𝐄𝐯𝐞𝐫𝐲𝐨𝐧𝐞 𝐛𝐞𝐥𝐢𝐞𝐯𝐞𝐬 “𝐍𝐨 𝐒𝐈𝐌 = 𝐍𝐨 𝐂𝐚𝐥𝐥”… 𝐚𝐧𝐝 𝐞𝐯𝐞𝐫𝐲𝐨𝐧𝐞 𝐢𝐬 𝐰𝐫𝐨𝐧𝐠 ❌❌ Your phone has a secret mode that wakes up only during emergencies. 𝗛𝗼𝘄 𝗬𝗼𝘂𝗿 𝗣𝗵𝗼𝗻𝗲 𝗖𝗮𝗻 𝗖𝗮𝗹𝗹 𝗘𝗺𝗲𝗿𝗴𝗲𝗻𝗰𝘆 𝗡𝘂𝗺𝗯𝗲𝗿𝘀 𝗪𝗶𝘁𝗵𝗼𝘂𝘁 𝗮 𝗦𝗜𝗠 ??🤔 Most people think - “No SIM = No Network = No Call.” ?? But here’s the surprising truth: 📌 The SIM is NOT the radio. 📌 The SIM is just permission. 📌 𝗧𝗵𝗲 𝗽𝗵𝗼𝗻𝗲 𝗶𝘁𝘀𝗲𝗹𝗳 𝗔𝗟𝗪𝗔𝗬𝗦 𝗵𝗮𝘀 𝗿𝗮𝗱𝗶𝗼 𝗵𝗮𝗿𝗱𝘄𝗮𝗿𝗲 𝘁𝗼 𝘁𝗮𝗹𝗸 𝘁𝗼 𝘁𝗼𝘄𝗲𝗿𝘀. And that’s why emergency calls work- 𝐞𝐯𝐞𝐧 𝐰𝐢𝐭𝐡: ❌ No SIM ❌ No balance ❌ No active plan ❌ No network from your operator 🧠 So how does the phone do it?? When you dial an emergency number like 112 / 911 / 100 / 000, your phone automatically triggers a special function called: 𝐄𝐦𝐞𝐫𝐠𝐞𝐧𝐜𝐲 𝐂𝐚𝐥𝐥 𝐌𝐨𝐝𝐞 This isn't a software trick - it's part of global telecom standards. 🔧 𝐖𝐡𝐚𝐭 𝐡𝐚𝐩𝐩𝐞𝐧𝐬 𝐢𝐧𝐬𝐢𝐝𝐞 𝐭𝐡𝐞 𝐩𝐡𝐨𝐧𝐞, 𝐀𝐬 𝐬𝐨𝐨𝐧 𝐚𝐬 𝐲𝐨𝐮 𝐩𝐫𝐞𝐬𝐬 𝐜𝐚𝐥𝐥: 1️⃣ The phone checks if the number is in the 𝐞𝐦𝐞𝐫𝐠𝐞𝐧𝐜𝐲 𝐝𝐚𝐭𝐚𝐛𝐚𝐬𝐞 𝐬𝐭𝐨𝐫𝐞𝐝 𝐢𝐧 𝐭𝐡𝐞 𝐝𝐞𝐯𝐢𝐜𝐞 𝐟𝐢𝐫𝐦𝐰𝐚𝐫𝐞 (not SIM-dependent). 2️⃣ If yes, the phone bypasses normal authentication and sends a special network message: "𝐄𝐌𝐄𝐑𝐆𝐄𝐍𝐂𝐘 𝐂𝐀𝐋𝐋 𝐒𝐄𝐓𝐔𝐏 𝐑𝐄𝐐𝐔𝐄𝐒𝐓" (Network message defined in 3GPP TS 22.101) 3️⃣ Because it’s flagged as emergency traffic, the phone doesn’t care about: SIM status, Carrier lock, Roaming, and Plan validity 4️⃣ The modem now scans for ANY available network, not just your operator. This process is called: Emergency Network Fallback (or Camp-On) 5️⃣ The nearest tower that supports GSM/LTE/VoLTE emergency routing must answer - by law. 🛰 𝐀 𝐒𝐢𝐦𝐩𝐥𝐞 𝐅𝐥𝐨𝐰 - Dial 112 / 000 / 911 / 100 ↓ Phone detects the number as emergency ↓ Switches to Emergency Call Mode ↓ Bypasses SIM and authentication ↓ Scans all available networks (any operator) ↓ Sends Emergency Call Request ↓ Nearest tower accepts the request (mandatory by law) ↓ Call connects to emergency services 📍 Why this exists Because in a crisis, it doesn’t matter: ✔ Who your operator is ✔ Whether you paid bills ✔ Whether you’re roaming ✔ Whether you even have a SIM What matters is: 𝐘𝐨𝐮 𝐜𝐚𝐧 𝐫𝐞𝐚𝐜𝐡 𝐡𝐞𝐥𝐩. In next post I will share how, a small changes lead to 4 deaths in Australia 😢 #meme #tech #dsa #coding #design #telecom #networking #google #microsoft
Adventure Travel Safety Protocols
Explore top LinkedIn content from expert professionals.
-
-
Hierarchy of HSE Documentation 1. HSE Manual The HSE Manual is the foundation of the system. It outlines the organization’s overall safety philosophy and commitment. Key Elements: Policy Statements: Health, safety, and environmental policies. Framework: Describes the HSE system’s structure (aligned with ISO standards). Responsibilities: Assigns roles at every organizational level. Core Procedures: High-level descriptions of risk management and performance monitoring. 2. HSE Program This program turns the manual’s policies into actionable initiatives tailored to the organization or project. Key Elements: Goals and Objectives: Clear targets like reducing incidents. Activities: Safety campaigns, training sessions, and workshops. Compliance: Registers of legal and regulatory requirements. Performance Metrics: KPIs like incident rates or compliance scores. 3. HSE Plan The HSE Plan focuses on specific projects or sites, detailing actions and strategies for local risks. Key Elements: Risk Assessments: Identifies site-specific hazards and controls. Emergency Response: Tailored procedures for on-site emergencies. Resource Allocation: Lists equipment and staff dedicated to safety. Stakeholder Communication: Engages all project participants. 4. Standard Operating Procedures (SOPs) SOPs are task-level documents that ensure consistency and safety. Key Elements: Detailed Steps: Clear instructions for recurring tasks Associated Risks: Describes hazards and mitigation strategies. Equipment Guidelines: Specifies tools and PPE requirements. 5. Work Instructions Work instructions provide detailed steps for specific roles or equipment use. Key Elements: Task Descriptions: Easy-to-follow steps tailored to workers. Safety Measures: Role-specific tips to prevent incidents. Visual Aids: Flowcharts or diagrams for clarity. 6. Forms Forms are used to document, track, and report on HSE activities. Key Types: Risk Assessment Forms: For identifying hazards. Incident Reports: Document accidents and corrective actions. Inspection Checklists: Ensure compliance with safety protocols. Training Records: Track employee participation in programs.
