Protecting remote mobile sites

June 2016 Editor's Choice, Surveillance, Access Control & Identity Management, Asset Management, Security Services & Risk Management

After an ODET Perimeter Intrusion Detection System (PIDS) has been installed for a period of one year, no incidence of theft and vandalism has occurred at a mobile operator’s tower infrastructure site, located remotely on a hill.

This is remarkable, considering that this particular site was targeted by thieves more than once, destroying equipment shelters, removing batteries and cutting ‘baseband’ or ‘IF’ copper cables from the shelters to the radio equipment, located on the mast.

Cables to radio units cut and stolen.
Cables to radio units cut and stolen.

The perpetrators always gained access to this site by forcing the palisade fencing apart. Because of the remoteness of this site, these criminals had enough time to completely ransack the installation. Alarm systems that were installed inside the enclosures only triggered after the enclosure was breached. This alarm was relayed to a security company, who blindly responded to this event not knowing the exact nature of this incident. Sending out a security officer and his colleague to such an alarm might be dangerous as they would not know the number of perpetrators involved in this break-in and the threat level they might pose.

ODET Systems Africa evaluated the situation at this site, considering the classic approach of the Five D’s namely:

• Denying access by the visible barrier of the repaired palisade fence.

• Detecting tampering with the palisade fence and access gate to site (ODET PIDS).

• Deterring the perpetrator/s by activating a light/alarm in conjunction with a video camera, sending the alarm event detail with a picture to a network operation centre (NOC), as well as to other interested parties via an message on a smart phone (ODET PIDS).

• Delaying the perpetrator by making ingress into the site a difficult as possible thereby buying time to:

• Defend the site by sending out a security response team geared for the threat level posed by the alarm incident.

ODET’s PIDS proved to be a reliable and valuable component to a layered security approach in countering this security treat.

The ODET system deployed in this application consists of an ODET 1 single zone processing unit, available in a nineteen inch rack mount format. A multimode fibre optical cable is used as a sensing medium, which is mounted on the fence and gate. The system also provides input/output contacts for further configurations if required. One such contact output, switch on a LED floodlight and alarm, if an alarm event is triggered (deterring function). The ODET system also connects to a fish-eye video camera, allowing control of the picture/video feed.

Perpetrator is left in picture at gate.
Perpetrator is left in picture at gate.

The alarm events, video feed and other functions are transmitted via an IP network connection to a security management system at the NOK. System maintenance and other analytics pertaining to this site, is also communicated via this network.

The image shows alarm events caught and recorded by the ODET system. All these events were of an unauthorised nature and these individuals were deterred by the alarm and lights the system triggered.

ODET is of the opinion that this particular system’s configuration and deployment caused confusion and doubt in the minds of potential criminals, thereby completely deterring any further attempts at vandalising this site. The company says this technology can form an important part in the continuing fight against lawlessness in South Africa and elsewhere, especially regarding the threat mobile network operators, telecommunication companies and other infrastructure operators, having remote locations, face daily.

For more information contact ODET Systems Africa, +27 (0)10 492 0897, [email protected]





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Gallagher Security releases OneLink
Gallagher Animal Management Products & Solutions Access Control & Identity Management
Gallagher Security has announced OneLink, a cloud-based solution that makes it faster, easier and more cost-effective to deploy security anywhere in the world, transforming how security can be delivered to remote sites and distributed infrastructure.

Read more...
Deepfakes and digital trust
Editor's Choice
By securing the video right from the specific camera that captured it, there is no need to prove the chain of custody for the video, you can verify the authenticity at every step.

Read more...
A new generational framework
Editor's Choice Training & Education
Beyond Generation X, and Millennials, Dr Chris Blair discusses the seven decades of technological evolution and the generations they defined, from the 1960’s Mainframe Cohort, to the 2020’s AI Navigators.

Read more...
Chubbsafes celebrates 190 years
Gunnebo Safe Storage Africa News & Events Security Services & Risk Management
Chubbsafes marks its 190th anniversary in 2025 and as a highlight of the anniversary celebrations it is launching the Chubbsafes 1835, a limited edition 190th-anniversary collector’s safe.

Read more...
Next generation of AI-powered video telematics
IoT & Automation Surveillance Transport (Industry)
Webfleet, Bridgestone’s fleet management solution in South Africa, has launched Webfleet Video 2.0, an AI-powered solution designed to enhance fleet safety, security, compliance with local regulations and operational efficiency through real-time video insights.

Read more...
Suprema unveils BioStar Air
Suprema neaMetrics News & Events Access Control & Identity Management Infrastructure
Suprema launches BioStar Air, the first cloud-based access control platform designed to natively support biometric authentication and feature true zero-on-premise architecture. BioStar Air simplifies deployment and scales effortlessly to secure SMBs, multi-branch companies, and mixed-use buildings.

Read more...
New law enforcement request portal
News & Events Security Services & Risk Management
inDrive launches law enforcement request portal in South Africa to support safety investigations. New portal allows authorised South African law enforcement officials to securely request user data related to safety incidents.

Read more...
Continuous AML risk monitoring
Access Control & Identity Management Security Services & Risk Management Financial (Industry)
AU10TIX, launched continuous risk monitoring as part of its advanced anti-money laundering (AML) solution, empowering businesses to detect behavioural anomalies and emerging threats as they arise.

Read more...
Back-up securely and restore in seconds
Betatrac Telematic Solutions Editor's Choice Information Security Infrastructure
Betatrac has a solution that enables companies to back-up up to 8 TB of data onto a device and restore it in 30 seconds in an emergency, called Rapid Access Data Recovery (RADR).

Read more...
Key design considerations for a control room
Leaderware Editor's Choice Surveillance Training & Education
If you are designing or upgrading a control room, or even reviewing or auditing an existing control room, there are a number of design factors that one would need to consider.

Read more...