Presentation is loading. Please wait.

Presentation is loading. Please wait.

AUSTRALIAN ARMY CADETS RADIO OPERATORS COURSE

Similar presentations


Presentation on theme: "AUSTRALIAN ARMY CADETS RADIO OPERATORS COURSE"— Presentation transcript:

1 AUSTRALIAN ARMY CADETS RADIO OPERATORS COURSE
CADET ADVANCED RADIO OPERATORS COURSE This presentation corresponds to Chapter 7 of the AAC CADET INSTRUCTOR RADIO COMMUNICATIONS HANDBOOK This course has been designed, written and developed by LTCOL(AAC) G.R. Newman-Martin, CSM, RFD ©LTCOL(AAC) G.R. NEWMAN-MARTIN, 2011

2 ©LTCOL G.R. Newman-Martin 2011
Topic 7 ©LTCOL G.R. Newman-Martin 2011

3 ©LTCOL G.R. Newman-Martin 2011
SECURITY ©LTCOL G.R. Newman-Martin 2011

4 ©LTCOL G.R. Newman-Martin 2011
SECURITY RULES, OK? ©LTCOL G.R. Newman-Martin 2011

5 ©LTCOL G.R. Newman-Martin 2011
SECURITY TAKING MEASURES TO PREVENT ACCESS ©LTCOL G.R. Newman-Martin 2011

6 BY NON-AUTHORISED PERSONS / GROUPS
SECURITY TAKING MEASURES TO PREVENT ACCESS BY NON-AUTHORISED PERSONS / GROUPS ©LTCOL G.R. Newman-Martin 2011

7 SECURITY TAKING MEASURES TO PREVENT ACCESS
BY NON-AUTHORISED PERSONS / GROUPS TO INFORMATION WHICH THEY SHOULD NOT ACCESS ©LTCOL G.R. Newman-Martin 2011

8 SHORT-TERM INFORMATION
©LTCOL G.R. Newman-Martin 2011

9 SHORT-TERM INFORMATION
…is information which is concerned with operations under way ©LTCOL G.R. Newman-Martin 2011

10 SHORT-TERM INFORMATION
…is information which is concerned with operations under way …..and which could give the opposition an advantage in the short term ©LTCOL G.R. Newman-Martin 2011

11 LONG-TERM INFORMATION
©LTCOL G.R. Newman-Martin 2011

12 LONG-TERM INFORMATION
Information of details of: Units Formations Future intentions ©LTCOL G.R. Newman-Martin 2011

13 LONG-TERM INFORMATION
Not to be encoded in low-grade tactical code except in emergency ©LTCOL G.R. Newman-Martin 2011

14 LONG-TERM INFORMATION
Not to be encoded in low-grade tactical code except in emergency …and then only after every other secure means of transmission has been considered ©LTCOL G.R. Newman-Martin 2011

15 LONG-TERM INFORMATION
Can be gained from: Direct breaches inadvertent careless ©LTCOL G.R. Newman-Martin 2011

16 LONG-TERM INFORMATION
Can be gained from: Indirect breaches Operators’ and users’: peculiarities ©LTCOL G.R. Newman-Martin 2011

17 LONG-TERM INFORMATION
Can be gained from: Indirect breaches Operators’ and users’: peculiarities idiosyncracies ©LTCOL G.R. Newman-Martin 2011

18 LONG-TERM INFORMATION
Can be gained from: Indirect breaches Operators’ and users’: peculiarities idiosyncracies operating techniques

19 ©LTCOL G.R. Newman-Martin 2011

20 RULES FOR MAINTENANCE OF SECURITY
©LTCOL G.R. Newman-Martin 2011

21 RULES FOR MAINTENANCE OF SECURITY
Use of prescribed procedures is mandatory ©LTCOL G.R. Newman-Martin 2011

22 RULES FOR MAINTENANCE OF SECURITY
Use of prescribed procedures is mandatory Use correct RATEL procedure ©LTCOL G.R. Newman-Martin 2011

