• Skip to primary sidebar
  • Skip to content
  • Skip to footer
  • Home
  • Subscription
  • The Magazine
  • Podcast
  • Contribute
  • Advertise
  • Contact Us

Circuit Magazine

For Security & Protection Specialists

Communication is vital to our everyday lives.  There are so many ways in which we do it: voice, text, email, tweets, FB Messenger, Whatsapp, Telegram, the list is virtually endless. The ability to communicate is taken for granted, so much so, that it is often overlooked in the planning phase of operations where, in reality, it should take center stage.

Take the military scenario as an example.  When an operation begins, the very first thing that will be established is a communication plan, linking the front line with those directing operations.  Without communication planning commanders can neither issue instructions to their forces nor receive intelligence feedback; without communications, they are deaf, dumb, blind and vulnerable and this is true for every other situation from the Boardroom to the Ops Room.

When planning an operation in a hostile environment communications takes priority because we expect to have to provide it for ourselves, and this mindset should be extended to any environment, friendly or hostile: sadly that doesn’t always happen and many an operation in a sleepy, leafy suburb has floundered for this very reason.

So, what should we consider, from a communications perspective, during our operational planning phase?

First, there is the nature of the operation itself.  A close protection task will necessitate different communications choices to a surveillance task.  A quick visit to the shops with your Principal will require a different approach to communication planning than it would to accompany them on a safari into the African bush.

Second is the type of information you need to convey and the frequency (not radio frequency) with which you need to convey it.  Are you giving a running commentary following a target on foot surveillance, or are you just giving regular check-ins with your ops room back at the Principal’s residence to let them know that the shopping trip is proceeding without incident?

The third consideration is the operational environment.  Are you in a place where to use communications devices, openly and overtly, might cause you problems?  Are you likely to find yourself in a situation where you may be searched, perhaps on entering a building with a security scanner, and you then have to explain the presence of your carefully concealed covert radio and accessories?

Next is a technology choice.  Do you, or indeed should you, rely on third-party networks for your communications?  Mobile phone use is taken for granted these days.  We use them for everything from making ‘old fashioned’ voice calls to poking people and writing on their walls!!

But what happens when the network isn’t there or is congested?:  think London, July 2007.  The Metropolitan Police, completely correctly, invoked ACOLC:  Access Overload Control which is the means whereby they can restrict access to all cellular networks for all but priority users; a lot of people’s communication plans fell over that day.
But that doesn’t mean you shouldn’t use existing third-party infrastructure.  Sometimes it is the right choice.  You just need to be aware of and make sure you have planned for as many eventualities as you can.

What are the options and what are their merits?

The first and simplest choice is the one we’ve just discussed: mobile phones.  Their conventional use to make voice calls or send text updates is well known and accepted.  Smartphones allow you to install apps that will turn the phone into a short range ‘walkie-talkie’ using the phones onboard Bluetooth/WiFi capability.

Less well known is the ability to have true PTT (push to talk) over the cellular network.  This has been popular in the USA and some Middle Eastern countries for years but has yet to really take hold in Europe, although it is available.  This doesn’t use the conventional ‘voice’ circuits on a mobile network but utilises the ‘data’ channel to convert your speech to IP packets and then route it to other devices within your talk-group.  It really is like having your own private nationwide radio network.

There are some limitations to this and it isn’t the ‘magic pill’ that will solve all our communications problems.  But it also has some advantages.  Think back to ACOLC which I mentioned earlier was invoked in the immediate aftermath of the 7/7 bombings.  It is a little known fact that ACOLC only affects the voice circuits on mobile networks.  Because the PTT services run over the data channels they are not affected:  food for thought.  But you can’t get away from the fact that you are still putting your reliance in a network owned and operated by someone else which, after all is said and done, is outside of your control.

The second and probably most popular choice is to have your own radio system in place.  This is private, is owned, operated and controlled by you and should not have the same level of vulnerability as a third party operated system.
However, it still presents its choices and challenges.  What type of radios to choose?  What make and model?  Analog or digital?  Clear or encrypted?  Overt or covert?  UHF or VHF?  Trunked or standard?  Licensed or license-free…..the list goes on.

