SlideShare a Scribd company logo
Sbms
Security based
Messaging system
(in a VIP security environment )
SECURITY BASED MESSAGING SYSTEM (SBMS)
IN A VIP SECURITY ENVIRONMENT
A VIP Security convoy would include the following (among other) components: A field command post (possibly in the Escort Car or Tail Car).
 Route Clearing Party moving ahead for mine clearing and AS checks.
 Outriders, warning car and pilot vehicle to precede the convoy.

 Decoy and VIP vehicles.
 Escort vehicles.
 Ambulance anti-jamming vehicle, tail car and baggage vehicle.
 Choppers for area reconnoitering.
 Sky sentries along the route.
VIP Security - A

Sky Sentries
SECURITY BASED MESSAGING SYSTEM (SBMS)
IN A VIP SECURITY ENVIRONMENT
A VIP Security LOCATION would include the following (among other) components: A Close Quarter Team.
 Inner and Outer Rings.
 Perimeter/ Route/ Venue Security.
 Camp/ Location Command.
 SWAT Team.
 Secured Parked Convoy.
 Alternative Exit Route Security.
 Snipers.
 Overhead Drone/ Aerial Reconnaissance.
Sky Sentries

Sky Sentries

VIP Security - B
- - - - - - - - - - - - - - - - - - - - - - - - ----- - - - - - - - -

- Close Quarter Security
Sky Sentries
-

Inner Ring

VIP

Outer Ring

Perimeter Security
OPS
- - - - - - - - - - - - - - Centr
- - - - e

- - - - - - - -

-

Sky Sentries
SBMS: Basic Function Diagram
SECURITY BASED MESSAGING SYSTEM (SBMS)
IN A VIP SECURITY ENVIRONMENT
Each of the components would have to be in real time communication with one or
more other components in an environment where: Communications have to be on a very low bandwidth (80 - 90% jammed by
the opposition).
 Communications have to be in fully secure mode via two factor authentication
and robust encryption without large file sizes.
 The messaging system would have to function across OS platforms including
radio beacons, android versions, software defined radio etc. without
discoverable IP addresses.
 The messaging system should be able to carry, with very low latency, messages
including the alpha numeric, audio, video and graphics.
 The messages would have to be scalable over various degrees to ensure that a
command does not go unheeded in a crisis scenario.
 Logging would have to be contemporaneous for later analysis.
 The command post would have to be in concurrent communication with, say,
Police Control Room, with the appropriate secure interface.
THANK YOU
Visit us at:
(www.aarktech.net
)

More Related Content

Similar to SBMS in a VIP Security Environment

SBMS in Battle Field Management System
SBMS in Battle Field Management SystemSBMS in Battle Field Management System
SBMS in Battle Field Management Systemaarkentechnologies
 
SBMS in a Global Chain Store Environment
SBMS in a Global Chain Store EnvironmentSBMS in a Global Chain Store Environment
SBMS in a Global Chain Store Environmentaarkentechnologies
 
Mark Contarino, R3 Engineering
Mark Contarino, R3 EngineeringMark Contarino, R3 Engineering
Mark Contarino, R3 Engineering
sUAS News
 
Nightingale_Security_Digital_Brochure
Nightingale_Security_Digital_BrochureNightingale_Security_Digital_Brochure
Nightingale_Security_Digital_BrochureTal Turner
 
Special tracking system mod
Special tracking system modSpecial tracking system mod
Special tracking system mod
riskis
 
Special tracking system mod
Special tracking system modSpecial tracking system mod
Special tracking system modriskis
 
Special tracking system mod rearanjat
Special tracking system mod rearanjatSpecial tracking system mod rearanjat
Special tracking system mod rearanjatriskis
 
Cyber Security and Cyber-Resilience for RPAS
Cyber Security and  Cyber-Resilience for RPASCyber Security and  Cyber-Resilience for RPAS
Cyber Security and Cyber-Resilience for RPAS
Giovanni Panice
 
Locking Down and Re-Using V2X Security - Lessons for Smart Cities
Locking Down and Re-Using V2X Security - Lessons for Smart CitiesLocking Down and Re-Using V2X Security - Lessons for Smart Cities
Locking Down and Re-Using V2X Security - Lessons for Smart Cities
OnBoard Security, Inc. - a Qualcomm Company
 
Autonomous driving end-to-end security architecture
Autonomous driving end-to-end security architectureAutonomous driving end-to-end security architecture
Autonomous driving end-to-end security architecture
Andrei Kholodnyi
 