23 RULES FOR MAINTENANCE OF SECURITY
Use of prescribed procedures is mandatory Use correct RATEL procedure Brevity – transmissions short & concise as possible, consistent with clarity ©LTCOL G.R. Newman-Martin 2011

24 RULES FOR MAINTENANCE OF SECURITY
Use of prescribed procedures is mandatory Use correct RATEL procedure Brevity – transmissions short & concise as possible, consistent with clarity Have a clear idea of what you are going to say, before you transmit ©LTCOL G.R. Newman-Martin 2011

25 RULES FOR MAINTENANCE OF SECURITY
Use of prescribed procedures is mandatory Use correct RATEL procedure Brevity – transmissions short & concise as possible, consistent with clarity Have a clear idea of what you are going to say, before you transmit Enforce rules for transmission security ©LTCOL G.R. Newman-Martin 2011

26 RULES FOR MAINTENANCE OF SECURITY
Use of prescribed procedures is mandatory Use correct RATEL procedure Brevity – transmissions short & concise as possible, consistent with clarity Have a clear idea of what you are going to say, before you transmit Enforce rules for transmission security THINK BEFORE SPEAKING! ©LTCOL G.R. Newman-Martin 2011

27 RULES FOR MAINTENANCE OF SECURITY
Use of prescribed procedures is mandatory Use correct RATEL procedure Brevity – transmissions short & concise as possible, consistent with clarity Have a clear idea of what you are going to say, before you transmit Enforce rules for transmission security THINK BEFORE SPEAKING! Do not use unauthorised codes or unauthorised prowords

28 TRANSMISSION SECURITY
RULES FOR TRANSMISSION SECURITY

29 RULES FOR TRANSMISSION SECURITY
Only authorised transmissions are to be made ©LTCOL G.R. Newman-Martin 2011

30 RULES FOR TRANSMISSION SECURITY
Only authorised transmissions are to be made Practices specifically prohibited by this rule: Violations of communications silence ©LTCOL G.R. Newman-Martin 2011

31 RULES FOR TRANSMISSION SECURITY
Only authorised transmissions are to be made Practices specifically prohibited by this rule: Violations of communications silence Unofficial conversations between operators ©LTCOL G.R. Newman-Martin 2011

32 RULES FOR TRANSMISSION SECURITY
Only authorised transmissions are to be made Practices specifically prohibited by this rule: Violations of communications silence Unofficial conversations between operators Transmitting on directed net without permission ©LTCOL G.R. Newman-Martin 2011

33 RULES FOR TRANSMISSION SECURITY Do not give away information
©LTCOL G.R. Newman-Martin 2011

34 RULES FOR TRANSMISSION SECURITY Do not give away information
Practices specifically prohibited by this rule: unauthorised use of plain language ©LTCOL G.R. Newman-Martin 2011

35 RULES FOR TRANSMISSION SECURITY Do not give away information
Practices specifically prohibited by this rule: unauthorised use of plain language compromising classified callsigns by: ©LTCOL G.R. Newman-Martin 2011

36 RULES FOR TRANSMISSION SECURITY Do not give away information
Practices specifically prohibited by this rule: unauthorised use of plain language compromising classified callsigns by: plain language disclosure ©LTCOL G.R. Newman-Martin 2011

37 RULES FOR TRANSMISSION SECURITY Do not give away information
Practices specifically prohibited by this rule: unauthorised use of plain language compromising classified callsigns by: plain language disclosure linking them with unclassified callsigns ©LTCOL G.R. Newman-Martin 2011

38 RULES FOR TRANSMISSION SECURITY Do not give away information
Practices specifically prohibited by this rule: unauthorised use of plain language compromising classified callsigns by: plain language disclosure linking them with unclassified callsigns transmitting the operator’s personal sign or name

39 ©LTCOL G.R. Newman-Martin 2011
AIDS TO SECURITY ©LTCOL G.R. Newman-Martin 2011

40 ©LTCOL G.R. Newman-Martin 2011
AIDS TO SECURITY Code words ©LTCOL G.R. Newman-Martin 2011

41 ©LTCOL G.R. Newman-Martin 2011
AIDS TO SECURITY Code words Nicknames ©LTCOL G.R. Newman-Martin 2011

