AUSTRALIAN ARMY CADETS RADIO OPERATORS COURSE

Slides:



Advertisements
Similar presentations
Amateur Radio Technician Class Element 2 Course Presentation
Advertisements

R/T Communications By LT Fullan. Sound Powered Phones Communicating on them: –Calling Stationed called Station calling Message –Reply Station replying.
Chapter 2 Radio Procedures Part 1. Radio Procedures SAD ECURITY CCURACY ISCIPLINE.
HIPAA Basics Brian Fleetham Dickinson Wright PLLC.
The Health Insurance Portability and Accountability Act of 1996– charged the Department of Health and Human Services (DHHS) with creating health information.
The Systems Analysis Toolkit
Technician License Course Chapter 8 Lesson Module 19: Operating Regulations: Interference; Remote & Automatic Operation; Prohibited Transmissions.
Technician License Course Chapter 7 Lesson Module 15: Licensing Regulations: Terms & Working with the FCC.
Request Medical Evacuation (MEDEVAC)
Communications CHAPTER 14. Communications Systems and Components Communication Components.
ACCIDENT INVESTIGATION
Initial Entry Training
Technician License Course Chapter 8 Lesson Module 19: Operating Regulations: Interference; Remote & Automatic Operation; Prohibited Transmissions.
Level 1 You can read single words written clearly with pictures to help. Level 2 You can read sentences aloud and match them to pictures. You can use a.
Chapter 2 Radio Procedures Part 1. RADIO PROCEDURES SAD ECURITY CCURACY ISCIPLINE.
AUSTRALIAN ARMY CADETS CADET ADVANCED RADIO OPERATORS COURSE.
AUSTRALIAN ARMY CADETS CADET ADVANCED RADIO OPERATORS COURSE.
An Introduction to the Privacy Act Privacy Act 1993 Promotes and protects individual privacy Is concerned with the privacy of information about people.
Rules and Regulations. Most Important Information Control Operator Responsibilities. –The FCC’s primary concern is that transmissions are made only under.
Tactical Radio Communications. STAY AWAKE! TURN OFF CELL PHONES NO TOBACCO USE DIRECT QUESTIONS TO INSTRUCTOR USE LATRINE ONLY DURING BREAKS DO NOT WRITE.
Intro to Health Science Chapter 4 Section 3.3
Version 2.10 OCT 2014 Basic Radio Communications Learning Outcome 2 Part 1 Be able to send messages on the Air Cadet radio network Uncontrolled copy not.
ISM Code 2010: Part A - Implementation Malcolm Maclachlan.
Oral Communication Skills Functions of a Meeting There are a number of functions that a meeting will perform better than other communication functions.
Proposal Template Project Based Learning Exercise Mehr 1386 Edmond Zahedi.
 Health Insurance and Accountability Act Cornelius Villalon Jr.
PO/EO: REFS: ACP 125, CANSUPP 1B, RADIOTELEPHONE PROCEDURES USE VOICE PROCEDURE TO CHANGE FREQUENCIES AND USE RADIO SILENCE.
© LTCOL G. Newman– Martin 2011 AUSTRALIAN ARMY CADETS CADET ADVANCED RADIO OPERATORS COURSE.
1 Business Information Management II. “Copyright and Terms of Service Copyright © Texas Education Agency. The materials found on this website are copyrighted.
Chapter 6 : User interface design
Network Security Presented by: JAISURYA BANERJEA MBA, 2ND Semester.
Introduction to Audience, Purpose, and Rhetorical Choices
RTO PROCEDURES SFC Norvell.
Chapter 2 Radio Procedures Part 1 Radio Procedures
Lecture 2 Radio Communications.
Understanding HIPAA Dr. Jennifer Lu.
MESSAGE SENDING Chapter 3 MESSAGE SENDING
Communication skills.
Alpine Technical Delegates - Update 2014
RADIO OPERATORS COURSE
Communication and Its Process.
AUSTRALIAN ARMY CADETS RADIO OPERATORS COURSE
AUSTRALIAN ARMY CADETS RADIO OPERATORS COURSE
Outcome 2 At the end of this session you will:
Done BY: Zainab Sulaiman AL-Mandhari Under Supervisor: Dr.Tarek
Introduction To Mass Communication By: Mandeep Choursia UIMS Chandigarh University Campus: Gharuan, Mohali.
FIELDCRAFT RECRUIT Created by LCDT Stewart. FIELDCRAFT RECRUIT  State the AAFC Environmental Management requirements and country code of conduct  Describe.
The Writing Process and Introduction to Business Messages
Basic Radio Communications Learning Outcome 2 Part 2
Message Sending Chapter 3 MESSAGE SENDING
MESSAGE SENDING Chapter 3 MESSAGE SENDING
Dept. of Mass communication
RADIO OPERATORS COURSE
AUSTRALIAN ARMY CADETS RADIO OPERATORS COURSE
AUSTRALIAN ARMY CADETS RADIO OPERATORS COURSE
Basic Radio Communications
Australian Army Cadets Cadet Advanced Radio Operator Course*
AUSTRALIAN ARMY CADETS RADIO OPERATORS COURSE
Developing Listening strategies
Computer Security CIS326 Dr Rachel Shipsey.
A. When operating a RACES station
Operating Regulations
Technician License Course.
Common European Framework of Reference for Languages
Cryptography and Network Security
Computer Security CIS326 Dr Rachel Shipsey.
Chapter 5 Computer Security
Operating Regulations American Radio Relay League
Presentation transcript:

AUSTRALIAN ARMY CADETS RADIO OPERATORS COURSE CADET ADVANCED RADIO OPERATORS COURSE This presentation corresponds to Chapter 7 of the AAC CADET INSTRUCTOR RADIO COMMUNICATIONS HANDBOOK This course has been designed, written and developed by LTCOL(AAC) G.R. Newman-Martin, CSM, RFD ©LTCOL(AAC) G.R. NEWMAN-MARTIN, 2011

©LTCOL G.R. Newman-Martin 2011 Topic 7 ©LTCOL G.R. Newman-Martin 2011

©LTCOL G.R. Newman-Martin 2011 SECURITY ©LTCOL G.R. Newman-Martin 2011

©LTCOL G.R. Newman-Martin 2011 SECURITY RULES, OK? ©LTCOL G.R. Newman-Martin 2011

©LTCOL G.R. Newman-Martin 2011 SECURITY TAKING MEASURES TO PREVENT ACCESS ©LTCOL G.R. Newman-Martin 2011

BY NON-AUTHORISED PERSONS / GROUPS SECURITY TAKING MEASURES TO PREVENT ACCESS BY NON-AUTHORISED PERSONS / GROUPS ©LTCOL G.R. Newman-Martin 2011

SECURITY TAKING MEASURES TO PREVENT ACCESS BY NON-AUTHORISED PERSONS / GROUPS TO INFORMATION WHICH THEY SHOULD NOT ACCESS ©LTCOL G.R. Newman-Martin 2011

SHORT-TERM INFORMATION ©LTCOL G.R. Newman-Martin 2011

SHORT-TERM INFORMATION …is information which is concerned with operations under way ©LTCOL G.R. Newman-Martin 2011

SHORT-TERM INFORMATION …is information which is concerned with operations under way …..and which could give the opposition an advantage in the short term ©LTCOL G.R. Newman-Martin 2011

LONG-TERM INFORMATION ©LTCOL G.R. Newman-Martin 2011

LONG-TERM INFORMATION Information of details of: Units Formations Future intentions ©LTCOL G.R. Newman-Martin 2011

LONG-TERM INFORMATION Not to be encoded in low-grade tactical code except in emergency ©LTCOL G.R. Newman-Martin 2011

LONG-TERM INFORMATION Not to be encoded in low-grade tactical code except in emergency …and then only after every other secure means of transmission has been considered ©LTCOL G.R. Newman-Martin 2011

LONG-TERM INFORMATION Can be gained from: Direct breaches inadvertent careless ©LTCOL G.R. Newman-Martin 2011

LONG-TERM INFORMATION Can be gained from: Indirect breaches Operators’ and users’: peculiarities ©LTCOL G.R. Newman-Martin 2011

