Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
ColumnsSecurity Talk Column

Creating a Robust Communications System for the 9/11 Memorial

Security at the World Trade Center may be under fire after a few high-profile breaches, but security at the September 11 Memorial Museum is on high alert.

By Diane Ritchey
August 1, 2014

Security at the World Trade Center may be under fire after a few high-profile breaches, but security at the September 11 Memorial Museum is on high alert. The memorial has drawn 300,000 visitors since it opened in May.

A crucial component of responding to any type of security-related incident is the ability to dispatch people and provide current information and instructions to those in the field.  Radio communications is the critical element that forms the link between detection and monitoring with an appropriate and timely response.

During the 9/11 attacks the communication system failed. For the Memorial Museum, architects Jacob Koshy and Ron Rochacher from Arup designed a security system comprised of video surveillance, intrusion detection, emergency intercom system and radio communications that provides coverage everywhere within the Museum, Plaza and Pavilion. The security system designed by Arup also ties into the Lower Manhattan Security Initiative launched by the New York Police Department.

 

What is involved with designing and implementing a radio system that supports security operations, both day-to-day duties and in response to an incident?

The design was primarily focused on the delivery of signals ubiquitously throughout the facility. This design aspect is important, as neither day-to-day operations nor emergencies are ever limited to where they can occur. Ensuring that there are the required minimum signal level strengths that will enable clear radio communications anywhere and at any time in the facility, required analysis of the propagation of RF signals within the facility and based on this, a determination of the most appropriate locations for antennas. In order to achieve this, antennas were carefully selected based on their propagation characteristics. Architectural constraints to mounting and the types of material on wall surfaces also impacted this selection.  

 

What does the new security system entail in terms of video surveillance, intrusion detection, emergency intercom system and radio communications?

The new security systems utilize IP-based technologies, but doesn’t enter into the bleeding edge of technology. While it was important to have the benefits of modern systems, it was even more important to have reliable systems. It is always easy to fall into the trap of going with the new shiny technology, but it is wise to make sure the technology has been properly vetted and will be operational when you need it most. In addition, it was important to have a level of integration between the systems to allow for ease of operation, but not to do so to the extent that one system can place another system at risk of being compromised and malfunctioning.

 

How does the new radio system for the 9/11 Memorial Museum, Plaza and Pavilion meet the needs of first responders?

First responders require resilient, robust and dependable means of communications in an emergency, so the systems and infrastructure they rely upon to achieve this deserves particular attention to their critical needs. The new radio system implemented at the 9/11 Memorial and adjacent connected facilities was designed to serve the interconnected spaces throughout the underground canyon like environment, while meeting first responder coverage requirements. This gives first responders access to the innermost parts of the facility while still equipped with excellent two-way radio communications capabilities. The system is one of multiple similar but independent radio systems deployed at various other elements within the WTC site. Together, the systems all operate as a significant piece of communications infrastructure offering first responders clear two-way radio calls and the opportunity to coordinate their response across several first responder agencies.

 

What can enterprise security executives learn from this project for physical security in their enterprise?

To have a successful security design and installation, it is critical to get all security stakeholders in the same room and to establish requirements and goals early. It is important for those goals to relayed to other members of a design team so that all of the needed support services and integration can be vetted.

A project of this nature also is a prime example of needing to be flexible through the design be adaptable, since electronic security technologies progress and change on a frequent basis and devices considered state-of-the-art when the project starts can easily be discontinued and/or considered antiquated towards the end of construction. Finally, a relationship should be formed early on in the construction phase between the designers and the contractors to allow for the collaborative environment that was formed during design, to continue throughout construction. 

 

Read moreSecurity Talk online at SecurityMagazine.com/columns/SecurityTalk

KEYWORDS: 9/11 communications system first responders security security communications Spetmeber 11 Memorial Museum

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Diane 2016 200

Diane Ritchey was former Editor, Communications and Content for Security magazine beginning in 2009. She has an experienced background in publishing, public relations, content creation and management, internal and external communications. Within her role at Security, Ritchey organized and executed the annual Security 500 conference, researched and wrote exclusive cover stories, managed social media, and authored the monthly Security Talk column.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Columns
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Digital, tablet and hands

The 2025 Annual Guarding Report: Unrest Inspires Upgrades in Training, Technology

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Cybersecurity predictions of 2026

5 Cybersecurity Predictions for 2026

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

January 14, 2026

Is Your Organization Prepared to Navigate Interconnected Threats in 2026?

The 2026 threat environment will be louder, faster, and more interconnected. The most pressing risks, from global political volatility to emerging tech disruptions, will challenge organizations to act amid ambiguity and protect credibility in an era of accelerating uncertainty.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Amalgamated Security Services Limited - Security Magazine

    Announcing the Winners of the Bill Zalud Memorial Award for Professional Excellence

    See More
  • Bill Zalud

    The Bill Zalud Memorial Award for Professional Excellence

    See More
  • Proud To Be Security: How Roles Changed After 9/11

    See More

Related Products

See More Products
  • Physical Security and Safety: A Field Guide for the Practitioner

  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

  • 150 things.jpg

    The Handbook for School Safety and Security

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing