Security Africa July Edition

Page 1

SECURITY AFRICA

Secure the beach Tunisia

June/July 2015 Issue 6: Security Africa Magazine

08

Nigeria Megaport gets green light

15

Africa gets serious on cybercrime defence

19

Mining moves into the future


Paxton

Easy Access Control from Paxton Get the complete solution with the UK market leaders

Plug and play door entry systems

Industry leading technical support

Wired & wireless IP door controllers

30 years of industry experience

Simple to fit, manage and maintain

Five year swap out warranty

Free installer training

System integration

‘Paxton products are straightforward and easy to quote, install and set up.’ Chad Jansen, Ascoteq

nc Gwara ja Warr an t

η ησ

ti

‫ ﻀﻤﺎ‬保证 uu ‫ن‬ εγγ Tak ύ

www.paxtonaccess.co.za

Garantía G ara n

Call us on +27 (0)21 4276691

y

tie ran Ga

Speak to your sales representative about Paxton today!

ia Guarant ranz ee Ga


INTRODUCTION

Introduction

A

s 2015 passes its mid-point we highlight some of the key issues for the Security industry and the sectors served by it. Our industry has a crucial role to play in protecting development throughout the region as the importance of lowered risk for investment is paramount. With the UN aim of `Ending Extreme Poverty by 2030’ the Addis Abba conference in July stresses a combined effort of private sector as well as current agencies and donors to create solutions which are sustainably driven by increased tax revenues. The relative strength of Africa in a time of global slump was recognised as a magnet for investors. In the aftermath of the terrorist attack on a Tunisian resort that left 38 dead, we consider the repercussions for the growing African tourist industry together with the role of surveillance technology to minimize threat.

and increased demand for protective clothing as the Oil and Gas industry continues its drive for enhanced health and safety. With risk governance and cyber security issues are moving further up the agenda of board level executives, MIS Training Institute’s three day conference from 16th to 18th September in Kigali, Rwanda, will address the current African threat landscape. Airlive brief us on their new wireless security system and Biomaster introduce their revolutionary approach to integrating their technology with existing systems. Also included is the announcement of the new deep sea port in Nigeria which should will become the largest of its kind in the continent.

As the Ebola crisis draws to a close, we highlight the new strategic locations being set up along the west African coast which will enhance response times in future emergency situations. We also consider the growing importance of cybernetic innovation in driving productivity in the mining industry

Judith Adele Editor

Advertising Sales Ben Charnley ben@securityafricamagazine.com

Design & Analytics Alex Scott design@securityafricamagazine.com

Editorial & PR Judith Adele editor@securityafricamagazine.com

Accounts Sue Barker accounts@securityafricamagazine.com

SA June/July 2015

2


Contents 04 08 09 10 15

3

Tunisia: Secure the Beach. In the aftermath of the attack that left 38 dead in Tunisia we assessthe implications for African tourist industry and the role of surveillance and security technology. Nigerian Megaport: Nigeria Unveils Africa’s Biggest Deep Sea Port in Badagry. We discuss the implications for the surrounding area, which covers over 1000 hectares. Biomaster set out their full product range and world class understanding of access control solutions: revolutionary security, access control and employee management solutions. Airlive brief Security Africa on their new wireless security system and take us to the lively capital of Santiago de Chile to demonstrate Cyber Crime Africa Summit & Roundtable: African nations come together to strategise against cybercrime.

SA June/July 2015

17 19 23

Special purpose armed forces secure strategic locations along Africa’s western coast Productivity drives in mining increasingly reliant on cybernetic innovation: what are the economic stakes of this new movement towards computer aided mining. Update on the potential for growth in thermal, mechanical and chemical applications which utilize protective clothing.


FEATURE

Tunisia: Secure the Beach 26th June 2015. 38 dead. After the devastating attack at Port El Kantaoui, the Tunisian goverment reassess the tourist security provision.

P

rotecting the Tunisian Tourist Industry On 20th July Tunisia’s Transport minister, Mahmoud Ben Romdhane, a member of a delegation who met families of the victims of the Sousse 26th June attack, asked Tobias Ellwood, the Foreign Office minister to drop its warning not to travel to the north African country in the aftermath of the shootings. The Foreign Office had updated its travel advice in July . “Further terrorist attacks in Tunisia, including in tourist resorts, are possible,” it says, “including by individuals who are unknown to the authorities and whose actions are inspired by terrorist groups via social media.” Romdhane argued that “This decision will make Tunisia a remote country that no one goes to: it is the exact hope of the terrorists.” He added that Tunisia had followed British security services advice and taken immediate steps to improve security for tourists including placing armed guards and security cameras in hotels and on beaches. Tunisia’s tourism ministry had pledged to deploy 1,000 armed officers from 1 July to reinforce the tourism police, who will also carry guns for the first time. Armed officers will be deployed inside and outside hotels, on beaches and at tourist and archaeological sites.