LONG-TERM INFORMATION Can be gained from: Indirect breaches Operators’ and users’: peculiarities idiosyncracies ©LTCOL G.R. Newman-Martin 2011

LONG-TERM INFORMATION Can be gained from: Indirect breaches Operators’ and users’: peculiarities idiosyncracies operating techniques

©LTCOL G.R. Newman-Martin 2011

RULES FOR MAINTENANCE OF SECURITY ©LTCOL G.R. Newman-Martin 2011

RULES FOR MAINTENANCE OF SECURITY Use of prescribed procedures is mandatory ©LTCOL G.R. Newman-Martin 2011

RULES FOR MAINTENANCE OF SECURITY Use of prescribed procedures is mandatory Use correct RATEL procedure ©LTCOL G.R. Newman-Martin 2011

RULES FOR MAINTENANCE OF SECURITY Use of prescribed procedures is mandatory Use correct RATEL procedure Brevity – transmissions short & concise as possible, consistent with clarity ©LTCOL G.R. Newman-Martin 2011

RULES FOR MAINTENANCE OF SECURITY Use of prescribed procedures is mandatory Use correct RATEL procedure Brevity – transmissions short & concise as possible, consistent with clarity Have a clear idea of what you are going to say, before you transmit ©LTCOL G.R. Newman-Martin 2011

RULES FOR MAINTENANCE OF SECURITY Use of prescribed procedures is mandatory Use correct RATEL procedure Brevity – transmissions short & concise as possible, consistent with clarity Have a clear idea of what you are going to say, before you transmit Enforce rules for transmission security ©LTCOL G.R. Newman-Martin 2011

RULES FOR MAINTENANCE OF SECURITY Use of prescribed procedures is mandatory Use correct RATEL procedure Brevity – transmissions short & concise as possible, consistent with clarity Have a clear idea of what you are going to say, before you transmit Enforce rules for transmission security THINK BEFORE SPEAKING! ©LTCOL G.R. Newman-Martin 2011

RULES FOR MAINTENANCE OF SECURITY Use of prescribed procedures is mandatory Use correct RATEL procedure Brevity – transmissions short & concise as possible, consistent with clarity Have a clear idea of what you are going to say, before you transmit Enforce rules for transmission security THINK BEFORE SPEAKING! Do not use unauthorised codes or unauthorised prowords

TRANSMISSION SECURITY RULES FOR TRANSMISSION SECURITY

RULES FOR TRANSMISSION SECURITY Only authorised transmissions are to be made ©LTCOL G.R. Newman-Martin 2011

RULES FOR TRANSMISSION SECURITY Only authorised transmissions are to be made Practices specifically prohibited by this rule: Violations of communications silence ©LTCOL G.R. Newman-Martin 2011

RULES FOR TRANSMISSION SECURITY Only authorised transmissions are to be made Practices specifically prohibited by this rule: Violations of communications silence Unofficial conversations between operators ©LTCOL G.R. Newman-Martin 2011

RULES FOR TRANSMISSION SECURITY Only authorised transmissions are to be made Practices specifically prohibited by this rule: Violations of communications silence Unofficial conversations between operators Transmitting on directed net without permission ©LTCOL G.R. Newman-Martin 2011

RULES FOR TRANSMISSION SECURITY Do not give away information ©LTCOL G.R. Newman-Martin 2011

RULES FOR TRANSMISSION SECURITY Do not give away information Practices specifically prohibited by this rule: unauthorised use of plain language ©LTCOL G.R. Newman-Martin 2011

RULES FOR TRANSMISSION SECURITY Do not give away information Practices specifically prohibited by this rule: unauthorised use of plain language compromising classified callsigns by: ©LTCOL G.R. Newman-Martin 2011

RULES FOR TRANSMISSION SECURITY Do not give away information Practices specifically prohibited by this rule: unauthorised use of plain language compromising classified callsigns by: plain language disclosure ©LTCOL G.R. Newman-Martin 2011

RULES FOR TRANSMISSION SECURITY Do not give away information Practices specifically prohibited by this rule: unauthorised use of plain language compromising classified callsigns by: plain language disclosure linking them with unclassified callsigns ©LTCOL G.R. Newman-Martin 2011

