9 minute read
FARM SECURITY
Farm security: The inkblot strategy and other solutions
For Benedict Weaver of Zero Foundation Africa, farm security needs to be intelligence-driven in a three-phased approach that utilises a classic counter-terrorism technique known as the “inkblot strategy”.
Advertisement
He explains: “Security stakeholders may use the inkblot strategy to connect the dots and deploy concentrated resources, in focused areas, on a roving basis. Once one area has been ring-fenced and mapped, other selected areas may then be ring-fenced utilising the flexibility of the PIS (predictive intelligence system). In this way, specific ring leaders will be identified, their online communications monitored, their planned attacks anticipated, and security resources may be allocated more effectively.”
Based on his extensive experience in the anti-poaching and conservation sectors, Weaver advocates the implementation of a three-phased approach that encompasses historical incidents and security breaches, the names of suspects, and keywords and slang or local language phrases.
Phase One
• Conduct local research and profile suspects online.
• Configure a secured server with an alert system to advise when certain keywords have been activated, know what social media platforms are being regularly used and identify the communications pathways between known suspects, previously unidentified ring leaders and second tier operators on the ground.
• Continue with the 24 hour monitoring of the information being retrieved and then analysed.
Phase Two
• Manage the information gathered and provide intelligence alerts on a regular basis, whether hourly, daily, weekly or monthly.
• Assess these intelligence alerts and look for patterns of activity and intentions within a ring-fenced area.
• Distribute text messages or posts in the vernacular and create a heat map for review purposes.
• Analyse the heat map to identify communications traffic chokepoints and
determine who is communicating more regularly and in greater volume with whom and when.
Phase Three
Source feedback from the security stakeholders and users of the predictive intelligence system (PIS) to determine the following:
• Results achieved
• Challenges faced
• Successes and failures
• Recommendations
Farm Watches
Prior to the establishment of the Commando System, farmers had Rifle Associations to keep in touch with and protect themselves, says Laurence Palmer. “The Farm Watch concept may fulfil the same role today – it just requires buy-in from all of the farmers in an area, and a formal structure to ensure that the plans and support protocols are in place and work.”
For them to succeed, Farm Watches need to include farms in a naturally defined area: in a valley, a grouping of farms in-between two main roads, between a river and a main road, or even just a grouping of like-minded individuals, he says.
“A well trained and well-run Farm Watch is a huge asset,” agrees Shelley Scheepers, Verifier’s National Operations Director Statistics. “We have worked with many Farm Watches across the country. The very best of them are non-political, work hand-in-hand with the SAPS, have the required training for crime scene management, legal parameters, emergency response procedures etc. In a well-coordinated Farm Watch environment, farmers may receive assistance from at least four other members within minutes. The rest of the team is able to cordon off areas, effectively leaving nowhere for the suspects to run. All of this being said, Farm Watches need a very close relationship with their SAPS members in order to work in line with the law.”
“Security equipment is expensive,” agrees Palmer, “but modern technology is such that small budgets may still provide what is needed for adequate protection. At the very least, farmers need an early warning system that gives them time and space to prepare and respond effectively to an imminent attack, and an effective, reliable communication system to summon timeous response.”
Start with the house
Scheepers suggests that the starting point is to secure the farmhouse, which may be done with cameras using AI (artificial intelligence) at a relatively minimal cost. “A mixture of technology will go a long way,” she says, “from securing the roads outside their boundaries with License Plate Recognition technology, to thermal cameras powered by AI on the boundary fence lines. Dependent on the landscape, radar technology may be cost effective, owing to its ability to cover a huge area, with the added benefit of integrating cameras, animal tagging, visitor management and the like into the device. Automatic drone deployment is also a great option – however, as with all of the above, it will inevitably come down to budget.”
Teeth that bite back
Daytona Electronics’ Bill Sandham has compiled a list of ‘teeth that bite back’. “When seconds matter, early warning technology that verifies humans (not birds/cats etc.) prior to breaching physical barriers/virtual perimeters is first prize. Plus adding small dogs in the house to act as warnings, bunkers, lighting triggered by motion with a beep, electrified fencing in tight zones i.e. the immediate garden, beams, manned guards, CCTV (closed circuit television) with UPS (uninterrupted power supply), solar functionality and OSVM (off site video monitoring). Add to this video verification, PA (public address) systems to ‘shout’ at intruders, early warning sirens (minimum 130 decibels), fog or gas – provided it’s located away from humans and animals – and a compliant police force that operates within a fast, motivated legal system with real consequences, which hurts the transgressors EVERY time.”
“Everyone’s default is to go for CCTV, whether analogue, digital or thermal, says Sandham, “and surveillance definitely has huge benefits. However, each case is different and requires a brief derived from a threat analysis as per the chart above.
He continues: “Every measure and counter-measure that acts against lawlessness is very welcome and in desperate need. Delegate all threats to a body/force/service provider who takes responsibility for negative outcomes and thus makes them accountable for inferior, non-acceptable levels of protection to the very clients which they take the money from. Also, the Agri industry could subsidise some of the technology and create monthly payment/rentals (not CapEx though) to fast-track the deployment of sec-tech which could include innovations such as a localised thermal drone force that has the ability to intercept intruders at the earliest point.”
