• Skip to primary sidebar
  • Skip to content
  • Skip to footer
  • Home
  • Subscription
  • The Magazine
  • Podcast
  • Contribute
  • Advertise
  • Contact Us

Circuit Magazine

For Security & Protection Specialists

In the first instalment of this article (Issue 54), I discussed the comms landscape in general and highlighted the importance of treating comms (sig’s) as a defined team role. I also outlined the importance of having a comms plan and looked at:

  • Why we communicate, 
  • What  we communicate, and 
  • How we communicate, which was split into two parts.  
  • Part 1 focused on the language we use 
  • Part 2 is the physical medium, hardware and technology that we use, which is what I will dive into here in this article,

It is inevitable if you work within the security sector that at some point, you will have has a radio thrust in your direction for you to use as your primary form of communication. Yes, that’s right: your primary form of communication! 

As the primary form communication, it means that this is the device that you will use to report into the Control Room, what you will use to see if your relief is on the way so you can go on your well-earned break, and your lifeline to call for help if you find yourself in a situation where you are being threatened or are in some other form of physical danger.

A useful and handy tool, right? So how much training were you given the first time it was handed to you? What explanation were you given about how well it works and how reliable it is? How much were you told about its limitations? What procedures were outlined about what to do if you press the button and you don’t get a response? What ‘lost comms’ systems were you briefed on? What alternative (back-up) methods were you told were in place if your primary comms failed?

I’d bet the keys to my car that 90% of people will not have been briefed on any of the above, and yet this one tool that may just save your life, and yet you have absolutely no idea how it works, or what to expect from it.

When was the last time you were handed a first aid kit and expected to know how to use it without the appropriate training? When was the last time you were expected to stand on the front-line without having been taught how to safely and legally restrain someone, should the need arise? When was the last time you were sent to do a security advance survey without being trained on what to look for and how to carry it out properly?

No wonder one of the things people always bemoan is comms! And the main reason for this is because they don’t know how it works. It isn’t their fault; it’s just that they’ve never had any meaningful training, and their expectations have never been managed.

So let’s start with some basics. Radio is a line of sight technology. In simple terms, if you can see it, you can talk to it! It’s a bit more complicated than that because radio waves at different frequencies behave in different ways and tend to bounce about all over the place. Therefore, the adage of ‘line of sight’ thing is more a rule of thumb than a hard and fast principle. 

While this falls outside the purview of this article since this isn’t a technical course, we won’t focus any more on that aspect. But it does raise an important point of awareness: conventional radio technology, whether analogue or digital, has limitations and these limitations are governed, to a large extent, by the laws of physics.

Most radio networks are designed to cover a specific area, and with few exceptions, that coverage is limited to a fairly small footprint. Often this is sufficient. Why cover an area bigger than the one in which you are operating? But even within this bubble, there may well be areas where coverage is patchy. Therefore, it is important that these are identified and radio users made aware that they can expect to lose comms (a.k.a. “notspots”) when entering that specific zone.

However, the key is that: movement clears notspots! On a recent site coverage survey, we stopped in a corridor to do a comms check and … nothing. We tried several times but to no avail. I took one pace, yes just one pace, in a different direction and comms was restored. So remember this, often adjusting your position by just a small amount can make a difference.

But what if your operational area is larger? What if you want comms across a whole town or city? To implement a radio network of that size has challenges, both technical and commercial. Finding enough locations to site repeaters (a repeater is a ‘booster’ for a radio network, generally located at the top of a tall building) is a challenge and paying for them is an even bigger one! Radio networks need licences to operate. Increasingly, licences are hard to come by, especially in densely populated locations such as town and city centres. Where they are available, they are expensive, reinforcing the fact that to provide wide-area coverage in these circumstances is often simply not financially viable.

Fortunately, however, technology does advance, and for every problem, there is a solution! As I mentioned in the previous article, we now take it for granted that our smartphones will work pretty much wherever we go. Seldom do we stray into areas where coverage is insufficient to allow us to stay in contact with the outside world. With the advent of 5G, we are going to enjoy even better coverage, with faster speed than we’ve ever had before. We can take advantage of all of this to give us the radio coverage we’ve always wanted. By using the mobile data network, it is now possible to have a ‘radio’ network that covers not only a city but the whole country, indeed the whole world. It sounds too good to be true, but it is a reality. 

Think of the mobile phone networks as one huge, interconnected repeater that we can access at will. We don’t own it. We don’t need to pay for licences. We have none of the headaches of maintaining it. That’s all done for us by the mobile network operators. But we can access it whenever and wherever we are. This is the reality today.

You will hear this reality referred to by a variety of different names: Network Radio, Push to Talk over Cellular (PoC), Push to Talk over Broadband (PTToB), LTE Radio, or simply Push to Talk (PTT) as some of the more common ones currently in use.

Indeed, this is what is replacing the TETRA based Airwave system currently used by the Bluelight and security services. The new Emergency Services Network (ESN) is based on a commercial PTT platform and accessed through the EE mobile network.