RULES FOR TRANSMISSION SECURITY Do not give away information Practices specifically prohibited by this rule: unauthorised use of plain language compromising classified callsigns by: plain language disclosure linking them with unclassified callsigns transmitting the operator’s personal sign or name

©LTCOL G.R. Newman-Martin 2011 AIDS TO SECURITY ©LTCOL G.R. Newman-Martin 2011

©LTCOL G.R. Newman-Martin 2011 AIDS TO SECURITY Code words ©LTCOL G.R. Newman-Martin 2011

©LTCOL G.R. Newman-Martin 2011 AIDS TO SECURITY Code words Nicknames ©LTCOL G.R. Newman-Martin 2011

©LTCOL G.R. Newman-Martin 2011 AIDS TO SECURITY Code words Nicknames Low-grade tactical codes ©LTCOL G.R. Newman-Martin 2011

©LTCOL G.R. Newman-Martin 2011 AIDS TO SECURITY Code words Nicknames Low-grade tactical codes Radio appointment titles ©LTCOL G.R. Newman-Martin 2011

©LTCOL G.R. Newman-Martin 2011 AIDS TO SECURITY Code words Nicknames Low-grade tactical codes Radio appointment titles Address groups and call-signs ©LTCOL G.R. Newman-Martin 2011

©LTCOL G.R. Newman-Martin 2011 AIDS TO SECURITY Code words Nicknames Low-grade tactical codes Radio appointment titles Address groups and call-signs Veiled speech ©LTCOL G.R. Newman-Martin 2011

©LTCOL G.R. Newman-Martin 2011 What is a ‘code word’? A single word which has been assigned: a security classification ©LTCOL G.R. Newman-Martin 2011

©LTCOL G.R. Newman-Martin 2011 What is a ‘code word’? A single word which has been assigned: a security classification a classified meaning ©LTCOL G.R. Newman-Martin 2011

©LTCOL G.R. Newman-Martin 2011 What is a ‘code word’? A single word which has been assigned: a security classification a classified meaning Meaning is registered and safeguarded ©LTCOL G.R. Newman-Martin 2011

©LTCOL G.R. Newman-Martin 2011 What is a ‘code word’? A single word which has been assigned: a security classification a classified meaning Meaning is registered and safeguarded Use of unauthorised codewords is prohibited ©LTCOL G.R. Newman-Martin 2011

LOW-GRADE TACTICAL CODES ©LTCOL G.R. Newman-Martin 2011

©LTCOL G.R. Newman-Martin 2011 LOW-GRADE TACTICAL CODES Operations codes (OPSCODES) Numeral codes (NUMCODES) Authentication tables ©LTCOL G.R. Newman-Martin 2011

©LTCOL G.R. Newman-Martin 2011 LOW-GRADE TACTICAL CODES Provide temporary security ©LTCOL G.R. Newman-Martin 2011

©LTCOL G.R. Newman-Martin 2011 LOW-GRADE TACTICAL CODES Provide temporary security Need to be decoded before they can be understood ©LTCOL G.R. Newman-Martin 2011

©LTCOL G.R. Newman-Martin 2011 LOW-GRADE TACTICAL CODES Provide temporary security Need to be decoded before they can be understood Can be broken with time ©LTCOL G.R. Newman-Martin 2011

LOW-GRADE TACTICAL CODES Provide temporary security Need to be decoded before they can be understood Can be broken with time Code tables are classified, accountable items

©LTCOL G.R. Newman-Martin 2011 OPSCODES ©LTCOL G.R. Newman-Martin 2011

©LTCOL G.R. Newman-Martin 2011 OPSCODES Substitute text of a message by pre- arranged material ©LTCOL G.R. Newman-Martin 2011

©LTCOL G.R. Newman-Martin 2011 OPSCODES Substitute text of a message by pre- arranged material Can only be understood by sender and intended receiver ©LTCOL G.R. Newman-Martin 2011

