Securing Xstrata Copper's Mount Isa mines

Access & Identity Management Handbook 2011 Access Control & Identity Management, Mining (Industry)

Mining giant opts for Cardax FT.

Located in mineral-rich north-west Queensland, in the sun-baked heart of Australia, ‘the Isa’ has the distinction of being one of the few places in the world where four metals (copper, zinc, lead and silver) are found and mined.

Xstrata Copper's Mount Isa Mines, operates one of the largest underground mines in the world. The Enterprise underground copper mine, the most recent copper ore source at Mount Isa, is Australia's deepest mine, with an internal shaft that reaches 1800 m deep.

Mount Isa Mines also mines and processes zinc, lead and silver and runs these operations on behalf of Xstrata Zinc. Xstrata Copper is one of four commodity businesses within the major global diversified mining group Xstrata plc. Along with Mount Isa Mines, acquired in 2003, Xstrata Copper’s operations comprise the Townsville copper refinery and Bowen Coke works, the Ernest Henry open pit copper-gold mine and the Townsville Port facilities. It also operates the Alumbrera copper-gold mine in the Catamarca Province in Argentina, South America.

The company’s mining and smelting complex at Mount Isa produces copper anode and lead bullion containing silver and zinc concentrate. Copper anode is transported for refining at the company’s copper refinery in Townsville, while lead bullion is transported for refining at the company’s lead-silver refinery in England. Zinc concentrate is sold directly to customers in Australia and overseas.

Safety and security

Handling explosives, operating machinery and working as deep as 1800 metres below ground require first class safety and security systems. Because Xstrata Copper is committed to providing a safe, productive and healthy work environment, the company is diligent in protecting its employees from unnecessary risks while striving for a zero-harm goal.

Sjeff Klaassen, from Xstrata Copper’s security partner ADT Queensland said ongoing security reviews and upgrades had become an integral part of the business planning process with a range of safety management and improvement systems being implemented in line with Xstrata Copper’s Safety and Health policies. This was confirmed by Mount Isa Mines Emergency and Protective Services Superintendent, Darren Bracey who said the complex mix of mining, processing and smelting at Mount Isa presented numerous challenges when it came to ensuring the safety of employees and the general public.

“We must allow for movement of authorised personnel with a minimum of effort, while ensuring all the necessary training, induction and other entry requirements are current,” he said. “We must also be able to ensure that personnel who are not authorised to access certain areas are prevented from doing so. Another challenge for us is having the ability to account for personnel in the event of an incident, particularly in our underground environment.”

Bracey said collection and management of all the associated data was a significant issue in itself – and aligning this with access requests complicated it even more. To cope with the movements of personnel at Mount Isa Mines and establish a safe and secure environment, the Mine originally installed the Cardax Unix access control system including Cardax Commander architecture at its copper mining site in 1990. Today, the site boasts security systems technology in the form of Cardax FT, a comprehensive Windows-based security system.

State-of-the-art security systems

The site has been able to extend the life of its five legacy Commanders through the Cardax FT Commander Interface, enabling the site to migrate to Cardax FT hardware architecture over time. Already, 20 Cardax FT Controller 5000s, complemented by three Controller 3000s for integrated intruder alarms management have been installed. The Controllers utilise the company’s existing LAN/WAN, reducing the overall labour component of Cardax FT installations.

Ten workstations enable the system to be used as an efficient tool by authorised staff on site, each of whom is assigned operator privileges to report and perform a multitude of functions. The Cardax system employed at Mount Isa Mines has several integration applications including an interface with the CCTV management system. It is integrated with reporter software packaged to provide a customised reporting tool to monitor the whereabouts of underground staff. As well as being interfaced to the company’s HR management system, the Cardax system also monitors alarms including environmental, fire, intrusion and production alarms and domestic site-associated alarm systems.

In addition to on-site alarms management, the system’s field controllers support dial-up to a remote alarm monitoring company for backup.

Cardax FT Cardholder Import enables cardholder data to be imported from other systems using an XML interface. There’s also PhotoID for image capture, card design and printing of Photo ID cards and Challenge, a feature that enables a cardholder’s image from their CCTV system to be checked against the cardholder image in the Cardax FT system.

Further expansion

At the time of writing, a further two software applications were being installed to assist in contractor management. The applications mean business managers can directly control the access periods given to each contractor for specific areas. These applications help ensure contractor compliance for site access and generate reports on times spent in a defined area by a person, contract company or other defined unit.

Bracey is quick to praise the Cardax FT system. “The advanced technology of the Cardax FT system is flexible enough to meet the changing mining environment. It has enabled better management of contractors. The development of electronic tagging to manage firing (of explosives) underground has significantly reduced risk of injury, as well as reducing the cost of miss-firings often experienced using the old manual tag board systems.

“The system has many different types of hardware that can be adapted to suit the site’s needs, while the powerful software lends itself well to integration with other third party software applications to allow better management of security, health, safety, access control and contractor management.”

For more information contact Gallagher Security Management Systems, +27 (0)11 974 4740, [email protected]





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

The future of security: intelligent automation
Access Control & Identity Management AI & Data Analytics IoT & Automation
As the security landscape evolves, businesses are no longer looking for stand-alone solutions, they want connected, intelligent systems that automate, streamline, and protect.

Read more...
Smart automation is changing security
SA Technologies IntelliGuard Access Control & Identity Management
Security has come a long way from manual check-ins, logbooks, and standalone surveillance cameras. With the rise of intelligent automation, security is now faster, smarter, and more connected than ever.

Read more...
The future of security in South Africa
ATG Digital Access Control & Identity Management
Security technology is evolving rapidly, but is local innovation keeping pace? Some global players recognise the potential of South African products for international markets, but can our manufacturers and service providers thrive without external support?

Read more...
Integration enhances estate access control
Access Control & Identity Management
With one-third of residential burglaries starting at the front door, the continued seamless integration of Glovent’s estate management platform with Impro access control software is welcome news for estates.

Read more...
T&A in South Africa’s retail sector
ERS Biometrics Access Control & Identity Management
Using existing systems, ERSBio provides a practical and more cost-effective way for businesses to manage operations, reduce payroll mistakes, and enhance overall efficiency through innovative T&A processes.

Read more...
Navigating the complexities of privileged access management
Editor's Choice Access Control & Identity Management
Privileged Access Management and Identity Access Management are critical pillars of modern cybersecurity, designed to secure access to sensitive resources, enforce principles like least privilege, and implement just-in-time access controls.

Read more...
Paxton opens second experience centre
Paxton News & Events Access Control & Identity Management
Security technology manufacturer, Paxton, has opened a new experience centre in Cape Town on 12 February in partnership with its exclusive distributors, Reditron and Regal Security.

Read more...
DoorBell with built-in AI
Ajax Systems Access Control & Identity Management Products & Solutions Smart Home Automation
Ajax Systems has announced the release of Ajax DoorBell, which features built-in AI, an IR sensor, and app control, seamlessly integrating into the Ajax ecosystem to ensure efficiency and security confidence.

Read more...
Physical security evolving beyond security teams
ATG Digital Access Control & Identity Management
The landscape of physical security is undergoing a major shift. Traditionally, selecting access control and visitor management solutions fell squarely on the shoulders of security professionals, but today includes legal, IT, technical operations and more.

Read more...
A passwordless future?
Access Control & Identity Management
The digital landscape is evolving rapidly, and with it comes the urgent need for more secure authentication methods. Passwords, once the cornerstone of online security, are now easy targets for cybercriminals.

Read more...