Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
ManagementPhysicalSecurity NewswireTechnologies & SolutionsSecurity Enterprise ServicesSecurity Leadership and ManagementAccess ManagementFire & Life SafetyPhysical Security

P25 Steering Committee and CISA release statement of Project 25 user needs

Insights on Emergency Management
September 11, 2020

To help Project 25 (P25) users navigate the continuing evolution of P25 systems and the complex world of P25 Standards, the P25 Steering Committee, with support from CISA, developed the Statement of Project 25 User Needs (SPUN) as a framework for users to better understand P25 technologies and define their communications needs.

P25 land mobile radio (LMR) systems have long provided critical tactical and emergency communications capabilities to public safety agencies nationwide. The P25 Standards that define the technical foundation on which these interoperable systems rely are “built for public safety by public safety” and their development relies on collaboration between user and manufacturer communities. However, most LMR users lack both access to the P25 Standards and the time to read through volumes of technical documentation to fully grasp all the features and capabilities that P25 systems can provide or to engage in the standards development process.

To bridge this gap, the SPUN provides high-level explanations of P25 system architecture, features, and functions as defined in the Telecommunications Industry Association 102 Suite of Standards (P25 Standards) and recognized by P25 users and system administrators.  Building upon the original P25 Statement of Requirements document that guided initial P25 Standards development, the SPUN is divided into two sections to help readers quickly find the information they need: 
 

  • P25 Overview (Main Document)
    • P25 general features, functions, and services
    • P25 Interfaces
    • P25 system types and modes
    • P25 system components
       
  • P25 User Needs List (Appendices)
    • Specific user needs across different system modes (i.e.,trunking and conventional)
    • Features, functions, and services
    • User needs for different P25 interfaces

How does the SPUN benefit LMR users?

Since its inception, P25 has aimed at making interoperable radio communications as reliable, flexible and easy to use as possible, and the only way standards developers can know if they’re achieving that goal is through feedback from practitioners in the field. Until the SPUN, however, practitioners have had no easy way to understand the scope, capabilities and features of P25. The SPUN translates the more than 70 P25 Standards into relatable content to help public safety understand all the capabilities available to them through the standards. The SPUN also provides a reliable way for readers to know if the standards can address their unmet needs and how to frame their input to the P25 Steering Committee. The SPUN gives users practical guidance for identifying and prioritizing their needs and communicating them to the committee or manufacturers. The P25 Steering Committee and CISA encourage LMR users to read the SPUN and send any and all feedback, suggestions, and recommendations for P25 improvements to the P25 Steering Committee: Project25SC@cisa.dhs.go.

To learn more about P25, visit https://www.cisa.gov/safecom/technology

KEYWORDS: communications security disaster planning emergency response public safety

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Columns
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • SIA Establishes Steering Committee to Guide Young Professional Program

    See More
  • Today’s Statement of Secretary Janet Napolitano before the Senate Committee -- "Nine Years After 9/11: Confronting the Terrorist Threat to the Homeland"

    See More
  • Video surveillance analytics

    Video Surveillance and the Evolving Needs of the End-User: Update, Integrate, Analyze, Act

    See More

Related Products

See More Products
  • 9780367259044.jpg

    Understanding Homeland Security: Foundations of Security Policy

  • Security of Information and Communication Networks

  • 9780367221942.jpg

    From Visual Surveillance to Internet of Things: Technology and Applications

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing