Creating the district ID database

Issue 8 2021 Agriculture (Industry), Security Services & Risk Management


Laurence Palmer.

The idea to perform in-depth risk assessments of a selected region, as discussed in the previous article, is critical. Once this has been completed, it should be considered essential to register and capture the personal details of every person that is resident or works in the selected region. Capture this information onto a central database that is secure, has off site back-ups and live access to the data by all authorised persons.

As a general guideline, all farmers and other role players should, whenever they interact with unknown or even known persons, take their photograph for the record. Keep this safe with all other details noted, i.e. purpose of visit, what was discussed and any related notes. Not only may this be vital information in the event of an investigation, but it serves as a psychological deterrent to the subject intent on breaking the law in future.

Communicate with all key role players and key individuals to obtain their support and buy-in for the project. In a situation such as this, it is very beneficial to link the critical outcomes to safety for all. The local communities and unions are far more receptive to safety considerations than to security.

Communicate further with the support services, i.e. SA Police, Metro Police, civil authorities, established security companies, businesses, local chiefs and indunas, union bosses, farm labour, domestic staff, the farmers and their families. Follow up on any possible financial support sources. Indicate a budget and estimate costs to conduct a pilot project as anticipated.

The following actions are required

1. All farmers in the region need to agree to the project. If some are excluded, the whole project is in jeopardy.

2. All persons living on the property will need to be identified by RSA ID book or card, passport or permanent residence permit.

3. The information will then be input onto the database and the person will be issued with a photo-ID card that is unique to the farm or property they are connected to and where they are employed or live.

4. All participants will be given an orientation period to explain to them the reasons for the issuing of the card and how they are expected to use it.

5. Each principal owner/occupier must have a computer in some form or other that can receive the software program and communicate with the database. Each member of the project will also be able to communicate with each other through an integrated messaging system.

Operational procedures

Every person will be required to submit the required information to set up the database and be issued with a photo-ID card, such as their full names as per their RSA ID, employer name and physical address, residential physical address, family rural details as applicable, cell number, next of kin details and vehicle details as applicable.

Furthermore, each person will be required to carry the ID card on their person at all times while within the region and present it on request by any person with a vested interest in the region, such as the SAPS, Metro Police, etc.

The principals are expected to keep the database up to date by capturing all and any changes in status of a person, incidents, dismissal or new employees, in fact anything that may be of effect and could assist to make the system viable.

Additional considerations

These are considerations that would have been mentioned in the risk assessment and will probably already be tabled.

1. A rapid mobile reaction unit that can respond to incidents.

2. The use of drones to gather information and identify activity.

3. All vehicles to be fitted with GPS tracker units.

4. Remote alarm and panic buttons that are carried by all vulnerable persons.

5. Weapons training: how, when and if to use them.

6. First aid trauma training and response.

7. The handling of cash and wages on the farm or business premises.

8. The principal member must have a camera and photograph all persons encountered during his/her daily operations on the property.

9. The principal member must enter into a written contract with each staff member.

10. There needs to be a mindset of reconciliation amongst the farmers towards their workers, to solve disputes at the lowest level before they escalate into a farm-wide or community conflict.

For more information, contact Laurence Palmer, +27 73 954 4450, [email protected]

Reference was made in the development of this article to a research paper from UNISA’s School of Criminal Justice.

This article is the opinion of the author and is based on the latest information available and his previous and current efforts to prevent farm attacks.


Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

From the editor's desk: AI and events
Technews Publishing News & Events
      Welcome to the 2024 edition of the SMART Surveillance Handbook. Reading through this issue will demonstrate that AI has undoubtedly made its mark on the surveillance industry. Like ‘traditional’ video ...

Read more...
The TCO of cloud surveillance
DeepAlert Verifier Technews Publishing Surveillance Infrastructure
SMART Security Solutions asked two successful, home-grown cloud surveillance operators for their take on the benefits of cloud surveillance to the local market. Does cloud do everything, or are there areas where onsite solutions are preferable?

Read more...
Surveillance on the edge
Axis Communications SA Guardian Eye Technews Publishing Surveillance
Edge processing, a practical solution that has been available for some time, has proven its utility in various scenarios, tailored to the unique requirements of each user.

Read more...
AI developments in surveillance
DeepAlert Secutel Technologies Technews Publishing Surveillance
When AI-powered video analytics first emerged in the surveillance market, it was heralded as a game-changer, promising near-magical object recognition and identification. As always, it was oversold, but times have changed and we are close to seeing the ‘magic’ at work.

Read more...
Putting cyber into surveillance
Dallmeier Electronic Southern Africa Cathexis Technologies Technews Publishing Editor's Choice
Cybersecurity has become an essential part of the physical security industry. However, unlike other IoT technologies, of which security products are a part, surveillance technologies have more to protect.

Read more...
Digital transformation in mines
NEC XON Technews Publishing Mining (Industry)
Digital transformation has been hyped to death, but is a reality all companies in all industries need to address, including the mining sector. BCX and NEC XON weigh in on the challenges mines face.

Read more...
Fire safety in mining
Technews Publishing Mining (Industry)
Clinton Hodgson, Head of the Industrial Fire & Life Safety Division at FS Systems International, provides SMART Security Solutions with his insights into fire safety risks and solutions as they pertain to the mining industry.

Read more...
Cybersecurity in mining
Technews Publishing Mining (Industry)
One does not usually associate mining with cybersecurity, but as big technology users (including some legacy technology that was not designed for cyber risks), mines are at risk from cyber threats in several areas.

Read more...
Deception technology crucial to unmasking data theft
Information Security Security Services & Risk Management
The ‘silent theft’ of data is an increasingly prevalent cyber threat to businesses, driving the ongoing leakage of personal information in the public domain through undetected attacks that cannot even be policed by data privacy legislation.

Read more...
Proactive strategies against payment fraud
Financial (Industry) Security Services & Risk Management
Amid a spate of high-profile payment fraud cases in South Africa, the need for robust fraud payment prevention measures has never been more apparent, says Ryan Mer, CEO of eftsure Africa.

Read more...