In addition to virtually limitless coverage, PTT also delivers a range of advanced features that were simply not possible. Or if they were possible, they were not practical to deploy, using conventional two-way radio technology.

Here are some examples:

  • Lone worker protection
  • Mandown
  • Remote monitoring of audio and video
  • Geo location through GPS
  • Indoor localisation using BLE beacons
  • Geo fencing generating alerts when entering or leaving a pre-defined area
  • Dynamic group allocation
  • Call recording for post-incident playback
  • Push to Video for real-time situational awareness

A further advantage is that all of these capabilities can be deployed almost immediately. Devices can be configured and re-configured remotely, meaning that if anything needs to be changed or a feature added, it can be done in real-time. There will be no need to wait for someone to come to site with a laptop and a programming lead, as is the case with conventional radio. It is also relatively simple to interface this technology with existing radio networks, so you don’t need to throw away what you have now. You can simply enhance it with an LTE capability, where necessary.

The question always comes up about the reliability of the mobile phone network. There have been some high profile ‘outages’ in the recent past that have caused chaos for millions. But whilst single networks are prone to problems from time to time, when was the last time that all four of the leading UK mobile networks failed simultaneously? I’m open to being corrected here, but I think the answer is ‘never.’  

I highlight this because to use the mobile data network, the devices that are deployed will obviously need to have a SIM card fitted. If that SIM card is tied to a single network, then yes, you are vulnerable. But here technology has advanced once again. There are now multi-network SIM cards, giving coverage across Vodafone, O2, EE and Three that are readily available. This means if one network goes down, you will automatically re-connect to one of the others.

However, this isn’t a panacea, although it comes close! At G6 we do a lot of work with National Trust properties across the UK, which by their very nature, tend to be in highly rural locations where mobile phone coverage cannot be guaranteed (at least not yet). In these more rural locations, we’re still deploying conventional radio solutions. But as mentioned above, technology exists for us to bridge both PTT and conventional radio, so it is foreseeable that the ‘meet & greet’ volunteers in the Visitor Centre will be using WiFi enable PTT devices. Using these, they can talk to the field workers on the margins of the estate, who themselves are using VHF handheld radios.

This is all possible right here and right now. If you haven’t yet explored the possibilities, I’d highly recommend that you do. Otherwise, you risk missing out on a world of improved operational capability and enhanced operator safety.

In the next article, I will be discussing more about communications planning, including what to consider when looking at contingencies and the role of the Operations or Control Room, in whatever form that may take in your comms plan.

consider when looking at contingencies, and we’ll also consider the role of the Operations or Control Room, in whatever form that may take, in your comms plan!

 


Communication Planning Part 2
By: Andy Clark

G6 Global has been delivering critical communications since 1999.  Communications connects everything that we do, and we will find the most robust and appropriate solution to your communications needs. We recently partnered with Syops Solutions who specialise in delivering communications training that will raise your teams communications skills to the next level.

For more information, email G6 Managing Director Andy Clark at:
andrew@g6-global.com – www.g6-global.com

Tweet
Share
Pin
Share
0 Shares

Buy The Latest Issue

Sign Up For News and Updates

We respect your privacy and will not share your information with anyone.
We will only message you when we have something relevant and of value to share with you.

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Latest Issue

Circuit Magazine - Issue 66 - AI Armageddon

Issue 66

Buy Now

Latest Newsletter

Newsletter Sign Up

What you don't know CAN hurt you!

SUBSCRIBE

Latest Industry News

Ugandan Minister Killed by Bodyguard in Apparent Wage Dispute

A Ugandan government minister, Charles Engola, was shot and killed by his bodyguard early Tuesday in an apparent private dispute over wages, according to the army and local media. Engola, a retired army colonel, served as the junior minister in charge of labor in President Yoweri Museveni’s government.

Event

News - Circuit Magazine

Zelenskiy Denies Ukraine’s Involvement in Alleged Kremlin Drone Attack

Ukrainian President Volodymyr Zelenskiy has refuted Russia’s claims that Ukraine was involved in a drone attack on the Kremlin, which was allegedly aimed at killing Russian President Vladimir Putin. Zelenskiy stated that Ukraine fights and defends its territory, not attacking Putin or Moscow. The Kremlin reported that two drones were used in the attack but were disabled by Russian defenses.

News taken from Issue 65 of the Circuit Magazine

Bodyguard Saves Japanese PM from Pipe Bomb Attack

A bodyguard has been hailed as a hero for his quick-thinking actions during a suspected pipe-bomb attack on Japanese Prime Minister Fumio Kishida. Video footage captured the bodyguard kicking away a metal object as it landed near Kishida
before positioning himself between the Prime Minister and the device, shielding him with a collapsible, handheld ballistics shield.

News from Issue 65 of the Circuit Magazine

AlertEnterprise Reveals First-Ever Guardian AI Chatbot Powered by OpenAI ChatGPT

AlertEnterprise has unveiled its first-ever Guardian AI Chatbot powered by OpenAI ChatGPT. The chatbot will make its global debut at the ASIS Europe and ISC West trade events. Built on OpenAI’s GPT-3 platform, the Guardian AI Chatbot aims to provide security operators with instant access to critical physical access and security insights through quick questions and prompts.

