Communications Equipment

On this page:

  • Introduction to communications equipment
  • Where to find tips on radio use
  • Where to find advice on information security

 

Communications equipment does not provide security. It is an aid to security, if properly used.

The leader of a field team should ensure that the team’s communications requirements are thought through in good time to allow the despatch of any vital equipment with the team as it deploys.

It is good practice, in insecure situations, for staff to have two independent means of communication (e.g. radio and satellite phone), so that if one breaks down communication will still be possible.

Avoid dependency on mobile phones. In a crisis a cellular telephone system is particularly vulnerable to becoming overloaded, damaged, or simply switched off by a belligerent.

Useful equipment may include:

  • Hand-held radios
  • Vehicle radios
  • Base station radios
  • Repeater stations (it may be possible to share repeater stations with other organisations)
  • Satellite telephones
  • Fax machines
  • E-mail accounts and accessories including software
  • Landline telephones
  • Cellular (mobile) telephones
  • Any necessary accessories, including battery chargers

From a security point of view, key questions requiring decision include:

  • Who needs to be able to contact whom, and with what degree of reliability?
  • Is it necessary to employ one or more dedicated radio operators, to ensure that someone is listening to the radio base station at all times, or during certain hours?
  • Who will be ‘on call’ at all times in case of emergency? Is a duty officer system required, both at HQ and in the field, where several staff members rotate as the ‘on call’ person? Or should the manager (or a delegated colleague in the manager’s absence) always be the ‘on call’ person?
  • Do you need communications that will give an instant response? Do you need one person to be able to talk to several others at once (radio) or is one to one contact enough (phones)?
  • What communications do other humanitarians in the area use, and do you need to be in contact with them?
  • Is the use of certain kinds of communication equipment perceived as suspicious or a threat by any group? If so, how can you reduce or remove this suspicion?

Answers to the above questions will depend on the assessed threat. In most situations, it is not thought necessary or cost-effective to have all members of staff in constant contact, using mobiles phones or radios, though if this is necessary then it should be provided. The manager should decide on the basis of the likely threat to each staff member, regardless of whether they are national or international staff.

In many countries there is a legal requirement to obtain a licence to use radios that are capable of transmitting. Check the local regulations and abide by them. Some countries forbid NGOs to operate radios or satellite telephones.

Technical assistance will be needed to set up and programme radios. Check whether such assistance is available locally. If so, consider whether it would be safe to rely on local technicians, who may become suddenly unavailable in a crisis. It is also important to be confident that they can be trusted with the knowledge of your communications arrangements: for example, could local military groups pressurise them into revealing sensitive information about your organisation?

Communications equipment is valuable and portable, attractive to thieves. This should be borne in mind when deciding where to locate communications equipment. Normally staff should sign for receipt of their communications equipment, and be held responsible for its safekeeping.

Staff should be trained to use all types of communications equipment that they may need to use. Remember that in a crisis the staff who are most skilled in using the equipment may not be available.

Annex 24 of the ECHO Generic Security Guide for Humanitarian Organisations gives an introduction to basic radio use, and sources of further help.

No communications system is fully secure. All staff should be aware of the need for information security, and the risks that can arise from interception of communications. See Annex 15 for a discussion of information security.

 

This is an extract, with minor adaptations, from the ECHO Generic Security Guide for Humanitarian Organisations, © Copyright the European Commission’s Directorate-General for Humanitarian Aid – ECHO. Available here as a free download online, in English, French, Spanish and Arabic.

Tags: Advocacy