Penny poachers: wireless video security making its mark against cable theft

August 2008 Surveillance

US-based Duke Energy is using revolutionary wireless video technology to fight copper theft at its substations and operations centres. This is something of particular interest to South Africa, which has been plagued over the past decade with a growing incidence of copper theft, something that impacts infrastructure, construction sites and commercial property, as thieves are able to pocket easy cash for stealing something that is in or on every building.

Copper cable theft costs utilities like Telkom, Eskom and Transnet Freight Rail billions of rands, in addition to impacting the emergency services’ ability to do its job and ruining smaller businesses, thereby costing people their jobs. Inkatha Freedom Party MP Hennie Bekker has insisted that this crime should be declared sabotage. Bekker says the answers provided to questions he recently asked in the National Assembly show that more than R5 billion is being lost to the economy every year because of the activities of cable thieves.

Costly losses

Normally copper theft is not so dramatic. In a November 2006 article, “With the price of copper up, the plumbing can go missing”, the New York Times claimed: “Though the news media has reported thefts of copper wire from streetlights, electrical substations and cellphone towers across the US, most of it is taken from abandoned homes or homes under construction.”

Unfortunately, victims of copper theft find that the loss of actual copper is not what is most expensive. The damage done removing R1600 of wire or plumbing often costs many thousands more to repair.

“The Gompers Centre in Phoenix in the US suffered some R280 000 in damage to its nine airconditioning units, leaving the 55 000-square foot facility without air for up to two weeks,” says Zane Greeff, technical director at Elvey Security Technologies. “R280 000 worth of damage. And what did the thieves get? R400 worth of copper.”

Even repair costs do not take into account the increased fire and operational risk when thieves remove copper lightning rods or grounding bars from commercial properties. The real problem is that much of the risk of theft occurs in areas that are difficult to secure with traditional security systems or CCTV surveillance cameras.

Electrical substations

Greeff points out that substations are an obvious target for copper thieves and this is one area where security could be put in place to combat such theft.

He says that using traditional sensors outdoors had created too many false alarms, while CCTV was impossible in all but a few areas with power, and even then it was simply too expensive.

“However, with a wireless and battery-operated verification security system we can create a substation security solution. The system is built around an outdoor sensor/camera, in conjunction with a cellular-based panel using the GSM/GPRS network,” says Greeff. “Motion activates the integrated night vision camera and sends a 10-second video of the intruder over the cell network to the monitoring station and site manager.”

Cell towers

Copper theft has also affected the mobile communications industry, especially in cellphone towers. Because these are the highest structures in a given area, cell towers are predisposed to take lightning strikes and are therefore designed with large copper grounding plates. If these plates are stolen, the expensive switching equipment housed near the base of the tower is at risk. However, in the cell towers where it has been installed, wireless video security has resolved the copper theft issue.

“The same wireless technology has been protecting cell towers with Videofied for more than a year in the US and they have not experienced a single loss,” says Michael Brett, national sales manager at Elvey.

Airconditioning units

In May, burglars climbed onto the roof of president Thabo Mbeki’s official residence, Mahlambandlovu, on the Bryntirion Estate in Government Avenue, Pretoria and stole between R20 000 and R30 000 worth of aluminium. The 10 mm aluminium wire which had been installed in the roof to form part of the house’s network of electronic fittings, including closed-circuit television cameras and computer systems, and which was also designed to protect the house against lightning.

The recent theft of a rooftop unit at a major supermarket cost the company concerned more than R100 000. The company has since installed wireless video security systems.

Cooling units in remote communication towers and switching stations are also routinely targeted. Often the replacement unit is stolen as well. These sites are difficult and expensive to secure when what is stolen is on the outside of a building. However, new technology makes outdoor wireless video far more affordable, and a new outdoor camera and sensor exists that operates in low temperatures, right down to -20° Celsius. The security system is also wireless, meaning that every device operates on a single set of batteries for months.



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Pentagon appointed as Milestone distributor
Elvey Security Technologies News & Events Surveillance
Milestone Systems appointed Pentagon Distribution (an Elvey Group company within the Hudaco Group of Companies) as a distributor. XProtect’s open architecture means no lock-in and the ability to customise the connected video solution that will accomplish the job.

Read more...
Video Analytics Selection Guide 2024
Surveillance
The Video Analytics Selection Guide 2024 highlights a number of video analytics/AI solutions companies offer to enhance and optimise video surveillance operations.

Read more...
Optimising your camera-to-operator ratio
Surveillance
Learning from critical data points in your security systems is the key to quality monitoring, effectively deploying resources, and scaling control room profitability. The golden equation is your true Camera-to-Operator ratio.

Read more...
Storage Selection Guide 2024
Storage Selection Guide Surveillance
The Storage Selection Guide 2024 includes a range of video storage and management options for small, medium and large surveillance operations.

Read more...
Directory of suppliers
Surveillance
The Directory of Suppliers and Solution Providers provides a selection of companies involved in various aspects of surveillance projects, from consulting to implementation and ongoing maintenance, as well as equipment suppliers.

Read more...
Perspectives on personal care monitoring and smart surveillance
Leaderware Editor's Choice Surveillance Smart Home Automation IoT & Automation
Dr Craig Donald believes smart surveillance offers a range of options for monitoring loved ones, but making the right choice is not always as simple as selecting the latest technology.

Read more...
The TCO of cloud surveillance
DeepAlert Verifier Technews Publishing Surveillance Infrastructure
SMART Security Solutions asked two successful, home-grown cloud surveillance operators for their take on the benefits of cloud surveillance to the local market. Does cloud do everything, or are there areas where onsite solutions are preferable?

Read more...
Cloud or onsite, a comparison
Astrosec Surveillance
In the realm of electronic security, the choice between cloud-based and onsite software solutions for offsite CCTV monitoring can significantly impact operational efficiency, cost-effectiveness, and overall effectiveness.

Read more...
On-camera AI and storage create added benefits
Elvey Security Technologies AI & Data Analytics Surveillance IoT & Automation
The days of standalone security systems are long past, and the drive is now to educate system integrators, installers, and end users on the return on investment that can be derived from intelligent, integrated BMS, IoT and security systems.

Read more...
Surveillance on the edge
Axis Communications SA Guardian Eye Technews Publishing Surveillance
Edge processing, a practical solution that has been available for some time, has proven its utility in various scenarios, tailored to the unique requirements of each user.

Read more...