©LTCOL G.R. Newman-Martin 2011 OPSCODES Substitute text of a message by pre- arranged material Can only be understood by sender and intended receiver This delays understanding by receiver until message is decoded ©LTCOL G.R. Newman-Martin 2011

©LTCOL G.R. Newman-Martin 2011 OPSCODES Substitute text of a message by pre- arranged material Can only be understood by sender and intended receiver This delays understanding by receiver until message is decoded Provide only short-term security ©LTCOL G.R. Newman-Martin 2011

OPSCODES Substitute text of a message by pre- arranged material Can only be understood by sender and intended receiver This delays understanding by receiver until message is decoded Provide only short-term security OPSCODE tables must be changed daily

©LTCOL G.R. Newman-Martin 2011 NUMCODES ©LTCOL G.R. Newman-Martin 2011

©LTCOL G.R. Newman-Martin 2011 NUMCODES Substitute numbers within plain text message by pre- arranged material ©LTCOL G.R. Newman-Martin 2011

©LTCOL G.R. Newman-Martin 2011 NUMCODES Substitute numbers within plain text message by pre- arranged material Can only be understood by sender and intended receiver ©LTCOL G.R. Newman-Martin 2011

©LTCOL G.R. Newman-Martin 2011 NUMCODES Substitute numbers within plain text message by pre- arranged material Can only be understood by sender and intended receiver Prevents unauthorised listeners from understanding numbers (e.g. grid references) immediately ©LTCOL G.R. Newman-Martin 2011

©LTCOL G.R. Newman-Martin 2011 NUMCODES Substitute numbers within plain text message by pre- arranged material Can only be understood by sender and intended receiver Prevents unauthorised listeners from understanding numbers (e.g. grid references) immediately Delays understanding by receiver until numbers are decoded ©LTCOL G.R. Newman-Martin 2011

©LTCOL G.R. Newman-Martin 2011 NUMCODES Substitute numbers within plain text message by pre- arranged material Can only be understood by sender and intended receiver Prevents unauthorised listeners from understanding numbers (e.g. grid references) immediately Delays understanding by receiver until numbers are decoded Provide only short-term security ©LTCOL G.R. Newman-Martin 2011

©LTCOL G.R. Newman-Martin 2011 NUMCODES Substitute numbers within plain text message by pre- arranged material Can only be understood by sender and intended receiver Prevents unauthorised listeners from understanding numbers (e.g. grid references) immediately Delays understanding by receiver until numbers are decoded Provide only short-term security NUMCODE tables must be changed daily ©LTCOL G.R. Newman-Martin 2011

AUTHENTICATION TABLES Refer to the two scenes in movie Crimson Tide which show the use of authentication codes. ©LTCOL G.R. Newman-Martin 2011

AUTHENTICATION TABLES USED TO: CHALLENGE THE IDENTITY OF A STATION ©LTCOL G.R. Newman-Martin 2011

AUTHENTICATION TABLES USED TO: CHALLENGE THE IDENTITY OF A STATION ESTABLISH THE AUTHENTICITY OF: ©LTCOL G.R. Newman-Martin 2011

AUTHENTICATION TABLES USED TO: CHALLENGE THE IDENTITY OF A STATION ESTABLISH THE AUTHENTICITY OF: A STATION ©LTCOL G.R. Newman-Martin 2011

AUTHENTICATION TABLES USED TO: CHALLENGE THE IDENTITY OF A STATION ESTABLISH THE AUTHENTICITY OF: A STATION A TRANSMISSION ©LTCOL G.R. Newman-Martin 2011

AUTHENTICATION TABLES USED TO: CHALLENGE THE IDENTITY OF A STATION ESTABLISH THE AUTHENTICITY OF: A STATION A TRANSMISSION A MESSAGE

©LTCOL G.R. Newman-Martin 2011 The movie ‘Crimson Tide’ depicts the use of authentication tables to authenticate operational command messages ©LTCOL G.R. Newman-Martin 2011

©LTCOL G.R. Newman-Martin 2011 NICKNAMES ©LTCOL G.R. Newman-Martin 2011

©LTCOL G.R. Newman-Martin 2011 NICKNAMES PRE-ARRANGED CLASSIFIED WORDS ©LTCOL G.R. Newman-Martin 2011

