Skip to main content
Log in

Security measures and the combating of diamond theft: case study at the Cullinan Diamond Mine, South Africa

  • Original Article
  • Published:
Security Journal Aims and scope Submit manuscript

Abstract

The theft of diamonds from diamond mines has been a longstanding problem for mine owners in South Africa (7th largest world producer of diamonds by carats). To combat such thefts mining operations have, over the years, instituted various measures, inter alia integrated security measures, and implemented several technological aids to try to reduce and/or stamp out this theft from their mining operations. This research study focussed on diamond theft taking place at the Cullinan Diamond Mine in South Africa and aimed to determine whether intelligence-led and technology solutions could assist in preventing or reducing the theft of diamonds. However, this theft has a considerable impact on the profitability of diamond mining. Accordingly, the security measures at Cullinan have a specific customised focus on preventing the theft of diamonds from the mining operations. The findings, while broadly indicating that they were effective, also revealed security and systemic gaps that could be improved. These centred around more effective use of technological aids; improving the co-operative relationship between intelligence analysts and security officers on the ground with co-ordinated sharing of collected information, and finally making the informer system more proactive, protective and rewarding for participating informants. The research was conducted by means of onsite observations; perusal of diamond theft case dockets that were internally investigated by Cullinan Diamond Mine security personnel (and substantiated by the police case dockets opened); and the undertaking of 30 one-on-one interviews—the responses to the latter being both qualitatively (thematic categories) and quantitatively (similar responses quantified) analysed.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

Notes

  1. The following information was recorded from the case dockets:

    • How the information which led to the cases investigated came to the attention of the Security Department;

    • Employees identified through intelligence to be involved in illicit diamond trade;

    • Arrested employees for being involved in illicit diamond trade;

    • Employees dismissed through internal disciplinary procedures for being involved in illicit diamond trade;

    • Contract employees identified through intelligence to be involved in illicit diamond trade;

    • Arrested contract employees for being involved in illicit diamond trade;

    • Contract employees dismissed from the mine for being involved in illicit diamond trade;

    • Value of the diamond recovered during arrests made;

    • Loss of diamond value during the period 2003–2004;

    • Difficulties experienced by investigators during the investigation of these cases;

    • Employee suspected but could not be pursuit due to insufficient evidence; and

    • Contract employees suspected but could not be pursuit due to insufficient evidence.

  2. The type of data/information that is captured in the diamond value chain incident database for the purpose of analysis is as follows:

    • All production-related incidents which included blockages of systems where diamond-bearing ground runs;

    • Spillages of diamond-bearing ground;

    • Breakdowns in the diamond-bearing systems;

    • Anything which affects production negatively; and

    • All security-related incidents within the diamond value chain which include broken seals, breach of fence, suspicious behaviour of employees in the plants, breach of security policies and procedures, reported cases and theft incidents (Respondent No. 6, 2016).

  3. The captured and analysed data are disseminated as follows:

    • The plant security personnel have a book in which they record all the security incidents, for example: spillage of diamond-bearing ground, breakdown of production systems, glove changes, blockages of system carrying diamond-bearing ground and open handling of diamond-bearing ground;

    • The information received gets captured on a security electronic database;

    • The electronic system on which all information is stored for future use and reference;

    • Information captured on the database is used to build trends. Information collected through sources also gets captured on the database; and

    • Intelligence cycle is used to analyse information capture and during this process there is a constant communication between the security data analyst and the collectors of information. Intelligence is disseminated via reports to the customers (Respondent No. 6, 2016).

  4. The applicable security policies at Cullinan Diamond Mine being, namely:

    • CDM-SEC-29. 2009. Diamond security policy and procedures.

    • CDM-SEC-05. 2008. Access Control.

    • CDM-SEC-20. 2008. X-ray scan operating procedure.

    • CDM-SEC-08. 2008. Surveillance.

    • PDSA-INTEL-02. 2009. Vetting Policy.

    • PDSA-INTEL-01. 2009. Security Intelligence Policy.

  5. The Cullinan, Finsch, Koffiefontein and Kimberley Ekapa Mining Joint Venture diamond mines have a reward system through which employees are encouraged to report criminals’ acts or behaviour contrary to policies and procedures, i.e. the reward is paid to employees who come forward with information regarding any illicit act on the mine which includes diamond theft. The reward paid to the employee is dependent on the accuracy of the information, value of the information and importance of the crime.