Secure Drone-to-X Communication - AUVSI XPONENTIAL 2018
Secure Drone-to-X Communication - AUVSI XPONENTIAL 2018 Secure Drone-to-X Communication - AUVSI XPONENTIAL 2018
Secure Drone-to-X Communication - AUVSI XPONENTIAL 2018
OnBoard Security, Inc. - a Qualcomm Company
 
Nightingale_Security__Company_Profile_Digital_Brochure_Desktop_071916
Nightingale_Security__Company_Profile_Digital_Brochure_Desktop_071916Nightingale_Security__Company_Profile_Digital_Brochure_Desktop_071916
Nightingale_Security__Company_Profile_Digital_Brochure_Desktop_071916Pierre Ketels
 
An OSGi Environment for FlexibleService Concepts - Detlef Kuck, Teamleader Te...
An OSGi Environment for FlexibleService Concepts - Detlef Kuck, Teamleader Te...An OSGi Environment for FlexibleService Concepts - Detlef Kuck, Teamleader Te...
An OSGi Environment for FlexibleService Concepts - Detlef Kuck, Teamleader Te...
mfrancis
 
Features of Security Drones in KSA
Features of Security Drones in KSAFeatures of Security Drones in KSA
Features of Security Drones in KSA
CustomizedDrones1
 
Schneider-Electric & NextNine – Comparing Remote Connectivity Solutions
Schneider-Electric & NextNine – Comparing Remote Connectivity SolutionsSchneider-Electric & NextNine – Comparing Remote Connectivity Solutions
Schneider-Electric & NextNine – Comparing Remote Connectivity Solutions
Honeywell
 
LAS16-203: Platform security architecture for embedded devices
LAS16-203: Platform security architecture for embedded devicesLAS16-203: Platform security architecture for embedded devices
LAS16-203: Platform security architecture for embedded devices
Linaro
 
CSFI_ATC_Cyber_Security_Project
CSFI_ATC_Cyber_Security_ProjectCSFI_ATC_Cyber_Security_Project
CSFI_ATC_Cyber_Security_ProjectBen Othman
 
Advanced Remote Air-Ground (RAG) System
Advanced Remote Air-Ground (RAG) SystemAdvanced Remote Air-Ground (RAG) System
Advanced Remote Air-Ground (RAG) System
Secretaria de Aviação Civil da Presidência da República
 
Linked In Presentation
Linked In PresentationLinked In Presentation
Linked In Presentation
dbrownindustrialdefender
 
Advancing Active Safety for Next-Gen Automotive
Advancing Active Safety for Next-Gen AutomotiveAdvancing Active Safety for Next-Gen Automotive
Advancing Active Safety for Next-Gen Automotive
Real-Time Innovations (RTI)
 

Similar to SBMS in a VIP Security Environment (20)

SBMS in Battle Field Management System
SBMS in Battle Field Management SystemSBMS in Battle Field Management System
SBMS in Battle Field Management System
 
SBMS in a Global Chain Store Environment
SBMS in a Global Chain Store EnvironmentSBMS in a Global Chain Store Environment
SBMS in a Global Chain Store Environment
 
Mark Contarino, R3 Engineering
Mark Contarino, R3 EngineeringMark Contarino, R3 Engineering
Mark Contarino, R3 Engineering
 
Nightingale_Security_Digital_Brochure
Nightingale_Security_Digital_BrochureNightingale_Security_Digital_Brochure
Nightingale_Security_Digital_Brochure
 
Special tracking system mod
Special tracking system modSpecial tracking system mod
Special tracking system mod
 
Special tracking system mod
Special tracking system modSpecial tracking system mod
Special tracking system mod
 
Special tracking system mod rearanjat
Special tracking system mod rearanjatSpecial tracking system mod rearanjat
Special tracking system mod rearanjat
 
Cyber Security and Cyber-Resilience for RPAS
Cyber Security and  Cyber-Resilience for RPASCyber Security and  Cyber-Resilience for RPAS
Cyber Security and Cyber-Resilience for RPAS
 
Locking Down and Re-Using V2X Security - Lessons for Smart Cities
Locking Down and Re-Using V2X Security - Lessons for Smart CitiesLocking Down and Re-Using V2X Security - Lessons for Smart Cities
Locking Down and Re-Using V2X Security - Lessons for Smart Cities
 
Autonomous driving end-to-end security architecture
Autonomous driving end-to-end security architectureAutonomous driving end-to-end security architecture
Autonomous driving end-to-end security architecture
 
Secure Drone-to-X Communication - AUVSI XPONENTIAL 2018
Secure Drone-to-X Communication - AUVSI XPONENTIAL 2018 Secure Drone-to-X Communication - AUVSI XPONENTIAL 2018
Secure Drone-to-X Communication - AUVSI XPONENTIAL 2018
 