42 ©LTCOL G.R. Newman-Martin 2011
AIDS TO SECURITY Code words Nicknames Low-grade tactical codes ©LTCOL G.R. Newman-Martin 2011

43 ©LTCOL G.R. Newman-Martin 2011
AIDS TO SECURITY Code words Nicknames Low-grade tactical codes Radio appointment titles ©LTCOL G.R. Newman-Martin 2011

44 ©LTCOL G.R. Newman-Martin 2011
AIDS TO SECURITY Code words Nicknames Low-grade tactical codes Radio appointment titles Address groups and call-signs ©LTCOL G.R. Newman-Martin 2011

45 ©LTCOL G.R. Newman-Martin 2011
AIDS TO SECURITY Code words Nicknames Low-grade tactical codes Radio appointment titles Address groups and call-signs Veiled speech ©LTCOL G.R. Newman-Martin 2011

46 ©LTCOL G.R. Newman-Martin 2011
What is a ‘code word’? A single word which has been assigned: a security classification ©LTCOL G.R. Newman-Martin 2011

47 ©LTCOL G.R. Newman-Martin 2011
What is a ‘code word’? A single word which has been assigned: a security classification a classified meaning ©LTCOL G.R. Newman-Martin 2011

48 ©LTCOL G.R. Newman-Martin 2011
What is a ‘code word’? A single word which has been assigned: a security classification a classified meaning Meaning is registered and safeguarded ©LTCOL G.R. Newman-Martin 2011

49 ©LTCOL G.R. Newman-Martin 2011
What is a ‘code word’? A single word which has been assigned: a security classification a classified meaning Meaning is registered and safeguarded Use of unauthorised codewords is prohibited ©LTCOL G.R. Newman-Martin 2011

50 LOW-GRADE TACTICAL CODES
©LTCOL G.R. Newman-Martin 2011

51 ©LTCOL G.R. Newman-Martin 2011
LOW-GRADE TACTICAL CODES Operations codes (OPSCODES) Numeral codes (NUMCODES) Authentication tables ©LTCOL G.R. Newman-Martin 2011

52 ©LTCOL G.R. Newman-Martin 2011
LOW-GRADE TACTICAL CODES Provide temporary security ©LTCOL G.R. Newman-Martin 2011

53 ©LTCOL G.R. Newman-Martin 2011
LOW-GRADE TACTICAL CODES Provide temporary security Need to be decoded before they can be understood ©LTCOL G.R. Newman-Martin 2011

54 ©LTCOL G.R. Newman-Martin 2011
LOW-GRADE TACTICAL CODES Provide temporary security Need to be decoded before they can be understood Can be broken with time ©LTCOL G.R. Newman-Martin 2011

55 LOW-GRADE TACTICAL CODES Provide temporary security
Need to be decoded before they can be understood Can be broken with time Code tables are classified, accountable items

56

57 ©LTCOL G.R. Newman-Martin 2011
OPSCODES ©LTCOL G.R. Newman-Martin 2011

58 ©LTCOL G.R. Newman-Martin 2011
OPSCODES Substitute text of a message by pre- arranged material ©LTCOL G.R. Newman-Martin 2011

59 ©LTCOL G.R. Newman-Martin 2011
OPSCODES Substitute text of a message by pre- arranged material Can only be understood by sender and intended receiver ©LTCOL G.R. Newman-Martin 2011

60 ©LTCOL G.R. Newman-Martin 2011
OPSCODES Substitute text of a message by pre- arranged material Can only be understood by sender and intended receiver This delays understanding by receiver until message is decoded ©LTCOL G.R. Newman-Martin 2011

61 ©LTCOL G.R. Newman-Martin 2011
OPSCODES Substitute text of a message by pre- arranged material Can only be understood by sender and intended receiver This delays understanding by receiver until message is decoded Provide only short-term security ©LTCOL G.R. Newman-Martin 2011

62 OPSCODES Substitute text of a message by pre- arranged material
Can only be understood by sender and intended receiver This delays understanding by receiver until message is decoded Provide only short-term security OPSCODE tables must be changed daily

