Download presentation
Presentation is loading. Please wait.
1
AUSTRALIAN ARMY CADETS RADIO OPERATORS COURSE
CADET ADVANCED RADIO OPERATORS COURSE This presentation corresponds to Chapter 7 of the AAC CADET INSTRUCTOR RADIO COMMUNICATIONS HANDBOOK This course has been designed, written and developed by LTCOL(AAC) G.R. Newman-Martin, CSM, RFD ©LTCOL(AAC) G.R. NEWMAN-MARTIN, 2011
2
©LTCOL G.R. Newman-Martin 2011
Topic 7 ©LTCOL G.R. Newman-Martin 2011
3
©LTCOL G.R. Newman-Martin 2011
SECURITY ©LTCOL G.R. Newman-Martin 2011
4
©LTCOL G.R. Newman-Martin 2011
SECURITY RULES, OK? ©LTCOL G.R. Newman-Martin 2011
5
©LTCOL G.R. Newman-Martin 2011
SECURITY TAKING MEASURES TO PREVENT ACCESS ©LTCOL G.R. Newman-Martin 2011
6
BY NON-AUTHORISED PERSONS / GROUPS
SECURITY TAKING MEASURES TO PREVENT ACCESS BY NON-AUTHORISED PERSONS / GROUPS ©LTCOL G.R. Newman-Martin 2011
7
SECURITY TAKING MEASURES TO PREVENT ACCESS
BY NON-AUTHORISED PERSONS / GROUPS TO INFORMATION WHICH THEY SHOULD NOT ACCESS ©LTCOL G.R. Newman-Martin 2011
8
SHORT-TERM INFORMATION
©LTCOL G.R. Newman-Martin 2011
9
SHORT-TERM INFORMATION
…is information which is concerned with operations under way ©LTCOL G.R. Newman-Martin 2011
10
SHORT-TERM INFORMATION
…is information which is concerned with operations under way …..and which could give the opposition an advantage in the short term ©LTCOL G.R. Newman-Martin 2011
11
LONG-TERM INFORMATION
©LTCOL G.R. Newman-Martin 2011
12
LONG-TERM INFORMATION
Information of details of: Units Formations Future intentions ©LTCOL G.R. Newman-Martin 2011
13
LONG-TERM INFORMATION
Not to be encoded in low-grade tactical code except in emergency ©LTCOL G.R. Newman-Martin 2011
14
LONG-TERM INFORMATION
Not to be encoded in low-grade tactical code except in emergency …and then only after every other secure means of transmission has been considered ©LTCOL G.R. Newman-Martin 2011
15
LONG-TERM INFORMATION
Can be gained from: Direct breaches inadvertent careless ©LTCOL G.R. Newman-Martin 2011
16
LONG-TERM INFORMATION
Can be gained from: Indirect breaches Operators’ and users’: peculiarities ©LTCOL G.R. Newman-Martin 2011
17
LONG-TERM INFORMATION
Can be gained from: Indirect breaches Operators’ and users’: peculiarities idiosyncracies ©LTCOL G.R. Newman-Martin 2011
18
LONG-TERM INFORMATION
Can be gained from: Indirect breaches Operators’ and users’: peculiarities idiosyncracies operating techniques
19
©LTCOL G.R. Newman-Martin 2011
20
RULES FOR MAINTENANCE OF SECURITY
©LTCOL G.R. Newman-Martin 2011
21
RULES FOR MAINTENANCE OF SECURITY
Use of prescribed procedures is mandatory ©LTCOL G.R. Newman-Martin 2011
22
RULES FOR MAINTENANCE OF SECURITY
Use of prescribed procedures is mandatory Use correct RATEL procedure ©LTCOL G.R. Newman-Martin 2011
23
RULES FOR MAINTENANCE OF SECURITY
Use of prescribed procedures is mandatory Use correct RATEL procedure Brevity – transmissions short & concise as possible, consistent with clarity ©LTCOL G.R. Newman-Martin 2011
24
RULES FOR MAINTENANCE OF SECURITY
Use of prescribed procedures is mandatory Use correct RATEL procedure Brevity – transmissions short & concise as possible, consistent with clarity Have a clear idea of what you are going to say, before you transmit ©LTCOL G.R. Newman-Martin 2011
25
RULES FOR MAINTENANCE OF SECURITY
Use of prescribed procedures is mandatory Use correct RATEL procedure Brevity – transmissions short & concise as possible, consistent with clarity Have a clear idea of what you are going to say, before you transmit Enforce rules for transmission security ©LTCOL G.R. Newman-Martin 2011
26
RULES FOR MAINTENANCE OF SECURITY
Use of prescribed procedures is mandatory Use correct RATEL procedure Brevity – transmissions short & concise as possible, consistent with clarity Have a clear idea of what you are going to say, before you transmit Enforce rules for transmission security THINK BEFORE SPEAKING! ©LTCOL G.R. Newman-Martin 2011
27
RULES FOR MAINTENANCE OF SECURITY
Use of prescribed procedures is mandatory Use correct RATEL procedure Brevity – transmissions short & concise as possible, consistent with clarity Have a clear idea of what you are going to say, before you transmit Enforce rules for transmission security THINK BEFORE SPEAKING! Do not use unauthorised codes or unauthorised prowords
28
TRANSMISSION SECURITY
RULES FOR TRANSMISSION SECURITY
29
RULES FOR TRANSMISSION SECURITY
Only authorised transmissions are to be made ©LTCOL G.R. Newman-Martin 2011
30
RULES FOR TRANSMISSION SECURITY
Only authorised transmissions are to be made Practices specifically prohibited by this rule: Violations of communications silence ©LTCOL G.R. Newman-Martin 2011
31
RULES FOR TRANSMISSION SECURITY
Only authorised transmissions are to be made Practices specifically prohibited by this rule: Violations of communications silence Unofficial conversations between operators ©LTCOL G.R. Newman-Martin 2011
32
RULES FOR TRANSMISSION SECURITY
Only authorised transmissions are to be made Practices specifically prohibited by this rule: Violations of communications silence Unofficial conversations between operators Transmitting on directed net without permission ©LTCOL G.R. Newman-Martin 2011
33
RULES FOR TRANSMISSION SECURITY Do not give away information
©LTCOL G.R. Newman-Martin 2011
34
RULES FOR TRANSMISSION SECURITY Do not give away information
Practices specifically prohibited by this rule: unauthorised use of plain language ©LTCOL G.R. Newman-Martin 2011
35
RULES FOR TRANSMISSION SECURITY Do not give away information
Practices specifically prohibited by this rule: unauthorised use of plain language compromising classified callsigns by: ©LTCOL G.R. Newman-Martin 2011
36
RULES FOR TRANSMISSION SECURITY Do not give away information
Practices specifically prohibited by this rule: unauthorised use of plain language compromising classified callsigns by: plain language disclosure ©LTCOL G.R. Newman-Martin 2011
37
RULES FOR TRANSMISSION SECURITY Do not give away information
Practices specifically prohibited by this rule: unauthorised use of plain language compromising classified callsigns by: plain language disclosure linking them with unclassified callsigns ©LTCOL G.R. Newman-Martin 2011
38
RULES FOR TRANSMISSION SECURITY Do not give away information
Practices specifically prohibited by this rule: unauthorised use of plain language compromising classified callsigns by: plain language disclosure linking them with unclassified callsigns transmitting the operator’s personal sign or name
39
©LTCOL G.R. Newman-Martin 2011
AIDS TO SECURITY ©LTCOL G.R. Newman-Martin 2011
40
©LTCOL G.R. Newman-Martin 2011
AIDS TO SECURITY Code words ©LTCOL G.R. Newman-Martin 2011
41
©LTCOL G.R. Newman-Martin 2011
AIDS TO SECURITY Code words Nicknames ©LTCOL G.R. Newman-Martin 2011
42
©LTCOL G.R. Newman-Martin 2011
AIDS TO SECURITY Code words Nicknames Low-grade tactical codes ©LTCOL G.R. Newman-Martin 2011
43
©LTCOL G.R. Newman-Martin 2011
AIDS TO SECURITY Code words Nicknames Low-grade tactical codes Radio appointment titles ©LTCOL G.R. Newman-Martin 2011
44
©LTCOL G.R. Newman-Martin 2011
AIDS TO SECURITY Code words Nicknames Low-grade tactical codes Radio appointment titles Address groups and call-signs ©LTCOL G.R. Newman-Martin 2011
45
©LTCOL G.R. Newman-Martin 2011
AIDS TO SECURITY Code words Nicknames Low-grade tactical codes Radio appointment titles Address groups and call-signs Veiled speech ©LTCOL G.R. Newman-Martin 2011
46
©LTCOL G.R. Newman-Martin 2011
What is a ‘code word’? A single word which has been assigned: a security classification ©LTCOL G.R. Newman-Martin 2011
47
©LTCOL G.R. Newman-Martin 2011
What is a ‘code word’? A single word which has been assigned: a security classification a classified meaning ©LTCOL G.R. Newman-Martin 2011
48
©LTCOL G.R. Newman-Martin 2011
What is a ‘code word’? A single word which has been assigned: a security classification a classified meaning Meaning is registered and safeguarded ©LTCOL G.R. Newman-Martin 2011
49
©LTCOL G.R. Newman-Martin 2011
What is a ‘code word’? A single word which has been assigned: a security classification a classified meaning Meaning is registered and safeguarded Use of unauthorised codewords is prohibited ©LTCOL G.R. Newman-Martin 2011
50
LOW-GRADE TACTICAL CODES
©LTCOL G.R. Newman-Martin 2011
51
©LTCOL G.R. Newman-Martin 2011
LOW-GRADE TACTICAL CODES Operations codes (OPSCODES) Numeral codes (NUMCODES) Authentication tables ©LTCOL G.R. Newman-Martin 2011
52
©LTCOL G.R. Newman-Martin 2011
LOW-GRADE TACTICAL CODES Provide temporary security ©LTCOL G.R. Newman-Martin 2011
53
©LTCOL G.R. Newman-Martin 2011
LOW-GRADE TACTICAL CODES Provide temporary security Need to be decoded before they can be understood ©LTCOL G.R. Newman-Martin 2011
54
©LTCOL G.R. Newman-Martin 2011
LOW-GRADE TACTICAL CODES Provide temporary security Need to be decoded before they can be understood Can be broken with time ©LTCOL G.R. Newman-Martin 2011
55
LOW-GRADE TACTICAL CODES Provide temporary security
Need to be decoded before they can be understood Can be broken with time Code tables are classified, accountable items
57
©LTCOL G.R. Newman-Martin 2011
OPSCODES ©LTCOL G.R. Newman-Martin 2011
58
©LTCOL G.R. Newman-Martin 2011
OPSCODES Substitute text of a message by pre- arranged material ©LTCOL G.R. Newman-Martin 2011
59
©LTCOL G.R. Newman-Martin 2011
OPSCODES Substitute text of a message by pre- arranged material Can only be understood by sender and intended receiver ©LTCOL G.R. Newman-Martin 2011
60
©LTCOL G.R. Newman-Martin 2011
OPSCODES Substitute text of a message by pre- arranged material Can only be understood by sender and intended receiver This delays understanding by receiver until message is decoded ©LTCOL G.R. Newman-Martin 2011
61
©LTCOL G.R. Newman-Martin 2011
OPSCODES Substitute text of a message by pre- arranged material Can only be understood by sender and intended receiver This delays understanding by receiver until message is decoded Provide only short-term security ©LTCOL G.R. Newman-Martin 2011
62
OPSCODES Substitute text of a message by pre- arranged material
Can only be understood by sender and intended receiver This delays understanding by receiver until message is decoded Provide only short-term security OPSCODE tables must be changed daily
63
©LTCOL G.R. Newman-Martin 2011
NUMCODES ©LTCOL G.R. Newman-Martin 2011
64
©LTCOL G.R. Newman-Martin 2011
NUMCODES Substitute numbers within plain text message by pre- arranged material ©LTCOL G.R. Newman-Martin 2011
65
©LTCOL G.R. Newman-Martin 2011
NUMCODES Substitute numbers within plain text message by pre- arranged material Can only be understood by sender and intended receiver ©LTCOL G.R. Newman-Martin 2011
66
©LTCOL G.R. Newman-Martin 2011
NUMCODES Substitute numbers within plain text message by pre- arranged material Can only be understood by sender and intended receiver Prevents unauthorised listeners from understanding numbers (e.g. grid references) immediately ©LTCOL G.R. Newman-Martin 2011
67
©LTCOL G.R. Newman-Martin 2011
NUMCODES Substitute numbers within plain text message by pre- arranged material Can only be understood by sender and intended receiver Prevents unauthorised listeners from understanding numbers (e.g. grid references) immediately Delays understanding by receiver until numbers are decoded ©LTCOL G.R. Newman-Martin 2011
68
©LTCOL G.R. Newman-Martin 2011
NUMCODES Substitute numbers within plain text message by pre- arranged material Can only be understood by sender and intended receiver Prevents unauthorised listeners from understanding numbers (e.g. grid references) immediately Delays understanding by receiver until numbers are decoded Provide only short-term security ©LTCOL G.R. Newman-Martin 2011
69
©LTCOL G.R. Newman-Martin 2011
NUMCODES Substitute numbers within plain text message by pre- arranged material Can only be understood by sender and intended receiver Prevents unauthorised listeners from understanding numbers (e.g. grid references) immediately Delays understanding by receiver until numbers are decoded Provide only short-term security NUMCODE tables must be changed daily ©LTCOL G.R. Newman-Martin 2011
70
AUTHENTICATION TABLES
Refer to the two scenes in movie Crimson Tide which show the use of authentication codes. ©LTCOL G.R. Newman-Martin 2011
71
AUTHENTICATION TABLES
USED TO: CHALLENGE THE IDENTITY OF A STATION ©LTCOL G.R. Newman-Martin 2011
72
AUTHENTICATION TABLES
USED TO: CHALLENGE THE IDENTITY OF A STATION ESTABLISH THE AUTHENTICITY OF: ©LTCOL G.R. Newman-Martin 2011
73
AUTHENTICATION TABLES
USED TO: CHALLENGE THE IDENTITY OF A STATION ESTABLISH THE AUTHENTICITY OF: A STATION ©LTCOL G.R. Newman-Martin 2011
74
AUTHENTICATION TABLES
USED TO: CHALLENGE THE IDENTITY OF A STATION ESTABLISH THE AUTHENTICITY OF: A STATION A TRANSMISSION ©LTCOL G.R. Newman-Martin 2011
75
AUTHENTICATION TABLES
USED TO: CHALLENGE THE IDENTITY OF A STATION ESTABLISH THE AUTHENTICITY OF: A STATION A TRANSMISSION A MESSAGE
76
©LTCOL G.R. Newman-Martin 2011
