Security Africa Magazine Dec 15

Page 1

SECURITY AFRICA

World Trade Organisation Nairobi, Kenya December 2015 Security Africa Magazine

12

Big Data and Software Security

17

Key Control in the Airport

28

On the Nigerian Mineral Trail


Paxton

Introducing the Next Generation Net2 Entry – The Simplest Door Entry Solution FEATURES OF THE NEW PANELS:

» Pan/tilt functionality to capture an angled view » Smart new design, available in IK10 rated vandal resistant stainless steel and plastic/ABS anthracite grey » Reads Paxton and MIFARE® token technology » v2.14 system update includes grouping and improved SIP compatibility » Available in flush, surface and rainhood variants FEATURES:

» » » » »

Just 3 components, simply plug together Units auto detect for easy installation Easy plug and play expansion Inbuilt Net2 access control for a complete solution Intruder alarm and secondary camera integration

Register your interest for our free training sessions email training@paxtonaccess.co.za

+27 (0)21 4276691 | www.paxtonaccess.co.za | support@paxtonaccess.co.za


INTRODUCTION

Introduction

A

s 2015 draws to a close, the region faces continued problems and issues which offer challenges as well as opportunities for the security, fire & safety industry. Africa is forecasted to have 5% GDP growth in 2016 and 7 of the world’s 10 fastest growing economies are in the continent so the demand for products that protect and facilitate secure commercial environments can only increase. Predictions that there will be 1.4 billion middle-class Africans by 2050 and the flourishing ICT sector, have led consultants McKinsey to acknowledge a dot-com boom in the region which will enable connectivity and increase demand for cyber-security. The Middle East and Africa Cyber Security Market is expected to grow to $13.43 billion by 2019, with an expected CAGR of 13.7% for the period 2013-2019. This market contributes 7.19% of the global market and will grow to 8.62% by 2019. There has long been a notion that sub-Saharan Africa is a difficult place to do business but as governments across the region determine to attract foreign investment, 17 out of the 50 economies making the most improvement in business regulation in the last 10 years are from the region according to World Bank statistics. Burundi, ranked in the top ten most improved

economies is the only low-income economy on the list. Traditional industries such as oil, gas and mineral mining have to compete in a difficult time globally with falling prices. Sub-Saharan Africa has the potential to become the next Persian Gulf and with the world’s concern focussed on continued conflict in the Middle East the region’s key task is to reassure investors. Tighter regulations on health and safety are becoming the benchmark for continuing sustainability and offer exponential opportunities for our industry. Similarly the move to diversify economies away from mineral resources towards agriculture, ICT tourism and renewable energy will necessitate increased security measures and products to attract investment. Finally, a seasonal greeting to our much valued clients, partners and subscribers. We look forward to a prosperous 2016.

Judith Adele Editor

Advertising Sales Ben Charnley ben@securityafricamagazine.com

Design & Analytics Alex Scott design@securityafricamagazine.com

Editorial & PR Judith Adele editor@securityafricamagazine.com

Accounts Sue Barker accounts@securityafricamagazine.com

SA December 2015

2


Contents 04 08 09 12 15 17

3

Nairobi World Trade Organisation Conference: As Africa hosted the WTO conference this month, anti-WTO activists hit the streets of Nairobi, sceptical about WTO declared ambitions to make globalisation more inclusive and help the world’s poor. Phoenix Distribution: Africas leading broad based distributor of software, has won the distribution rights to security giant Kaspersky Labs full range of security solutions in the East Africa region. Cloud Tech: Testing, new apps and upgrades offer the ideal starting point to test the waters before cloud migration - Cloud is one of the most significant over-arching growth trends driving digital transformation today. Although in South Africa we are seeing some uptake of this technology. Securing Software: Software is the cornerstone of business today, supporting essential business processes, enabling productivity and facilitating enhanced efficiency, to name but a few functions. Paxton Training: Paxtons ethos of making everything simple for the installer, including providing free, practical workshops across the country, ensures its products are sold and installed with confidence. Key Control for Aviation Industry: Airports have many security requirements and challenges, and part of the challenge arises because of the mix of people onsite, including airport staff airline staff, contractor and vendor staff and travellers.

SA December 2015

21 24 25 28 36

AirLive in Dubai Intersec 2016: One of the most advanced providers of international IP Surveillance Networking is announcing its participation at INTERSEC Dubai 2016 (HALL 1, Booth: 1-F10). AirLive will showcase its latest Surveillance Networking Solutions. AirLive in Venezuela: The military airbase Teniente Luis del Valle García, Venezuela, implemented a system of video surveillance and security based on AirLive IP cameras. Jasco Enterprise Awarded Prestigious Accolade: The achievement was presented at the annual Partner Connect Conference awards ceremony, held this year at the Atlantis Hotel in Dubai on 25 November 2015. Nigerian Mineral Trail: Experts say that with trillions of Naira lying fallow from untapped mineral resources in Nigeria the nation has no business with poverty and deprivation. Honeywell and Aviation: Ikin Özel, Regional General Manager, Turkey & North Africa, outlined Honeywell’s complex integrated airport solutions to Samantha Jenkins.

.


FEATURE

Landmark Deal at Nairobi World Trade Organisation Encouraging prospects for African economic growth include elimination of export tarrifs on high-tech industry.

A

s Africa hosted the WTO conference this month, anti-WTO activists hit the streets of Nairobi, sceptical about WTO declared ambitions to make globalisation more inclusive and help the world’s poor. Despite a predicted clash between the West and emerging powers in the developing world WTO is poised to emphatically change the future of Africa in global trade in the coming decades with new agreements to eliminate export tariffs on agricultural and IT products. The WTO’s Tenth Ministerial Conference was held in Nairobi, Kenya, from 15 to 19 December 2015, the first such meeting hosted by an African nation. The Conference was chaired by Kenya’s Cabinet Secretary for Foreign Affairs and International Trade, Amina Mohamed. Members representing major exporters of information technology products agreed on the December 16th at the WTO’s Tenth Ministerial Conference on the timetable for implementing a landmark deal to eliminate tariffs on 201 IT products valued at over $1.3 trillion per year. There was also a win for developing countries after the Ministerial Conference finally closed a deal on elimination of agricultural and export subsidies. Developing countries have been protesting against the subsidies as it inhibited their potential to trade. The subsidies made agricultural products and exports from developing countries more expensive thus SA December 2015

> 4


FEATURE

unattractive. Sub-saharan Africa possesses 60% of the world’s uncultivated land, yet is only responsible for 3% of global agricultural exports. Under the decision, developed members have committed to remove export subsidies immediately, except for a handful of agriculture products, and developing countries will do so by 2018. Developing members will keep the flexibility to cover marketing and transport costs for agriculture exports until the end of 2023, and the poorest and food-importing countries would enjoy additional time to cut export subsidies. Speaking during the closing ceremony on Saturday, WTO Director General Roberto Azevêdo termed the deal as historical. “This task has been outstanding since the exporting subsidies were banned for industrial goods more than 50 years ago. Today’s decision tackles issue once and for all,” he said. He says the move removes the distortion the subsides have caused in agriculture market thereby helping to level the plain field for the benefit of farmers and exporters in developed and least developed countries. “It will also help to limit similar distorting effects associated with exports credit and state trade enterprises,” he added. “We have been able to achieve truly remarkable results 5

SA December 2015

and this cannot be overstated. We have agreed on a package of outcomes that will have positive outcomes that will have a positive impact on the developing countries and in particular the Least Developed Countries,” concluded Foreign Affairs Cabinet Secretary Amina Mohammed. Amina Mohammed, who received a standing ovation said: “the areas covered represent deeply important aspirations of many members and will establish the path for agricultural reforms in securing food for the most disadvantaged.” IT negotiations were conducted by 53 WTO members, including both developed and developing countries, which account for approximately 90 per cent of world trade in IT products. However, all 162 WTO members will benefit from the agreement, as they will all enjoy duty-free market access to the markets of the members eliminating tariffs on these products. The list of 201 products was originally agreed by the Information Technology Agreement (ITA) participants in July 2015. “I am delighted to mark this breakthrough here today at the Ministerial Conference”, said WTO Director General Roberto Azevêdo. “This is a very significant achievement. Annual trade in these 201 products is valued at $1.3 trillion per year, and accounts for approximately 10% of total global trade. Eliminating tariffs on trade of this magnitude will have a huge impact. It will support lower prices — including in many


FEATURE

other sectors that use IT products as inputs — it will create jobs and it will help to boost GDP growth around the world”. This breakthrough follows months of intensive negotiations among the ITA participants. Their review of “draft schedules” involved a process whereby each of them indicated over what timeframe and how they intended to implement the elimination of duties on these products.

Emerging powers in the developing world are contesting the old order and working through WTO to gain greater access for their products in European and American markets. For every product on the list, ITA participants have negotiated the level of reductions and over how many years it will fully eliminate the tariffs. As a result of these negotiations, approximately 65% of tariff lines will be fully eliminated by 1 July 2016. Most of the remaining tariff lines will be completely phased out in four stages over three years. This means that by 2019

almost all imports of the relevant products will be duty free. The WTO Director General said: “This agreement is the first major tariff-cutting deal at the WTO since 1996 — and it comes fast on the heels of the historic Bali Package. We now have two deals in two years which deliver real, economically significant results. I hope that this success will serve to inspire progress elsewhere in our work.” Among the products covered in this agreement are newgeneration semi-conductors, GPS navigation systems, medical products which include magnetic resonance imaging machines, machine tools for manufacturing printed circuits, telecommunications satellites and touch screens. The agreement also contains a commitment to work to tackle non-tariff barriers in the IT sector, and to keep the list of products covered under review to determine whether further expansion may be needed to reflect future technological developments. Emerging powers in the developing world are contesting the old order and working through WTO to gain greater access for their products in European and American markets. With WTO membership increased from 162 to 164, following the formal endorsement of Liberia and Afghanistan as members of the Nairobi MC10, indicated that the body will remain a powerful multilateral platform for trade-related negotiations. SA December 2015

6


Product door not shown in image Fingerprint reade r optional

Store, manage and control keys, cards and small assets more securely and efficiently with KeyWatcher® Touch. Access is limited to authorized users, and all transactions are recorded with detailed reports available. The system will even automatically email transactional information to any user – at any time. And KeyWatcher’s convenient touchscreen makes removing and returning keys easier than ever. With our modular design and full scalability, it’s easy to see how we keep making key management better. That’s Morse Watchmans’ outside the box thinking – right inside the box.

morsewatchmans.com • 1.203.264.4949


AFRICA NEWS

Phoenix seals Partnership Phoenix Distribution wins distribution rights to Kaspersky product range.

P

hoenix Distribution, Africa’s leading broad based distributor of software, has won the distribution rights to security giant Kaspersky Lab’s full range of security solutions in the East Africa region.

enterprises as well as small and midsize organisations.” Phoenix has been a partner of Kaspersky for a decade, and has leveraged its strong channel, technical expertise and support resources to build the Kaspersky brand in Africa.

Simon Campbell-Young, CEO of Phoenix Distribution says the partnership will expand Kaspersky Lab’s reach across the continent. “Phoenix has branches in several regions in Africa and is ideally placed to grow the Kaspersky brand. We are delighted to expand our relations with Kaspersky beyond South Africa, and are sure we will have a similar success in East Africa that we have enjoyed in South Africa,” he says.

Campbell-Young says this partnership is an extension of the excellent relationship between the two companies. “East Africa is a key market for Kaspersky Lab and Phoenix alike, and the region is growing incredibly fast. It is vital to select the right partners in the area, to be able to offer African customers robust and effective solutions, particularly in the cyber security space. We believe this partnership is a step in the right direction, and will help grow both brands, as well as help Phoenix to strengthen its channel partnerships and further boost its offerings and support services.”

He adds that the partnership with Kaspersky Lab will help African organisations address the complex security challenges faced by these businesses, by offering them a comprehensive and best-in-class portfolio of security solutions. “A top priority will be extending our channel reach, and sharing knowledge about Kaspersky’s solutions to our partners in the region.” The terms of the distributorship agreement will see Kaspersky Lab and Phoenix uniting to leverage their strengths in security products and services, to help East African clients deal with issues such as cloud security, BYOD, endpoint security and similar. “We will help them address the increasingly complex threat landscape in Africa, and will work alongside our channel partners to roll out the full range of Kaspersky Lab solutions for

About Phoenix Phoenix Distribution is currently the leading Value Added distributor of software, accessories and peripherals across the African continent, covering software publishing, localisation and product distribution across multiple territories in multiple languages.

SA December 2015

8


TECHNOLOGY

On Cloud Networking New apps and upgrades offer the ideal starting point to ‘test the waters’ before cloud migration.

om e y

C

loud is one of the most significant over-arching growth trends driving digital transformation today. Although in South Africa we are seeing some uptake of this technology, customer confidence generally remains fairly low, and local organisations are still faced with the challenge of significant investment of existing legacy infrastructure. This has led to hesitation in the market when it comes to the option of migrating to cloud-based platforms. However, cloud technology is not ‘all or nothing’, and there are many methodologies that can be taken towards adoption. These include strategic migrations, testing, new product development and upgrades. For many South African businesses, the investment into existing infrastructure is significant, and this legacy infrastructure needs to be managed, operated and run effectively and reliably. This can make the transitioning to cloud a seemingly onerous task, with the result that many IT departments are susceptible to “Dark IT”. The question is, “Where to start?” Many businesses have embraced the need to use cloud services, yet IT departments are subjected to the continuous onslaught of being reliable with current infrastructure and systems management. How do IT departments leverage the significant benefits the cloud offers? In addition, a lack of confidence surrounded cloud initiatives can hinder adoption, as many IT departments are unsure of which projects are suitable for the cloud and which infrastructure should be maintained in-house,

9

SA December 2015

as well as which applications could benefit most from cloud migration. Organisations need not make the call to move all of their core transactional systems over, but can take a more strategic approach to see where the cloud can provide benefit, without taking the risk of a wholesale cloud migration. The need to balance the operation and maintenance of classic IT operations with dynamic solutions that utilise the cloud platforms. A bi-modal approach to IT, leveraging both in-house and cloud-based infrastructure and services, has to become the norm of today. Simply moving old workloads into a new environment, in other words the cloud, is not always the best option. Before any existing services or solutions are migrated, it is essential to conduct a cloud readiness assessment, particularly in terms of the applications that can be safely and productively migrated across. A cloud readiness assessment can also provide a full overview of the business and all associated IT services, and facilitate the design of a roadmap for optimal cloud migration. In addition to these methods, a third option is to take new projects, services and applications as well as upgrades to existing solutions and deliver them straight from the cloud. Since in many organisations businesses that demand agility are bypassing IT and obtaining


TECHNOLOGY

pure cloud services externally, this method enables IT to regain some control and initiative, and also demonstrate value to the business. While new projects are being rolled out, organisations can also assess legacy applications and systems, take them through the cloud readiness assessment, and determine which can be safely migrated.