Keeping Your Edge By Elijah Shaw

Keeping Your Edge: Listen in Totality

Someone said this quote to me a long time ago and it really resonated. It was one of those things where the more I thought about what it actually meant, the more insight I gained from just those few short words. The quote itself originated from the American poet, Maya Angeolu. And while it’s very unlikely social media was on her mind, or even a thing, when she drafted it, I think it’s very fitting on how it plays into society today.

Is Your Brain Working Against You? How to Train Your Brain to Handle Challenges & Pressures of Executive Protection Work

Is Your Brain Working Against You?

Our brain is constantly processing information. From making our coffee in the morning to dreaming while we sleep, our neurons are always working to figure out what to do with the information they’re receiving. Every scenario is carefully calculated within our brains which then tells us how to respond to certain stimuli. In the field of Close Protection, it’s crucial that we train our brains to respond to stimuli in a quick and calculated way so that we are able to execute our responsibilities and keep people safe.

Comms Planning - Part I

Does Everyone on Your Team Speak the Same Language?

It’s an anomaly then that so little importance seems to be attached to ‘comms’ both during planning and training. Having a competent ‘signaller’ on the team, who is well-trained and well-versed in multiple forms of communication has to be an advantage, right? Think back to the military example I gave earlier, the signaller clearly forms a vital part in any unit, whether on the frontline or back in the Ops Room. But most security-related courses only pay lip-service to the importance of communications, if it is ever mentioned at all.

Global Risk Updates

Global Situation Report - November 2021

Global Situation Report – November 2021

Each issue our global geopolitical partner, Stratfor, provides an in-depth analysis of global incidents via in-house experts, cutting edge technology and through a comprehensive globally sourced network. Here is your summary from the last 30 days.

Popular Tags

armed attack Bodyguard business Celebrity client clients Close Protection Communication cp Elijah Shaw EP Executive Executive Protection firearm firearms government gun Intelligence Law Enforcement Media Medical military News online Orlando Wilson police Prevention professional protect protection Risk Safety Security SIA Social Media Surveillance Technology terror Terrorism terrorist Threat Training VIP weapon

On The Frontline

Keeping Your Edge: Support Those You Meet Along The Way

Over the decades I have seen many artists, label executives, managers and agents rise from relative obscurity, to monumental heights. For example, it was an amazing thing to have your Protectee ask you to pick up a 9 year old who’d won some local acclaim because of his singing ability, and take him to a meeting, then subsequently watch his meteoritic rise to arguably the top 1% in pop music, past & present.

A Framework for Social Change

The One Percent

Cybersecurity provider NTT Security reports that five countries are the most common sources to 50 percent of global cyberattacks (Figure 2). Akamai states that two-thirds of Distributed Denial of Service (DDoS) cyberattacks originate in ten countries.  Symantec, another provider, adds 13 more countries for a total of 23 countries, which are homes to the worst cyber offenders and who are responsible for two-thirds of all malicious internet activity.

Communications Column By Andy Clark

A Deeper Understanding

a PoC service is like any other client server system that you use. Take Skype as an example that many people will be familiar with. This is what is commonly referred to as a ‘client-server’ application. The Skype app sits on you phone, tablet, laptop or desktop and is in constant communication with the Skype servers out there in the cloud.

Follow us

  • Email
  • Facebook
  • Twitter

From The Archives

Bullet Proof Vests How Protected Are You?

Bullet proof vests are incredibly useful pieces of equipment for Security Personnel. Not only are …

Continue Reading about Bullet Proof Vests How Protected Are You?

Counter-Ambush Tactics for Security Professionals – Part 1

As security personnel working in a protective operations role, we are tasked to do everything we can …

Continue Reading about Counter-Ambush Tactics for Security Professionals – Part 1

cyber security fundamentals

Cyber Security

Cyber Security I write and speak about this particular issue quite regularly, and it’s one that I …

Continue Reading about Cyber Security

The Death of Journalist Marie Colvin

Why media management has to be held accountable (young journalists and freelancers also take …

Continue Reading about The Death of Journalist Marie Colvin

Promoted Event

International Security Expo

Latest Podcast Episode

Latest Issue

Circuit Magazine - Issue 66 - AI Armageddon

Issue 66

As AI armageddon comes closer, the global challenge is discerning the line between innovation and oversight, particularly concerning decision-making biases and security implications.

Buy Now

Follow us

  • Email
  • Facebook
  • Instagram
  • LinkedIn
  • Twitter
  • Home
  • Subscription
  • The Magazine
  • Podcast
  • Contribute
  • Advertise
  • Contact Us

© 2023 Circuit Magazine · Rainmaker Platform

This website or its third-party tools use cookies which are necessary to its functioning and required to improve your experience. By clicking the consent button, you agree to allow the site to use, collect and/or store cookies.
I accept