Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Security Enterprise ServicesFire & Life SafetyPhysical Security

Stemming Outbreaks of Violence in South Africa

By Frank Baldwin
world map
October 25, 2019

Despite being one continent, the countries within Africa are far from unified. Since apartheid, South Africa has been isolated from its neighbors and other countries across the continent, who made sacrifices to support the liberation movement.

Recently, this separation from the continent and its people has escalated to violence against foreign nationals from elsewhere in Africa.

Growing violence

September 2019 saw a rise in attacks on foreigners across South Africa. The unrest followed a strike by the country’s lorry drivers, who were protesting against the employment of foreign drivers.

Several people were killed and hundreds arrested as mobs attacked foreign-owned businesses and people in the streets of major cities including Johannesburg. Much of the violence and crime targeted foreign African migrants from countries such as Nigeria, Ethiopia, Zambia and Kenya.

However, such attacks are nothing new. For more than two decades, this type of crime has bedevilled the country, and there is growing frustration that so little has been done to stop it.

The South African government does not collect data on attacks against foreign nationals. But since 1994, the African Centre for Migration & Society has monitored these types of attacks across the nation. Violent attacks peaked in 2008 and again in 2015. In September 2019, the number of attacks was already approaching the levels seen in 2015.

Prevailing safety concerns

Neighboring countries were quick to condemn the outbreak of xenophobic violence. Botswana, Lesotho and Zimbabwe all issuing travel advisories for South Africa urging their citizens to exercise extreme caution when travelling in the country.

Elsewhere across the continent, Nigeria also offered to repatriate its citizens, with Air Peace airline helping to evacuate just over 600 Nigerians.

As a result of prevailing security concerns, Madagascar’s football federation announced it would not be sending a team to play in South Africa. Zambia also pulled out of an international friendly due to be played against the nation at the National Heroes Stadium.

The Zambian government expressed concern over the situation in South Africa and requested all of its citizens using the route to and from the country to suspend their trips indefinitely.

Concrete security solutions

Clearly, concrete processes and improved security measures are needed to control and prevent persistent unrest across South Africa.

The leaders of Nigeria and South Africa have now pledged to stem future outbreaks of xenophobic violence by working together to set up appropriate mechanisms between the two countries. These mechanisms mean cooperating at various levels, including policing and the sharing of intelligence information.

In 2015, the South African army was drafted to deal with attacks and unrest. However, this is a costly and resource encumbering solution and should only be seen as a last resort. In comparison, advanced security technology can be used alongside conventional policing methods to bolster preventative action.

Solutions like perimeter security , vehicle scanners and mobile security space solutions can be set up at various crucial checkpoints and assist with the detection of threats such as explosives and weapons which could be used in an attack. Thus, enabling South Africa to get a firmer grip on security across the country and helping to block future outbreaks of violence.

KEYWORDS: public safety violence

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Frankbaldwin

An experienced entrepreneur, Frank Baldwin has a passion for building businesses and challenging the status quo. With a 30-year track record and the Queen’s Award for Enterprise, he has gained extensive knowledge of the x-ray security market and has worked with some of the most innovative and progressive companies in the sector. Today, he continues to be an active figure within the sector, advising organizations on the purchase and deployment of security equipment. 

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Cybersecurity
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Cyber Tactics Column
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    New Security Technology
    By: Charles Denyer
Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Pills spilled

More than 20,000 sensitive medical records exposed

Coding on screen

Research reveals mass scanning and exploitation campaigns

Laptop in darkness

Verizon 2025 Data Breach Investigations Report shows rise in cyberattacks

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Computer with binary code hovering nearby

Cyberattacks Targeting US Increased by 136%

2025 Security Benchmark banner

Events

May 22, 2025

Proactive Crisis Communication

Crisis doesn't wait for the right time - it strikes when least expected. Is your team prepared to communicate clearly and effectively when it matters most?

September 29, 2025

Global Security Exchange (GSX)

 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • US Customs and Border Patrol

    How has COVID-19 hindered security efforts?

    See More
  • facialrecognition

    Adapting to Emerging Threats: What’s Next for Security Screening Technology?

    See More
  • edu5-900px.jpg

    Five Strategies of an Effective Domestic Violence Prevention Program on Campus

    See More

Events

View AllSubmit An Event
  • February 20, 2025

    Ideological Tensions in the Workplace: Understanding and Mitigating Risks of Violence

    ON DEMAND: Organizations face evolving threats, including workplace violence stemming from ideological tensions, political polarization, economic disparities, and other factors.
View AllSubmit An Event
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing