Security expectations in South Africa have arguably regressed to the level of a basic human need, namely that of survival. Unfortunately, for the majority of our population, the fulfilment of this basic need is directly equivalent to the financial ability of the individual, family or group association.
Security expectations in South Africa have arguably regressed to the level of a basic human need, namely that of survival. Unfortunately, for the majority of our population, the fulfilment of this basic need is directly equivalent to the financial ability of the individual, family or group association.
The South African government has long lost the ability to ensure the safety of its citizens. Historically the expectation of protection from a citizen’s government has been part and parcel of government’s service delivery. Paying taxes, being a model, law-abiding citizen, does unfortunately not guarantee any form of personal, family or interest group security and the individual is left to foot the bill. Sadly, security estate living has become the only option in many crime ridden areas in our country.
Satisfying this important human need for security has landed in the lap of the individual or groups, in so much as we find ourselves being responsible for our own personal and asset safety. It is a grudge buy, it is about survival, it is often a matter of life and death. The gravity of the situation must be understood by role-players offering product and service in an attempt to meet the expectation of paying clients. Role-players however do not always offer integrated, reliable and sustainable product and service.
The resident in a security village expects protection from personal and asset harm. The resident has assessed the risk, is forced into this position, basically has no other option, must pay for the service and therefore may harbour the expectation that his safety needs are met. The resident needs of safety will only be met when correctly deploying technologies, process and people in a continuing effort to achieve and importantly maintain the safety of the client or resident. It is paramount that role-players understand the integration, implementation and maintenance of the different technologies as well as the process of estate security.
The security process consists of multiple disciplines, with not one being dominant, but in essence the contribution and implementation of each ensuring the success of the process. Furthermore, it has become evident that without an holistic approach, the expectation of the client will not be met and the process will end in disarray.
Effective estate security should be based on three pillars:
* Secure the perimeter of the estate.
* Control access and exit to and from the secured area.
* Institute, implement and maintain effective process.
Technologies used in perimeter protection
The first line of defence would be mortar walls, palisade fencing, environmental fencing or any physical barrier that will keep an intruder out of the estate grounds. Electric fencing, barbed wire and spikes of all sorts are physical barricading products that act as second deterrent. Any physical barrier can be scaled and therefore the above products add to the effectiveness of the physical barrier. Electric fencing offers further value by constituting an alarm within a zone when breached. Alarm triggered zones can be used very effectively by complementing technologies when managing a breach in the perimeter.
Infrared beams along the perimeter will also trigger alarms within zones, when breached. Complementing technologies will draw on the position of the breach to manage the intrusion. Vibration detecting fibre-optic rings can be used in conjunction with physical barriers or in areas where no physical barriers can be erected, such as echo sensitive areas. These products offer intelligence, which minimises false alarms for example distinguishing between animal or human perimeter breaches. Alarm triggered zones assist complementing technologies such as electronic surveillance with intruder management.
Gates and booms protect the perimeter at the access points into the estate. The access areas are often the Achilles heel in a very well protected perimeter. Electronic surveillance plays a major part in detecting and managing perimeter intrusion. Many surveillance technologies offer different solutions to fit need and budget.
* The ever-enhancing development of IP camera technology now offers realistic video frames, extraordinary picture quality with acceptable bandwidth and storage requirements. Megapixel cameras can now capture video footage in up to 10X higher resolution than analogue cameras. This ability means fewer cameras per area, and a much higher quality base video image.
* Intelligent video analytics are becoming affordable and integrated on recording software as well as featured in IP cameras. Number plate recognition, facial recognition, behavioural analytics, motion detection, and many alarm conditions are now working standard features of electronic surveillance equipment.
* Thermal camera technology makes it virtually impossible for an intruder to breach a perimeter undetected over kilometres and independent of adverse lighting conditions.
Access and exit control
Strangely, this is the area where the implementation and integration of available technology is conspicuously lacking. Physical barriers such as motorised gates, booms, spikes etc, allow qualified access using a remote control, cards, pin numbers or biometrics to open the barrier. Audio and video access systems back up the access control by allowing a remote person or resident to identify, qualify and then open the barrier. Although metal detecting loops can automatically open barriers for vehicles to exit, it must be noted as a security risk.
The sign-in system is the most commonly used. The system is totally dependent on human intervention which makes it susceptible to human traits such as unreliable, fatigue, inconsistency, and many more. What control and safety can the signing of a book without the backup of any credentials really have? Breaches of access control protocol happens daily and consistently. The technology to replace the sign-in system with biometric access combined with visitor management software and electronic surveillance is available. Human intervention will still be needed, but will be limited or remote and can therefore be better trained and more secure.
Process
A holistic approach is the only way to deliver on the expectation of the clients. Areas that need to be addressees, initiated, maintained and monitored are the following.
* A security protocol for the estate needs to be developed, implemented and maintained for both the service providers and residents alike.
* Service level agreements for all participating providers must be documented, monitored and maintained.
* Communication protocols that ensure the implementation and execution of the security protocol between service providers and estate management must be in place.
* Maintenance contracts with service level agreements are essential.
* Consistent monitoring of protocol, service levels and maintenance is to be done.
* Experience has taught that a single point of contact is the only way to ensure that responsibility and accountability is taken and implemented.
It is unfortunate but part of our reality that security estate living has become a human need of survival. It is however, of paramount importance, that an holistic view be taken and that all service providers to the security estate industry realise and fulfil the expectation of residents with trustworthy product and process.
For more information contact Bernard Senakal, managing director, SentronicsSD, +27 (0)21 957 4505, [email protected], www.sentronics.co.za
© Technews Publishing (Pty) Ltd. | All Rights Reserved.