Since cloud can be based on a ‘pay as you use’ model, infrastructure can be added as and when necessary without significant capital outlay - allowing organisations to respond more quickly to changing market demand. This approach offers organisations a number of benefits, not least of which is reduced risk. For example, when embarking on an upgrade, there are usually challenges that need to be ironed out which can impact productivity, production and the operations in general. The upgrade can be fully tested in a cloud environment, which stabilises the IT environment, reduces disruption to the company and enables a smoother, hitch-free project. Furthermore, with regard

to new products, projects or services, cloud models mean that the business is not committed to a fixed capital expenditure in order to deliver. Since cloud can be based on a ‘pay as you use’ model, infrastructure can be added as and when necessary without significant capital outlay or lengthy procurement processes. This also improves agility, allowing organisations to roll out new services faster and respond more quickly to changing market demand. Businesses also do not need to become heavily invested in new projects, as they can be cut at any time if they are not delivering as expected. In addition, all of this can be done outside of the production environment, and will therefore not have any impact on the day-to-day operations of the business In many instances, after conducting a cloud readiness assessment, organisations will discover that the benefits far outweigh any risks. Cloud is not simply about saving costs, but around provisioning more agile, dynamic, flexible and responsive IT services. The speed and agility with which new products can be delivered to market can become a significant competitive edge, and the lack of risk in attempting new products can help to drive innovation. If a product works, cloud IT can also scale quickly to meet growing demand. Ultimately, if the right services, applications and solutions are migrated into the cloud, organisations can leverage multiple benefits with minimal risk that will enable them to become more competitive in today’s digital marketplace.

SA December 2015

10


www.airlive.com


TECHNOLOGY

Application Security and Big Data The ability to secure applications whilst maintaining a rich culture of connectivity is the dilemma of 21st century enterprise. Software is the cornerstone of business today, supporting essential business processes, enabling productivity and facilitating enhanced efficiency, to name but a few functions. Catering to trends such as mobility and always-on connectivity, applications are now more accessible than ever before, and are available through a wide variety of platforms, including the web, cloud, and mobile devices. The challenge lies in the fact that, in order to perform their primary functions, software applications require access to data – the currency of the modern enterprise. The more open, connected and available applications become, the more they extend beyond the traditional boundaries of the organisation. This often puts them outside the control of security defences, potentially leaving sensitive information vulnerable to a variety of threats. Application security is therefore an essential component of an effective overall data protection strategy, particularly when dealing with confidential customer information. Applications are typically not built with security in mind, focusing on delivering functionality. As a result, they are often an overlooked aspect of security strategy. However, without effective application security, these very tools could expose sensitive information, leaving it unprotected and vulnerable. Cyber crime has become big business, and with such vulnerabilities open to exploitation, organisations’ are increasingly at risk of a variety of threats. This includes theft of data, customer information and intellectual property, disruption of business operations, damage to brand and

SA December 2015

> 12


TECHNOLOGY

reputation, and opening up employees and customers to risk, including the risk of identity and payment information theft. Application security is particularly critical for organisations dealing with online commerce and trading. These organisations need to effectively secure not only confidential customer information, but comply with regulations around securing payment card information as well. The nature of the threat is evident when one examines a number of recent website data breaches, including the recent case of United Airlines. The company admitted to three dozen of its MileagePlus loyalty card accounts being compromised as part of an attack that reused login credentials obtained from a third party source. The reality is that this type of crime is inevitably on the rise, as perpetrators of hacks often sell the data they steal, making this type of crime highly profitable. Some statistics highlight the magnitude of the problem. According to the Symantec Internet Security Threat Report of April 2015, the retail industry “liable for the largest number of identities exposed, accounting for almost 60 percent of all identities reported exposed” and the number of breaches containing financial information amounted to 35.5%, most frequently credit or debit card details. A significant proportion of this information was obtained via online channels. 13

SA December 2015

In addition, according to the report, “real names, government ID numbers, and home addresses were the top three types of information breached in 2014”. This information is all confidential to the customer, and represents a breach of the Protection of Personal Information (PoPI) Act in South Africa. Further to the challenge of securing payment information within web applications, organisations also need to ensure the mobile dimension is addressed. According to the Symantec report, “there are now more than 1 million malicious apps in existence; p¬roof-ofconcept attacks on the Internet of Things are here, including wearables, Internet infrastructure, and even cars; and devices on the cusp of the Internet of Things, such as routers, network-attached storage devices, and embedded Linux devices, are already under attack.” Mobility effectively creates additional loopholes for criminals to exploit when launching attacks aimed at data breaches. The recently published 2015 “HP Security Research Cyber Risk Report” highlighted that 80% of mobile applications unintentionally reveal potential benefits to malicious hackers while 71% store data in an unsecure manner, 65% do not protect data via encrypted communication or other means and 31% can reveal geolocation. In addition, this report highlights that fundamental application security errors in coding still


TECHNOLOGY

occur and Appsec vulnerability also exists outside the application code. For example, 52% of web applications experience issue with input validation, including cross-site scripting, SQL injection and other vulnerabilities. Furthermore, 82% of these web applications with vulnerabilities related to server misconfiguration, improper file settings and out-dated software to mention a few.

When it comes to protecting information, adherence to regulatory legislation such as the Payment Card Industry (PCI) is enormously beneficial. As these facts and figures illustrate, application security is essential. It is also however an issue that is the subject of much debate on how to effectively achieve. While there is much discussion on the most effective approach to application security, consensus is that it is essential to start with security built into the software development lifecycle. If security is built into the framework and process of the actual application

development, it will prove far easier to enforce on a granular level. However, actually achieving this goal is all but impossible for the majority of organisations, as they often need to make use of existing systems and legacy solutions that must integrate with each other, inherently opening up vulnerabilities. Mitigating this risk requires appropriate tools for access control, data protection and more. In addition, it is essential to incorporate application security and testing into security strategy, including vulnerability testing of the underlying application operating system and all related dependencies. In addition, specific application testing, including web and mobile security, should be included, as well as code scanning solutions to examine the actual application code for vulnerabilities. When it comes to protecting information, and especially confidential customer information such as payment data, adherence to regulatory legislation such as the Payment Card Industry (PCI) and Data Security Standard (DSS) is enormously beneficial. PCI DSS represents the minimum best practice standards required for data security, including specifications for application security, along with policies, procedures and more. PCI as a best practice can be applied in many organisations, whether they process payment information or not, and can go a long way toward mitigating the risk of application vulnerabilities and related data breaches in organisations. SA December 2015

14


ACCESS CONTROL

Paxton Training in SA Paxton Delivering Practical Access Control Training in South Africa.

