Security measures are essential in emergency communications deployment. Each aspect of emergency communications security should be studied and integrated into an overall disaster preparedness strategy. Customized training manuals for onsite emergency wireless communications technicians and security personnel need to be developed for each emergency communications network application.
This area of contingency planning is critical to the effective overall success of the emergency communications operation. From choosing the proper wireless network equipment of an emergency backup communications network, to placing the wireless communications network equipment at appropriate physical locations, to the most effective use of the communications equipment for voice and data protocol, security efforts are never underestimated or undervalued at Triage Communications.
The main wireless communications switch, or base station location needs to be carefully planned for each emergency wireless communications network application using the results of the (RF) studies. Customer needs will dictate the exact security measures that are required. Each self contained portable wireless cell site that is added must operate in conjunction with the main base station switch, and each component will in turn, be secured as part of the emergency wireless communications network. A team of security personnel will be deployed at the main wireless communications switch, and roving emergency technicians will ensure the operational status of the entire emergency wireless communications network during operations.
Each wireless communications cell site must be carefully planned to accommodate the proper security measures, such as stealth-like camouflage covering, where required. In addition, placement of each emergency wireless communications cell site for proper emergency radio transmission coverage is essential. It is important to consider placement of the main wireless communications switch in conjunction with the wireless cell sites, or substation communications equipment and support all communication components with trained security personnel. Refueling each unit is also an important physical location factor, as trucks or aircraft will need to access each site at regular intervals.
The requirements of each region and the customer base will dictate the use of security protocols for voice and data transfer. Encrypted software will be used in virtually all applications to enhance the security of each user on the network.
Radio Frequency Surveys Disaster Preparedness Network Products Home