This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
This Website Uses Cookies
By closing this message or continuing to use our site, you agree to our cookie policy. Learn More
This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
Subscribe
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • Home
  • News
    • Security Newswire
    • Technologies
    • Security Blog
    • Newsletter
    • Web Exclusives
  • Columns
    • Career Intelligence
    • Security Talk
    • The Corner Office
    • Leadership & Management
    • Cyber Tactics
    • Overseas and Secure
  • Management
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • More
  • Physical
    • Access Management
    • Video Surveillance
    • Identity Management
    • More
  • Cyber
  • Sectors
    • Education: University
    • Hospitals & Medical Centers
    • Critical Infrastructure
    • More
  • Exclusives
    • Security 500 Report
    • Most Influential People in Security
    • Top Guard and Security Officer Companies
    • The Security Leadership Issue
    • Annual Innovations, Technology, & Services Report
  • Events
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
    • Security 500 West
  • Resources
    • The Magazine
      • This Month's Issue
      • Digital Edition
      • Archives
      • Professional Security Canada
    • Videos
      • ISC West 2018
      • ASIS 2017
    • Photo Galleries
    • Polls
    • Classifieds & Job Listings
    • White Papers
    • Mobile App
    • Store
    • Sponsor Insights
  • InfoCenters
    • Video Management Systems
  • Contact
    • Editorial Guidelines
  • Advertise
Home » Creating a Robust Communications System for the 9/11 Memorial
Security Talk ColumnColumns

Creating a Robust Communications System for the 9/11 Memorial

Security at the World Trade Center may be under fire after a few high-profile breaches, but security at the September 11 Memorial Museum is on high alert.

loud feat
August 1, 2014
Diane Ritchey
KEYWORDS 9/11 security / communications system / first responders security / security communications / Spetmeber 11 Memorial Museum
Reprints
No Comments

Security at the World Trade Center may be under fire after a few high-profile breaches, but security at the September 11 Memorial Museum is on high alert. The memorial has drawn 300,000 visitors since it opened in May.

A crucial component of responding to any type of security-related incident is the ability to dispatch people and provide current information and instructions to those in the field.  Radio communications is the critical element that forms the link between detection and monitoring with an appropriate and timely response.

During the 9/11 attacks the communication system failed. For the Memorial Museum, architects Jacob Koshy and Ron Rochacher from Arup designed a security system comprised of video surveillance, intrusion detection, emergency intercom system and radio communications that provides coverage everywhere within the Museum, Plaza and Pavilion. The security system designed by Arup also ties into the Lower Manhattan Security Initiative launched by the New York Police Department.

 

What is involved with designing and implementing a radio system that supports security operations, both day-to-day duties and in response to an incident?

The design was primarily focused on the delivery of signals ubiquitously throughout the facility. This design aspect is important, as neither day-to-day operations nor emergencies are ever limited to where they can occur. Ensuring that there are the required minimum signal level strengths that will enable clear radio communications anywhere and at any time in the facility, required analysis of the propagation of RF signals within the facility and based on this, a determination of the most appropriate locations for antennas. In order to achieve this, antennas were carefully selected based on their propagation characteristics. Architectural constraints to mounting and the types of material on wall surfaces also impacted this selection.  

 

What does the new security system entail in terms of video surveillance, intrusion detection, emergency intercom system and radio communications?

The new security systems utilize IP-based technologies, but doesn’t enter into the bleeding edge of technology. While it was important to have the benefits of modern systems, it was even more important to have reliable systems. It is always easy to fall into the trap of going with the new shiny technology, but it is wise to make sure the technology has been properly vetted and will be operational when you need it most. In addition, it was important to have a level of integration between the systems to allow for ease of operation, but not to do so to the extent that one system can place another system at risk of being compromised and malfunctioning.

 

How does the new radio system for the 9/11 Memorial Museum, Plaza and Pavilion meet the needs of first responders?

First responders require resilient, robust and dependable means of communications in an emergency, so the systems and infrastructure they rely upon to achieve this deserves particular attention to their critical needs. The new radio system implemented at the 9/11 Memorial and adjacent connected facilities was designed to serve the interconnected spaces throughout the underground canyon like environment, while meeting first responder coverage requirements. This gives first responders access to the innermost parts of the facility while still equipped with excellent two-way radio communications capabilities. The system is one of multiple similar but independent radio systems deployed at various other elements within the WTC site. Together, the systems all operate as a significant piece of communications infrastructure offering first responders clear two-way radio calls and the opportunity to coordinate their response across several first responder agencies.