S

ince its launch in South Africa in March 2014, global access control designer and manufacturer Paxton, has experienced an unprecedented interest in its product offering and installer training, the Certified Installer Programme. Paxton’s ethos of making everything simple for the installer, including providing free, practical workshops across the country and market leading support available six days a week, 52 weeks a year ensures its products are sold and installed with confidence. Taking this approach and listening to installers also delivers valuable feedback and market intelligence, which is a key element of the company’s product development strategy. Werner Geldenhuys, Sales Executive at Paxton explains the company’s fresh approach to education in the South African security industry. “Paxton’s Certified Installer Programme provides installers with the tools to select the right product for the job and the ability to install confidently and correctly first time. Less time on site means more profit to the installer and greater customer satisfaction.”

15

SA December 2015

Paxton’s practical approach to training differentiates it from other companies in the security market. Werner explains: “The key to successful training is to have trainees engaged and involved with the product. With the focus being on the installer, they are given the opportunity to familiarise themselves with the product in a practical session.

Too many companies see training and support as a cost to the business – however investment in education and aftersales support are the fundamental building blocks of growth “Whether the installer is from an intruder alarm background or their core business is networked products, our objective is to cater for all levels whilst


ACCESS CONTROL

keeping the material we deliver consistent. “Each session varies slightly depending upon the audience attending. However, the same important key information will be delivered throughout the day.” Paxton training seminars in South Africa have been well received with 100 per cent of installers saying they would recommend it to a colleague. Christo Lotz, of Prime Security, said: “The training showed me a new sales advantage on a new product.” Witness Khumalo of Ulyabonwa Security Solutions, said: “It was educational, the training gave me a clear view of access control possibilities in different sectors.” Paxton is confident that this training and education strategy will continue to build on initial success and have a positive impact on the skillset of installers in South Africa. Werner said: “The feedback from installers has been very good and since January this year, Paxton has trained over 300 installers from nearly 200 companies

across South Africa. We are offering leading access control, backed by innovative training and support.” “Too many companies see training and support as a cost to the business – however investment in education and aftersales support are the fundamental building blocks to growth in a developing industry. “Taking this approach is creating demand for our products and we will maintain this strategy of educating installers as we continue with our training and education programme for South Africa.”

Sign up for Training To sign up to the Certified Paxton Installer Programme for 2016 please visit: http://www.paxtonaccess.co.za/trainingrequest-za.asp

SA December 2015

16


FEATURE

Key Control Systems It is becoming abundantly clear that access control solutions will be fundemental to 21st century Airport security.

A

irports have many security requirements and challenges, and part of the challenge arises because of the mix of people on-site, including airport staff, airline staff, contractor and vendor staff and travelers. One component of managing security in such settings is to strengthen the role of access control, so that all parties remain in their authorized areas, assets are protected and security personnel can focus on operational matters. For many airports, strengthening access control means implementing a key control and management system to ensure that all keys, including those to sensitive areas, are properly secured and accounted for. When installed throughout the airport complex, the automated key control systems enable controlled access to keys and provide valuable forensic capabilities such as automated tracking, alarm and reporting functions. Key Control Increases Security Automated key control and management systems offer an increased level of security for an airport by preventing unauthorized key access and reducing the incidence of lost or misplaced keys. Tamper-proof cabinets are used to hold keys to sensitive or sterile airport areas, including ramps, operational spaces and other SIDA (Security Identification Display Area) spaces restricted from the general public. Authorized users with permission to enter these restricted areas

17

SA December 2015

unescorted can access keys which they have been pre-programmed to use by entering their PIN code and swiping a pre-issued badge. If the criteria entered matches the information stored in the system data base, the key cabinet will unlock and the necessary key can be removed or returned. Following are more specific ways key control and management systems are designed to improve airport operational security. Actionable Information Operational security and efficiency is further improved because all key access activity is automatically recorded including user, date and time of key access/return. Scheduled reports of which keys are in or out and who has/had them keeps airport security management informed. Administrators can request programmed reports to trace key movements by time, date and user code. If an incident occurs, during the follow-up investigation, management can query the system for specific details such as a listing of all transactions between certain times. Or, immediately following an incident, a report can be generated showing which keys are signed out and who last accessed them. Real-time audit reports can also track keys in use, overdue or lost keys, the location of a stored key (i.e. which key cabinet in the system) and any inconsistent key usage. When time is of the essence, the up-to-date and


FEATURE

reliable information provided by a key control and management system’s reporting can provide a strong evidence trail allowing airport personnel to enforce established procedures regarding secure areas. System Integrity Key control and management systems may also incorporate additional security features to help maintain the integrity of the system and provide enhanced security. For example, when an authorized user accesses a key, a numeric code can appear on the display and that code must be entered at secure doors when using the key. As an added safety measure, alarms can be triggered for certain predetermined circumstances such as the use of force to gain access or remove a key, invalid user codes, a door left open for more than 10 seconds after use, power failure, a key missing or not returned on time, or a key returned by the wrong user. Locking devices can also be attached to the keys to prevent users from swapping out the real key for another. These can be color-coded for organizational purposes. For example, this can help airport management organize keys for sensitive or sterile areas. The color-coding system also means that individual keys need not be labeled as to their purpose. If a key is lost, not only does the system flag this missing key, but it also eliminates any immediate identity issues.

Integrated / Networked Systems Today’s sophisticated key management systems bear little resemblance to manual processes in the past. Now, these systems are designed with an open architecture platform to enable network connectivity to access control and other systems provided by a range of integration partners for multiple levels of security and control. Operational Efficiency Optimizing the key management and access control technology within a facility through system integration pays impressive rewards in improved security and system efficiency. The technology can usually be integrated with the existing physical security system without costly upgrades or overhauls. For example, asset control systems featuring alarm and relay inputs/outputs can be integrated with existing video surveillance systems for additional security. Ethernet and USB capability help to ensure system compatibility and integration. Systems can also integrate with the airport’s existing identification cards. Integration with access control also allows system administrators to regulate the area of movement within the building for staff with keys. An authorized airport employee who has taken a specific, high-value key can be denied egress from the facility via an accessSA December 2015

18


FEATURE

controlled door until the key is returned. The parameters can be applied to users, keys, groups of keys, time constraints, and reservations. Or, when high security keys are involved, specific management can be alerted via email if that particular key has not been returned on time. Operational Convenience Compatibility with other security systems and network access offers an added richness and usability to airport security management. Integration with existing databases can also save time and money, by using a common frontend database to synchronize programming. Transactions such as adding or deleting users are easier and provide more efficient administrative control. Adding or deleting contractors and other non-permanent airport staff is just as easy, and the information is automatically distributed to all key cabinets within the system. Mobile Capability Mobile applications are quickly becoming a preferred platform for airport security managers accessing key control data and even to perform transactions. The result is improved safety and integrity of the airport. Advanced communication capabilities enable key control systems to be monitored and administered remotely from PDAs or smartphones as well as from the desktop. Apps for automated key control systems enable users to maintain control of keys no matter their location. At any time, an authorized user can see real time transactions and information about keys that are in use and any keys that are overdue, as well as about where and when alarms may have been triggered or overall system status. For investigative purposes, for example, managers can even review key usage to determine who may have last accessed a key for a vehicle that was found to be damaged. Notifications and events are automatically sent to authorized airport personnel for real-time awareness and management, and allowing them complete control of the system. They can cancel an alarm and even, if necessary, remotely disable user privileges. These features, along with many others, provide the mobile user with a greater level of convenience and control when it comes to key control management in an airport environment. 19