The movie ‘Crimson Tide’ depicts the use of authentication tables to authenticate operational command messages ©LTCOL G.R. Newman-Martin 2011
77
©LTCOL G.R. Newman-Martin 2011
NICKNAMES ©LTCOL G.R. Newman-Martin 2011
78
©LTCOL G.R. Newman-Martin 2011
NICKNAMES PRE-ARRANGED CLASSIFIED WORDS ©LTCOL G.R. Newman-Martin 2011
79
©LTCOL G.R. Newman-Martin 2011
NICKNAMES PRE-ARRANGED CLASSIFIED WORDS CONVEY HIDDEN MEANINGS OTHER THAN THEIR USUAL MEANINGS ©LTCOL G.R. Newman-Martin 2011
80
©LTCOL G.R. Newman-Martin 2011
NICKNAMES PRE-ARRANGED CLASSIFIED WORDS CONVEY HIDDEN MEANINGS OTHER THAN THEIR USUAL MEANINGS USED FOR: COMMUNICATIONS DRILL FOR: ©LTCOL G.R. Newman-Martin 2011
81
©LTCOL G.R. Newman-Martin 2011
NICKNAMES PRE-ARRANGED CLASSIFIED WORDS CONVEY HIDDEN MEANINGS OTHER THAN THEIR USUAL MEANINGS USED FOR: COMMUNICATIONS DRILL FOR: CLOSING DOWN, IMPOSING/LIFTING RADIO SILENCE, CHANGING FREQUENCY ©LTCOL G.R. Newman-Martin 2011
82
©LTCOL G.R. Newman-Martin 2011
NICKNAMES PRE-ARRANGED CLASSIFIED WORDS CONVEY HIDDEN MEANINGS OTHER THAN THEIR USUAL MEANINGS USED FOR: COMMUNICATIONS DRILL FOR: CLOSING DOWN, IMPOSING/LIFTING RADIO SILENCE, CHANGING FREQUENCY SUBSTITUTING FOR UNPRONOUNCEABLE NAMES ©LTCOL G.R. Newman-Martin 2011
83
©LTCOL G.R. Newman-Martin 2011
NICKNAMES PRE-ARRANGED CLASSIFIED WORDS CONVEY HIDDEN MEANINGS OTHER THAN THEIR USUAL MEANINGS USED FOR: COMMUNICATIONS DRILL FOR: CLOSING DOWN, IMPOSING/LIFTING RADIO SILENCE, CHANGING FREQUENCY SUBSTITUTING FOR UNPRONOUNCEABLE NAMES PROVISION OF LOW-GRADE COVER FOR REFERENCE TO GEOGRAPHICAL FEATURES e.g. OBJECTIVES, BOUNDS, ROUTES, REPORT LINES ©LTCOL G.R. Newman-Martin 2011
84
©LTCOL G.R. Newman-Martin 2011
Other low-grade security measures Radio Appointment Titles Callsigns Address Groups ©LTCOL G.R. Newman-Martin 2011
85
©LTCOL G.R. Newman-Martin 2011
Veiled Speech The art of referring to a future event by reference to the past ©LTCOL G.R. Newman-Martin 2011
86
©LTCOL G.R. Newman-Martin 2011
Veiled Speech The art of referring to a future event by reference to the past Consists of a reference to events of which unauthorised persons or groups have no knowledge. ©LTCOL G.R. Newman-Martin 2011
87
©LTCOL G.R. Newman-Martin 2011
Veiled Speech The art of referring to a future event by reference to the past Consists of a reference to events of which unauthorised persons or groups have no knowledge. Poor aid to security ©LTCOL G.R. Newman-Martin 2011
88
©LTCOL G.R. Newman-Martin 2011
Veiled Speech The art of referring to a future event by reference to the past Consists of a reference to events of which unauthorised persons or groups have no knowledge. Poor aid to security Should be used sparingly – operators and users can never be sure of what knowledge unauthorised persons have. ©LTCOL G.R. Newman-Martin 2011
89
©LTCOL G.R. Newman-Martin 2011
NET SECURITY MEASURES ©LTCOL G.R. Newman-Martin 2011
90
©LTCOL G.R. Newman-Martin 2011
Net Security Measures Those actions taken to protect security ©LTCOL G.R. Newman-Martin 2011
91
©LTCOL G.R. Newman-Martin 2011
Net Security Measures Those actions taken to protect security They include instructions for: opening and closing communications ©LTCOL G.R. Newman-Martin 2011
92
©LTCOL G.R. Newman-Martin 2011
