FARM SECURITY
Farm security: The inkblot strategy and other solutions For Benedict Weaver of Zero Foundation Africa, farm security needs to be intelligence-driven in a three-phased approach that utilises a classic counter-terrorism technique known as the “inkblot strategy”.
H
e explains: “Security stakeholders may use the inkblot strategy to connect the dots and deploy concentrated resources, in focused areas, on a roving basis. Once one area has been ring-fenced and mapped, other selected areas may then be ring-fenced utilising the flexibility of the PIS (predictive intelligence system). In this way, specific ring leaders will be identified, their online communications monitored, their planned attacks anticipated, and security resources may be allocated more effectively.” Based on his extensive experience in the anti-poaching and conservation sectors, Weaver advocates the implementation of a three-phased approach that encompasses historical incidents and security breaches, the names of suspects, and keywords and slang or local language phrases. Phase One • Conduct local research and profile suspects online.
14
SECURITY FOCUS AFRICA JULY 2021
• Configure a secured server with an alert system to advise when certain keywords have been activated, know what social media platforms are being regularly used and identify the communications pathways between known suspects, previously unidentified ring leaders and second tier operators on the ground. • Continue with the 24 hour monitoring of the information being retrieved and then analysed. Phase Two • Manage the information gathered and provide intelligence alerts on a regular basis, whether hourly, daily, weekly or monthly. • Assess these intelligence alerts and look for patterns of activity and intentions within a ring-fenced area. • Distribute text messages or posts in the vernacular and create a heat map for review purposes. • Analyse the heat map to identify communications traffic chokepoints and
determine who is communicating more regularly and in greater volume with whom and when. Phase Three Source feedback from the security stakeholders and users of the predictive intelligence system (PIS) to determine the following: • Results achieved • Challenges faced • Successes and failures • Recommendations Farm Watches Prior to the establishment of the Commando System, farmers had Rifle Associations to keep in touch with and protect themselves, says Laurence Palmer. “The Farm Watch concept may fulfil the same role today – it just requires buy-in from all of the farmers in an area, and a formal structure to ensure that the plans and support protocols are in place and work.”
securityfocusafrica.com