  6. According to the Diamond Security Policy of Cullinan Diamond Mine PDSA-SPP-01, (2009) there are strict rules around handling of Kimberlite ground listed as follows in the policy:

    It is not permitted for any person to sort or to scratch in concentrate or Kimberlite unless such activities fall within the scope of the person’s work. It is not permitted for any person to recover unpolished diamonds using fishing tools or other self-enrichment devices such as sieves, containers adapted for sieving, lubricating grease, cloth, rubber impregnated with grease, etc. Sorting and/or open handling of concentrate, kimberlite or any gravel spillage is strictly prohibited, unless authorisation is given by the Security Manager/Head of Security. Sorting may only take place in the Sort house by authorised personnel. Any person seen to be sorting, scratching or tampering with concentrate, kimberlite or gravel spillage in the abovementioned areas render themselves liable to dismissal, and legal action (PDSA-SPP-01, 2009).

  7. The use of informers in preventing crime is an accepted practice internationally. In South Africa, the use of informers is regulated in terms of the Constitution of the Republic of South Africa 108 of 1994 and the National Strategic Intelligence Act 39 of 1994. At Petra Diamond Southern Africa, the security intelligence function is regulated in terms of the PDSA-INTEL-01 policy.

  8. Four additional secondary/ancillary research questions were also posed to the interviewees, namely: Secondary research question No. 2: What are the risks or threats that Cullinan Diamond Mine faces in relation to diamond theft during the mining process? Secondary research question no. 3: What intelligence processes and systems are being adopted and implemented by the intelligence collection team to prevent and combat diamond theft? Secondary research question no. 4: What [diamond theft] trends have been confirmed through internal security operations conducted? However, these are not discussed in this article.

  9. The use of drones must comply with the South African Civil Aviation Regulation Part 101.01.4 which regulates the use of drones for private use (Flying Robot, [sa]: np).

  10. Seven out of the top ten diamond producers worldwide are from Africa (see https://en.wikipedia.org/wiki/List_of_countries_by_diamond_production).

References

  • Anon. 2003. Diamond theft threatens jobs. Fin24, Aug 7. Retrieved Aug 4, 2019 from https://www.fin24.com/Companies/Diamond-theft-threatens-jobs-20030807.

  • CISCO. [Sa]. IP video surveillance. [Sl]: CISCO. Retrieved Mar 21, 2017 from http://www.cisco.com/c/en/us/solutions/enterprise/ip-video-surveillance/index.html.

  • Clark, R.M. 2010. A Target-Centric Approach. Washington, DC: CQ Press.

    Google Scholar 

  • Flying Robot. [Sa]. SA Drone Laws. Flying ROBOT. Retrieved Mar 21, 2017 from https://flyingrobot.co/pages/sa-drone-laws.

  • Flynn, H.F. 2009. The use of Informers during precious metal undercover operations. Unpublished dissertation. MTech Forensic Investigation. Pretoria: University of South Africa.

  • Mokhuane, S.J. 2016. A security risk management approach to the prevention of theft of Platinum Group Metals: Case study of Impala Platinum mines and refinery. Unpublished dissertation. MTech in Security Management. University of South Africa, Pretoria.

  • Muza. P. 2016. Security measures employed in the mining industry: A case study of selected Zimbabwean gold mines. Unpublished dissertation. MTech in Security Management. University of South Africa, Pretoria.

  • Ndlovu, P.F. 2012. Diamond Law. Change, trade and policy in context. Pretoria: Juta.

    Google Scholar 

  • Nek, M.D. 2019. Combating diamond theft through intelligence-led and technology-based solutions: Case study Cullinan Diamond Mine, South Africa. Unpublished dissertation. MTech in Security Management. University of South Africa, Pretoria.

  • The Southern African Institute of Mining Metallurgy. 2013. Colloquium. Diamonds: Source to Use. Symposium Series S74. Misty Hills Conference Centre, Muldersdrift, Cradle of Humankind, Johannesburg. 12–13 March. Retrieved July 15, 2018 from https://www.saimm.co.za/saimm-events/past-saimm-events/past-events/5th-diamond-source-to-use-2013.

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Anthony Minnaar.

Ethics declarations

Conflict of interest

On behalf of all authors, the corresponding author states that there is no conflict of interest.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

This article has been extracted from an unpublished masters’ dissertation titled: Combating diamond theft through intelligence-led and technology-based solutions: Case study Cullinan Diamond Mine, South Africa. Nek, M.D. 2019. MTech in Security Management. University of South Africa, Pretoria.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Nek, M.D., Minnaar, A. Security measures and the combating of diamond theft: case study at the Cullinan Diamond Mine, South Africa. Secur J 35, 1125–1161 (2022). https://doi.org/10.1057/s41284-021-00317-y

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1057/s41284-021-00317-y

Keywords

Navigation