63 ©LTCOL G.R. Newman-Martin 2011
NUMCODES ©LTCOL G.R. Newman-Martin 2011

64 ©LTCOL G.R. Newman-Martin 2011
NUMCODES Substitute numbers within plain text message by pre- arranged material ©LTCOL G.R. Newman-Martin 2011

65 ©LTCOL G.R. Newman-Martin 2011
NUMCODES Substitute numbers within plain text message by pre- arranged material Can only be understood by sender and intended receiver ©LTCOL G.R. Newman-Martin 2011

66 ©LTCOL G.R. Newman-Martin 2011
NUMCODES Substitute numbers within plain text message by pre- arranged material Can only be understood by sender and intended receiver Prevents unauthorised listeners from understanding numbers (e.g. grid references) immediately ©LTCOL G.R. Newman-Martin 2011

67 ©LTCOL G.R. Newman-Martin 2011
NUMCODES Substitute numbers within plain text message by pre- arranged material Can only be understood by sender and intended receiver Prevents unauthorised listeners from understanding numbers (e.g. grid references) immediately Delays understanding by receiver until numbers are decoded ©LTCOL G.R. Newman-Martin 2011

68 ©LTCOL G.R. Newman-Martin 2011
NUMCODES Substitute numbers within plain text message by pre- arranged material Can only be understood by sender and intended receiver Prevents unauthorised listeners from understanding numbers (e.g. grid references) immediately Delays understanding by receiver until numbers are decoded Provide only short-term security ©LTCOL G.R. Newman-Martin 2011

69 ©LTCOL G.R. Newman-Martin 2011
NUMCODES Substitute numbers within plain text message by pre- arranged material Can only be understood by sender and intended receiver Prevents unauthorised listeners from understanding numbers (e.g. grid references) immediately Delays understanding by receiver until numbers are decoded Provide only short-term security NUMCODE tables must be changed daily ©LTCOL G.R. Newman-Martin 2011

70 AUTHENTICATION TABLES
Refer to the two scenes in movie Crimson Tide which show the use of authentication codes. ©LTCOL G.R. Newman-Martin 2011

71 AUTHENTICATION TABLES
USED TO: CHALLENGE THE IDENTITY OF A STATION ©LTCOL G.R. Newman-Martin 2011

72 AUTHENTICATION TABLES
USED TO: CHALLENGE THE IDENTITY OF A STATION ESTABLISH THE AUTHENTICITY OF: ©LTCOL G.R. Newman-Martin 2011

73 AUTHENTICATION TABLES
USED TO: CHALLENGE THE IDENTITY OF A STATION ESTABLISH THE AUTHENTICITY OF: A STATION ©LTCOL G.R. Newman-Martin 2011

74 AUTHENTICATION TABLES
USED TO: CHALLENGE THE IDENTITY OF A STATION ESTABLISH THE AUTHENTICITY OF: A STATION A TRANSMISSION ©LTCOL G.R. Newman-Martin 2011

75 AUTHENTICATION TABLES
USED TO: CHALLENGE THE IDENTITY OF A STATION ESTABLISH THE AUTHENTICITY OF: A STATION A TRANSMISSION A MESSAGE

76 ©LTCOL G.R. Newman-Martin 2011
The movie ‘Crimson Tide’ depicts the use of authentication tables to authenticate operational command messages ©LTCOL G.R. Newman-Martin 2011

77 ©LTCOL G.R. Newman-Martin 2011
NICKNAMES ©LTCOL G.R. Newman-Martin 2011

78 ©LTCOL G.R. Newman-Martin 2011
NICKNAMES PRE-ARRANGED CLASSIFIED WORDS ©LTCOL G.R. Newman-Martin 2011

79 ©LTCOL G.R. Newman-Martin 2011
NICKNAMES PRE-ARRANGED CLASSIFIED WORDS CONVEY HIDDEN MEANINGS OTHER THAN THEIR USUAL MEANINGS ©LTCOL G.R. Newman-Martin 2011

