AUSTRALIAN ARMY CADETS CADET ADVANCED RADIO OPERATORS COURSE

  • Slides: 107
Download presentation
AUSTRALIAN ARMY CADETS CADET ADVANCED RADIO OPERATORS COURSE

AUSTRALIAN ARMY CADETS CADET ADVANCED RADIO OPERATORS COURSE

Topic 7 ©LTCOL G. R. Newman-Martin 2011

Topic 7 ©LTCOL G. R. Newman-Martin 2011

SECURITY ©LTCOL G. R. Newman-Martin 2011

SECURITY ©LTCOL G. R. Newman-Martin 2011

SECURITY RULES, OK? ©LTCOL G. R. Newman-Martin 2011

SECURITY RULES, OK? ©LTCOL G. R. Newman-Martin 2011

SECURITY TAKING MEASURES TO PREVENT ACCESS ©LTCOL G. R. Newman-Martin 2011

SECURITY TAKING MEASURES TO PREVENT ACCESS ©LTCOL G. R. Newman-Martin 2011

SECURITY TAKING MEASURES TO PREVENT ACCESS BY NON-AUTHORISED PERSONS / GROUPS ©LTCOL G. R.

SECURITY TAKING MEASURES TO PREVENT ACCESS BY NON-AUTHORISED PERSONS / GROUPS ©LTCOL G. R. Newman-Martin 2011

SECURITY TAKING MEASURES TO PREVENT ACCESS BY NON-AUTHORISED PERSONS / GROUPS TO INFORMATION WHICH

SECURITY TAKING MEASURES TO PREVENT ACCESS BY NON-AUTHORISED PERSONS / GROUPS TO INFORMATION WHICH THEY SHOULD NOT ACCESS ©LTCOL G. R. Newman-Martin 2011

SHORT-TERM INFORMATION ©LTCOL G. R. Newman-Martin 2011

SHORT-TERM INFORMATION ©LTCOL G. R. Newman-Martin 2011

SHORT-TERM INFORMATION …is information which is concerned with operations under way ©LTCOL G. R.

SHORT-TERM INFORMATION …is information which is concerned with operations under way ©LTCOL G. R. Newman-Martin 2011

SHORT-TERM INFORMATION …is information which is concerned with operations under way …. . and

SHORT-TERM INFORMATION …is information which is concerned with operations under way …. . and which could give the opposition an advantage in the short term ©LTCOL G. R. Newman-Martin 2011

LONG-TERM INFORMATION ©LTCOL G. R. Newman-Martin 2011

LONG-TERM INFORMATION ©LTCOL G. R. Newman-Martin 2011

LONG-TERM INFORMATION Information of details of: Units Formations Future intentions ©LTCOL G. R. Newman-Martin

LONG-TERM INFORMATION Information of details of: Units Formations Future intentions ©LTCOL G. R. Newman-Martin 2011

LONG-TERM INFORMATION Not to be encoded in low-grade tactical code except in emergency ©LTCOL

LONG-TERM INFORMATION Not to be encoded in low-grade tactical code except in emergency ©LTCOL G. R. Newman-Martin 2011

LONG-TERM INFORMATION Not to be encoded in low-grade tactical code except in emergency …and

LONG-TERM INFORMATION Not to be encoded in low-grade tactical code except in emergency …and then only after every other secure means of transmission has been considered ©LTCOL G. R. Newman-Martin 2011

LONG-TERM INFORMATION Can be gained from: Direct breaches • inadvertent • careless ©LTCOL G.

LONG-TERM INFORMATION Can be gained from: Direct breaches • inadvertent • careless ©LTCOL G. R. Newman-Martin 2011

LONG-TERM INFORMATION Can be gained from: Indirect breaches • Operators’ and users’: • peculiarities

LONG-TERM INFORMATION Can be gained from: Indirect breaches • Operators’ and users’: • peculiarities ©LTCOL G. R. Newman-Martin 2011

LONG-TERM INFORMATION Can be gained from: Indirect breaches • Operators’ and users’: • peculiarities

LONG-TERM INFORMATION Can be gained from: Indirect breaches • Operators’ and users’: • peculiarities • idiosyncracies ©LTCOL G. R. Newman-Martin 2011

LONG-TERM INFORMATION Can be gained from: Indirect breaches • Operators’ and users’: • peculiarities

LONG-TERM INFORMATION Can be gained from: Indirect breaches • Operators’ and users’: • peculiarities • idiosyncracies • operating techniques

©LTCOL G. R. Newman-Martin 2011

©LTCOL G. R. Newman-Martin 2011

RULES FOR MAINTENANCE OF SECURITY ©LTCOL G. R. Newman-Martin 2011

RULES FOR MAINTENANCE OF SECURITY ©LTCOL G. R. Newman-Martin 2011

RULES FOR MAINTENANCE OF SECURITY § Use of prescribed procedures is mandatory ©LTCOL G.