SA December 2015

Outside the Terminal Improvements that strengthen an airport’s access control should not stop at the terminal. Remotely located buildings such as fire stations, administrative facilities, control towers and even hangars can pose a challenge for management in terms of keeping the buildings secured and safe from break-ins, vandalism and other unwanted access. Since these locations are not connected to the main terminals, providing access can also create a challenge when it is necessary for maintenance crews and other workers to have access to certain or all areas within these buildings. Common Concerns Will employees remember to return the keys? Will the facility be properly locked upon exit? Will accurate time logs be kept? Automated key control and management systems installed at the remote facilities can help eliminate these issues. More efficient than requiring employees to pick up and return keys to/ from a central office, on-site networked key control systems with tracking capability offer an easy-to-use alternative. Illuminated key slots to locate keys, random return capability and user prompt screens with tailored messages all help make systems easier and more efficient for even the occasional users. Key control systems can be programmed remotely to meet the requirements of airport and federal government regulations as well as setting time and date parameters for each user, which can also help to ensure Net2 is designed to work the deterrence and detection of unwarranted access to controlled areas within the facility. Using PIN codes seamlessly in the event of or biometric authentication, remotely located systems make it easier for authorized users to access keys communications failure. when needed and for security management to be more assured about the building’s security.

It will continue to permit

Accountability Beyond Security or deny access to users as In a real-life example, United Airlines Jet Rebuild and Test Facility in San Francisco keeps track of valuable tools using a key control and management solution. At the facility where United brings its jets for rebuilding, each mechanic is provided with the specific tools and test equipment needed for the job at hand. The items, some of which have values up to $20,000 each, are kept in locking toolboxes and the toolboxes are kept in assigned areas relating to the project. The shop uses


FEATURE

the integrated key control system to store the keys for the toolboxes and to enable complete control of who has access to individual keys and when that access is authorized. The system can be accessed through an IP network from anywhere in the building and this online control enables airline management to administer the system and know from their own desktop computer who has any key. An audit trail tracks data regarding who removed any key, when it was taken and when it was returned. Activity reports provide complete information on which keys come and go, at what time and on what day. The information provides insight into usage trends that could help the facility better understand the operation and any opportunities for improvement, such as a need for additional equipment or improved alternative scheduling. Planning for the Future Changes to the Aviation and Transportation Security Act, airport expansion, policy changes and system upgrades are just some of the circumstances that can affect an existing or planned implementation of a key control and management system. Several options and design variations are available to customize a solution and help protect the airport’s investment as needs grow and change. Lockers It’s not just bottles of perfume or electronic cigarettes that are confiscated at TSA airport checkpoints. Guns, knives and other banned weapons are also found and must be held in a secure lock-up. Today’s key control

and asset management systems provide the answer with integrated locker systems. Vital documents, cash, employee badging/access control cards, data drives and even small electronic gear can also be controlled and secured using asset management lockers. The locker systems are identical in function to key control systems; users can access items only from the lockers/modules for which they have been pre-authorized and any activity such as removing or returning items or opening lockers/ modules is automatically recorded, creating an audit trail. Custom Solutions From single key cabinets to those used for securing hundreds of keys, solutions for airport key security, key control and key management can be tailored to a variety of needs. Smart, tamper-proof designs help keep space requirements small, and systems can be optionally accessed with pass codes, access cards or biometrics. Hundreds of key control and management systems are already installed and in use in airports around the world, providing tangible benefits and supporting airport management in the achievement of safety and operational goals. As described above, in some of these installations, further enhancing integration with related systems could provide further improvements and benefits. In either case, for both new airport installs or enhancements, administrators can be confident that they are not only improving their local security posture but also thereby improving the safety of the entire global air transport system. SA December 2015

20


SECURITY NEWS

Airlive at Intersec 2016 A preview of what to expect from Airlive’s upcoming product range.

T

he need for High Quality Video Surveillance has grown increasingly in the word in the past few years. Surveillance can be indoor or outdoor, local or remote, static or with patrol which brings many challenges since network has to adapt to multiple access scenarios, harsh environments, different client requirements etc. Cameras are improving not only with its video quality, but also with its connectivity thus enabling them to be connected wirelessly which enables them to be positioned in a wide area without any additional infrastructure. Thanks to inbuilt Wi-Fi function, Airlive 300W SmartCube Camera is the smallest Cube Camera with integrated IVS Software and Temperature/Humidity sensor, which is not only recording video, but also can monitor peoples movements in a store or shopping center, do peoples counting, and send you hourly report to your email, or will save the data on a cloud. E-fence function will allow you to detect any movement in your designated area, and will inform you via your smartphone if any suspicious activity is happening. In a door mode camera can detect any movement with PIR sensor and will play prerecorded sound which can be a greeting for your store visitors. For Home Door Mode, camera will not only detect, but also will notify you if

21

SA December 2015

anyone is in front of your door so that you can talk to them via inbuilt 2-way-audio using your smartphone. Temperature and Humidity sensors will allow you to measure temperature in your house or office, thus allowing you to save money on cold or hot seasons, when conditioning or heating is a must. Furthermore, 3MP sensor with IR, ICR, and wide field lens will ensure that the video quality will always be sharp and clear. This year AirLive will introduce AirMax series products 4GW and VH4GW that bridges the connections between WiFi, Ethernet, and the 4G/3G Mobile Network. It can connect any Wi-Fi or Ethernet equipped devices to the broadband Internet. Therefore, Telecom operators can extend their service to cover WiFi and Ethernet devices such as IP cameras, PC, notebooks, traffic controller, and much more. VH4GW can be powered with 9 ~ 36V DC, thus making it easy to deploy it in any type of public transportation, police cars, etc. In Switch and NVR Section AirLive will introduce new Industrial Grade Switches, Fiber Switch, POE switches with POE Extender for full network deployment, 32 Channel NVR and more. All of which can offer the most stable and rugged networking with the best Price/ Performance ratio in industry.


