Securing mines - high value, high risk

March 2008 Integrated Solutions

Securing a mine is a challenge. The industry features many unique requirements that are vastly different to those in a corporate environment.

On the local front, we have a few extra challenges to deal with: we have a higher crime rate than most countries, and mines form a key component of the health of our economy, reinforcing the need for effective security solutions to prevent and eliminate the threat of theft and/or sabotage in this sector.

What differentiates mines from corporate environments is that they are usually located in geographically dispersed areas; feature high-value commodities such as gold, platinum and diamonds; and cover a huge footprint.

This gives rise to many crimes that are a result of collusion. For example, people from the same town and neighbourhood are likely to work in a mine that provides employment to communities in geographically dispersed areas.

This creates a higher risk profile for mines as crime by individuals is replaced by two or more individuals that collaborate. These are key issues that need to be considered when assessing a mine's security requirements.

In addition, mines are under pressure to deliver more products, faster and more efficiently. This requires more attention to security as higher throughput means there is more risk.

A 'layered' approach is required when assessing the risks in mining. This is usually done by area, the risk associated with each area and the people that work there. For example, the raw product might be difficult to pilfer, as it needs to be extracted as with gold, platinum and diamonds. However, as the product enters the 'sorting' process, this significantly increases the risk.

Security measures therefore need to increase with the higher risk. Having a risk profile of staff will assist to reduce theft and other crimes in a mining environment.

It is also important to know where staff members are situated. Rather than regarding this as a 'big brother' approach, it is critical to maintain high safety levels in a mine and being able to establish where workers are situated is crucial. Asset tracking therefore becomes part of the security agenda.

Considering the above, mines often follow a path of identifying a niche security requirement and fulfilling it with a niche, individual solution.

Technology has been a big driver in this area as advancements have seen a shift from physical guarding to automated solutions. However, the way to properly secure a mine with technology is to create an integrated environment that delivers a highly sophisticated security solution made up of interlinked components that deliver more functionality and control.

Interfacing with products such as access control, CCTV, alarms, X-ray machines and risk-analysis software can greatly enhance the individual capabilities of these systems. For example, behavioural patterns can lead to identifying a potential threat by coupling the functionality of access control and CCTV. Access control of employees can be segmented with zones - high, medium and low risk - and individuals allowed access to certain areas according to their job requirement and role. If an individual enters an unauthorised area, the CCTV camera can be triggered and an alarm to security personnel generated.

However, this can be taken one step further. Profiles developed with CCTV, access control and risk-profile software can be used to monitor irregular behaviour. If, perhaps, a person's behaviour changes such as their movements reflect anxiety or they deviate from their everyday behaviour, the systems can flag an alert or alarm, highlighting a potential crime or threat before it occurs.

The concept of adapting to a mining environment's unique needs through the integration of a plethora of individual security solutions is not new. It is in practice in a few mining companies and working well.

So rather than taking an isolated approach, mines should look towards solutions that are built on an open architecture and can be integrated with other solutions.

Neil Cameron is the systems divisional manager at Johnson Controls Systems & Service

For more information contact Johnson Controls, +27 (0)11 921 7100, [email protected], www.johnsoncontrols.com



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Security industry embraces mobile credentials, biometrics and AI
AI & Data Analytics Access Control & Identity Management Integrated Solutions
As organisations navigate an increasingly complex threat landscape, security leaders are making strategic shifts toward unified platforms and emerging technologies, according to the newly released 2025 State of Security and Identity Report from HID.

Read more...
Insurance provider uses Net2 For access management
Paxton Access Control & Identity Management Integrated Solutions Healthcare (Industry)
BestMed selected Paxton Net2 for its access control requirements because of its simplicity of installation and ease of navigation for end users, as well as the 5-year warranty.

Read more...
The power of knowing your client
Ideco Biometrics Access Control & Identity Management Integrated Solutions
One of the most effective ways to combat the threat of fraud, identity theft, and financial crime threats is through a robust Know Your Client (KYC) process, which safeguards both businesses and clients.

Read more...
Managing identities for 20 years
Ideco Biometrics Technews Publishing SMART Security Solutions Access Control & Identity Management Integrated Solutions IoT & Automation
Many companies are now more aware of the risks associated with unauthorised access to locations and sensitive data and are investing in advanced identity authentication technologies to mitigate these threats.

Read more...
Cost-effective and reliable remote connectivity
Agriculture (Industry) Integrated Solutions Infrastructure
Companies that operate in hard-to-connect areas now have access to reliable connectivity due to a collaboration between MTN South Africa, Vox and Tarana technology.

Read more...
Advanced Perimeter Intrusion Detection Systems
XtraVision OPTEX Technews Publishing Modular Communications Perimeter Security, Alarms & Intruder Detection Integrated Solutions Products & Solutions
Making full use of fibre installations around the perimeter by adding Perimeter Intrusion Detection Systems means you can easily add another layer of security to existing surveillance and fencing systems.

Read more...
A critical component of perimeter security
Nemtek Electric Fencing Products Gallagher Technews Publishing Stafix Editor's Choice Perimeter Security, Alarms & Intruder Detection Integrated Solutions
Electric fences are standard in South Africa, but today, they also need to be able to integrate with other technologies and become part of a broader perimeter security solution.

Read more...
Using advanced surveillance technology as a smart city enabler
Duxbury Networking Integrated Solutions Surveillance
Smart cities are increasingly becoming a focus area for African governments and companies. However, the transition to these environments does not come without challenges, especially when it comes to security and resource management.

Read more...
SMART Estate Security returns to KZN
Nemtek Electric Fencing Products Technews Publishing Axis Communications SA OneSpace Technologies Editor's Choice News & Events Integrated Solutions IoT & Automation
The second SMART Estate Security Conference of 2024 was held in May in KwaZulu-Natal at the Mount Edgecombe Estate Conference Centre, which is located on the Estate’s pristine golf course.

Read more...
Dynamic Dashboard enhances security and operational efficiency
Suprema neaMetrics Products & Solutions Integrated Solutions Residential Estate (Industry)
In today’s data-driven world, security systems are overwhelmed by an unprecedented volume of data, from video surveillance and access control logs to intrusion alerts and a variety of IoT sensor data.

Read more...