80 ©LTCOL G.R. Newman-Martin 2011
NICKNAMES PRE-ARRANGED CLASSIFIED WORDS CONVEY HIDDEN MEANINGS OTHER THAN THEIR USUAL MEANINGS USED FOR: COMMUNICATIONS DRILL FOR: ©LTCOL G.R. Newman-Martin 2011

81 ©LTCOL G.R. Newman-Martin 2011
NICKNAMES PRE-ARRANGED CLASSIFIED WORDS CONVEY HIDDEN MEANINGS OTHER THAN THEIR USUAL MEANINGS USED FOR: COMMUNICATIONS DRILL FOR: CLOSING DOWN, IMPOSING/LIFTING RADIO SILENCE, CHANGING FREQUENCY ©LTCOL G.R. Newman-Martin 2011

82 ©LTCOL G.R. Newman-Martin 2011
NICKNAMES PRE-ARRANGED CLASSIFIED WORDS CONVEY HIDDEN MEANINGS OTHER THAN THEIR USUAL MEANINGS USED FOR: COMMUNICATIONS DRILL FOR: CLOSING DOWN, IMPOSING/LIFTING RADIO SILENCE, CHANGING FREQUENCY SUBSTITUTING FOR UNPRONOUNCEABLE NAMES ©LTCOL G.R. Newman-Martin 2011

83 ©LTCOL G.R. Newman-Martin 2011
NICKNAMES PRE-ARRANGED CLASSIFIED WORDS CONVEY HIDDEN MEANINGS OTHER THAN THEIR USUAL MEANINGS USED FOR: COMMUNICATIONS DRILL FOR: CLOSING DOWN, IMPOSING/LIFTING RADIO SILENCE, CHANGING FREQUENCY SUBSTITUTING FOR UNPRONOUNCEABLE NAMES PROVISION OF LOW-GRADE COVER FOR REFERENCE TO GEOGRAPHICAL FEATURES e.g. OBJECTIVES, BOUNDS, ROUTES, REPORT LINES ©LTCOL G.R. Newman-Martin 2011

84 ©LTCOL G.R. Newman-Martin 2011
Other low-grade security measures Radio Appointment Titles Callsigns Address Groups ©LTCOL G.R. Newman-Martin 2011

85 ©LTCOL G.R. Newman-Martin 2011
Veiled Speech The art of referring to a future event by reference to the past ©LTCOL G.R. Newman-Martin 2011

86 ©LTCOL G.R. Newman-Martin 2011
Veiled Speech The art of referring to a future event by reference to the past Consists of a reference to events of which unauthorised persons or groups have no knowledge. ©LTCOL G.R. Newman-Martin 2011

87 ©LTCOL G.R. Newman-Martin 2011
Veiled Speech The art of referring to a future event by reference to the past Consists of a reference to events of which unauthorised persons or groups have no knowledge. Poor aid to security ©LTCOL G.R. Newman-Martin 2011

88 ©LTCOL G.R. Newman-Martin 2011
Veiled Speech The art of referring to a future event by reference to the past Consists of a reference to events of which unauthorised persons or groups have no knowledge. Poor aid to security Should be used sparingly – operators and users can never be sure of what knowledge unauthorised persons have. ©LTCOL G.R. Newman-Martin 2011

89 ©LTCOL G.R. Newman-Martin 2011
NET SECURITY MEASURES ©LTCOL G.R. Newman-Martin 2011

90 ©LTCOL G.R. Newman-Martin 2011
Net Security Measures Those actions taken to protect security ©LTCOL G.R. Newman-Martin 2011

91 ©LTCOL G.R. Newman-Martin 2011
Net Security Measures Those actions taken to protect security They include instructions for: opening and closing communications ©LTCOL G.R. Newman-Martin 2011

92 ©LTCOL G.R. Newman-Martin 2011
Net Security Measures Those actions taken to protect security They include instructions for: opening and closing communications authentication ©LTCOL G.R. Newman-Martin 2011

93 ©LTCOL G.R. Newman-Martin 2011
Net Security Measures Those actions taken to protect security They include instructions for: opening and closing communications authentication radio silence, change of frequency ©LTCOL G.R. Newman-Martin 2011