Net Security Measures Those actions taken to protect security They include instructions for: opening and closing communications authentication ©LTCOL G.R. Newman-Martin 2011
93
©LTCOL G.R. Newman-Martin 2011
Net Security Measures Those actions taken to protect security They include instructions for: opening and closing communications authentication radio silence, change of frequency ©LTCOL G.R. Newman-Martin 2011
94
©LTCOL G.R. Newman-Martin 2011
Net Security Measures Those actions taken to protect security They include instructions for: opening and closing communications authentication radio silence, change of frequency action in cases of compromise etc. ©LTCOL G.R. Newman-Martin 2011
95
©LTCOL G.R. Newman-Martin 2011
Net Security Measures Information that is subject to periodic change ©LTCOL G.R. Newman-Martin 2011
96
©LTCOL G.R. Newman-Martin 2011
Net Security Measures Information that is subject to periodic change ….and which is required to implement net security measures ©LTCOL G.R. Newman-Martin 2011
97
©LTCOL G.R. Newman-Martin 2011
Net Security Measures Information that is subject to periodic change ….and which is required to implement net security measures ….is outlined in RATEL SOIs for particular exercises ©LTCOL G.R. Newman-Martin 2011
98
©LTCOL G.R. Newman-Martin 2011
Net Security Measures Information that is subject to periodic change ….and which is required to implement net security measures ….is outlined in RATEL SOIs for particular exercises ….& includes details of nicknames, callsigns and frequencies. ©LTCOL G.R. Newman-Martin 2011
99
©LTCOL G.R. Newman-Martin 2011
DEFENCE AGAINST RADIO JAMMING ©LTCOL G.R. Newman-Martin 2011 24
100
DEFENCE AGAINST RADIO JAMMING
USE RADIO ONLY WHEN NECESSARY ©LTCOL G.R. Newman-Martin 2011
101
DEFENCE AGAINST RADIO JAMMING
USE RADIO ONLY WHEN NECESSARY KEEP CONVERSATIONS SHORT ©LTCOL G.R. Newman-Martin 2011
102
DEFENCE AGAINST RADIO JAMMING
USE RADIO ONLY WHEN NECESSARY KEEP CONVERSATIONS SHORT CUT DOWN YOUR RADIATION – LOW POWER ©LTCOL G.R. Newman-Martin 2011
103
DEFENCE AGAINST RADIO JAMMING
USE RADIO ONLY WHEN NECESSARY KEEP CONVERSATIONS SHORT CUT DOWN YOUR RADIATION – LOW POWER CHOOSE SITE WELL ©LTCOL G.R. Newman-Martin 2011
104
DEFENCE AGAINST RADIO JAMMING
USE RADIO ONLY WHEN NECESSARY KEEP CONVERSATIONS SHORT CUT DOWN YOUR RADIATION – LOW POWER CHOOSE SITE WELL USE CARE BUT BE AS BRIEF AS POSSIBLE WHEN TUNING IS NECESSARY ©LTCOL G.R. Newman-Martin 2011
105
DEFENCE AGAINST RADIO JAMMING
USE RADIO ONLY WHEN NECESSARY KEEP CONVERSATIONS SHORT CUT DOWN YOUR RADIATION – LOW POWER CHOOSE SITE WELL USE CARE BUT BE AS BRIEF AS POSSIBLE WHEN TUNING IS NECESSARY USE CORRECT PROCEDURE ©LTCOL G.R. Newman-Martin 2011
106
DEFENCE AGAINST RADIO JAMMING
USE RADIO ONLY WHEN NECESSARY KEEP CONVERSATIONS SHORT CUT DOWN YOUR RADIATION – LOW POWER CHOOSE SITE WELL USE CARE BUT BE AS BRIEF AS POSSIBLE WHEN TUNING IS NECESSARY USE CORRECT PROCEDURE AVOID MANNERISMS, IDIOSYNCRACIES AND ACCENTS TO REMAIN ANONYMOUS AND INDISTINGUISHABLE FROM OTHER RADIO USERS ©LTCOL G.R. Newman-Martin 2011
107
©LTCOL G.R. Newman-Martin 2011
GOTTA QUESTION PUNK… …WELL DO YA? ©LTCOL G.R. Newman-Martin 2011
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.