Security Communications.
Security Communications.
Security Operations
In this article, we are going to look at some of the more basic, but all too
often forgotten radio communication procedures required for quick, concise
and accurate transmission of information via radio.
Call Signs
When used in radio communications, call signs can perform a number of
functions. Their primary function is often to protect the identity of the parties
involved in the radio transmission. However, they also serve to simplify
matters when communicating between large groups of people. For example,
can you imagine trying to communicate with someone on a first name basis
when there are three people in the group all called David? Not to mention
that it is unreasonable to expect that every person in a group remember
everyone’s name.
Instead, it is far easier and safer to assign call signs based either on the
Phonetic alphabet or a person’s area of responsibility. For example, C1, C2,
C3, pronounced Charlie One, two and three, would be used in place of Ralph,
Fred and Bill. This way each person knows who is being called and there is no
risk of him or her being identified. Alternatively, if you had three members of
your team assigned to the stage area at a rock concert, you could assign
them the call signs: Stage one, two and three. Once again, the identity of the
caller is preserved and everyone knows exactly who he or she is
communicating with.
Code Words
Code words and call signs are used for much the same reasons – to prevent
the true nature of the subject being discussed from being overheard by
uninvited listeners. Take for example a situation where a security officer
receives a radio call informing him that the door to one of the venue’s cash
offices has a broken lock. The call also informs him that the staff member at
that location will be leaving the area unattended for a period of time. He is
therefor requested to get someone there to keep an eye on the money. If
anyone were listening in on the conversation, it would be a simple matter of
getting there first or worse, taking the officer out of the picture and helping
themselves to the contents of the cash office.
By employing code words, you make it difficult for anyone with criminal
intentions to interfere with your operations. Take our example of the cash
office from earlier in the article. Someone wishing to take advantage of the
opportunity knows after hearing the call, who is attending, where the cash is
and the nature of the problem. However, by employing the system of code
words and call sign as discussed the call might sound something like this:
The following key words are used in order to covey certain messages.
1. Start the message with your call, Sign and then say the call sign of
the person you wish to contact.
1. Any time you expect a response, finish you transmission with the
word OVER. This will let the person you are talking to know you are
waiting for their reply.
2. When you are responding to someone else’s message, use the word
ROGER to let them know you have understood their transmission. If
you didn’t understand the transmission for some reason ask them to
repeat the message by saying, “Repeat last call”.
1. When you have finished your transmission and wish to end the
conversation use the word OUT. This lets the person you are talking
to know that you are finished. It also lets anyone else waiting to use
the radio know that the channel is clear and they can go ahead.
When putting all of the previous examples in practice, you should have a
short exchange that is easily understood, accurate and concise. Let’s look at
the earlier example of the cash office incident again. A conversation between
trained radio operators should “sound” something like this:
“Cash office to Security, OVER.”
You can see how much more efficient and secure this example is. Cutting out
the call signs once communications in this relay are established, can shorten
this example even further.
There are a number of common problems that can occur with officers who
have either little or no time on a radio net. Probably the most common of
these problems is accidentally cutting off the first few seconds of a
transmission. This is especially annoying if you are the person they are trying
to contact. By cutting off the first few seconds of their transmission, the caller
effectively cuts off their own call sign.
As a result, all you hear is your call sign with no idea of who is calling.
To prevent this problem from occurring, simply push the transmit button on
the radio and count to two before you begin to relay your message. Do this
every time you transmit and you should get your message through loud and
clear every time.
Make Sure That You Pay Attention To Radio Calls
If for some reason you are going to be unavailable for any period of time, call
your supervisor and let them know and then inform them when you are back
on air. If you are tied up with a patron or in the middle of something, rather
than just ignoring your radio, respond with your caller’s call sign followed by
your own and then say “stand by”. When you are free to talk, open radio
communications with the last caller using correct procedure and say “go
ahead”.
Don’t Babble!
People who babble to hear their own voice and to express their importance
can be extremely annoying. These people distract other staff, clog up radio
channels and make it difficult for anyone else trying to use the radio.
As is the case with all the skills a security officer must posses, practice makes
perfect.
Share this:
Facebook
X
TAGS
emergency response
phonetic alphabet
radio communication
security operations
John Ellery
http://www.tacforce.com/
John Ellery is a former member of the SAS and author of the book “Be Mean, but be
first.” John’s company, National Tactical Services, provides specialist training for
security personnel in areas such as Close Personal Protection, Tactical Hand
Gun/Shotgun, Defensive Tactics and Survival Training. John is available for
consultation and can be reached on: +61 (0)418 208 901.
RELATED ARTICLES
ABOUT US
Australia's leading security resource
FOLLOW US
About
Advertise
Subscribe
Calendar of Events
Contact
Media
Associations
Case Studies
© 2020 Interactive Media Solutions Pty Ltd