Emergency communications for the prepared citizen break down into three geographic tiers — squad-level, county-level, and nationwide — each with distinct hardware, network architecture, and data requirements. Rather than chasing a single “perfect radio,” the goal is to build layered capability across these tiers so that losing one link does not collapse the entire communication plan. This mirrors the same layered thinking that applies to building a coherent loadout: every tier adds redundancy and reach.
The Three Geographic Tiers
Squad-Level: A Few Miles
The most common and most urgent communication need is knowing where your people are and talking to them in real time. At the squad scale — roughly one to five miles — the required capabilities are real-time voice, GPS-based location sharing (blue force tracking), and short text messaging. A pair of UHF/VHF handhelds handles voice, while a mesh device running alongside those radios can provide location data to phones or tablets running ATAK.
Running voice and data on separate radios is not wasteful. It provides frequency agility — if one net goes down or becomes compromised, the other still functions. It also avoids the bandwidth bottleneck of trying to push voice and data through the same narrow pipe. For hardware considerations at this tier, see Handheld Radio Hardware, Configuration, and Accessories.
County-Level: Tens of Miles
At the county scale, communication divides into emergency voice (coordinating responses, requesting help) and non-emergency text and data (status updates, logistics, information sharing). Repeater infrastructure — whether pre-existing amateur repeaters or improvised relay nodes — extends the reach of handheld radios dramatically. This is where mesh networking and MANET architectures become particularly relevant, as covered below.
County-level communication also demands more deliberate planning. A PACE plan for this tier might specify a primary amateur repeater net, an alternate simplex frequency, a contingency mesh network, and an emergency satellite link.
Nationwide: Hundreds to Thousands of Miles
For wide-area situational awareness — understanding what is happening across the country during a major disruption — HF radio remains the primary tool. HF supports both voice contacts and digital text modes such as PSK31, JS8Call, and Winlink, which can pass email-like messages over long distances with modest equipment. Detailed treatment of HF capabilities lives in HF Radio and Long-Range Communication.
One capability that deserves far more attention in the preparedness community is one-way shortwave reception. A $50–$100 shortwave receiver requires no license, no antenna installation, and no transmission — yet it provides access to widely broadcast emergency information from government, military, and international sources. Receive-only shortwave is arguably the lowest cost-to-value ratio in the entire emergency communication stack. It requires zero infrastructure on the user’s end and zero coordination with anyone else.
Data Types Across Networks
Within each tier, three distinct data types serve different functions:
- Real-time voice — the fastest way to coordinate action, but ephemeral and bandwidth-hungry.
- Text messaging — slower but persistent, useful for passing coordinates, instructions, and status updates without tying up a voice net.
- Location/position data — automated GPS sharing that answers the single most important question in any emergency: where is everyone?
These are complementary, not interchangeable. A system that provides excellent text messaging but no voice still leaves a critical gap, and vice versa. The most robust setups run all three simultaneously, often on different hardware. For a deeper framework on evaluating these trade-offs, see Communication Method Evaluation Criteria and Trade-off Analysis.
Mesh Networking and MANET Architecture
Mobile ad hoc networking (MANET) is the architecture that makes squad- and county-level data networking possible without fixed infrastructure. In a mesh network, every radio node can forward traffic for other nodes, creating a self-healing web where individual node failures do not take down the network. Platforms like Meshtastic, Beartooth MkII, and goTenna Pro all implement some version of this architecture and integrate with ATAK for blue force tracking, dropped pins, text messages, routes, shapes, and even compressed images.
However, mesh networking has a critical hidden cost: mesh overhead. The majority of available bandwidth in a real-world mesh is consumed retransmitting other nodes’ packets. The more nodes in the network, the more retransmission occurs. A given user may only have a fraction of the system’s nominal throughput available for their own data. This makes mesh networks excellent for low-bandwidth applications (position reports, short texts) but poorly suited for high-bandwidth uses like streaming video — at least on the 900 MHz platforms most accessible to civilians.
Higher-bandwidth MANET systems like the MPU5 and Silvus StreamCaster operate at 2.4 GHz and above, supporting video feeds and drone telemetry. The trade-off is that higher frequencies suffer greater attenuation through foliage and structures compared to 900 MHz systems, reducing effective range in wooded or urban terrain. For a broader treatment of mesh and MANET concepts, see Mesh, MANET, and Resilient Networks.
Extending Range with Altitude
One of the most effective ways to extend mesh network coverage is to gain altitude. A single drone-mounted relay node can extend effective coverage from 1–2 km to several miles by rising above terrain obstructions that block ground-level signals. This principle — that antenna height dominates range in VHF/UHF — applies equally to improvised hilltop relay stations and to purpose-built airborne platforms. The underlying physics are covered in Radio Wave Propagation and Frequency Theory.
Security: Encryption vs. Low Probability of Intercept
All three major mesh platforms support AES-256 encryption, which protects message content from being read by an adversary. But encryption and signal security are distinct problems. Even if an adversary cannot read a message, they can detect that a transmission occurred, determine its origin bearing, and begin building a picture of network activity. This is the domain of electronic warfare and signal security.
Frequency hopping and spread spectrum techniques improve resistance to interference and provide modest protection against casual monitoring, but they do not meaningfully hide transmissions from modern software-defined radio (SDR) equipment. A competent adversary with an SDR can detect and locate frequency-hopping transmitters. True low probability of intercept (LPI) requires minimizing transmit power, limiting transmission duration, and blending into ambient RF noise — operational discipline that no amount of hardware can replace.
This reality has direct implications for how electronic warfare threats shape communication planning. Any team relying on mesh radios needs to understand that encrypted does not mean invisible.
Redundancy as Design Principle
The core architectural lesson is that redundancy is a feature, not a flaw. Running a voice radio and a separate data mesh device is not duplication — it is resilience. If the mesh network goes down, voice still works. If a jammer targets the voice frequency, text messages may still pass on the mesh. If both local systems fail, a shortwave receiver still provides one-way awareness of the broader situation.
This layered approach maps directly to PACE planning: each geographic tier and each data type should have its own primary, alternate, contingency, and emergency path. The Emergency Communication Planning and PACE Framework provides the structure for building this out systematically.
For the prepared citizen, the entry point is simple: a quality handheld radio for voice at the squad level, a mesh device paired with ATAK on a phone for location data, and a shortwave receiver for nationwide awareness. That baseline — costing a few hundred dollars — covers all three tiers with at least one capability each. Everything beyond that is depth and redundancy, built outward as skills and budget allow. The EDC comms starting point addresses how to carry the first layer of this architecture every day.