Short-term reaction Foreign tourists are important to Tunisia’s economy, it accounted for 14.5% of GDP last year.

SA June/July 2015

> 4


FEATURE

But recent research has questioned whether terrorist attacks have a long term effect on the tourist industry.

political unrest leading to changes to Foreign Office advice for UK citizens,” it added.

“Short-term, it would put some people off,” says Yeganeh Morakabati, an expert in risk and tourism at Bournemouth University. “Longer-term, people have short memories. A lot of people will forget.”

Egypt, which has experienced several years of political unrest, saw an average annual decline in UK visitor numbers of 18.5% from 2010 to 2014, according to the Office for National Statistics.

The Foreign Office had already warned of a “high threat from terrorism” in Tunisia before the 26th June massacre. “Attacks could be indiscriminate, including in places visited by foreigners,” it said, urging people to be “especially vigilant”. It specifically mentioned a prior attack on the Bardo Museum in the capital Tunis, which left 22 people dead in March this year.

But no other major tourist destination frequented by Britons suffered in the same way. British visitors to Tunisia dropped from 423,000 in 2010 to 360,000 in 2011, the year of the so-called Arab Spring, in which pro-democracy activists toppled several countries’ governments. The figure has since picked up, reaching 440,000 last year. However, the amount spent by UK tourists fell from £178m to £143m from 2010 to 2014.

“If it’s a one-off attack, people forget,” says Morakabati. “With Tunisia we’ve had, in a matter of months, two of them - sending the signal that it’s frequent.”

Tourists prepared for some risk The Bardo Museum in Tunis was the focus of a terrorist attack in March 2015. In its 2014 tourism market report, the Association of British Travel Agents found the popularity of a “number of popular holiday destinations were affected by political, social and economic unrest... The most prominent of these was Egypt which started the year [2013] with high visitor numbers but suffered a significant drop-off due to 5

SA June/July 2015

“A very good way of getting people to go to destinations which have suffered at the hands of terrorists is to cut prices,” says Simon Calder, travel editor of The Independent. “It does seem to lure the British back and I don’t say that at all disparagingly. We can make a cost-risk analysis. As long as we know the risks, that’s a reasonable thing to do. “Look at it as a mathematical equation,” says Morakabati. “Sometimes the attractiveness of a destination is higher than the level of risk.” There was strong growth in the number of UK nationals going to Morocco, rising from 308,000 in 2010 to


FEATURE

460,000 last year. This included a 51,000 increase in 2012, the year after the Marrakesh bombing, which killed 15 people. Yet, after the London bombings of July 2005, in which 52 people died, the number of people visiting the UK did not decline, according to official statistics. Overall, the figures suggest that the tourism industry in countries enduring long-term strife, such as Egypt, suffers more than those affected by individual terror attacks.

There is no doubt that the tourism industry will be increasingly aware of the need for vigilance Even then, promoting individual destinations within countries can help overcome this, says Morakabati. “Egypt has in the past done isolated marketing with Sharm el-Sheikh. For many tourists, who are not so strong with geography, they might almost not see it as part of Egypt. So if something happens to Egypt, they see it as separate.” But governments have a financial incentive to protect tourist hotspots. On the Foreign Office website’s colour-

coded travel map of Egypt, Sharm el-Sheikh is a small haven of “green” surrounded by “orange”, which advises against all but essential travel. Enhanced Security key to long-term prospects. Calder thinks that Tunisia’s tourism industry, “ will suffer in the short term and then recover. There are still hotels,” he says. “There are still close to half a million people dependent on tourism for their livelihood.” The direct contribution of travel and tourism to Tunisia’s GDP was expected to grow by 3.6% a year until 2024, according to a report published last year by the World Travel and Tourism Council. This, of course, was before this year’s attacks. Governments respond with high profile answers to tragedies such as the Sousse attack. Long-term the solutions to `lone-wolf`’terrorist attacks are less straightforward. There is no doubt that the tourism industry will be increasingly aware of the need for vigilance with regard to security in order to reassure travel companies and foreign governments of lowered levels of risk. Maintaining troops on tourist beaches is a reminder of the horror of previous attacks and can create panic. Large resort areas across the African continent are likely to invest in the most advanced surveillance installations and access control technology in the months and years to come in order to survive. SA SA June/July 2015

6


www.CyberCrimeAfricaSummit.com FEATURE

SAVE £200 Book Before 14th August 2015

Summit, Roundtable & Exhibition 16-18 September 2015 Kigali Serena Hotel - Kigali, Republic of Rwanda

A Safari of Africa’s Evolving Cyber Crime Landscape: Responses to Fight Cybercrime “This event has been an eye opener experience and a realisation for the need to fight new threats. There is a need for a change within Africa”

Keynote Speakers Hon. Jean Philbert Nsengimana, Minister of Youth and ICT, Ministry of Youth and ICT, Government of Rwanda

CISO, Ecobank

“This event is a must for everybody who wants to be in the global technology village”

Ibrahim Juma, Head, Information Security, KENTRADE (Kenya)

Ray Stanton, Executive Vice-President Professional Services, BT (UK)

Steve Whitehead, Managing Member, Eavesdropping Detection Solutions, A Division of CBIA (South Africa)

Dr Elia G. Kaiyamo, MP & Deputy Minister, Ministry of Home Affairs & Immigration Namibia

“Very important training for each CISO who wants to build networks on intelligence sharing” Edward Kiptoo, Lead CISO, Citibank, Kenya

“This was a one stop shop to understand information security get equipped and straight away go out and implement” Musonda Kapaya, CISO, Zambia National Commercial Bank PLC

David Isiavwe, General Manager and Chief Internal Auditor, Union Bank of Nigeria

Leadership Coaching Chantell Ilbury, Motivational Speaker, Facilitator and Keynote Speaker, Cape Town (South Africa)

Pre-registration for the exhibition is now live online at www.securex.co.za. For more information on Securex 2015, visit the website at www.securex.co.za.

Shane Fankhauser, Executive Presentation Coach for Corporate, Political and PR Advocacy Communications (UK)

Game-Changing Topics and Real Cases on How to Mitigate Risk • • • • •

Analytics, big data and forensics Cloud, mobile and social media security Enterprise risk, privacy and security Hacking, intelligence and risk mitigation controls Business continuity and disaster recovery Supporting Association:

7

SA June/July 2015

To book a stand, contact Sven Riddle or Zelda Jordaan on: svenr@specialised. Exhibition - New for 2015! com or zeldaj@specialised.com

What Emerging Technologies are out there? Forensics tools, Information Security, Facial Recognition, Voice Stress Analysis and Case Management Software?

Media Partners:

+44 (0)20 3819 0802

shook@misti.com


AFRICA NEWS

Nigerian Megaport Nigeria unveils Africa’s biggest Deep Sea Port in Badagry covering over 1000 hectares of land.

T

he Lagos State Government disclosed in July that it would commence the construction of the biggest deep sea port in Africa, which it said, would be situated on over 1,000 hectares of land in Badagry with the capacity to create thousands of employment opportunities. The state government also announced that a good number of foreign and domestic investors including Maersk Group “have already signed on to the project,” thereby suggesting that the state would have largest cargo container port in Africa. The state governor, Mr. Akinwunmi Ambode, disclosed the plan during a visit to the site of the project in Badagry alongside some top state officials, promising that the port project would have begin in the next two months. After inspecting the project site, the governor said the proposed site for the biggest deep sea port in Africa “is over 1,000 hectares of which we have just been told that there is going to be a free trade zone and a container terminal.” He added that the investors “have done the best they can. We have Maersk Group in the bouquet of foreign investors that have signed on to this project. We are going to have the largest cargo container port in Africa situated in Badagry. “That means a lot to us in terms of employment generation. It means a lot to us also in terms of new

settlement. Like it has been said, we hope that in the next two months we are coming back here to kick-start this project,” the governor explained. Ambode promised to bring development to about 12 communities in the area and ensure that every community “is duly compensated. In any direction that we have one or two that are still dialoguing, we would protect their interests. We would ensure that their interests are protected. “It will be long-lasting for generation yet unborn. I want to assure the Aivoji community that they are safe and that our administration will continually support them and protect their interests. Like we have been told, this project is 500 metres away from the point of no return which is also a tourist attraction for us. “So, we have decided to protect that particular place to make sure that tourism is complemented. With a deep sea port project, it means there will be new settlements in Badagry, new towns and the standard of living is positively affected by this kind of project. “Before I came here, I inspected the Mile II-Badagry expressway. There is no way we want to do the deep sea port project here if we do not finish the Mile IIBadagry expressway. I assure you that the two projects will start simultaneously. We will use that to create jobs and increase the GDP of Lagos economy. Within the next four years, there will be a dramatic change in this axis of Lagos.” SA

SA June/July 2015

8


ACCESS CONTROL

Revolutionary control Biomaster set out their full product range and world class understanding of access control solutions

B

ioMaster provides revolutionary access control, employee management and fingerprint matching technology. Our product range is an advanced suite of four innovative access control and database management products. Each product is designed to integrate seamlessly with your existing systems, to provide you with impenetrable business security, access control and unmatched employee management in the cloud. Our solutions are comprehensive, and include important access control features such as anti-passback regulations, visitor management, staff information storage, and so much more. We have the following product offering: >

BioAccess for access control

>

BioCentral for central database technology and staff information storage in the cloud

>

BioMatch for cloud-based finger print and finger vein matching technology

> BioMobile for off-site clocking and mobile solutions

9

>

BioInduction for safety orientation linked directly to Access control

>

BioCheck for ensuring that your staff SA June/July 2015

compliment does not have a criminal record and verifying their identity as true.