94 ©LTCOL G.R. Newman-Martin 2011
Net Security Measures Those actions taken to protect security They include instructions for: opening and closing communications authentication radio silence, change of frequency action in cases of compromise etc. ©LTCOL G.R. Newman-Martin 2011

95 ©LTCOL G.R. Newman-Martin 2011
Net Security Measures Information that is subject to periodic change ©LTCOL G.R. Newman-Martin 2011

96 ©LTCOL G.R. Newman-Martin 2011
Net Security Measures Information that is subject to periodic change ….and which is required to implement net security measures ©LTCOL G.R. Newman-Martin 2011

97 ©LTCOL G.R. Newman-Martin 2011
Net Security Measures Information that is subject to periodic change ….and which is required to implement net security measures ….is outlined in RATEL SOIs for particular exercises ©LTCOL G.R. Newman-Martin 2011

98 ©LTCOL G.R. Newman-Martin 2011
Net Security Measures Information that is subject to periodic change ….and which is required to implement net security measures ….is outlined in RATEL SOIs for particular exercises ….& includes details of nicknames, callsigns and frequencies. ©LTCOL G.R. Newman-Martin 2011

99 ©LTCOL G.R. Newman-Martin 2011
DEFENCE AGAINST RADIO JAMMING ©LTCOL G.R. Newman-Martin 2011 24

100 DEFENCE AGAINST RADIO JAMMING
USE RADIO ONLY WHEN NECESSARY ©LTCOL G.R. Newman-Martin 2011

101 DEFENCE AGAINST RADIO JAMMING
USE RADIO ONLY WHEN NECESSARY KEEP CONVERSATIONS SHORT ©LTCOL G.R. Newman-Martin 2011

102 DEFENCE AGAINST RADIO JAMMING
USE RADIO ONLY WHEN NECESSARY KEEP CONVERSATIONS SHORT CUT DOWN YOUR RADIATION – LOW POWER ©LTCOL G.R. Newman-Martin 2011

103 DEFENCE AGAINST RADIO JAMMING
USE RADIO ONLY WHEN NECESSARY KEEP CONVERSATIONS SHORT CUT DOWN YOUR RADIATION – LOW POWER CHOOSE SITE WELL ©LTCOL G.R. Newman-Martin 2011

104 DEFENCE AGAINST RADIO JAMMING
USE RADIO ONLY WHEN NECESSARY KEEP CONVERSATIONS SHORT CUT DOWN YOUR RADIATION – LOW POWER CHOOSE SITE WELL USE CARE BUT BE AS BRIEF AS POSSIBLE WHEN TUNING IS NECESSARY ©LTCOL G.R. Newman-Martin 2011

105 DEFENCE AGAINST RADIO JAMMING
USE RADIO ONLY WHEN NECESSARY KEEP CONVERSATIONS SHORT CUT DOWN YOUR RADIATION – LOW POWER CHOOSE SITE WELL USE CARE BUT BE AS BRIEF AS POSSIBLE WHEN TUNING IS NECESSARY USE CORRECT PROCEDURE ©LTCOL G.R. Newman-Martin 2011

106 DEFENCE AGAINST RADIO JAMMING
USE RADIO ONLY WHEN NECESSARY KEEP CONVERSATIONS SHORT CUT DOWN YOUR RADIATION – LOW POWER CHOOSE SITE WELL USE CARE BUT BE AS BRIEF AS POSSIBLE WHEN TUNING IS NECESSARY USE CORRECT PROCEDURE AVOID MANNERISMS, IDIOSYNCRACIES AND ACCENTS TO REMAIN ANONYMOUS AND INDISTINGUISHABLE FROM OTHER RADIO USERS ©LTCOL G.R. Newman-Martin 2011

107 ©LTCOL G.R. Newman-Martin 2011
GOTTA QUESTION PUNK… …WELL DO YA? ©LTCOL G.R. Newman-Martin 2011


Download ppt "AUSTRALIAN ARMY CADETS RADIO OPERATORS COURSE"

Similar presentations


Ads by Google