Collaborative mine security methodologies

Issue 5 2021 Mining (Industry), Integrated Solutions

South Africa’s mining sector has, in many ways, been the backbone to our economy and attracts valuable foreign investments to South Africa. According to Stats SA’s data, the mining sector contributes approximately R226,2 billion (roughly 13,5 billion US dollars) to the country’s Gross Domestic Product (GDP). The mining industry is, however, a high priority and an easy target for criminal attacks, both from internal and external criminal elements. The increasing criminal attacks and high losses experienced during the Covid-19 pandemic and related lockdown periods highlighted the need for an increased focus on and renewal of the methodologies used to secure mines.

The application of risk assessments, which are focused on identifying threats, vulnerabilities and risks to mine assets, addresses the core service deliverables. This incorporates various physical security measures including appropriate intelligent perimeters, functional and practical access control facilities controlled through electronic access control systems. Additionally, continuous surveillance through task-specific CCTV and surveillance systems, are monitored to ensure timely intervention to breaches and the support of skilled security resources to action policies and procedures.

The recent development and improvement of technology, specifically the use of drones as a force multiplier, artificial intelligence (AI) driven surveillance platforms and the application of traditional security systems through integrated video management system (VMS) platforms, allows for improved security execution as a collaborative ecosystem.

While these security measures address the risks and vulnerabilities posed by crime actors, there is still a need for a proactive focus on identifying and addressing these threat/crime actors outside of the normal security protocols.

It has been proven that the first step to combat criminal activities is, undoubtedly, the gathering of information. Investigators trace and apprehend suspects who are involved in organised crime, theft of stock and minerals, illegal operations and fraud. The accurate and proactive implementation of an information gathering function, aligned to and within the ambit of the law, supported by an accurate data analyst capability, allows for a proactive approach to preventing criminals to execute criminal attacks. Sound intelligence leads to proactive planning and coordination and in return lowers the opportunity and risk of serious incidents.

The ability to implement ‘contactless’ security through the use of technology, including drones, smart fences, intelligent alarms and proactive AI-driven analytics is the future of and has been proven multiple times at mines in various regions by Bidvest Protea Coin.

A well-developed security solution philosophy is to successfully support clients in technology, people and processes. Various tried and tested technologies need to be deployed in order to enable operational teams to deter, detect, delay, deny and ultimately defend.

A well-rounded mining security service should include:

• Experienced security management specialists, continuously driving innovation in process and infrastructure improvement.

• Security operational plans, based on global best practices, risk and task appropriate standards and objectives (standard operating procedures).

• Experienced, skilled and motivated security officers.

• Physical security mitigation measures including appropriate fences, access control points, physical structures and lockable facilities.

• Technology-driven proactive and automated procedures.

• Appropriately designed, equipped and a manned operations centre, applying AI-driven monitoring and control.

• Well trained and experienced response capabilities supported by aerial surveillance (drones) as a force multiplier.

• In-house investigations and information resources, tasked with collaboration with law enforcement and crime prevention forums.

• Electronic incident logging and analytics resources to drive proactive and preventative operational planning and execution.

• Management support to enable security to contribute to productivity, profitability and ultimately shareholder value.


Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Digital transformation in mines
NEC XON Technews Publishing Mining (Industry)
Digital transformation has been hyped to death, but is a reality all companies in all industries need to address, including the mining sector. BCX and NEC XON weigh in on the challenges mines face.

Read more...
Fire safety in mining
Technews Publishing Mining (Industry)
Clinton Hodgson, Head of the Industrial Fire & Life Safety Division at FS Systems International, provides SMART Security Solutions with his insights into fire safety risks and solutions as they pertain to the mining industry.

Read more...
Leading products, trustworthy service
Mining (Industry)
First Distribution Digital Security & IoT aims to be the leading value-added distributor of IP video, advanced video analytics, high-density storage solutions, access control, fire detection, public address, IoT, and networking products in Africa.

Read more...
Key and asset management for mining
Traka Africa Mining (Industry)
Traka specialises in intelligent management solutions for keys and equipment, helping organisations control their important assets, improving productivity and accountability, and reducing risk in critical processes.

Read more...
Cybersecurity in mining
Technews Publishing Mining (Industry)
One does not usually associate mining with cybersecurity, but as big technology users (including some legacy technology that was not designed for cyber risks), mines are at risk from cyber threats in several areas.

Read more...
Directory of Product and Solution Suppliers
Mining (Industry)
The Directory of Product and Solution Suppliers for the mining industry includes the details of companies that provide products, advice and services to the mining sector, primarily, but not limited to the areas of security and risk.

Read more...
Mines require proof of performance
Technews Publishing Mining (Industry)
The relatively hostile environment and remote locations of mining establishments mean that any electronic/technical implementations have to be easily installed, require little or no maintenance and, once commissioned, require no adjustment.

Read more...
Container conversions for access control
BoomGate Systems Mining (Industry)
The container conversions available from Boomgate Systems offers instant onsite secure access control points for industries and applications such as mines and remote locations where construction projects might be underway.

Read more...
Effective access control for peace of mind
Flow Systems Mining (Industry)
Established in 1975, Flow Systems offers a wide range of physical access control barriers, such as turnstiles, but also includes a wide selection of manual and automatic vehicle boom barrier gates, with or without spikes and/or LEDs.

Read more...
Enhancing overall access control
Turnstar Systems Mining (Industry)
Turnstar’s Titan turnstile offers high security physical access control, which can be integrated with advanced technologies to prevent unauthorised entry to mining facilities.

Read more...