About Biomaster The BioMaster mission is to provide revolutionary security, access control, employee management solutions and innovative technology that integrates seamlessly with your existing systems. At BioMaster, we create, develop and implement a range of access control and fingerprint matching solutions. Our vision and mission is to provide revolutionary access security software and innovative technology that integrates seamlessly with our clients’ existing systems. Our BioMaster products lead the way in access control employee management solutions. Along with the implementation of these, we provide a fully clientfocused service, in a friendly and professional atmosphere. The BioMaster team are an elite collection of specialists, all with backgrounds and capabilities in systems development and implementation. When the time comes for revolutionising the access control, employee management and finger matching industry, we’re ahead of the crowd. We’re the artisans of business security systems development. And, some would say, we’re the superheroes of our trade.


FEATURE

Airlive: Cutting Edge Security Systems Airlive brief Security Africa on their new wireless security system and take us to the lively capital of Santiago de Chile to demonstrate. Due to its mobility and convenience, wireless IP cameras are widely used by people who what to make sure their family or asset safe when they are away from home. Although this kind of IP camera also allows wired connection, using Wi-Fi will be a much easier way to stream video, which avoids the complexity of wiring and gives users more freedom of deployment. But the critical issue is whether the quality of Wi-Fi is sufficient for video streaming, which may severely impact the video quality consumer received. A robust wireless network could be a prerequisite for a home security system working efficiently. And the latest 802.11ac Wi-Fi technology is regarded as the ideal solution to meet this need. New Wi-Fi technology underpins wireless security system 802.11ac Wi-Fi technology, presented some time ago is getting into devices for home users who need higher performance and stability of connections, as well as more bandwidth and efficiency. AirLive, a world-class surveillance and networking equipment provider has launched the new Wi-Fi enabled devices, supporting 802.11ac technology - AC-1200R AP router, whose theoretical data rates of Wi-Fi AC standard is 1200 Mbps, are 3 times faster than Wi-Fi N technology. Moreover, with high power radios and MIMO technology, it is able to provide up to 2 times coverage compared to other wireless routers. These features benefit video transfer

SA June/July 2015

> 10


FEATURE

and allow users to install wireless IP cameras at more locations. Users can exploit the full capabilities of 802.11ac standard while maintaining backwards compatibility with previous wireless technologies, which makes it an ideal solution to improving an existing wireless/wired network.

Dual band supports various devices In addition to its superior speed and coverage, the 2.4 GHz/5 GHz dual band of AirLive AC-1200R is another advantage for building home security system. The 5 GHz network is less vulnerable to interference and provides stable bandwidth up to 867 Mbps - therefore, it is suitable for video streaming and on-line gaming. The 2.4 GHz radio provides a separate network for computers, tablet PC, and smart phones. By supplying separate network bandwidth for each of the two types of links, the AC-1200R provides maximum flexibility in setting up a home security network. Both radios can be connected with wireless IP cameras depending on their compatibility.

More Choices AirLive also launches another 802.11ac AP productAC.TOP. The AC.TOP is a ceiling mount AP which minimizes visibility for installation in public areas such as office, shopping mall, campus, hotel, restaurants, 11

SA June/July 2015

clinic and hospitals. The Built-in Gigabit PoE port delivers both electricity and data over single Ethernet cable which makes installation much easier. Both AC.TOP and AC-1200R can be managed by AirLive Central management software, which can discover AirLive AP automatically, and allow users to change settings, upgrade firmware across multiple AirLive products at the same time. AirLive AC-1200R and AC.TOP are

Case study: Santiago de Chile The KSA YOUR APARTMENT building located in the city of Santiago de Chile, a hotel and apartment lease, installed a surveillance system and monitoring based on AirLive cameras and equipment backed by a major network infrastructure. The hotel area ranges from the 1st floor to floor 7 and the remaining floors will be used to lease apartments to private individuals for residential purposes.

The Challenge According to the project managers, the surveillance system should consider the following points: a) Sufficient cameras for visibility of all the corridors on each floor and underground. b) Minimum capacity of 1 megapixel and minimum


FEATURE

range of 15 meters. c) Centralized recording system to allow for pre-event recording (changes of light, movements, etc.). d) The event recording a few seconds before and after the event occurred. e) Monitoring Concierge Room more access system should facilitate verification of recordings and transferring them to other storage devices. f) The shape and position of the camera system should have the ability to track people inside the building.