THE PERFECT MATCH

Why stop at software? Combining its award-winning video management software with high-performance hardware, Milestone Systems now offers the Milestone Husky™ Series, available in three models – use one as a simple standalone or connect multiple models and choose from more than 50 options for a truly customizable and scalable solution. The series is compatible with thousands of cameras and supports Milestone services such as Customer Dashboard to enable your installer to monitor the health of your system and proactively resolve technical issues. Milestone Husky appliances make it easy to find a configuration to meet the needs of any surveillance solution! Learn more: www.milestonehusky.com

Milestone Systems Southern Africa Email: huskyza@milestonesys.com


Axis Communications’ Academy

Building your strengths in network video

Your customers and your success depend on you having the most up-to-date, comprehensive knowledge in the industry. Axis Communications’ Academy makes it easy to stay one step ahead — putting network video knowledge right at your fingertips. The Academy gives you a wealth of information to help you build your strengths through every part of your chain — from interactive system design tools, practical “how-to” guides and

specialized webinars to registration for classroom-based training and certification. And it’s available anytime, anywhere, in your language from Axis’ own highly-trained Academy staff. When your knowledge source is the company that invented network video and continually sets the standard for innovation in the industry, rest assured customers will recognize your expertise — driving more business to your door. Get the Axis picture. Stay one step ahead. Visit www.axis.com/academy

Axis Communications’ Academy - the global learning center for network video

SA


SECURITY NEWS

Airlive Venezuela Venezuelan defence sector take advantage of Airlive technologies for airbase.

T

he military airbase “Teniente Luis del Valle GarcĂ­aâ€?, at Venezuela, implemented a system of video surveillance and security based on AirLive IP cameras.

This military base train fighter pilots in the flight simulator with the latest technology to command the fleet of aircraft war Sukhoi MK30. These aircraft and all units of the complex are already monitored and protected by AirLive cameras. The military base needed to protect and secure all internal and external complex facilities. To achieve this goal, the integrator in charge of the project recommended the implementation of an IP video surveillance system based on AirLive domes. The solution chosen by the AirLive partner included the installation of four speed domes- AirLive SD-2020 because its high speed PTZ zoom can quickly monitor any event happens at the base. These domes are responsible for monitoring the entire perimeter of the

complex and the nearby sites, offering high quality image and highly precise performance, backed by modern patrol functions and cruise for surveillance in the night. Besides, nine AirLive OD-2050HD cameras were deployed in all areas inside the complex. These cameras provide continuous monitoring in all units of the training centre, especially the command office, classroom training and flight simulator hall, where the latest technology instruments were equipped. Two servers will be used to protect the images and all the information generated in the training center. After the tests, the video surveillance system based on AirLive is working properly and meets the initial expectations expressed by those responsible for the military base. With this project, AirLive is positioned stepped forward to offer a high performance solution for the defence sector in Venezuela.

SA December 2015

24


SECURITY NEWS

Jasco win Accolade Iasco Enterprise arrive in Dubai to win “2015 Partner of the Year South Africa”.

J

asco Enterprise, an Avaya Platinum Partner, has been awarded the prestigious accolade of 2015 Partner of the Year South Africa. The achievement was presented at the annual Partner Connect Conference awards ceremony, held this year at the Atlantis Hotel in Dubai on 25 November 2015. The Avaya Partner Connect conference is an annual event aimed at providing Avaya partners and resellers with an opportunity to network and gain insight into Avaya products, services and solutions. As part of the event, awards are given to partners who have attained excellence or have made notable achievements during the past year. Jasco, a partner and reseller of Avaya solutions for more than 20 years, has been recognised with numerous different awards over the years, most notably for its contact centre solutions, however, this is their first achievement as the overall Partner of the Year. Jasco won the award based on its impressive sales growth over the past year across their Avaya portfolio of contact centre and telephony solutions as well as networking products. While the networking portfolio is a relatively new offering in the Jasco stable, the

25

SA December 2015

organisation has long been a valued partner in the contact centre space, previously winning the Contact Centre Partner of the Year Award as well as an award for Outstanding Individual Contribution. Since 2014, Jasco has seen an increase in overall Avaya product sales of 90%, an achievement which saw them recognised as the fastest growing Avaya partner in South Africa over the year, ultimately resulting in the Partner of the Year award. “As a long-time Avaya Platinum Partner, we have been recognised frequently over the years, but winning the overall Partner of the Year is a significant achievement for us. This prestigious award is an affirmation of our dedication and commitment to Avaya as a strong brand in the South African market, as well as the African market as a whole,” says Andre Deetlefs, Product Executive: Jasco Enterprise at The Jasco Group. “We are delighted to have been recognised with this accolade and we look forward to continuing to work with Avaya to provide solutions and services in the market to meet the changing needs of our customers,” he concludes.


SECURITY NEWS

The Jasco Group has a national footprint with offices in Gauteng, Western Cape, Free State, Eastern Cape and Kwa-Zulu Natal. Other than South Africa, the organisation trade in many sub-Saharan African countries, with a special focus on the Southern African region.

customisation of solutions; managed services, support and maintenance.

Jasco delivers end-to-end best-of-breed solutions across the entire ICT value chain. Our services include solution design, business consulting, project management and logistics to manage the supply, installation and commissioning of solutions; and professional services to provide integration and

The Jasco Group has a national footprint with offices in Gauteng, Western Cape, Free State, Eastern Cape and Kwa-Zulu Natal. Other than South Africa, the organisation trade in many sub-Saharan African countries, with a special focus on the Southern African Development Community (SADC) region.

Jasco’s operating divisions, namely Intelligent Technologies, Enterprise, Carriers and Electrical Manufacturers deliver a range of solutions and services. Intelligent Technologies delivers broadcast, power, data centres and Property Technology Management (PTM) solutions as well as Energy Optimisation and Co-location services, a carrier-neutral co-location telecommunications hub where the network infrastructure serves multiple service providers. The Carrier business provides solutions and components for access and transmission networks as well as hisites. The Enterprise business delivers contact centre solutions, Unified Communications, Cloud Solutions and security and fire solutions. Electrical Manufacturers delivers contract manufacturing of white goods.Â

SA December 2015

26


The Standard in Fire Systems Advanced is a British success story. We design and manufacture worldbeating fire alarm systems in the UK, exporting them to over 60 countries. Where quality and performance are priorities, you’ll find Advanced, including in The Shard.

Our innovations continually challenge the industry. AlarmCalm, our complete false alarm management solution tackles one of the biggest issues in Fire today and gives Advanced customers more options, more confidence and more peace of mind.

Tel: Tel:+44 +44(0)1670 (0)1670707 707111 111 Fax: Fax: +44 +44 (0)1670 (0)1670 707 707 222 222 Email: www.advancedco.com Email:sales@advancedco.com sales@advancedco.com Web: Web: www.advancedco.com


FEATURE

The Nigerian Mineral Trail Experts say that with trillions of naira lying fallow from untapped mineral resources in Nigeria the nation has no business with poverty and deprivation. Agbo-Paul Augustine, Kola Eke-Ogiugo and Donatus Nadi, provide an extensive report on the travails of Nigeria’s minerals sector.

W

hen Senator Duro Faseyi, representing Ekiti North Senatorial District stood in the hallowed chamber of the Nigerian Senate recently, to sound the alarm over the mind-boggling amount of money the nation is robbed off annually from mining, he never minced words in rousing his colleagues to the reality before them. The loss of N4 trillion yearly was enough to choke, the seated Senators needed to come alive to spurring national reawakening to the massive loss of the badly desired revenue from the solid minerals sector. In the motion, sponsored by Senator Faseyi, he said it was “worrisome and unlawful plundering” of the nation’s solid minerals sector by local and foreign illegal miners. He claimed that unapproved mining has cost Nigeria over N8 trillion in every two years. He centred his argument on the inability to muster a strong legislation for the solid minerals sector and poor implementation of the existing weak laws. As to where the Ekiti state senator got his fact remained unclear to Leadership Weekend but Senator Faseyi maintained that Nigeria’s underground wealth is being stolen barefacedly. If oil had maintained a flying price in the international market, Nigerians like the Ekiti Senator will have no memory of the existence of the mining sector. SA December 2015

>

28


FEATURE

Nigeria over the last 12 months has witnessed a sharp decline of oil prices which has impacted much on the economy. With 45 dollars a barrel, Nigerians do not need a prophet to know the hard truth. The situation has created a never foreseen circumstance where the government is failing to meet the expectations of the Nigerian people. By Leadership Weekend’s findings, over half of Nigeria’s 36 states had received bailout funds from the federal government to rescue their states from grinding to a halt as workers were owed several months’ salaries. The situation has negated the cardinal purpose of government and governance to paying salaries and allowances of civil servants and political office holders against the provision of amenities and basic infrastructure. The Nigeria Extractive Industries Transparency Initiative (NEITI) independent audit report on governance and revenue management of the Nigeria solid minerals sector for 2012 revealed that Nigeria earned a total of 31.449 billion Naira in 2012 as against 26.925Billion Naira in 2011, showing an increase of 17%. The report further stated that the contributions to the main macroeconomic areas of the Nigerian economy are a meagre 0.02% of total exports earnings and 0.14% 29

SA December 2015

of new employments in the country by the end of 2012. It revealed that out of the 17,000 jobs created by the Solid minerals sector in 2012, 96% were Nigerian hires. The abysmal performance of the solid mineral sector shows the level of affronts to the Nigerian minerals sector of which N4trillion is annually lost to the activities of artisanal miners. With attention redirected to the non-oil sector like solid minerals to the rescue of the nation, LEADERSHIP Weekend spoke with experts in the sector of how Nigeria can make the much-needed revenue from minerals. The President, Nigerian Mining and Geoscience Society (NMGS) Prof. Gbenga Okunlola told LEADERSHIP Weekend that the hard fact remained that Nigeria is losing a lot of money to uncontrolled mining. He maintained that there is no country in the world that wastes it resources like “the way we are doing in Nigeria”. The geologist expressed doubt on the credibility of the source of Senator Faseyi on the amount lost yearly but posited that for Nigeria to make the trillion she hoped for, the nation must start from ground zero because the mining sector of the country is at crude level. “Government must start from ground zero because the

>


FEATURE

mining sector is at a crude level. We need to plan and standardised. “The public institutions that serve as a primary database should be strengthened because the data emanating from these institutions is low for any meaningful development. “Government has no business in mining, but it has to create the necessary knowledge base for investors to work with,” Okunlola said.

It is wrong to call the current miners illegal, rather, government should go there and organise them. If you call them illegal miners you will be creating problem To show successive governments’ indifference towards the minerals sector according to Prof. Okunlola, the Mines Inspectorate unit of the federal ministry of solid minerals was left with only 6 vehicles to monitor about 2,000 mining sites across the federation. He lamented

that mining sector in the 1950s and 60s were controlled by government inspectorate unit and the nation got substantial revenue. “But we neglected it when we found new wealth in oil and the world has past us”. He also frowned at the fact that Nigeria missed the recent mining boom in the world that ended about three years ago when gold was sold at about 2,000 U.S. Dollars an ounce. Besides gold, he said tantalite, tin and columbite sold five times of today’s price. He reiterated the need for the nation to prepare as solid minerals sales is always cyclical. The geologist disagrees with the Nigerian Senate on the issue of weak laws encouraging poor returns from the mining sector. He insisted that the current mining laws in the country are “world class” and there is nothing to add. “If you make a good law and you have a weak institution it won’t fly,” Okunlola argued. He urged the federal government to make funds available to the relevant institutions in the solid minerals sector and give them a target to achieve. Prof. Okunlola is, however, optimistic that the federal ministry of solid minerals in no distance time will

SA December 2015

30


FEATURE

compete with the petroleum ministry in revenue generation because he believed the resource base is wider.

Stephen Ifeacho, who is based in Abuja, noted how Nigeria is not attractive to foreign investors due to the problems associated with the Land Tenure system.

Also speaking on the way forward, a sedimentologist and senior lecturer at the Nnamdi Azikiwe University, Awka, Anambra State, Prof. Anthony Okoro said Nigeria cannot expect to have gold and other minerals without investment in the sector.

He said while artisanal miners continue to mine and sell precious minerals at cheap prices because of the lack of regulation, the biggest challenge the mining sector is facing currently is the rift that often arise between investing companies and their host communities.

He reminded that so much was invested in the oil sector before export began in the country.

“Part of the requirement for mining right is a proof of letter of consent from host communities. But even with Corporate Social Responsibilities (CSRs) in place, 40 percent of the people still go against the companies and this has frustrated many investors,” Ifeacho revealed.

“We don’t have an investment in the minerals sector yet we want to harness from it,” he said. Prof. Okoro is optimistic that Nigeria can make N4 trillion annually but cautioned against calling the locals in the various mining site as ‘illegal miners’. “It is wrong to call the current miners illegal, rather, government should go there and organise them. If you call them illegal miners you will be creating problem.” He further called on the federal government to consider investing in the industry and encourage investors and local miners to mechanise processes away from the present crude method of exploration. A geologist and business development expert, Igweze

31

SA December 2015

There was an agreement between the ruler in the area and the prospector that a car would be bought for the former in the event of any major discovery He cited a case of an investor in Ebonyi State who in spite several CSRs to the host community got frustrated


FEATURE

out by some groups because he is perceived as an outsider. While agreeing with the Senate’s recent motion on the need to check the huge losses of revenue as a result of uncontrolled activities in the mining sector, Ifeacho said the presence of the federal ministry of solid minerals is not felt in rural areas where mining activities take place. He called on the government to enact local content laws to encourage indigenous firms to invest in the minerals sector. Other experts have alerted that federal, states and local governments are losing about N50 trillion annually from untapped resources that abound in the nation’s soil with untapped gold alone accounting for about N8 trillion. In curbing the challenges of uncontrolled mining in the country comes also a new wave of crisis. Host communities where mining takes place have decried the manner in which miners conduct their business which they complained are detrimental to their living condition. Traditional Rulers Major Accomplices in Mining Revenue Theft Engaging the challenges of illegal mining is arguably one of the most challenging tasks facing the Nasarawa State government. Being blessed with one of the

largest deposits of solid minerals in the country, the government is yet to evolve a coherent action plan for the exploration of these minerals. For Bakin Ayini in Kokona local government area, it is a bitter taste of the experience in the hands of miners which are carried out in connivance with the traditional rulers in those areas where the minerals abound. Aqua Marine was said to have been discovered in the area by one Mallam Usman Gajere, a local fisherman, in 1985 and since then it has turned out to be a curse for them because it has brought nothing but pain, poverty and death. Mr. Odeh Hassan, a local resident told that one Alhaji Kalimbo from Keffi local government was said to have been given the Exclusive Prospecting License (EPL) by the then Plateau State government in 1986 and after discovering the precious metal continued to explore it without any mining lease. Dr. Kayode Fayemi Hassan, however, said there was an agreement between the traditional ruler in the area and the prospector that a car would be bought for the former in the event of any major discovery, but nothing was accruable to the community apart from water pollution and environmental degradation.