-
𝗔𝗜 𝗳𝗼𝗿 𝗚𝗢𝗢𝗗: 𝗡𝗔𝗦𝗔 𝗮𝗻𝗱 𝗜𝗕𝗠 𝗹𝗮𝘂𝗻𝗰𝗵 𝗼𝗽𝗲𝗻-𝘀𝗼𝘂𝗿𝗰𝗲 𝗔𝗜 𝗳𝗼𝘂𝗻𝗱𝗮𝘁𝗶𝗼𝗻 𝗺𝗼𝗱𝗲𝗹 𝗳𝗼𝗿 𝗺𝗼𝗿𝗲 𝗲𝗳𝗳𝗶𝗰𝗶𝗲𝗻𝘁 𝘄𝗲𝗮𝘁𝗵𝗲𝗿 𝗮𝗻𝗱 𝗰𝗹𝗶𝗺𝗮𝘁𝗲 𝗳𝗼𝗿𝗲𝗰𝗮𝘀𝘁𝗶𝗻𝗴! 🌍 (𝗧𝗵𝗶𝘀 𝗶𝘀 𝘄𝗵𝗮𝘁 𝘀𝗵𝗼𝘂𝗹𝗱 𝗴𝗲𝘁 𝗺𝗼𝗿𝗲 𝘀𝗽𝗼𝘁𝗹𝗶𝗴𝗵𝘁 𝗽𝗹𝗲𝗮𝘀𝗲 𝗮𝗻𝗱 𝗡𝗢𝗧 𝘁𝗵𝗲 𝗻𝗲𝘅𝘁 𝗖𝗵𝗮𝘁𝗚𝗣𝗧 𝗪𝗿𝗮𝗽𝗽𝗲𝗿!) In collaboration with NASA, IBM just launched Prithvi WxC an open-source, general-purpose AI model for weather and climate-related applications. And the truly remarkable part is that this model can run on a desktop computer. 𝗛𝗲𝗿𝗲'𝘀 𝘄𝗵𝗮𝘁 𝘆𝗼𝘂 𝗻𝗲𝗲𝗱 𝘁𝗼 𝗸𝗻𝗼𝘄: ⬇️ → The Prithvi WxC model (2.3-billion parameter) can create six-hour-ahead forecasts as a “zero-shot” skill – meaning it requires no tuning and runs on readily available data. → This AI model is designed to be customized for a variety of weather applications, from predicting local rainfall to tracking hurricanes or improving global climate simulations. → The model was trained using 40 years of NASA’s MERRA-2 data and can now be quickly tuned for specific use cases. And unlike traditional climate models that require massive supercomputers, this one operates on a desktop. Uniqueness lies in the ability to generalize from a small, high-quality sample of weather data to entire global forecasts. → This AI-powered model outperforms traditional numerical weather prediction methods in both accuracy and speed, producing global forecasts up to 10 days in advance within minutes instead of hours. → This model has immense potential for various applications, from downscaling high-resolution climate data to improving hurricane forecasts and capturing gravity waves. It could also help estimate the extent of past floods, forecast hurricanes, and infer the intensity of past wildfires from burn scars. It will be exciting to see what downstream apps, use cases, and potential applications emerge. What’s clear is that this AI foundation model joins a growing family of open-source tools designed to make NASA’s vast collection of satellite, geospatial, and Earth observational data faster and easier to analyze. With decades of observations, NASA holds a wealth of data, but its accessibility has been limited — until recently. This model is a big step toward democratizing data and making it more accessible to all. 𝗔𝗻𝗱 𝘁𝗵𝘀 𝗶𝘀 𝘆𝗲𝘁 𝗮𝗻𝗼𝘁𝗵𝗲𝗿 𝗽𝗿𝗼𝗼𝗳 𝘁𝗵𝗮𝘁 𝘁𝗵𝗲 𝗳𝘂𝘁𝘂𝗿𝗲 𝗼𝗳 𝗔𝗜 𝗶𝘀 𝗼𝗽𝗲𝗻, 𝗱𝗲𝗰𝗲𝗻𝘁𝗿𝗮𝗹𝗶𝘇𝗲𝗱, 𝗮𝗻𝗱 𝗿𝘂𝗻𝗻𝗶𝗻𝗴 𝗮𝘁 𝘁𝗵𝗲 𝗲𝗱𝗴𝗲. 🌍 🔗 Resources: Download the models from the Hugging Face repository: https://lnkd.in/gp2zmkSq Blog post: https://ibm.co/3TDul9a Research paper: https://ibm.co/3TAILXG #AI #ClimateScience #WeatherForecasting #OpenSource #NASA #IBMResearch
-
The life jacket is an essential personal protective equipment for #maritime workers, members of public participating in water sports and visitors getting onboard and off vessels. Using an appropriate life jacket increases the likelihood of survival should a person fall into water accidentally. In collaboration with the Ministry of Manpower and key industry stakeholders, Maritime and Port Authority of Singapore (MPA) is working with the Workplace Safety and Health Council to develop new 𝐖𝐨𝐫𝐤𝐩𝐥𝐚𝐜𝐞 𝐒𝐚𝐟𝐞𝐭𝐲 𝐚𝐧𝐝 𝐇𝐞𝐚𝐥𝐭𝐡 (WSH) 𝐠𝐮𝐢𝐝𝐞𝐥𝐢𝐧𝐞𝐬 𝐨𝐧 𝐭𝐡𝐞 𝐮𝐬𝐞 𝐨𝐟 𝐏𝐞𝐫𝐬𝐨𝐧𝐚𝐥 𝐅𝐥𝐨𝐭𝐚𝐭𝐢𝐨𝐧 𝐃𝐞𝐯𝐢𝐜𝐞𝐬 (𝐋𝐢𝐟𝐞 𝐉𝐚𝐜𝐤𝐞𝐭𝐬). These guidelines provide guidance on the selection of life jackets for different work environments, and is aligned with international standards and recommend good practices on their use and maintenance. A four-week public consultation was launched at Singapore Safety@Sea Week in mid-August 2024, following a two-week industry consultation exercise in July 2024. For more information and to submit your feedback on the guidelines on the use of Personal Flotation Devices (Life Jackets), visit (https://lnkd.in/gQQRqSji). You are welcome to provide your comments before 15 September 2024. In addition, the 12 most popular water sports in Singapore (i.e. canoeing & kayaking, dragon boating, free diving, improvised rafting, open water swimming, power boating, rowing, sailing, scuba diving, snorkeling, stand-up paddling, and water skiing & waterboarding) have unique open water safety requirements. These requirements are covered in the 𝐂𝐨𝐝𝐞 𝐨𝐟 𝐏𝐫𝐚𝐜𝐭𝐢𝐜𝐞 (𝐂𝐎𝐏) 𝐟𝐨𝐫 𝐈𝐧𝐥𝐚𝐧𝐝 𝐚𝐧𝐝 𝐎𝐩𝐞𝐧 𝐖𝐚𝐭𝐞𝐫 𝐒𝐩𝐨𝐫𝐭𝐢𝐧𝐠 𝐀𝐜𝐭𝐢𝐯𝐢𝐭𝐢𝐞𝐬 (SS 701:2023) (https://lnkd.in/gj-DpvTH), that are aimed at preventing injuries and fatalities from recreational, competitive, and educational activities planned by the public and organised groups in inland and open waters. The objective of this standard is to provide requirements and recommendations for stakeholders to address any health and safety concerns during the use of open water facilities/activity locations and during organised activities/events in an open water environment. Guidelines include: • Checklists for safe water activities, venue and equipment; • Guide to staffing ratio for adult participants during activities; • Examples of risk factors and control measures for water sports MPA will continue to work with all #MaritimeSG partners to build a strong safety culture together with companies, employers and unions! (𝘗𝘩𝘰𝘵𝘰𝘴 𝘵𝘢𝘬𝘦𝘯 𝘢𝘵 𝘵𝘩𝘦 𝘏𝘢𝘳𝘣𝘰𝘶𝘳 𝘊𝘳𝘢𝘧𝘵 𝘚𝘢𝘧𝘦𝘵𝘺 𝘍𝘰𝘳𝘶𝘮 𝘰𝘯 20 𝘈𝘶𝘨𝘶𝘴𝘵 2024 𝘸𝘩𝘦𝘯 𝘵𝘩𝘦 𝘯𝘦𝘸 𝘥𝘳𝘢𝘧𝘵 𝘞𝘚𝘏 𝘨𝘶𝘪𝘥𝘦𝘭𝘪𝘯𝘦𝘴 𝘸𝘢𝘴 𝘴𝘩𝘢𝘳𝘦𝘥)
-
Starlink, a division of SpaceX, has announced its plans to introduce Direct-to-Cell, a groundbreaking feature that uses its vast satellite network to allow voice calls on regular smartphones. What sets this apart is its simplicity—there’s no need for modifications to your device. As long as your phone is LTE-compatible, you’re ready to connect. This innovation could fundamentally change how we think about mobile communication. Imagine being able to make calls from the remotest corners of the Earth—whether you’re deep in a rainforest, sailing in the middle of the ocean, or trekking across deserts—with no cell towers in sight. Starlink’s satellite system makes this scenario entirely possible. According to a letter sent by SpaceX to the FCC, the service has already proven successful with devices from major brands like Apple, Samsung, and Google. Tests confirmed smooth communication using the PCS G Block spectrum, across urban and rural areas, indoors and outdoors, and even under tree cover or clear skies. Crucially, SpaceX emphasizes that any LTE-enabled smartphone will work with this technology—no hardware upgrades required. Even slightly older models like the iPhone 13 or iPhone 14 can benefit from this satellite connectivity, proving that cutting-edge communication doesn’t have to leave older devices behind. One of the most significant advantages of Starlink’s service is its flexibility. Unlike traditional satellite communication systems that often restrict users to preset messaging options, this new solution allows consumers to send fully customizable messages through their preferred platforms. In emergency situations, this added context could be life-saving, enabling users to clearly communicate their needs. Whether it’s a text to check in with loved ones or a critical call during an outdoor expedition, this innovation promises