Security Measures

Security measures are essential in emergency communications deployment. Each aspect of emergency communications security should be studied and integrated into an overall disaster preparedness strategy. Customized training manuals for onsite emergency wireless communications technicians and security personnel need to be developed for each emergency communications network application. 

Key Benefits


This area of contingency planning is critical to the effective overall success of the emergency communications operation. From choosing the proper wireless network equipment of an emergency backup communications network, to placing the wireless communications network equipment at appropriate physical locations, to the most effective use of the communications equipment for voice and data protocol, security efforts are never underestimated or undervalued at Triage Communications

Component Capability

The main wireless communications switch, or base station location needs to be carefully planned for each emergency wireless communications network application using the results of the (RF) studies. Customer needs will dictate the exact security measures that are required. Each self contained portable wireless cell site that is added must operate in conjunction with the main base station switch, and each component will in turn, be secured as part of the emergency wireless communications network.  A team of security personnel will be deployed at the main wireless communications switch, and roving emergency technicians will ensure the operational status of the entire emergency wireless communications network during operations.

Physical Location

Each wireless communications cell site must be carefully planned to accommodate the proper security measures, such as stealth-like camouflage covering, where required. In addition, placement of each emergency wireless communications cell site for proper emergency radio transmission coverage is essential. It is important to consider placement of the main wireless communications switch in conjunction with the wireless cell sites, or substation communications equipment and support all communication components with trained security personnel. Refueling each unit is also an important physical location factor, as trucks or aircraft will need to access each site at regular intervals.   

Data Transfer Protocol

The requirements of each region and the customer base will dictate the use of security protocols for voice and data transfer. Encrypted software will be used in virtually all applications to enhance the security of each user on the network. 

Radio Frequency Surveys   Disaster Preparedness  Network Products  Home