Travel Planning: Emergency Communication

Communication is something most of us take for granted. We seamlessly transition from cellular service to internet service without even giving it a thought.

Technology has made communication easy and has provided us with a number of communication resources.

However, what happens when the things we take for granted are taken away? It doesn’t seem probable or likely, but it happens every day.

Why you need to plan ahead

Natural disasters can strike with little-to-no warning.

But with mother nature aside, there are multiple countries throughout the world with government-imposed internet, social media, and cell phone blackouts.

What is happening

Sudan

The government has imposed an internet blackout that is going on two weeks as of the date of this article.

These blackouts are being imposed as a way to control protests that are being carried out by citizens.

Mobile internet was turned off, then a majority of fixed telephone lines to homes and offices were also cut.

Ethiopia

The Ethiopian government blocked the internet across the country during national exams.

Despite the fact it was allegedly conducted to combat cheating, communication was disrupted by the move.

This is also not the first time Ethiopia has conducted internet blackouts over the years.

Liberia

On June 7, 2019, citizens in Libera woke up to the fact social media had been blocked.

This included sites such as WhatsApp, Instagram, Snapchat, Facebook, Google’s Gmail service, and the website of The Associated Press to name a few.

The Liberian government initiated the shut down ahead of planned protests.

They noted security as a concern and the blackouts were rolled out without notice.

China

The Chinese government has significant control over what the Chinese citizens are able to access via the internet.

Broad restrictions and censorship are common as well as monitoring of the public’s activity.

What has happened

Here are some countries with communication restrictions occurring in the recent past.

Africa

  • Camaroon
    • Internet shutdown in English-speaking regions in 2017 and 2018 in response to prolonged protests
  • Chad
    • Social media restricted for over 300 days in 2018 after recommendations to change presidential term limits
  • DRC (Democratic Republic of Congo)
    • Internet shut off during 2018 election and remained unavailable amid claims of electoral fraud in 2019
  • Ethiopia
    • Internet shutdowns during anti-government protests in 2017 and state of emergency in 2018
  • Sudan
    • Internet and social media restricted in 2018 and 2019 during widespread protests
  • Uganda
    • Access to messaging platforms restricted following new social media tax in 2018
  • Zimbabwe
    • Internet and social media cut off amid protests in 2019

In 2018 alone, there were 21 internet shutdowns on the continent of Africa. The statistics are staggering.

India

In India, there were 154 internet shutdowns between January 2016 and May 2018. This is the most of any country in the world. SFLC.IN provides a current way to track shutdowns in India.

Sri Lanka

When terrorists killed more than 250 people in Sri Lanka in April 2019, authorities shut down access to multiple social-media services for more than a week.

How communications are restricted

The list goes on, but I think the point has been made. Governments frequently restrict information and communication and sometimes for no apparent or given reason.

These actions are typically carried out in one of three ways:

  1. Completely block access across all platforms
  2. Use of content blocking techniques where access is limited to certain sites or applications
  3. Use of bandwidth throttling making the internet too slow to use

If communication is disrupted, do you have a contingency plan in place to deal with such issues?

How do you plan to communicate if you are in a country where this happens? How will you contact your team who is off working in a location subject to this type of activity?

These are scenarios that require planning.

There are countless ways to skirt communication issues.

We want to provide a non-comprehensive list as a starting point for you or your organization to consider in your travel planning.

What to do

cellular communication tower

SMS Texts

As opposed to MMS messaging, SMS texts are easier to send via a cellular network when there are ongoing issues with internet services.

Most messaging applications use Internet Protocols (IPs) and are required to be connected to the internet to function, thus are subjected to potential censorship or restrictions.

VPNs (Virtual Private Network)

VPNs use a technology that circumvents geographical restrictions and censorship while keeping one’s location and identity unknown.

Quartz Africa adds that VPNs can, however, differ from region to region, and it is important to know the safety and security of each specific network before use.

A good reference to compare different virtual networks is That One Privacy Site.

Psiphon

Psiphon is a circumvention tool that utilizes VPN, SSH, and HTTP Proxy technology to provide you with uncensored access to internet content.

Your Psiphon client will automatically learn about new access points to maximize your chances of bypassing censorship.

Psiphon is designed to provide you with open access to online content.

Psiphon does not increase your online privacy, and should not be considered or used as an online security tool.

TOR

Tor (The Onion Router) The goal of onion routing is to have a way to use the internet with as much privacy as possible, by routing traffic through multiple servers and encrypting it each step of the way.

Peer to Peer

Firechat and The Serval Project are peer to peer options that allowing you to message offline between mobile devices outside of mobile tower range.

Lantern is a peer to peer tool used to get around internet censorship. Basically, it allows users to share bandwidth with those in areas where the internet is being restricted.

Tails Operating System is a live operating system you can start on almost any computer from a USB stick or a DVD.

With Tails, you can use the Internet anonymously and circumvent censorship. All connections to the Internet are forced to go through the Tor network.

Leave no trace on the computer you are using unless you ask it explicitly and use state-of-the-art cryptographic tools to encrypt your files, emails, and instant messaging.

Satellite Phone

A satellite phone will allow you to connect to to the telephone network or other phones via satellite.

This negates the requirement to have phone towers to establish communication.

Keep in mind, some countries prohibit or restrict the use of satellite phones so you need to be aware of the risk associated with use in those areas.

Amateur/HAM Radio

Amateur (HAM) radio can provide you with communication locally, regionally, and beyond.

Again, this is not dependent on cellular or internet connections to operate.

License requirements and other restrictions can vary depending on geographic location, but HAM has a proven track record of reliable communication capabilities when other options aren’t working.

Two-way Radios

Two-way radios can provide more localized communication through the use of Family Radio Service (FRS) and General Mobile Radio Service (GMRS).

GMRS does require a license from the FCC to operate in the States, while FRS does not.

GMRS will allow for better communication in terms of options for use, power, distance, and clarity.

Personal Locator Beacon

A personal locator beacon (PLB) is a good option for emergency signaling. A PLB is simple in function as it will send your location and an emergency signal to rescue agencies when activated.

Satellite Messenger

A satellite messenger can provide the same functionality as a PLB with the added benefit of offering communication and navigation options.

These devices can operate worldwide but there may be some variance in coverage depending on the brand.

Satellite messengers require a subscription or plan to enable all functions.

In conclusion

The various solutions above highlight just a few of the many options available and are by no means all-inclusive.

The point is there are ways for you to increase the communication capabilities for you and your team.

Regardless of whether your travel is being done personally or on behalf of a company, NGO, non-profit, or faith-based organization, communication is key.

Spend some time on your communication plan and make sure everything is squared away.

Use the P.A.C.E. acronym when establishing your protocols.

You need to have primary, alternate, contingency, and alternate means of communication if at all possible.

An example may be Primary: Cell phone, Alternate: SMS messaging, Contingency: landline, and Emergency: satellite messenger device.

Keep an open mind and put in the work ahead of time.

Make sure you know what your options are and make you know how to utilize them!

church safety and security team insurance

Navigating Church Security Team Insurance

Understanding Insurance Exclusions for Security Teams Establishing a security team in your church brings important considerations, especially concerning your insurance coverage. An armed team introduces additional risks that may not

social media and safety

The Concept of Leakage in Threat Assessment

The concept of leakage in threat assessment plays a crucial role in identifying potential threats and preventing harmful incidents. Leakage refers to the communication of an intent to harm a

Safety and Security Weekly

Better understand the complexities of our world and mitigate risk in less than 5 minutes a week.