©LTCOL G.R. Newman-Martin 2011 NICKNAMES PRE-ARRANGED CLASSIFIED WORDS CONVEY HIDDEN MEANINGS OTHER THAN THEIR USUAL MEANINGS ©LTCOL G.R. Newman-Martin 2011

©LTCOL G.R. Newman-Martin 2011 NICKNAMES PRE-ARRANGED CLASSIFIED WORDS CONVEY HIDDEN MEANINGS OTHER THAN THEIR USUAL MEANINGS USED FOR: COMMUNICATIONS DRILL FOR: ©LTCOL G.R. Newman-Martin 2011

©LTCOL G.R. Newman-Martin 2011 NICKNAMES PRE-ARRANGED CLASSIFIED WORDS CONVEY HIDDEN MEANINGS OTHER THAN THEIR USUAL MEANINGS USED FOR: COMMUNICATIONS DRILL FOR: CLOSING DOWN, IMPOSING/LIFTING RADIO SILENCE, CHANGING FREQUENCY ©LTCOL G.R. Newman-Martin 2011

©LTCOL G.R. Newman-Martin 2011 NICKNAMES PRE-ARRANGED CLASSIFIED WORDS CONVEY HIDDEN MEANINGS OTHER THAN THEIR USUAL MEANINGS USED FOR: COMMUNICATIONS DRILL FOR: CLOSING DOWN, IMPOSING/LIFTING RADIO SILENCE, CHANGING FREQUENCY SUBSTITUTING FOR UNPRONOUNCEABLE NAMES ©LTCOL G.R. Newman-Martin 2011

©LTCOL G.R. Newman-Martin 2011 NICKNAMES PRE-ARRANGED CLASSIFIED WORDS CONVEY HIDDEN MEANINGS OTHER THAN THEIR USUAL MEANINGS USED FOR: COMMUNICATIONS DRILL FOR: CLOSING DOWN, IMPOSING/LIFTING RADIO SILENCE, CHANGING FREQUENCY SUBSTITUTING FOR UNPRONOUNCEABLE NAMES PROVISION OF LOW-GRADE COVER FOR REFERENCE TO GEOGRAPHICAL FEATURES e.g. OBJECTIVES, BOUNDS, ROUTES, REPORT LINES ©LTCOL G.R. Newman-Martin 2011

©LTCOL G.R. Newman-Martin 2011 Other low-grade security measures Radio Appointment Titles Callsigns Address Groups ©LTCOL G.R. Newman-Martin 2011

©LTCOL G.R. Newman-Martin 2011 Veiled Speech The art of referring to a future event by reference to the past ©LTCOL G.R. Newman-Martin 2011

©LTCOL G.R. Newman-Martin 2011 Veiled Speech The art of referring to a future event by reference to the past Consists of a reference to events of which unauthorised persons or groups have no knowledge. ©LTCOL G.R. Newman-Martin 2011

©LTCOL G.R. Newman-Martin 2011 Veiled Speech The art of referring to a future event by reference to the past Consists of a reference to events of which unauthorised persons or groups have no knowledge. Poor aid to security ©LTCOL G.R. Newman-Martin 2011

©LTCOL G.R. Newman-Martin 2011 Veiled Speech The art of referring to a future event by reference to the past Consists of a reference to events of which unauthorised persons or groups have no knowledge. Poor aid to security Should be used sparingly – operators and users can never be sure of what knowledge unauthorised persons have. ©LTCOL G.R. Newman-Martin 2011

©LTCOL G.R. Newman-Martin 2011 NET SECURITY MEASURES ©LTCOL G.R. Newman-Martin 2011

©LTCOL G.R. Newman-Martin 2011 Net Security Measures Those actions taken to protect security ©LTCOL G.R. Newman-Martin 2011

©LTCOL G.R. Newman-Martin 2011 Net Security Measures Those actions taken to protect security They include instructions for: opening and closing communications ©LTCOL G.R. Newman-Martin 2011

