Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • The Security Leadership Issue
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

Incident Reporting: Real-time Talk

September 1, 2005
Steve Abrams, Penn State’s Emergency Coordinator, uses the Incident Commanders’ Radio Interface (ICRI) from the University Police Emergency Operations Center, linking together Stadium Operations, the Pennsylvania State Police, University Police and the Incident Commander. A Sabre and two different MTS-2000 radios are connected to the ICRI, while Abrams is shown talking through the handset interface.
The critical nature of incident reporting depends in one way on the need to contend with a diversity of means of security and law enforcement communications inside and outside organizations.

A case in point is Pennsylvania State University (PSU). For nearly as long as Joe Paterno has been head coach, Penn State University’s police force has faced the complex task of managing up to 150,000 people and 30,000 vehicles.

Football to homeland security

Police Supervisor Lt. Clifford Lutz, a veteran of PSU’s police force for over 28 years, knows the gamut of these challenges, having provided security and logistics for Nittany Lion football games, and now responding to new homeland security directives.

Although Penn State has 50 sworn officers and 200 auxiliary officers and guards, like any university in a small town or rural setting, it has to bring in resources from near and far to pull off major events of the magnitude that the university attracts.

This support generally comes from neighboring counties, colleges and public safety agencies. Although collaboration has been strong, the communications among these various teams hasn’t always been so. The problem, well known in the world of public safety, is that of radio interoperability, i.e., the incompatibility between the various radio equipment and frequencies used by different fire, police, emergency management, public safety and campus security departments.

An Incident Commanders’ Radio Interface is a simple “black box” that mates the radio types that need to be compatible.
Radio interoperability was brought to painful reality at the scene of the World Trade Centers on Sept. 11, where firefighters inside the buildings didn’t know of the impending collapse because those outside couldn’t communicate with them. In fact, a survey by the National Governors’ Association Center for Best Practices found radio interoperability the number-one priority for states’ homeland security initiatives.

In the university setting, this incompatibility creates an impasse that interferes with getting decisions implemented in the field in real time – whether for a minor incident or major crisis.

While PSU manages its own university communications with an 800 MHz trunked system that meets campus personnel needs, they still need to communicate with support coming from outside of Centre County, which includes a variety of agencies and departments from the Borough of State College, neighboring township police, Pennsylvania State Police and others throughout the region.

What Lutz found was the Incident Commanders’ Radio Interface (ICRI), a small black box about the size of a cocktail table book that would solve their interoperability needs. It comes from Communications-Applied Technology, Reston, Va.

“When we saw the ICRI, it seemed too good to be true. It turned out to be so simple; it was brilliant. No need for computer geeks to convert radio code to hexidecibel radio data streams or to program any computers,” said Lutz. The most complicated aspect of using the ICRI was turning it on and off and plugging in cables to mate the radio types that needed to be compatible. Toggle switches on the front are simply flipped to create or mute different talk groups.

Lutz described his learning curve: “We had a major event and received the ICRI a day before. We set it up and had it working in 10 minutes. Other agencies that were setting up their operations in the command post saw us talk with those in the field, which was something that had never been done before.”

Using the ICRI within PSU police unified command system allowed them to have both communications across chains of command and with people at the operational level. One of the biggest payoffs for large event management was instantly reducing the cycle and amount of time to make changes in the field. “The operational or incident commander can see something and change it in real-time, not 15 to 30 minutes or when a sergeant or corporal gets to the post to make the change,” said Lutz.

Lutz now uses the ICRI to create different talk groups to match up operational units that are assigned to the same task.

The ICRI interconnects essentially all types of portable and mobile radios, direct-connect and cell phones, and provides a telephone interface and command handset. By connecting a radio used by each agency or department to the ICRI, the communications could be grouped or mixed according to who needed to speak to whom.

In addition to event management, the ICRI fills a key role in homeland security and the university’s disaster and continuity of operations plan, creating interoperability with other mutual aid agencies and jurisdictions.

Sidebar: Assessing Radio Interoperability

“We looked at a lot of different vendors, talked to a lot different agencies and basically the prerequisite checklist came down to three critical issues,” said Pennsylvania State University Police Supervisor Lt. Clifford Lutz. “We’ve seen other agencies who bought very expensive, complex equipment that had lots of great capabilities but they all too often sit in a closet.”

Among his advice: The equipment should not require special skills or training. He suggests security executives answer a number of crucial questions. How efficient is the equipment? Does it marry any radio operating system to another, whether that’s an 800 MHz trunked sytem, VHF, UHF, direct-connect type cell phone or regular telephone?

And about cost: Does the equipment do what it’s supposed to do? The reality is most departments don’t have $100,000, which is what some equipment costs. The ICRI at PSU was under $ 8,000.

Satellite communication trucks with power generators can bring wireless voice lines and wireless interconnections to an organization or area, which has lost traditional and emergency communications.

Sidebar: Satellite Communication Trucks

Truck in the satellite dish when local communications break down.

For example, Crawford & Company Catastrophe Services of Atlanta successfully tested one of its new satellite communication trucks when it was deployed to Pensacola, Fla., after Hurricane Dennis. The satellite provided a stable source of power and wireless communications to Crawford’s field units and adjusters.

The trucks facilitate voice/data transfer when infrastructure is compromised, which allows adjusters to begin processing claims immediately, no matter where the catastrophe strikes. Via satellite, the trucks provide 10 to 15 wireless voice lines and more than 250 wireless Internet connections. Each truck also powers a generator which to charge laptop computers, mobile phones and other business tools.

Sidebar: Video Goes Beyond Talk

Quick-setup video conferencing systems can play a role in incident reporting, situation briefings and disaster management. As more corporate security departments, law enforcement agencies and government operations bring in video conferencing and IP-based security video, the ability to bring together those separate entities grows easier.

An example: Marconi, with a North American office in Kanata, Ontario, Canada, just introduced its ViPr Virtual Presence System. It can handle five-way video conference.

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Security Leadership and Management
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Cyber Tactics Column
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Logical Security
    By: Charles Denyer
Manage My Account
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Coding

AI Emerges as the Top Concern for Security Leaders

Half open laptop

“Luigi Was Right”: A Look at the Website Sharing Data on More Than 1,000 Executives

Person working on laptop

Governance in the Age of Citizen Developers and AI

Shopping mall

Victoria’s Secret Security Incident Shuts Down Website

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

July 17, 2025

Tech in the Jungle: Leveraging Surveillance, Access Control, and Technology in Unique Environments

From animal habitats to bustling crowds of visitors, a zoo is a one-of-a-kind environment for deploying modern security technologies.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • OneFacility software

    Real-Time Communication for Incident Reporting

    See More
  • SEC0120-Prods-slide5_900px

    Real-Time Communication for Guards

    See More
  • SEC0521-ProdSpot-slide16_900px

    Helps to Enable Predictive Outcomes in Real Time

    See More

Related Products

See More Products
  • 9780128147948.jpg

    Effective Security Management, 7th Edition

  • Photonic-Sensing.gif

    Photonic Sensing: Principles and Applications for Safety and Security Monitoring

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!