SA December 2015

32


FEATURE

In Anguwan Doka community, the story remains the same but the members of the community enjoy some fringe benefits as they are given one-third of whatever is collected at the end of each prospecting season and the proceeds shared among the members of the community. The findings showed that the community cedes their land to any interested prospector who must go into agreement with them on an acceptable sharing formula. A third party called ‘Sponsor’ who takes care of the miners’ welfare for the period the prospecting would last is the third party. Narrating how the illegal mining has thrived in Anguwan Toni, the community head, Alhaji Ahmadu Kundi, said Nasbago Nig. Ltd has been prospecting for Tourmaline since the 1980s and on various occasions, the community has made various sums of money as proceeds ranging from N900,000 to N40 million. In addition, the traditional ruler noted that the prospecting company has helped in completing the local Primary Health Care Centre and primary school. The curious twist, however, is the fact that the members of the community have no idea of the market prices of these precious metals and are therefore at the mercy of 33

SA December 2015

Nasbago to decide and still buy it from the community since they have no accessibility to the market. It begins and ends with Nasbago. In Gidan Kwano, Nasarawa local government, the story was more controversial due to the preponderance of tantalite, columbite and tin in the area which has attracted numerous prospectors with attendant consequences on land and bio-diversity. A resident, Mr. Ogapa Oto, noted that prospecting in commercial quantity started in the area in 1989 by Gyara Nig. Ltd, which went ahead to continue mining without securing the Mining Lease from the government. He said corruption at various levels has perverted the mining industry because community leaders and government officials go into agreement with the illegal miners to short change the communities and government. Recounting, he said in the event of any protest armed policemen were unleashed on the youths who are forcefully made to recant their positions and protests. Common to all these is the fact that all the mining dealings in the areas visited are illegal, but the various communities find themselves helpless because the traditional rulers in connivance with the elites are always on the same page.


FEATURE

Commenting on the ugly trend, the media aide to Nasarawa State governor, Ahmed Tukur, said harnessing of the tremendous solid minerals potential of the state is one of the critical areas of focus for the state government. He said only recently, the government had constituted a 9-man committee to look for the way forward in getting potential investors to exploit the abundant resources in the state, decrying policy summersaults as the brain behind the non-harnessing of the mineral deposits in the state. Ahmed stated further that in order to achieve this goal in the nearest future, the Nasarawa state government has declared free tax regime for intending investors in the solid minerals sector with a view to attracting more prospectors for the benefit of the economy of the state.

The Delta State Government has continued to campaign against illegal mining activities Communities in Delta State have had their share inhuman treatment from illegal miners who, apart from destroying their farmland with impunity, also experienced environment degradation.

A visit to the communities revealed the scrapping of top soil that is good for farming, destruction of farmland, cutting down of economic trees such as cocoa trees, kolanut trees, citrus trees; the encouragement of gully erosion, and construction of illegal underground mines that is causing an environmental hazard by miners. Besides these, the communities are exploited because they were ignorant of the economic value of the minerals deposit and by the time they realised its value, much damage had been done. It was gathered that following the report of the illegal exploration of mineral resources, the Delta State ministry of commerce swung into action in the communities in Ndokwa and Isoko North and South to verify the claims. According to an officer of the ministry, who chose not to have his name in print, the state government further instituted surveillance bodies in the form of vigilante to monitor the activities of the uncontrolled miners in the communities and arrest them. The Delta State Government through the Ministry of Commerce has continued to campaign against illegal mining activities because of the dangers associated with it, but with the high level of poverty in the state, the illegal miners have refused to desist.

SA December 2015

34



SECURITY NEWS

Honeywell and Aviation With over 100 years working in Aviation, Honeywell is perfectly placed to enhance international airport security.

H

oneywell is a major system integrator, deploying complex systems to large airport hubs around the globe. Its turnkey solutions are designed to deliver benefits to all airport stakeholders, including airport operations, air traffic service providers, and ground handlers. “With more than 100 years of experience in the aviation and airports sectors, Honeywell is uniquely qualified to support growth and development of the world’s airports,” explained lkin Özel, Regional General Manager, Turkey & North Africa, Honeywell. “Our leading-edge technologies make the airport experience safer and more secure, more comfortable and energy efficient, and more innovative for passengers around the world.” Its solutions are present in more than 500 airports worldwide, with the most recent developments including Pristina Airport, Boryspil Airport, Cairo Airport, Diyarbakır Airport, and Antalya Airport. The approach is simple – to deliver smart airside and terminal solutions to better address tough challenges around safety, security, efficiency and productivity to deliver an improved airport experience. In utilising a powerful and

integrated platform, operators are able to reduce costs, increase productivity, and make critical decisions.

Security solutions such as smart security cameras, advanced video analytics, radar video surveillance and access controls keep passengers more secure before they enter the terminal At this year’s ACI Airport Exchange, Honeywell will be showcasing its broad range of innovations and expertise. Among these is the Honeywell Command & Control Suite, Digital Video Manager (DVM) 600, Enterprise Buildings Integrator (EBI) R430, Attune, Life Safety Solutions, Scanning Solutions, Advanced Visual Docking Guidance System (AVDGS), Airfield Lighting, System Integration & ATC Tower Solutions, and SmartPath GBAS and EGTS (electric taxiing system). “At airports equipped with these new technologies,

SA December 2015

36


SECURITY NEWS

aircraft can approach and land at airports in a more efficient way, reducing delays and increasing capacity,” Özel said.

experience from the moment that passengers arrive on airport property to flight touchdown at the final destination.

SmartPath, for example, is a Ground-Based Augmentation System (GBAS), which is said to enable increased airport capacity, decreased air traffic noise, reduced weather delays, and also offers substantial maintenance and fuel savings.

Security solutions such as smart security cameras, advanced video analytics, radar video surveillance and access controls keep passengers and their belongings more secure before they enter the terminal. Its passenger check-in, flight ticketing, and security and baggage handling solutions are used by more than 160 airlines in over 275 countries. In the terminal, meanwhile, it provides building management systems that integrate comfort, security, safety, and energy efficiency.

“GBAS technology offers greater environmental efficiencies and reduced airport maintenance costs, potentially saving up to $400,000 per system a year. It overcomes many of the limitations of traditional Instrument Landing Systems (ILS), including susceptibility to signal interference from weather, other aircraft, and rugged terrain,” Özel added. More than 20 airports have either installed, or are commissioning, SmartPath systems worldwide. IATA predicts that airlines will carry 3.91 billion passengers per year by 2017 – an increase of one billion on 2012 figures. Özel explained that Honeywell’s technologies improve the air travel 37

SA December 2015

On the runway it offers ground-based solutions that improve the safety of take-offs and landings, and help aircraft to avoid obstacles on the ground and in the air. Finally, Honeywell is onboard almost every commercial aircraft with smart and connected aircraft systems, as well as providing aircraft engines, auxiliary power units, and it has even developed an advanced technology to make green jet fuel.




Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.