Nightingale_Security__Company_Profile_Digital_Brochure_Desktop_071916
Nightingale_Security__Company_Profile_Digital_Brochure_Desktop_071916Nightingale_Security__Company_Profile_Digital_Brochure_Desktop_071916
Nightingale_Security__Company_Profile_Digital_Brochure_Desktop_071916
 
An OSGi Environment for FlexibleService Concepts - Detlef Kuck, Teamleader Te...
An OSGi Environment for FlexibleService Concepts - Detlef Kuck, Teamleader Te...An OSGi Environment for FlexibleService Concepts - Detlef Kuck, Teamleader Te...
An OSGi Environment for FlexibleService Concepts - Detlef Kuck, Teamleader Te...
 
Features of Security Drones in KSA
Features of Security Drones in KSAFeatures of Security Drones in KSA
Features of Security Drones in KSA
 
Schneider-Electric & NextNine – Comparing Remote Connectivity Solutions
Schneider-Electric & NextNine – Comparing Remote Connectivity SolutionsSchneider-Electric & NextNine – Comparing Remote Connectivity Solutions
Schneider-Electric & NextNine – Comparing Remote Connectivity Solutions
 
LAS16-203: Platform security architecture for embedded devices
LAS16-203: Platform security architecture for embedded devicesLAS16-203: Platform security architecture for embedded devices
LAS16-203: Platform security architecture for embedded devices
 
CSFI_ATC_Cyber_Security_Project
CSFI_ATC_Cyber_Security_ProjectCSFI_ATC_Cyber_Security_Project
CSFI_ATC_Cyber_Security_Project
 
Advanced Remote Air-Ground (RAG) System
Advanced Remote Air-Ground (RAG) SystemAdvanced Remote Air-Ground (RAG) System
Advanced Remote Air-Ground (RAG) System
 
Linked In Presentation
Linked In PresentationLinked In Presentation
Linked In Presentation
 
Advancing Active Safety for Next-Gen Automotive
Advancing Active Safety for Next-Gen AutomotiveAdvancing Active Safety for Next-Gen Automotive
Advancing Active Safety for Next-Gen Automotive
 

Recently uploaded

UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
g2nightmarescribd
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 

Recently uploaded (20)

UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 

SBMS in a VIP Security Environment

  • 1.
  • 2. Sbms Security based Messaging system (in a VIP security environment )
  • 3. SECURITY BASED MESSAGING SYSTEM (SBMS) IN A VIP SECURITY ENVIRONMENT A VIP Security convoy would include the following (among other) components: A field command post (possibly in the Escort Car or Tail Car).  Route Clearing Party moving ahead for mine clearing and AS checks.  Outriders, warning car and pilot vehicle to precede the convoy.  Decoy and VIP vehicles.  Escort vehicles.  Ambulance anti-jamming vehicle, tail car and baggage vehicle.  Choppers for area reconnoitering.  Sky sentries along the route.
  • 4. VIP Security - A Sky Sentries
  • 5. SECURITY BASED MESSAGING SYSTEM (SBMS) IN A VIP SECURITY ENVIRONMENT A VIP Security LOCATION would include the following (among other) components: A Close Quarter Team.  Inner and Outer Rings.  Perimeter/ Route/ Venue Security.  Camp/ Location Command.  SWAT Team.  Secured Parked Convoy.  Alternative Exit Route Security.  Snipers.  Overhead Drone/ Aerial Reconnaissance.
  • 6. Sky Sentries Sky Sentries VIP Security - B - - - - - - - - - - - - - - - - - - - - - - - - ----- - - - - - - - - - Close Quarter Security Sky Sentries - Inner Ring VIP Outer Ring Perimeter Security OPS - - - - - - - - - - - - - - Centr - - - - e - - - - - - - - - Sky Sentries
  • 8. SECURITY BASED MESSAGING SYSTEM (SBMS) IN A VIP SECURITY ENVIRONMENT Each of the components would have to be in real time communication with one or more other components in an environment where: Communications have to be on a very low bandwidth (80 - 90% jammed by the opposition).  Communications have to be in fully secure mode via two factor authentication and robust encryption without large file sizes.  The messaging system would have to function across OS platforms including radio beacons, android versions, software defined radio etc. without discoverable IP addresses.  The messaging system should be able to carry, with very low latency, messages including the alpha numeric, audio, video and graphics.  The messages would have to be scalable over various degrees to ensure that a command does not go unheeded in a crisis scenario.  Logging would have to be contemporaneous for later analysis.  The command post would have to be in concurrent communication with, say, Police Control Room, with the appropriate secure interface.
  • 9. THANK YOU Visit us at: (www.aarktech.net )