©LTCOL G.R. Newman-Martin 2011 Net Security Measures Those actions taken to protect security They include instructions for: opening and closing communications authentication ©LTCOL G.R. Newman-Martin 2011

©LTCOL G.R. Newman-Martin 2011 Net Security Measures Those actions taken to protect security They include instructions for: opening and closing communications authentication radio silence, change of frequency ©LTCOL G.R. Newman-Martin 2011

©LTCOL G.R. Newman-Martin 2011 Net Security Measures Those actions taken to protect security They include instructions for: opening and closing communications authentication radio silence, change of frequency action in cases of compromise etc. ©LTCOL G.R. Newman-Martin 2011

©LTCOL G.R. Newman-Martin 2011 Net Security Measures Information that is subject to periodic change ©LTCOL G.R. Newman-Martin 2011

©LTCOL G.R. Newman-Martin 2011 Net Security Measures Information that is subject to periodic change ….and which is required to implement net security measures ©LTCOL G.R. Newman-Martin 2011

©LTCOL G.R. Newman-Martin 2011 Net Security Measures Information that is subject to periodic change ….and which is required to implement net security measures ….is outlined in RATEL SOIs for particular exercises ©LTCOL G.R. Newman-Martin 2011

©LTCOL G.R. Newman-Martin 2011 Net Security Measures Information that is subject to periodic change ….and which is required to implement net security measures ….is outlined in RATEL SOIs for particular exercises ….& includes details of nicknames, callsigns and frequencies. ©LTCOL G.R. Newman-Martin 2011

©LTCOL G.R. Newman-Martin 2011 DEFENCE AGAINST RADIO JAMMING ©LTCOL G.R. Newman-Martin 2011 24

DEFENCE AGAINST RADIO JAMMING USE RADIO ONLY WHEN NECESSARY ©LTCOL G.R. Newman-Martin 2011

DEFENCE AGAINST RADIO JAMMING USE RADIO ONLY WHEN NECESSARY KEEP CONVERSATIONS SHORT ©LTCOL G.R. Newman-Martin 2011

DEFENCE AGAINST RADIO JAMMING USE RADIO ONLY WHEN NECESSARY KEEP CONVERSATIONS SHORT CUT DOWN YOUR RADIATION – LOW POWER ©LTCOL G.R. Newman-Martin 2011

DEFENCE AGAINST RADIO JAMMING USE RADIO ONLY WHEN NECESSARY KEEP CONVERSATIONS SHORT CUT DOWN YOUR RADIATION – LOW POWER CHOOSE SITE WELL ©LTCOL G.R. Newman-Martin 2011

DEFENCE AGAINST RADIO JAMMING USE RADIO ONLY WHEN NECESSARY KEEP CONVERSATIONS SHORT CUT DOWN YOUR RADIATION – LOW POWER CHOOSE SITE WELL USE CARE BUT BE AS BRIEF AS POSSIBLE WHEN TUNING IS NECESSARY ©LTCOL G.R. Newman-Martin 2011

DEFENCE AGAINST RADIO JAMMING USE RADIO ONLY WHEN NECESSARY KEEP CONVERSATIONS SHORT CUT DOWN YOUR RADIATION – LOW POWER CHOOSE SITE WELL USE CARE BUT BE AS BRIEF AS POSSIBLE WHEN TUNING IS NECESSARY USE CORRECT PROCEDURE ©LTCOL G.R. Newman-Martin 2011

DEFENCE AGAINST RADIO JAMMING USE RADIO ONLY WHEN NECESSARY KEEP CONVERSATIONS SHORT CUT DOWN YOUR RADIATION – LOW POWER CHOOSE SITE WELL USE CARE BUT BE AS BRIEF AS POSSIBLE WHEN TUNING IS NECESSARY USE CORRECT PROCEDURE AVOID MANNERISMS, IDIOSYNCRACIES AND ACCENTS TO REMAIN ANONYMOUS AND INDISTINGUISHABLE FROM OTHER RADIO USERS ©LTCOL G.R. Newman-Martin 2011

©LTCOL G.R. Newman-Martin 2011 GOTTA QUESTION PUNK… …WELL DO YA? ©LTCOL G.R. Newman-Martin 2011