Having worked through all the options above you are now faced with the question of coverage.  If you are only going to be working in a relatively confined area and all parties are going to be quite close together throughout the course of an operation, then this becomes less of an issue.  But if the operational footprint is large, if you are looking at providing coverage from the Principal’s residence on one side of town to their high rise office block 20 miles away, and at all points in between the two, then the challenges grow!

The thing to remember when it comes to communication planning is that ‘everything is possible’.  This may sound unlikely but I assure you it is true.  With the right combination of equipment, technology, and knowledge, there isn’t anywhere we can’t communicate.
But that is the key to the whole communications question: combination.  No single system should ever be used in isolation.  Sometimes different systems need to be combined to achieve an objective, but even if they don’t there should always be a fall-back and, ideally another one after that.

Whenever possible we will plan double-redundancy into any communications scenario.  If your private radio network fails your back up is your mobile phone.  But if your backup fails where do you go next?  It may be as simple as knowing the locations of the public telephones (does anyone use those anymore?) in your area or carrying a satellite phone for absolute emergencies.  The thing is, you’ve thought about it and factored it into your comms plan.

As with any other aspect of operational planning, it’s about knowing what tools you have in your box.  You don’t necessarily have to deploy them all every time, but knowing what is available to you is definitely a good place to start.

I hope this has given you some food for thought.  Next time we’ll be taking a close look at Equipment Selection.

 


Communication Planning

By: Andrew Clark

Andrew Clark is MD at G6 Global Communications. G6 Global has been providing quality specialist telecommunications services to a wide range of clients for almost 16 years. G6 specializes in operating alongside clients in hostile and high-risk environments and work extensively with Government Departments, Special Forces Teams, Private Security Companies, Close Protection and Residential security Teams, and Surveillance Operators.

For more information > G6 Communications  or +44 (0)1454610050

Tweet
Share
Pin
Share
0 Shares

Buy The Latest Issue

Sign Up For News and Updates

We respect your privacy and will not share your information with anyone.
We will only message you when we have something relevant and of value to share with you.

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Latest Issue

Circuit Magazine - Issue 66 - AI Armageddon

Issue 66

Buy Now

Latest Newsletter

Newsletter Sign Up

What you don't know CAN hurt you!

SUBSCRIBE

Latest Industry News

Ugandan Minister Killed by Bodyguard in Apparent Wage Dispute

A Ugandan government minister, Charles Engola, was shot and killed by his bodyguard early Tuesday in an apparent private dispute over wages, according to the army and local media. Engola, a retired army colonel, served as the junior minister in charge of labor in President Yoweri Museveni’s government.

Event

News - Circuit Magazine

Zelenskiy Denies Ukraine’s Involvement in Alleged Kremlin Drone Attack

Ukrainian President Volodymyr Zelenskiy has refuted Russia’s claims that Ukraine was involved in a drone attack on the Kremlin, which was allegedly aimed at killing Russian President Vladimir Putin. Zelenskiy stated that Ukraine fights and defends its territory, not attacking Putin or Moscow. The Kremlin reported that two drones were used in the attack but were disabled by Russian defenses.

News taken from Issue 65 of the Circuit Magazine

Bodyguard Saves Japanese PM from Pipe Bomb Attack

A bodyguard has been hailed as a hero for his quick-thinking actions during a suspected pipe-bomb attack on Japanese Prime Minister Fumio Kishida. Video footage captured the bodyguard kicking away a metal object as it landed near Kishida
before positioning himself between the Prime Minister and the device, shielding him with a collapsible, handheld ballistics shield.

News from Issue 65 of the Circuit Magazine

AlertEnterprise Reveals First-Ever Guardian AI Chatbot Powered by OpenAI ChatGPT

AlertEnterprise has unveiled its first-ever Guardian AI Chatbot powered by OpenAI ChatGPT. The chatbot will make its global debut at the ASIS Europe and ISC West trade events. Built on OpenAI’s GPT-3 platform, the Guardian AI Chatbot aims to provide security operators with instant access to critical physical access and security insights through quick questions and prompts.