 

What can enterprise security executives learn from this project for physical security in their enterprise?

To have a successful security design and installation, it is critical to get all security stakeholders in the same room and to establish requirements and goals early. It is important for those goals to relayed to other members of a design team so that all of the needed support services and integration can be vetted.

A project of this nature also is a prime example of needing to be flexible through the design be adaptable, since electronic security technologies progress and change on a frequent basis and devices considered state-of-the-art when the project starts can easily be discontinued and/or considered antiquated towards the end of construction. Finally, a relationship should be formed early on in the construction phase between the designers and the contractors to allow for the collaborative environment that was formed during design, to continue throughout construction. 

 

Read moreSecurity Talk online at SecurityMagazine.com/columns/SecurityTalk

Subscribe to Security Magazine

Recent Articles by Diane Ritchey

The Road to CSO: Meet Microsoft's New Security Leader

The Next Generation of White Hat Hackers?

Best in Class: GSOCs and Global Risk Management

Unhappy New Year?

Changing Cultures, Changing Security at FM Global

Diane-2016-200

Diane Ritchey is Editor-in-Chief of Security magazine. She has an experienced background in magazine publishing, having previously served as Editor of an industry-leading business publication. Within her role at Security, Ritchey authors the annual Security 500 Report, exclusive cover stories and the monthly Security Talk column.

Related Articles

Announcing the Winners of the Bill Zalud Memorial Award for Professional Excellence

The Bill Zalud Memorial Award for Professional Excellence

Mass Communication Systems Notify the Masses

Beyond the Numbers: What the Stanley-Niscayah M&A Means for You

You must login or register in order to post a comment.

Report Abusive Comment

Subscribe For Free!
  • Print & Digital Edition Subscriptions
  • Security eNewsletter & Other eNews Alerts
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Popular Stories

security-center

The Top 5 Reasons Why Your Security Program Needs Intelligence Personnel

SEC0219-cover-Feat-slide_900px

The Road to CSO: Meet Microsoft's New Security Leader

Globe

Which Countries Have the Worst and Best Cybersecurity?

Cyber Doors

2018 Set a New Record for Security Vulnerabilities

cyber-SMB

8 Vulnerabilities Penetration Testers Recommend You Address in 2019

20180222ENR_Skyward_Drones_360x184customcontent

Events

February 19, 2019

Drones and Surveillance at MetLife Stadium

Unmanned aerial systems pose a legitimate threat to sporting events in America. The devices are not only becoming cheaper and easier to own, but technology has advanced to such a point that virtually anyone — hobbyist or terrorist — can fly one. MetLife Stadium is home of the New York Jets and New York Giants, in addition to numerous entertainment events and concerts each year.

February 26, 2019

Harness Real-time Public Information to Improve Active Shooter Response

Corporate security teams hope never to respond to an active shooter situation. But given today’s realities, companies spend a great deal of time developing guidelines, holding training sessions, and carrying out drills to ensure that their staff will be prepared in case an active shooter event occurs.
View All Submit An Event

Poll

Employee Background Screening

How Often Does Your Organization Conduct Background Screening on Employees?
View Results Poll Archive

Products

Effective Security Management, 6th Edition

Effective Security Management, 6th Edition

 Effective Security Management, 5e, teaches practicing security professionals how to build their careers by mastering the fundamentals of good management. Charles Sennewald brings a time-tested blend of common sense, wisdom, and humor to this bestselling introduction to workplace dynamics. 

See More Products
Security-500

Security Magazine

SEC-Feb-2019-Cover_144px

2019 February

In Security’s February 2019 issue, meet Brian Tuskan, Microsoft's New Security Leader. Learn how he has used technology, his reputation, networking and a desire to help people to become Microsoft’s new CSO. Read about the Next Generation of White Hat Hackers, How to Evaluate Security's Role, and more.

View More Subscribe
  • More
    • Market Research
    • Custom Content & Marketing Services
    • Security Group
    • Editorial Guidelines
    • Privacy Policy
    • Survey And Sample
  • Want More
    • Subscribe
    • Connect
    • Partners

Copyright ©2019. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing