Download PDF version Contact company
Warrior’s operations are further tailored to protect local residents and the environment
Warrior’s services combine perimeter control, video surveillance and intelligence gathering analysis

As mining activities in East African nations intensifies occasioned by finds in oil gas niobium, rare earth and gold, mining companies are now grappling with a new headache of protecting the precious commodities while taking care of staff as organised crimes find cash cows in these mines.

But security companies like Warrior Security Limited aware of the ticking time bomb have risen to the occasion introducing world class tailor made security services that offer round the clock surveillance and protection of both workers and neighbouring community.

The mutating crime is being fanned by a rising number of organised armed groups which is now seeing sophisticated criminals access valuable minerals, sell them to the black market, and evade capture.

In South Africa, a study found a total of 6,045 asset thefts between January 2006 and December 2010 at one unnamed mine, with the items stolen including tools, equipment, personal belongings and vehicles, as well as copper cable, indicating that all items at a mining site are at risk.

Beyond asset security, safety of the workers and communities living around mining areas remains a concern especially in the oil industry where the products are mostly combustibles and explosives. Accidents such as fires and explosion in these areas have been known to have serious effects on the workers and the surrounding community. In Niger Delta for example, over 700 people were injured when a pipeline leak led to an oil flood near the village of Jesse which ultimately resulted in an explosion.

Aware that every mining venture calls for varied security interventions, Warrior has designed and implemented a security system tailored to each mining project, leaving the client free to concentrate on core activities. The services combine perimeter control, video surveillance, communication, location and tracking solutions, intelligence gathering analysis and dissemination, as well as body guards. Warrior develops a secure system tailored to the needs of that particular site. Over the years safety and environmental responsibility on site has also been ignored by most companies and Warrior is working towards establishing strong community connection.

Before commencing operations, Warrior seeks traditional knowledge of local elders to assist in planning. The operations are further tailored to protect local residents and the environment. Warrior's ensures that it consults communities in order to understand their priorities, expectations and preferences for dialogue. Warrior also engages with the community to curb issues that arise with development of extractive industries such as forced resettlements.

With its rich background in post conflict areas and oil and mineral rich regions of South Sudan, Congo, Zambia, Tanzania having protected UN organisations, embassies, NGOs, corporate businesses and individuals, Warrior has positioned itself as a specialist security company in emerging sectors like mining. Warrior has religiously protected Tanga Cement Company, part of Simba Cement, in Tanzania for the last three years where they have approximately 100 guards, including dog handlers, armed guards, a mobile response team, and a fire crew.

Warrior's greatest asset lies in its extensive training programme, which gives it the ability to analyse, assess and report on situations in more detail and in a timelier manner than many larger, strategic oriented organisations.

Warrior Security brings to the industry a guarantee of quality with an ISO 9001:2008 feather to its cap, having already been independently certified in South Sudan, and expecting a certification from Tanzania and DRC later this year.

Download PDF version Download PDF version

In case you missed it

Comprehensive K12 security
Comprehensive K12 security

For K12 education pioneers, embarking on a journey to upgrade security controls can present a myriad of questions about finding the best-fit solutions and overcoming funding hurdle...

Choosing the right fingerprint capture technology
Choosing the right fingerprint capture technology

Choosing the appropriate fingerprint technology for a given application is dependent on factors including the required level of security and matching accuracy, the desired capabili...

How do new security technologies transform retail and loss prevention?
How do new security technologies transform retail and loss prevention?

When it comes to preventing theft and ensuring overall safety, technology offers a robust toolkit for retail stores to enhance security in several ways. From intelligent surveillan...