James Bore's Cyber Security

Ways to See the Threat Before it Happens

Threat modelling is widely in use, whether knowingly or not, across every walk of life – and has been used since time immemorial to prioritise security defences. The only difference between the well-known risk assessments carried out by everyone and threat modelling in cyber security is the attempt to document and systemise it. I am hoping that this idea of formal threat modelling will be a useful tool for you to use in your future arsenal of available resources as a CP operator.

Close Protection advice

Keeping Your Edge: Building a Solid Foundation

Longevity, consistency and remaining relevant are some primary goals of all protectors. These factors are important when establishing a new contract and providing services for a new client. But what is equally important is the mindset that goes into those first days and weeks on the assignment. As such, I wanted to get the personal perspective of Vantrell Wilson, a close protection agent who I have trained with and worked alongside of for years now.

Technology in the security industry

Leveraging Technology in Industry Hiring

Increased global connectedness through technology is fast becoming the norm these days. Video conferencing and “face to face” meetings are happening daily in real-time across the world. As an industry that prides itself on having the edge over our adversaries, we are falling below our own standards when it comes to utilizing the technological resources at our availability to their fullest potential.

Global Risk Updates

Global Situation Report - November 2021

Global Situation Report – November 2021

Each issue our global geopolitical partner, Stratfor, provides an in-depth analysis of global incidents via in-house experts, cutting edge technology and through a comprehensive globally sourced network. Here is your summary from the last 30 days.

Popular Tags

armed attack Bodyguard business Celebrity client clients Close Protection Communication cp Crime Elijah Shaw EP Executive Executive Protection firearm firearms government gun Intelligence Law Enforcement Media Medical military News online police Prevention professional protect protection Risk Safety Security SIA Social Media Surveillance Technology terror Terrorism terrorist Threat Training VIP weapon

On The Frontline

Foot Steps with Jose Casillas

Foot Steps: Episode 3 – Devon Taitt

I believe everyone should spend at least a year working the clubs on the weekends. You will develop your self-awareness, situational awareness, verbal and nonverbal communication skills, and overall confidence. It’s controlled chaos. The perfect training ground. 

Tiger kidnapping Could you be targeted?

Tiger Kidnapping

Over the years there have been many articles in Circuit Magazine about the kidnapping threat, and rightly so.

As we know, the danger of kidnapping is always a concern amongst high-level executives, especially when operating and traveling to some regions where kidnapping occurrences are more common. In this article, however, the topic is focused on one particular method of kidnapping, and that is what’s known as tiger kidnapping.

Philip Young - Rough Injustice

Rough Injustice

  My name is Philip Young and I am a South African citizen incarcerated in Afghanistan. My incarceration is the result of an incident that took place in Helmand Province on the 1st of October 2009.   The incident involved the fatal shooting, by me, of an Afghan citizen. The shooting came about when the […]

Follow us

  • Email
  • Facebook
  • Twitter

From The Archives

Personal Security in Hotels

It is inevitable that in the close protection business you will spend time in domestic and …

Continue Reading about Personal Security in Hotels

Enhancing Your Safety and Survival at the Airport

When it comes to surviving sudden violence whether as the result of an active shooter or other …

Continue Reading about Enhancing Your Safety and Survival at the Airport

New Data Highlights Cyber Security Skills Shortage

A new report shows the extent to which a shortage in cyber security skills is affecting businesses. …

Continue Reading about New Data Highlights Cyber Security Skills Shortage

Nigeria – Country Risk Assessment

Significant Events On December 9, university lecturers defied a government ultimatum to return …

Continue Reading about Nigeria – Country Risk Assessment

Promoted Event

International Security Expo

Latest Podcast Episode

Latest Issue

Circuit Magazine - Issue 66 - AI Armageddon

Issue 66

As AI armageddon comes closer, the global challenge is discerning the line between innovation and oversight, particularly concerning decision-making biases and security implications.

Buy Now

Follow us

  • Email
  • Facebook
  • Instagram
  • LinkedIn
  • Twitter
  • Home
  • Subscription
  • The Magazine
  • Podcast
  • Contribute
  • Advertise
  • Contact Us

© 2023 Circuit Magazine · Rainmaker Platform

This website or its third-party tools use cookies which are necessary to its functioning and required to improve your experience. By clicking the consent button, you agree to allow the site to use, collect and/or store cookies.
I accept