The Solution The integrator Evolution Ingeniería Limitada recommended the implementation of an IP video surveillance system composed of 52 security cameras to monitor the corridors. This system includes three types of cameras: 23 cameras 360 degrees with ​​ segmentation capabilities (for floors 1 to 23), the fish eye model AirLive FE-200VD, 23 cameras (floors 1 to 23) model AirLive DM-720 and 6 cameras for underground (1 to 3) AirLive BU-720. In order to supply power PoE (Power Over Ethernet) to cameras 11 POE-FSH808AT switches were installed. For recording images a system composed of 4 NVRs, AirLive NVR 16 were installed with a continuous recording capacity exceeding 30 days, with 3 TB disks 3 and 4 monitors each LED full HD.

The Result After the tests, the video surveillance system widely responded to the expectations of management of the building, integrating seamlessly with wired network infrastructure (Cat.6) to all floors. This was also designed to support Internet telephony, wireless and IP television services. The most important point is the interconnection between floors and the equipment room, located on the 1st underground, was fitted with ring-fiber links, in order to deliver a high back to services. Besides a power system with UPS distributed between floors is able to ensure continuity for more than an hour every building communications systems. Besides a racks located on floors through the building from the 1st floor to floor 23 were considered. SA AirLive products

> 52 IP cameras (FE-200VD, DM-720, BU 720) > 11 switches POE-FSH808AT > 4 CoreNVR16

SA June/July 2015

12


RUN Milestone Mobile AND WITNESS ANY MOMENT WHEREVER YOU ARE

Instant access to your video surveillance from your smartphone or tablet Compatible with all XProtectŽ video management software (VMS) and the Milestone Husky™ NVR series, the free Milestone Mobile app gives you secure access to your video surveillance system anytime, anywhere. Available in 27 languages, the app lets you conveniently view live video, as well as playback and export footage from your smart device. Discover how to expand your surveillance and security system capabilities with XProtect video management software at milestonesys.com Join the Milestone Partner Open Platform (MPOP) Days: Africa! The MPOP Days will be hosted in Johannesburg, South Africa on July 28-29. Visit our website to register today! Milestone Systems Southern Africa Tel: +27 76 811 7495

POSSIBLE STARTS HERE


Storacall TeleAcoustics Sound Solutions

Storacall TeleAcoustics Ltd is a supplier of specialist telecom products to the government, utilities, financial, manufacturing, oil and gas industry in the UK and around the world. The company manufacture and distribute acoustic telephone hoods, 'Hippo' telephone cabinets, industrial telephone kiosks, marine enclosures, pedestals, weatherproof telephones and tough internal telephones. To download the new brochure showing the latest range of Telephone Hoods , Cabinets, Kiosks and Environmental Phones please visit:

www.teleacoustics.co.uk For further information, please contact The TeleAcoustics Sales Team: Tel: +44 (0)1242 578815 Email: sales@teleacoustics.co.uk

Storacall Voice Systems

Two-Way Radio Communications Recording Robust communications monitoring and recording for IP, digital and analog two-way radio interfaces With over forty years experience in the call recording industry and a client list that includes Government agencies, emergency services and the transport sector, Storacall are a natural choice for secure and reliable recording of radio traffic. In addition Storacall has particular experience with call recording applications in the oil and Gas industry Working with market leaders in the radio industry, Storacall offers a range of scalable systems suitable for use in the most demanding of environments. Supporting from 4 to 400 channels of Analogue, Digital UHF, VHF or IP radio with integrations to Telephones Hotlines, Intercoms, Phone systems, PAGA systems, Dispatchers Tetra and RoIP. All models provide a cost effective encrypted and secure recording See details of our range of call recording systems here www.storacall.co.uk or for a full information pack or to discuss a possible application please call +44 (0) 1932 710710 or e-mail sales@storacall.co.uk

Storacall Voice Systems Ltd | Swan House | Windmill Rd | Sunbury on Thames | Middlesex | TW16 7DT


SECURITY NEWS

Cybercrime Meeting Cyber Crime Africa Summit & Roundtable

W

ith African economies continuing to grow at higher rates compared to other emerging markets and as the continent surges forward, information risk governance and cyber security issues are moving further up the agenda of board level executives. Clearly there is a greater need for companies and government bodies across Africa to address these ongoing challenges and to collaborate more effectively. Building upon successful and well-established CISO Summits held across EMEA and Asia Pacific, MIS Training Institute’s upcoming Cyber Crime Africa Summit & Roundtable event seeks to do just that. Taking place on 16th to 18th September in Kigali, Rwanda, the three day conference will address the current African threat landscape, to identify potential challenges on the horizon across the next 12 months and to equip all those involved with the practical guidance needed to reinforce their information risk, security management and business continuity programmes. The key themes for 2015 include Analytics, Big Data and Forensics, Cloud, Mobile and Social Media Security, Identify Theft, Hacking and Risk Mitigation controls, Business Continuity and disaster recovery. However,

15

SA June/July 2015

these are just the tip of the iceberg as attendees are encouraged to share and discuss the issues they are facing in roundtable debates and lively discussions. Lead by prominent African and International professionals, the lineup of speakers is very much a who’s who of the information security community in Africa. With representatives including senior figures from Kentrade, BT, Union Bank of Nigeria, Sasfin Bank, Defence and Security Forum and Nedbank Limited, the speakers are the foremost authorities in ICT security, information security and senior IT risk professionals and will be met by their counterparts in government offices and private sector organisations across Africa. The event also attracts Political Appointees and Committee Members, who are keen to grasp the issues at hand and their effects.

Keynote speakers: > Hon. Jean Philbert Nsengimana, Minister of Youth and ICT, Ministry of Youth and ICT, Government of Rwanda


SECURITY NEWS

>

Ibrahim Juma, Head, Information Security, KENTRADE (Kenya)

>

Ray Stanton, Executive Vice-President Professional Services, BT (UK)

>

Steve Whitehead, Managing Member, Eavesdropping Detection Solutions, A Division of CBIA (South Africa)

>

David Isiavwe, General Manager and Chief Internal Auditor, Union Bank of Nigeria

This year’s event also benefits from the co-location of MIS Training Institute’s 10th Annual Audit, Risk & Governance Africa Conference, allowing attendees a rare opportunity to swap notes with their colleagues in related disciplines and get a fresh perspective on how the work they are doing impacts on other areas of their organisations. SA About MIS Training Institute

Leadership Coaching: > >

Shane Fankhauser, Executive Presentation, Coach for Corporate Political and PR Advocacy Communication (UK) Chantell Ilbury, Motivational Speaker, Facilitator and Keynote Speaker, Cape Town (South Africa)

MIS Training Institute is the international leader for conferences, training courses and bespoke events for professionals working areas In this new era, wein the will of information security, corporate /physical security, to antifraud, internal from start seeanti-corruption, everything audit; governance and technology risk and audit. self-driving cars, to virtual For further information about the event, to customer assistants,

please visit the event website www. cybercrimeafricasummit.com or contact advanced robotics featuring Constance Belinga at cbelinga@misti.com. www.misti.com

SA June/July 2015

16


SECURITY NEWS

Marines on Standby Special purpose armed forces secure strategic locations along Africa’s western coast

T

roops from the Marine Corps’ Spainbased crisis response force for Africa will be visiting the continent more regularly since the service developed three new forward staging locations for use in emergencies. Located in Gabon, Senegal and Ghana, the three cooperative security locations will be visited by detachments from Special Purpose Marine Air-Ground Task Force–Crisis Response–Africa every six months, said Col. Thomas Savage, the unit’s commanding officer. While in the three countries, all of which are along Africa’s western coast, the Marines will build relationships with local troops and leaders and keep the bases ready for use, Savage said. The Marine Corps has also made agreements with leaders in Niger said 1st Lt. Danielle Dixon, a spokeswoman for the task force. Dixon said U.S. Africa Command will make future announcements about new cooperative security locations there and elsewhere as they come online. These cooperative security locations, or CSLs, will help the Marines avoid lengthy trips from Europe to respond to crises across the vast African continent. In 2014, for example, Marines with the Morón, Spain-based unit flew 4,200 miles to evacuate the U.S. Embassy in South Sudan amid civil unrest there.

17

SA June/July 2015

Established for use by the Marine Corps last year, the CSLs consist of little more than an austere fenced-in space the size of a football field, Savage told Marine Corps Times in an interview at his unit’s headquarters in Spain. But in a crisis such as an embassy reinforcement or humanitarian intervention, the locations can be readied within hours to host nearly 200 troops for as long as they need to stay. Marines tested the CSLs in Ghana and Gabon for the first time earlier this year, Savage said. Teams of crisis response Marines converged on Ghana for a little more than four weeks in March and just recently returned from a three-week test in Gabon in June. In each case, he said, an advance team of five to 10 Marines arrived early to arrange diplomatic permissions, secure contracts for food and other services, make contact with the local embassy and turn the sparse locations into fully functioning forward bases. “It’s kind of like a [forward operating base] without getting shot at,” Savage said. “We brought porta-johns, we even brought washers and dryers, power generators ... then we’re operational.” In terms of equipment, Savage said the Marines kept


SECURITY NEWS

their footprint small. The task force sent 186 troops to Gabon with four MV-22B Ospreys and two KC-130J Hercules jets, but brought no vehicles.

As the Marines return to the new staging locations, Savage said they will develop a playbook for making the area operational. Though Savage said most State Department-directed missions that would require Marines to forward-position at a CSL would run about 30 days, the only real challenge to keeping the troops there longer is tied to aircraft maintenance. “It’s very difficult to keep your aircraft in peak condition when you can’t bring them out and take them apart,” said Savage, adding that limited space and resources made repairs and maintenance a challenge. Ultimately, the host nations and U.S. Embassy determine the length of stay.

Embassy in Libreville, the country’s capital, to build familiarity with the layout and meet staff members. They also trained with about 60 Gabonese troops, holding courses in non-lethal weapons employment and generator maintenance and logistics, and an enlistedto-officer transition program. Meanwhile, Savage and other task force leaders were building friendships with Gabonese military leadership, even offering Osprey rides. While the three CSLs the Marines are using were chosen because of the strong relationship the U.S. maintains with each country, Savage said the reception in Gabon was especially warm. “Those guys were man-hugging you and trading coins,” he said. As the Marines return to the new staging locations, Savage said they will develop a playbook for making the area operational. The playbooks will also document what training has been conducted with local troops, so new Marine teams can pick up where the last one left off. Marines from SPMAGTF–Crisis Response–Africa will visit Senegal for a dry run in that location when the next unit rotation, led by 6th Marines, takes over next month. SA

During the visit to Gabon, the Marines toured the U.S. SA June/July 2015

18


ENERGY

The Mining of Tomorrow Productivity drives in mining increasingly reliant on cybernetic innovation

M

ining may be a highly industrial endeavour that hasn’t changed dramatically over the decades, but sophisticated new technologies are starting to play ever-greater roles in improving productivity and miner safety. In the future, the mining houses that are deploying the latest technology in the areas of robotics, sensors, automation, wearables, and connectivity will likely emerge as the winners in the unceasing quest for operational excellence within the sector. Taking a step back for a moment, historically, mining companies had very little technology at the “stope level”. The physical work of blasting, breaking rock, clearing sites and then extracting ore, has remained a very low-tech activity. To use an analogy, it was like a blind man guided by a simple walking stick. But with new technology monitoring, all sorts of data at stope level, we can contrast the example of the blind man, with a highly-skilled surgeon that deftly operates with full visibility, and with all the tools he needs close at hand. Sensor and tracking technology at mine sites provides real-time data on everything from ore samples, temperature, air quality, ground stability, staff

19

SA June/July 2015

movements, staff fatigue to medical issues and much more. Combined, these information feeds give mining managers a rich view on the state of operations ‘at the coalface’ – as the mine develops something akin to a central nervous system, which constantly gives feedback on its own health and performance. With this, mining firms can profitably operate at deeper Net2 is designed to work levels, make better predictions about ore grades and productivity levels, tailor their outputs more accurately seamlessly in the event of to market demands, and better ensure the safety of its staff.

communications failure.

For thecontinue mining houses, It will to permit it possible to as orbecomes deny access to users start measuring labour productivity One area that has grabbed the imagination of miners around the world is that of advanced robotics. Initial trials from mining giant Anglo American and US-based University Carnegie Mellon have already produced a working prototype that enters mine sites immediately following a blast, navigates on its own, conducts


ENERGY

measurements, and takes readings. The robot is able to go into dangerous areas where it’s not safe for humans to enter. Ground penetrating radar technology can be used to rapidly gather high resolution subsurface information. This technology can help in determining mining safety (like rock bursts, fractures, and shear zones), mapping rock quality and establishing where mineral and metal deposits exist – enabling faster adjustments to mining plans. In the arena of wearable technology, miners can track various environmental conditions with embedded sensors, and transmit information relating to their health and stress levels. Wearable technology can also be used to push relevant information down to the miner while he is underground. To enable this, connectivity solutions like Fibre, WiFi and RFID need to be established to carry these various streams of information. These information highways, the nerves linking the various functions in our ‘central nervous system’ analogy, are critical in delivering the right data to the right individuals.

‘soft dollar’ and ‘hard dollar’ formats. By deploying the right solutions, it becomes possible to start doing predictive analysis on miner’s health, measuring labour productivity, throughput rates, extraction qualities, haulage costs and other operational yardsticks. Ultimately, to realise all of these benefits, the mining house must hook up this pulsating, information rich ‘central nervous system’ to the right array of enterprise architecture. Having the correct systems is essential – to manage all the information being generated, allocate resources based on this information, and make better strategic decisions. SA To find out more about attending the Certified Installer Programme please visit Paxton’s website: http://paxton.info/2355 The Programme covers both the commercial and technical elements of selling and installing access control. Sessions are taking place close to major cities such as Cape Town, Johannesburg and Pretoria, throughout 2015.