seamless, reliable communication where it was previously impossible. And this is just the beginning. SpaceX’s letter to the FCC hints at future expansions, including support for the Internet of Things (IoT), improved voice communication, and even web browsing through the satellite network. These advancements aim to deliver even greater value for individuals, businesses, and emergency services. By making it possible to stay connected from virtually anywhere, Elon Musk’s Starlink continues to push the boundaries of modern communication. Whether for work, emergencies, or simply keeping in touch, this latest development could redefine what it means to be connected in an increasingly mobile world. https://lnkd.in/ghsQVVM6 #spacex #starlink #satellite #communication #connectivity #innovation #mobility
-
As I've been writing my new book The Invisible Threat, I have been detailing examples of the need to continually assess our cybersecurity. Some years ago I looked at a case where a criminal set up an evil twin Wi-Fi router near a Starbucks and harvested the information of everyone that connected. But this story has my eyes raised! Imagine this: Sarah, a frequent traveler, connects to what she believes is the in-flight Wi-Fi to check her emails. Unbeknownst to her, a cybercriminal a few rows behind has set up an evil twin network, mimicking the airline's legitimate Wi-Fi. As Sarah logs in, the cybercriminal intercepts her data, gaining access to her personal information inflight. This actually happened! Earlier this month, Australian Federal Police arrested a man for executing such evil twin Wi-Fi attacks on multiple domestic flights and at airports in Adelaide, Melbourne, and Perth. The suspect allegedly created fake Wi-Fi networks, prompting passengers to log in with their email or social media credentials to harvest their logins for these accounts. How to protect yourself! *Avoid Logging In: Free Wi-Fi should not require email or social media logins. *Use a VPN: Encrypts your data and secures your connection. *Disable File Sharing: Prevent unauthorized access to your device. *Forget Networks: Manually forget public networks after use to avoid auto-reconnections. Stay vigilant in public places and always remember to assess your security. Nothing is ever free. Please Share this post to spread awareness! #CyberSecurity #WiFiSafety #TravelTips #DigitalSafety #TechNews
-
#SafetyTech tip: Here's a free app to support emergency communication on remote sites in Australia. I actually didn't know about this app until I found out about it today as part of an induction onto a remote site and it's definitely worth sharing... Emergency+ is an app developed by Australia’s emergency services that helps workers to communicate their GPS coordinates via direct line to Triple Zero, SES or the Police Assistance Line (131 444). The integration with What3Words means there is no need to describe locations manually... plus it works with no mobile data – GPS coordinates still display and you can use 112 for contact. A simple, effective tool that enhances emergency preparedness for anyone working in high-risk, remote, or off-grid environments. Search for it on the relevant app store. Have you used Emergency+ in your workplace? Are there international equivalents? #safetytech
-
How Ransomware Almost Stole My Spotlight A few years ago, while on a routine business trip to Kuala Lumpur, I was giving a company presentation when I realised that my greatest risk was not forgetting my words but rather my digital security. Seated at a cramped desk in my hotel room, I rehearsed my presentation with my laptop connected to the hotel's public Wi-Fi, navigating each slide as though I had delivered it a thousand times. All my meticulous work resided solely on the notebook's hard drive. I was ignorant of the hidden dangers of that unsecured network. While setting up at the regional conference, a fellow speaker's laptop fell victim to a ransomware attack. Within minutes, their slides were sealed behind an encrypted vault. I watched the organisers frantically attempt to salvage the session, my heart pounding as I imagined the same disaster befalling me. Determined never to experience such anxiety again, I developed a speaker-specific cybersecurity routine based on simple daily habits. Pre-trip organisation Before every journey, I tidy and organise my laptop by backing up crucial data to a secure cloud vault and external storage, retaining only essential files, and removing any unused applications that have not been used for more than three months. Secure connections Whenever I use airport or hotel Wi-Fi, I first connect to a VPN so that every keystroke, file transfer and message remains encrypted. Strict wireless management I disable Bluetooth when I'm not using it and disable Wi-Fi auto-connect to prevent unauthorised networks or headsets from connecting. Multiple backups I keep copies of my slides in protected cloud storage as well as on a trusted thumb drive so that I never rely on a single source. Post-trip sanitisation After each trip, I forget all saved Wi-Fi networks, clear cached credentials, and either archive or delete files I no longer need while backing up the rest to both the cloud and an external hard drive. I know this sounds like a lot of work, but each habit is now as natural as my morning cup of tea. It may add minutes to my prep, but it saves me hours of panic and ensures no malware or ransomware ever steals the spotlight from my presentations. Over to you Which cyber-hygiene habit do you rely on most when presenting or travelling? Share your tip below and help us create a collective checklist so that every speaker can step into the spotlight with confidence. #alvinsratwork ✦ #ExecutiveDirector ✦ #cybersecurity ✦ #cyberhygiene ✦ #Cyberawareness ✦ #BusinessTechnologist ✦ #Cyberculture
-
Cyber risks do not take a vacation. We can be more vulnerable to data compromise and identity theft when we travel. You are thinking how can this be the case? Business and pleasure travel remains strong. Many are on spring break or will be shortly. We know the risks of using public Wi-Fi at a coffee shop or hotel. Have you considered cyber risks for Wi-Fi on an airplane? This is a public network too. Airplane Wi-Fi is not encrypted. This means all travelers use the airplane Wi-Fi their web surfing, email activity/content, and passwords can be seen by others on the network. Risk concerns are: ➡️Data Interception ➡️Man-in-the Middle Attacks ➡️Malware ➡️Packet Sniffing So, what can business and pleasure travelers do to mitigate cyber risks when they need to keep connected on an airplane? Options are: 1) VPN 2) Antivirus software on your device 3) Password Manager 4) Don’t auto-connect to public networks 5) Limit activity to non-sensitive data (avoid financial transactions) Happy Travels! #RiskManagement #Cybersecurity #DataPrivacy #Leaders Longview Leader Corporation