Securing Xstrata Copper's Mount Isa mines

Access & Identity Management Handbook 2011 Access Control & Identity Management, Mining (Industry)

Mining giant opts for Cardax FT.

Located in mineral-rich north-west Queensland, in the sun-baked heart of Australia, ‘the Isa’ has the distinction of being one of the few places in the world where four metals (copper, zinc, lead and silver) are found and mined.

Xstrata Copper's Mount Isa Mines, operates one of the largest underground mines in the world. The Enterprise underground copper mine, the most recent copper ore source at Mount Isa, is Australia's deepest mine, with an internal shaft that reaches 1800 m deep.

Mount Isa Mines also mines and processes zinc, lead and silver and runs these operations on behalf of Xstrata Zinc. Xstrata Copper is one of four commodity businesses within the major global diversified mining group Xstrata plc. Along with Mount Isa Mines, acquired in 2003, Xstrata Copper’s operations comprise the Townsville copper refinery and Bowen Coke works, the Ernest Henry open pit copper-gold mine and the Townsville Port facilities. It also operates the Alumbrera copper-gold mine in the Catamarca Province in Argentina, South America.

The company’s mining and smelting complex at Mount Isa produces copper anode and lead bullion containing silver and zinc concentrate. Copper anode is transported for refining at the company’s copper refinery in Townsville, while lead bullion is transported for refining at the company’s lead-silver refinery in England. Zinc concentrate is sold directly to customers in Australia and overseas.

Safety and security

Handling explosives, operating machinery and working as deep as 1800 metres below ground require first class safety and security systems. Because Xstrata Copper is committed to providing a safe, productive and healthy work environment, the company is diligent in protecting its employees from unnecessary risks while striving for a zero-harm goal.

Sjeff Klaassen, from Xstrata Copper’s security partner ADT Queensland said ongoing security reviews and upgrades had become an integral part of the business planning process with a range of safety management and improvement systems being implemented in line with Xstrata Copper’s Safety and Health policies. This was confirmed by Mount Isa Mines Emergency and Protective Services Superintendent, Darren Bracey who said the complex mix of mining, processing and smelting at Mount Isa presented numerous challenges when it came to ensuring the safety of employees and the general public.

“We must allow for movement of authorised personnel with a minimum of effort, while ensuring all the necessary training, induction and other entry requirements are current,” he said. “We must also be able to ensure that personnel who are not authorised to access certain areas are prevented from doing so. Another challenge for us is having the ability to account for personnel in the event of an incident, particularly in our underground environment.”

Bracey said collection and management of all the associated data was a significant issue in itself – and aligning this with access requests complicated it even more. To cope with the movements of personnel at Mount Isa Mines and establish a safe and secure environment, the Mine originally installed the Cardax Unix access control system including Cardax Commander architecture at its copper mining site in 1990. Today, the site boasts security systems technology in the form of Cardax FT, a comprehensive Windows-based security system.

State-of-the-art security systems

The site has been able to extend the life of its five legacy Commanders through the Cardax FT Commander Interface, enabling the site to migrate to Cardax FT hardware architecture over time. Already, 20 Cardax FT Controller 5000s, complemented by three Controller 3000s for integrated intruder alarms management have been installed. The Controllers utilise the company’s existing LAN/WAN, reducing the overall labour component of Cardax FT installations.

Ten workstations enable the system to be used as an efficient tool by authorised staff on site, each of whom is assigned operator privileges to report and perform a multitude of functions. The Cardax system employed at Mount Isa Mines has several integration applications including an interface with the CCTV management system. It is integrated with reporter software packaged to provide a customised reporting tool to monitor the whereabouts of underground staff. As well as being interfaced to the company’s HR management system, the Cardax system also monitors alarms including environmental, fire, intrusion and production alarms and domestic site-associated alarm systems.

In addition to on-site alarms management, the system’s field controllers support dial-up to a remote alarm monitoring company for backup.

Cardax FT Cardholder Import enables cardholder data to be imported from other systems using an XML interface. There’s also PhotoID for image capture, card design and printing of Photo ID cards and Challenge, a feature that enables a cardholder’s image from their CCTV system to be checked against the cardholder image in the Cardax FT system.

Further expansion

At the time of writing, a further two software applications were being installed to assist in contractor management. The applications mean business managers can directly control the access periods given to each contractor for specific areas. These applications help ensure contractor compliance for site access and generate reports on times spent in a defined area by a person, contract company or other defined unit.

Bracey is quick to praise the Cardax FT system. “The advanced technology of the Cardax FT system is flexible enough to meet the changing mining environment. It has enabled better management of contractors. The development of electronic tagging to manage firing (of explosives) underground has significantly reduced risk of injury, as well as reducing the cost of miss-firings often experienced using the old manual tag board systems.

“The system has many different types of hardware that can be adapted to suit the site’s needs, while the powerful software lends itself well to integration with other third party software applications to allow better management of security, health, safety, access control and contractor management.”

For more information contact Gallagher Security Management Systems, +27 (0)11 974 4740, lyndp@gallaghersms.com





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Simple steps to protect yourself against identity theft
November 2019 , Access Control & Identity Management
Are you doing enough to reduce the risk of having your identity stolen?

Read more...
Looking ahead with mobile access technologies
Access & Identity Management Handbook 2020, Technews Publishing, HID Global, dormakaba South Africa, Salto Systems Africa, Suprema, Gallagher , Access Control & Identity Management, Integrated Solutions
Given the broad use of smartphones around the world and the numerous technologies packed into these devices, it was only a matter of time before the access control industry developed technology that would ...

Read more...
Mobile access is more secure than card systems
Access & Identity Management Handbook 2020 , Access Control & Identity Management
The ability to use mobile phones as access credentials is one of the biggest trends in a market that historically has been slow in adopting new technology.

Read more...
This is the future. This is what we do.
Access & Identity Management Handbook 2020, ZKTeco , Access Control & Identity Management
ZKTeco has created a unique range of visible light facial recognition products combined with a flexible Android platform.

Read more...
The security of biometrics
Access & Identity Management Handbook 2020, ViRDI Distribution SA, IDEMIA , Technews Publishing, Suprema , Access Control & Identity Management
Hi-Tech Security Solutions asks whether your personal biometric data is safe from prying eyes.

Read more...
A picture spoofs a thousand cameras
Access & Identity Management Handbook 2020, NEC XON, Hikvision South Africa, Technews Publishing , Access Control & Identity Management
Hi-Tech Security Solutions looks into the reliability and effectiveness of facial biometrics as well as the concerns about privacy.

Read more...
IoT and behavioural authentication
Access & Identity Management Handbook 2020, CA Southern Africa , Access Control & Identity Management
IoT represents an increasing security risk to individuals in the form of pervasive, always-on monitoring of your personal activity with a potential compromise of your most personal security credentials.

Read more...
Border crossing and national identification
Access & Identity Management Handbook 2020 , Access Control & Identity Management
Amidst a choice of technologies, diversity of policy frameworks, and emergent priorities, countries that intend to upgrade their identification systems today find themselves drawn into a complex vortex.

Read more...
T&A by biometrics in the cloud
Access & Identity Management Handbook 2020 , Access Control & Identity Management
Time and attendance solutions have evolved from punch cards to cost-effective and more accurate cloud-based biometric systems.

Read more...
Scalable access solution
Access & Identity Management Handbook 2020 , Access Control & Identity Management, Integrated Solutions
Bosch Building Technologies makes access management simple, scalable and always available with Access Management System 2.0.

Read more...