Hemmersbach Rhino Force prevents African rhinos poaching with Coolfire
Real-time team collaboration when the mission means life or death.
In this Story
Founded in 2016, Hemmersbach Rhino Force is a direct action conservation organization protecting one of the most endangered species on earth–the African Black Rhino. Their teams use innovative tactics and technologies to preserve rhino genes, prevent killing of rhinos, and expose and confront all other illegal activities in the bush of Southern Africa.
The Rhino Force team was dependent on a combination of radio and cellular tech to communicate. Disjointed communication channels limited the team’s advanced eyes and situational awareness capabilities.
Give Command Centers and deployed Ranger Teams share a real-time Common Operating Picture
Seamless integration to existing Ranger Team SOPs through Sessions
Efficient deployment and coordination of Ranger Teams according to real-time threats
Use of GPS tracking for deliveries from start to finish
Extendable system to support future global wildlife protection groups and eco-tourism
Try Coolfire for Free
In recent years, poaching syndicates and gangs have become increasingly sophisticated and adopted new methods to avoid detection, like using helicopters and night vision equipment to track rhinos. This has led to record levels of poaching activity. To deter criminal activity, Rhino Force must have real-time oversight of potential security breaches to coordinate quick response with teams of rangers on the ground
Upgrading situational awareness with mission-critical information to prevent poaching
Rangers in the field can evaluate environmental conditions as they approach a response area. Command centers can track ranger locations, communicate in real time, and provide updated mission status directly into their phones. And command centers and deployed teams share a single source of truth for mission-critical information.
How Coolfire enables real-time response
Discover more about how the Rhino Force uses Coolfire Core to identify security breaches, track targets, and coordinate response.