducing time to value and enhancing application security
Editor's Choice
Next-generation AI tools are adding new layers of intelligent testing, audit, security, and assurance to the application development lifecycle, reducing risk, and improving time to value while augmenting the overall security posture.

Read more...
2024 State of Security Report
Editor's Choice
Mobile IDs, MFA and sustainability emerge as top trends in HID Global’s 2024 State of Security Report, with artificial intelligence appearing in the conversation for the first time.

Read more...
Cyberthreats facing SMBs
Editor's Choice
Data and credential theft malware were the top two threats against SMBs in 2023, accounting for nearly 50% of all malware targeting this market segment. Ransomware is still the biggest threat.

Read more...
Are we our own worst enemy?
Editor's Choice
Sonja de Klerk believes the day-to-day issues we face can serve as opportunities for personal growth and empowerment, enabling us to contribute to creating a better and safer environment for ourselves and South Africa.

Read more...
How to spot a cyberattack if you are not a security pro
Editor's Choice
Cybersecurity awareness is straightforward if you know what to look for; vigilance and knowledge are our most potent weapons and the good news is that anyone can grasp the basics and spot suspicious activities.

Read more...
Protecting IP and secret data in the age of AI
Editor's Choice
The promise of artificial intelligence (AI) is a source of near-continuous hype for South Africans. However, for enterprises implementing AI solutions, there are some important considerations regarding their intellectual property (IP) and secret data.

Read more...
Super election year increases risks of political violence
Editor's Choice
Widening polarisation is expected in many elections, with terrorism, civil unrest, and environmental activism risks intensifying in a volatile geopolitical environment. Multinational businesses show an increasing interest in political violence insurance coverage in mitigation.

Read more...
Deception technology crucial to unmasking data theft
Information Security Security Services & Risk Management
The ‘silent theft’ of data is an increasingly prevalent cyber threat to businesses, driving the ongoing leakage of personal information in the public domain through undetected attacks that cannot even be policed by data privacy legislation.

Read more...
Proactive strategies against payment fraud
Financial (Industry) Security Services & Risk Management
Amid a spate of high-profile payment fraud cases in South Africa, the need for robust fraud payment prevention measures has never been more apparent, says Ryan Mer, CEO of eftsure Africa.

Read more...