Working in a gold mine is tough. There are safety considerations to keep you safe as well as security of the gold itself. There is this saying that “Security increases production”. From ore to processed mill feed to refined gold bullions for shipment. The security challengers are phenomenal at Porgera mine in the Enga Province of Papua new Guinea.
One of these challengers aside from illegal mining activities on the SML, is stopping employees and contractors from stealing the processed gold. Porgera Joint Venture has counter measures in place like electronic security systems, manpower and policies that deter theft but now and again we always come up with idiots with sticky fingers. They lose their jobs on the spot. Sometimes we can find gold bearing material concealed away somewhere inside the process plant, personal lockers, vehicles and even on their bodies.
Guys tried sticking nuggets up their arses hopping the metal detectors won’t find it. They were caught and lost their jobs. Some grow extra pair of balls between the crotch. But they got caught too. I could go on and on but that’s not what this blog post is about.
Actually it’s about calculating the value of gold that could have been stolen or smuggled out of the mine. It helps to get a grip on what workers are actually capable of smuggling for personnel gain. As a security officer this is a vital piece of information. Needless to say, I googled a whole lot of website trying to find a simple online calculator where you just punch in the weight and parts per million from the assay figures, the current gold price and the PNG exchange rate for USD and the answer smiles back at you.
But no…it wasn’t that simple. So I gathered all the conversion data, calculation formulas and hid it in an excel spread sheet. So if you don’t have one of those fancy online gold calculators, you can download it from me if you want.
This is what it looks like:
Here is an example if you want to write it on paper:
1.515kg x 32.150746568628 oz = 48.7083810514714 oz
48.7083810514714 oz x 6304.1 PPM = 307062.504986581
307062.504986581 / 1,000,000 = 0.307062504986581
0.307062504986581 x 1333.20 = 409.38 USD
409.38 / 0.3260 = 1,255.75 PGK
There you have it. Hope you don’t go spreading the good news. It’s a secret.
It should be remembered that the key goal of decision makers at times of crisis is to consider information rather than to derive it, so the control room, equipment and systems in place should be set up to facilitate this. FAST information can make the difference in critical situations. It needs to be registered and easily accessible – in other words it should be Frequent, Accurate, and Systematic and in a Timely manner. Fast information gathering is a CCTV surveillance operator’s core function. Surveillance is the operation of learning trends, behavioural traits and activities that change in a given environment. Collecting information from CCTV surveillance and other resources is essential for building a detailed knowledge of persons, vehicles and areas under surveillance.
There are two types of information that a surveillance operator requires when executing surveillance:
• Basic Information Requirements and
• Priority Information Requirements – PIRs
In Basic Information Requirements, you determine what you need to know. It also enables you to answer your Priority Information Requirements (PIRs). PIRs are mostly driven by your Surveillance Supervisory Team (SST) who determines what they want to confirm, deny, or where to fill-in the gaps. This information helps the SST in determining a course of action and be able to make the key decisions during the execution. Some information derived from the execution of information gathering will be converted to PIRs:
Prioritize and then develop your PIRs
Once you have compiled your information requirements, determined your Surveillance Supervisory Team’s requirements first and rank in order information requirements from most critical to least critical. You can’t answer all of them due to time constraints and resources. These are the tasks that you just do not have the time or resources for. They should be put at the bottom of the list of priorities.
In crafting your information requirements, you want to address the following five “W’s”:
- What is it you are looking for?
- Where is it that you want to look?
- When is it that you want to look?
- Why is this information so valuable to achieving your Primary Goal?
- Who is it that needs the information?
However, you can collect all the information you require, but if there is no plan to get it to the right people at the right time to make operational decisions – it is fairly useless.
My father in-law brought me an old StarVision 15″ TV for me to fix the other day with no picture problem. I asked him where he got it from and he told me he got it from the Maritime college. One of the captains gave it to him. He told me to fix it so that he could watch it in his room.
Anyway I did a trouble shoot which I will tell you how to do. Switch on the TV and listen for the static rush that indicates that high voltage is present. It’s the voltage charge from the flyback transformer. Another way is to put your arm near the glass screen to feel if the hair on your skin will stand. See if the power light in front of the screen is on.
This TV did not have any static from the high voltage charge but the red power light or LED was on. That’s a good sign and it can be fixed quickly. Now you have to unscrew the cover off and take a look at the circuit board if any of the capacitors are swollen or signs of burns and heat. OK this board looked good.
At this stage you need to check if the line voltage to the Horizontal Output IC is 110 volts DC. You need a multimeter to perform a voltage test. Stick the black lead to a large heatsink on the board and the red lead to one of the points of the flyback primary winding just look for two big bolts of solder where the flyback is connected onto the board. The other eight solder joints are arranged in a semi circular formation. The line voltage is actually coming out of the large filter capacity. If you don’t read 110vdc and get 80vdc and below until you see a zero, then the 3 PIN IC is bagarap. That’s the ic connected to the flyback. It charges the flyback primary winding to produce the high voltage the screen needs to glow. There are several ways to check the components but I was lucky enough to find the solution. Sometimes it will take longer. Olsem yu yet.
I was reading a fellow country man’s article titled “Why the Southern Highlands & Hela Provinces are important to me” and it inspired me to tell this story. It almost brought tears down as I reflected on a similar experience back in 2001 when I was at Gordon’s market in Port Moresby. I was with a young Erave youth; his name is Leme who left his village when he was aged 5 years with his older brother because of a tribal fight that destroyed his entire village and displaced the villagers. He went back to his village after some years but he could not settle in so he drifted to Madang with some “wantoks”. Homeless and wondering around I found him in town and took him in after hearing about his ordeals. He just became part of the family and he even changed his surname to my family name. Anyway we were in Port Moresby trying to locate his older brother who lived somewhere at 5 mile area. As soon as we got off the PMV at Gordons market and walked past some women sitting behind their esky coolers selling ice block, his face suddenly lit up and he smiled. I asked what he was smiling about and he told me, “mi harim tokples ya”. (I can hear my native language being spoken.)
We eventually found some information from the ladies and went to 5 mile where he was reunited with his brother after all these years. He decided to stay with me in Madang instead of with his older brother. He is now married to a lady from Banab, NCR Madang and lives with her in the village.
Anyway, the point of these experience after reading the article by Scott Waide, I made these comments on his blog: “from my point of view we are all Papua New Guineans despite our language barriers and cultures. I am from the coastal region and I don’t know how to speak Erave or Tari languages but that did not stop the brotherhood that developed between Leme and myself. Personally, I disagree with provincial day events and provincial flags. It only separates our unity as Papua New Guineans. I believe we should do away with promoting provinciality as it only stereotypes us into classes. Natural disasters like the Rabaul Volcanic eruptions in 1994, Aitepe Tsuanmi in 1998 and recent disasters at Manam, Kadovar and Mendi have brought back that unity of independence in 1975 despite our Provincial barriers. Learning of how Bougainville supplied aid to the victims of the 7.5 magnitude earthquake in Southern Highlands is a classic example of this story. The bottom line is that we unite in times of disaster and emergency despite our cultural differences is a phenomenon worth considering in reforming our government of the day, its country values and our constitutional rights.”
Scott mentioned in another article that “…in the last 10 years, the monopoly of information has shifted from government to citizens…” and “…in a disaster prone country like Papua New Guinea, it is crucial that we review our processes and use our resources better..” which I totally agree with. There is no civil defense set up in Papua New Guinea unlike most countries. I am not referring to the PNGDF or the National Disaster Center in Port Moresby but non-combatant civilians, volunteers trained in the capacity of providing humanitarian relief work. This can be taught in schools by reforming education curriculums and the national qualification framework to train civilians at all levels of education.
If we really value National Security, as citizens we should not take sides in the political arena while the current sovereignty of our nation and democracy is being manipulated by greed, foreign gain and power. Unity in times of disaster should be the same when it concerns the governance of national security.
As in all things tied to information distribution, a scope statement defines at the beginning, the objective, purpose, function and limitations of its existence. Likewise, information about CCTV surveillance infrastructure, personnel, equipment, operations and captured images should meet specific requirements of a scope. The acronym S.C.O.P.E spells it out clearly and simply: It must be Segregated, Confidential, Organized, Prioritized and Executed. Each of these five elements form the foundation of CCTV surveillance. The fifth element is only effective if the functions and setup of the control room is designed to support security or investigations.
In a nut shell, CCTV surveillance in security support is a planned operation of collecting information from recorded camera video feed inside a control room by consciously deploying options to mitigate various safety and security risk factors or undesirable outcomes with contingencies that deliberately and legally eliminate immediate and potential threat to business assets.
Operators of CCTV equipment are the key components in a CCTV Control room that should be set up, or redesigned, according to a CCTV operational requirements plan and the CCTV room staff, as end users, should participate in this process.
Even the selection of CCTV operators should also follow a formal process and be based on a sound analysis of the job expectations, equipment and systems. Job competencies and tasks should be derived from the function requirements of the control room.
That my friend is lesson 101 of CCTV control room ergonomics having the CCTV operator in mind.
“Remember the SCOPE”
Human Factors in any control room environment has been the focus of my research into trying to understand what makes the job of an operator relatively challenging and how to mitigate options for better job satisfaction.
CCTV surveillance is a relatively new concept of security support in Papua New Guinea. Bearing in mind that, internet and social media, email and blogs have transformed business through computers and mobile phones making online marketing and advertising to be competitive inside the international information arena in recent years of cyber activities which inevitably brought about the introduction of the Cyber Law by the government in 2016.
So as far as CCTV monitoring is concerned, we only have a handful of trained operators in the country who really understand and appreciate the function of CCTV surveillance from a control room and dedicated CCTV workstations.
In 2005 a fully functional CCTV control room with an arsenal of 126 analog cameras, digital video recording, two workstations and the pioneering CCTV operators without any formal CCTV operator training embarked on the job of CCTV monitoring of high security assets in the mining operations situated in Enga Province. That job since has expanded to a little over 400 analog and digital cameras, recruiting and training of more operators and a state of the art CCTV control room in the country along with its own technical support team.
The expansion came with increased workload and stress on the operators whom I have had the privilege and opportunity of supervising and managing the day to day operations on a 21 days FIFO roster. Remuneration is an issue but the last eight months have been the reason for understanding and implementation of standards, training and health requirements in improved work performance of the operators and increased job satisfaction.
Stay with me because I am going to post more articles about the ergonomics of a CCTV control room and functions with some CCTV surveillance training that I developed throughout the pursuit of improving job satisfaction as opposed to financial appraisal.
“Remember the SCOPE.”
The future in identity theft is here on Facebook. This has already happened to some of my Facebook friends and it comes in the form of Facial Recognition software apps. Every time you try out one of their apps you resign your privacy rights of your contacts, GPS location and pictures. It then collects your selfies for its database to create virtual facial images of a person complete with aged variations, opposite sex and various other combinations. The downside to this technology is your online privacy, online behavior and security is at risk and inevitably the theft of your identity for scams and malicious attacks.