UFC 4-021-01
18 DECEMBER 2002
APPENDIX B
IMPACT OF TECHNOLOGICAL ADVANCES
Expected Near-term Mass Notification System Improvements
Recent technological advancements are likely to be adopted by mass notification
system manufacturers, thereby increasing functionality, reliability, and security. Table
B-1 summarizes the current capabilities and likely improvements.
Table B-1. Impact of Recent Technological Advancements on
Mass Notification Systems
Function
Current Capability
Expected Improvement
Wireless
Many of the mass notification system
Adoption of the encrypted Association of
communications
radios available today are transmitting
(APCO) Project 25 Protocol (when fully
keying (FSK) telemetry. Manufacturers
deployed and more broadly available) will
have developed mechanisms for
further reduce the chances of
adding security that significantly
unauthorized commands being accepted
reduces the chance of unauthorized
and will make interception of messages
commands being accepted. However,
and commands very difficult.
a person with a receiver tuned to the
analog voice transmissions, and once
voice communications are enabled,
be used to distort or override
messages.
Network
Most mass notification system network
As bases install fiber optic data networks,
communications
communications are a combination of
adoption of isolated fiber optic Ethernet
protocols
analog voice and asynchronous serial
mass notification system networks using
Internet Protocol (IP) will significantly
often are unavailable.
improve overall mass notification system
loops), and functionality. Presently, it is
very important that the networks remain
completely isolated. Also, current wireless
wide area networks (WAN) generally
provide inadequate security for mass
notification system use.
Unauthorized
Most mass notification system
Adoption of strong authentication using
access security
products available today depend on
available technologies like biometric
locked cabinets and access restrictions
sensors will ease access for authorized
to the control center to prevent
users while making access more difficult
unauthorized access.
for unauthorized personnel.
B-1