In agreement with the above, Palmer also advocates intelligent perimeter beams that are linked to automatic flood lights and cell phones, the creation of a safe space containing effective communications to keep the family safe while calling and waiting for assistance, panic buttons and double vacuum gates.
Edwin Wakefield, MD of Mimic Components, says that a basic system comprising an enclosure around the house with fence alarms and motionsensing solar lights pointing outwards and positioned on the house fence, is a good start and sometimes better than the more expensive solutions if it is used together with an active, on-the-ball Farm Watch. In addition, he continues, is creating a ‘nearest neighbour assistance plan’ supported by a long-range multitone sounder. “The sounder may help to ward off intruders and get the quickest response from the surrounding area. Whilst neighbours should not be expected to engage with armed intruders, the sounder will alert them to danger while also hopefully chasing the criminals away – preferably in a prearranged direction that will assist the security company to trap them. Each group will need to appoint a training officer and, if possible, maybe though Afriforum, funds could be raised to pay for the employment of coordinators and to help develop a national strategy. It could work along the lines of local WhatsApp groups, and it would need to have a backup if internet reception is poor in the area. The police will have to be involved in each area, but the driving will have to be done by the coordinators.”
Take back the element of surprise
Wolfgang Kirsch, Senior Developer at Classic Systems, believes the surprise element – currently in favour of attackers – needs to be taken back by farmers and responders. This may be achieved, in part, through the use of good, easy-to-use security systems together with trained first responders. The fear of new technology may be a drawback – it’s daunting to have to re-skill – and communication infrastructure could also be a challenge when or where internet and telephone coverage is limited, but great strides have been made in accessibility and coverage in the last few years with wireless long-range equipment.
Farmers, he continues, need training in situational observation and prevention, too. “As a control room software provider, we are not directly involved in the ground responses, but I would like to say this: The perpetrators work in groups and are highly organised in their attacks, which suggests that syndicates are involved.”
The number of commercial farms in South Africa has decreased alarmingly from 120,000 in 1994 to about 35,000 today, warns Weaver. “A similar decline in commercial farming was witnessed in Kenya post-Mau-Mau insurgency and in Rhodesia following independence. Both of those countries were agriculturally rich before these events but became net importers of food afterwards. South Africa will go the same way unless a new strategy for farm security is adopted. If we ignore the problem for too long, South Africa will be unable to feed its population, and this will result in a whole different basket of socio-economic problems.”
Wolfgang Kirsch of Classic Systems concurs, saying, “Farmers are essential to the country’s sustainability. The government should be providing tax incentives to companies and to farmers actively working to make farming communities safer.”
Contributors:
• AfriForum / Ernst Roets Phone: 086 10 200 30 / 012 644 4485 Email: ernst@afriforum.co.za Website: https://afriforum.co.za/en/ farm-murders-on-the-increase-again/
• Daytona Electronics / Bill Sandham Phone: 084 886 0000 Email: bill@de24hr.co.za Website: www.DE24HR.co.za
• Zero Foundation Africa / Ben Weaver Phone: 27 21 712 3024 Email: weaver@zerofoundationafrica. com Website: https://www. zerofoundationafrica.com/
• Laurence Palmer Phone: 073 954 4450 Email: unicornnlpconsulting@gmail.com
• Mimic Components / Edwin Wakefield Phone: 060 012 3456 Email: edwin@mimiccomponents.co.za Website: https://mimiccomponents.co. za/
• Classic Systems / Wolfgang Kirsch Phone: 010 500 9300 / 011 084 7900 Email: info@intelligent-monitoring.com Website: http://www.intelligentmonitoring.com
• Verifier Off-Site Monitoring / Shelley Scheepers Phone: 086 111 6023 Email: stevenv@verifier.co.za Website: https://www.verifier.co.za/
• Willy de Jong Phone: 041 368 6184 / 076 717 8646 Email: willydj@axxess.co.za
Veteran security electronics advisor Willy de Jong makes the following points:
• Farms and smallholdings are often located in isolated areas, making them very vulnerable to attack, as security backup is a long distance away. The criminals thus have time on their hands to commit their foul deeds before security back-up arrives.
• Farms usually have firearms and cash on hand, which are attractions for criminals.
• Typically, security weaknesses include occupants not being security-aware. They often leave doors and gates unlocked, valuables lying around in the open and so on.
• It is critical for farmers to know who their workers are and to have copies of their ID books, to know where they live, and to keep communication channels open.
• Key security elements include a secure fence with razor wire around the home area, security gates and burglar bars. Add to this communication with the outside world per cell phone and/or two-way radio system to security patrols or back up organisations. And a safe area where those under attack may seek refuge until help arrives.
• If budget permits, a CCTV (closed circuit TV) system that senses movement and is backed up by guards on the premises is money well-spent, as is a good two-way radio system and microwave beams inside the perimeter fence and at vulnerable points.