For the mining houses, the benefits of connecting and using all of these new technologies lie in both SA June/July 2015

20



The Standard in Fire Systems Advanced is a British success story. We design and manufacture worldbeating fire alarm systems in the UK, exporting them to over 60 countries. Where quality and performance are priorities, you’ll find Advanced, including in The Shard.

Our innovations continually challenge the industry. AlarmCalm, our complete false alarm management solution tackles one of the biggest issues in Fire today and gives Advanced customers more options, more confidence and more peace of mind.

Tel: Tel:+44 +44(0)1670 (0)1670707 707111 111 Fax: Fax: +44 +44 (0)1670 (0)1670 707 707 222 222 Email: www.advancedco.com Email:sales@advancedco.com sales@advancedco.com Web: Web: www.advancedco.com


FIRE NEWS

Huge Market in PPE The protective clothing market is estimated to be worth over $9 billion by 2020

T

he protective clothing market is mainly being driven by the increasing demand from the oil & gas and construction & manufacturing industries. This is due to the growth in thermal, mechanical and chemical applications which utilize protective clothing, thereby contributing to the growth of the overall market. The key factors restraining this market include higher pricing of specialized protective clothing and increased automation in end-use industries. High pricing of protective clothing is one of the major setbacks that affect the growth of the protective clothing market. Protective clothing involves high cost of manufacturing owing to the use of high-performing fabrics as well as multiple test methods and standards. T he growth of the protective clothing market is reliant on the growth of the employment trend in various industries. The slowdown in the European market adversely affects the demand of various end-user industries, such as chemical, manufacturing, mining, and others, which in turn affects the growth of the protective clothing market in Europe. Thermal is the major application of protective clothing followed by visibility and mechanical. Thermal comprise the largest application in the protective clothing market

23

SA June/July 2015

and account for more than one-fourth share of the said market. The North America region dominated the market for thermal application of protective clothing, followed by Europe andAsia-Pacific. The market for biological/radiation application is projected to witness the highest CAGR of 12.0% between 2015 and 2020. The leading players in the market include Ansell Limited (U.S.), Lakeland Industries (U.S.), Teijin Limited (Japan), Kimberly Clark (U.S.) and Sioen Industries (Belgium), E.I.DU Pont De Nemours and company (U.S.), Honeywell International Inc. (U.S.) and 3M Company (U.S).

M&M is world’s No. 2 firm in terms of annually published premium market research reports. The report covers the protective clothing market and its trends in five regions, North America,Europe, AsiaPacific, Middle East & Africa, and Latin America. The market has also been analyzed on the basis of applications, such as thermal, mechanical, chemical, biological/radiation, and visibility. The market has also


FIRE NEWS

been segmented and analyzed on the basis of material type which includes aramid & bleands, polyolefin & blends, polyamide, PBI, UHMW Polyethylene, cotton fibers, and laminated polysters.

About M&M MarketsandMarkets is world’s No. 2 firm in terms of FLIR thermal cameras annually published premium market research reports. Serving 1700 global fortune enterprises with more allow monitoring day than 1200 premium studies in a year, M&M is catering to multitude of clients across 8 different industrial and night. Without any verticals.

additional lighting, it is We specialize in consulting assignments and business research across high growth markets, cutting edge possible to detect intruders technologies and newer applications. Our 850 fulltime analyst and SMEs at MarketsandMarkets are tracking global high growth markets following the “Growth Engagement Model – GEM”. The GEM aims at proactive collaboration with the clients to identify new opportunities, identify most important customers, write “Attack, avoid and defend” strategies, identify sources of incremental revenues for both the company and its competitors. M&M’s flagship competitive intelligence and market research platform,

“RT” connects over 200,000 markets and entire value chains for deeper understanding of the unmet insights along with market sizing and forecasts of niche markets. The new included chapters on Methodology and Benchmarking presented with high quality analytical infographics in our reports gives complete visibility of how the numbers have been arrived and defend the accuracy of the numbers. We at MarketsandMarkets are inspired to help our clients grow by providing apt business insight with our huge market intelligence repository. SA Contact M&M: Mr. Rohan North – Dominion Plaza, 17304 Preston Road, Suite 800, Dallas, TX 75252 Tel: +1-888-600-6441 Email: sales@marketsandmarkets.com Visit MarketsandMarkets Blog @ http://www. marketsandmarketsblog.com/market-reports/ chemical

SA June/July 2015

24




Store, manage and control keys, cards and small assets more securely and efficiently with KeyWatcher® Touch. Access is limited to authorized users, and all transactions are recorded with detailed reports available. The system will even automatically email transactional information to any user – at any time. And KeyWatcher’s convenient touchscreen makes removing and returning keys easier than ever. With our modular design and full scalability, it’s easy to see how we keep making key management better. That’s Morse Watchmans’ outside the box thinking – right inside the box.

morsewatchmans.com • 1.203.264.4949


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.