RULES FOR MAINTENANCE OF SECURITY § Use of prescribed procedures is mandatory ©LTCOL G. R. Newman-Martin 2011

RULES FOR MAINTENANCE OF SECURITY § Use of prescribed procedures is mandatory § Use

RULES FOR MAINTENANCE OF SECURITY § Use of prescribed procedures is mandatory § Use correct RATEL procedure ©LTCOL G. R. Newman-Martin 2011

RULES FOR MAINTENANCE OF SECURITY § Use of prescribed procedures is mandatory § Use

RULES FOR MAINTENANCE OF SECURITY § Use of prescribed procedures is mandatory § Use correct RATEL procedure § Brevity – transmissions short & concise as possible, consistent with clarity ©LTCOL G. R. Newman-Martin 2011

RULES FOR MAINTENANCE OF SECURITY § Use of prescribed procedures is mandatory § Use

RULES FOR MAINTENANCE OF SECURITY § Use of prescribed procedures is mandatory § Use correct RATEL procedure § Brevity – transmissions short & concise as possible, consistent with clarity § Have a clear idea of what you are going to say, before you transmit ©LTCOL G. R. Newman-Martin 2011

RULES FOR MAINTENANCE OF SECURITY § Use of prescribed procedures is mandatory § Use

RULES FOR MAINTENANCE OF SECURITY § Use of prescribed procedures is mandatory § Use correct RATEL procedure § Brevity – transmissions short & concise as possible, consistent with clarity § Have a clear idea of what you are going to say, before you transmit § Enforce rules for transmission security ©LTCOL G. R. Newman-Martin 2011

RULES FOR MAINTENANCE OF SECURITY § Use of prescribed procedures is mandatory § Use

RULES FOR MAINTENANCE OF SECURITY § Use of prescribed procedures is mandatory § Use correct RATEL procedure § Brevity – transmissions short & concise as possible, consistent with clarity § Have a clear idea of what you are going to say, before you transmit § Enforce rules for transmission security § THINK BEFORE SPEAKING! ©LTCOL G. R. Newman-Martin 2011

RULES FOR MAINTENANCE OF SECURITY § Use of prescribed procedures is mandatory § Use

RULES FOR MAINTENANCE OF SECURITY § Use of prescribed procedures is mandatory § Use correct RATEL procedure § Brevity – transmissions short & concise as possible, consistent with clarity § Have a clear idea of what you are going to say, before you transmit § Enforce rules for transmission security § THINK BEFORE SPEAKING! § Do not use unauthorised codes or unauthorised prowords

RULES FOR TRANSMISSION SECURITY

RULES FOR TRANSMISSION SECURITY

RULES FOR TRANSMISSION SECURITY Only authorised transmissions are to be made ©LTCOL G. R.

RULES FOR TRANSMISSION SECURITY Only authorised transmissions are to be made ©LTCOL G. R. Newman-Martin 2011

RULES FOR TRANSMISSION SECURITY Only authorised transmissions are to be made Practices specifically prohibited

RULES FOR TRANSMISSION SECURITY Only authorised transmissions are to be made Practices specifically prohibited by this rule: • Violations of communications silence ©LTCOL G. R. Newman-Martin 2011

RULES FOR TRANSMISSION SECURITY Only authorised transmissions are to be made Practices specifically prohibited

RULES FOR TRANSMISSION SECURITY Only authorised transmissions are to be made Practices specifically prohibited by this rule: • Violations of communications silence • Unofficial conversations between operators ©LTCOL G. R. Newman-Martin 2011

RULES FOR TRANSMISSION SECURITY Only authorised transmissions are to be made Practices specifically prohibited

RULES FOR TRANSMISSION SECURITY Only authorised transmissions are to be made Practices specifically prohibited by this rule: • Violations of communications silence • Unofficial conversations between operators • Transmitting on directed net without permission ©LTCOL G. R. Newman-Martin 2011

RULES FOR TRANSMISSION SECURITY Do not give away information ©LTCOL G. R. Newman-Martin 2011

RULES FOR TRANSMISSION SECURITY Do not give away information ©LTCOL G. R. Newman-Martin 2011

RULES FOR TRANSMISSION SECURITY Do not give away information Practices specifically prohibited by this

RULES FOR TRANSMISSION SECURITY Do not give away information Practices specifically prohibited by this rule: • unauthorised use of plain language ©LTCOL G. R. Newman-Martin 2011

RULES FOR TRANSMISSION SECURITY Do not give away information Practices specifically prohibited by this

RULES FOR TRANSMISSION SECURITY Do not give away information Practices specifically prohibited by this rule: • unauthorised use of plain language • compromising classified callsigns by: ©LTCOL G. R. Newman-Martin 2011

RULES FOR TRANSMISSION SECURITY Do not give away information Practices specifically prohibited by this

RULES FOR TRANSMISSION SECURITY Do not give away information Practices specifically prohibited by this rule: • unauthorised use of plain language • compromising classified callsigns by: • plain language disclosure ©LTCOL G. R. Newman-Martin 2011

RULES FOR TRANSMISSION SECURITY Do not give away information Practices specifically prohibited by this

RULES FOR TRANSMISSION SECURITY Do not give away information Practices specifically prohibited by this rule: • unauthorised use of plain language • compromising classified callsigns by: • plain language disclosure • linking them with unclassified callsigns ©LTCOL G. R. Newman-Martin 2011

RULES FOR TRANSMISSION SECURITY Do not give away information Practices specifically prohibited by this

RULES FOR TRANSMISSION SECURITY Do not give away information Practices specifically prohibited by this rule: • unauthorised use of plain language • compromising classified callsigns by: • plain language disclosure • linking them with unclassified callsigns • transmitting the operator’s personal sign or name

AIDS TO SECURITY ©LTCOL G. R. Newman-Martin 2011

AIDS TO SECURITY ©LTCOL G. R. Newman-Martin 2011

AIDS TO SECURITY • Code words ©LTCOL G. R. Newman-Martin 2011

AIDS TO SECURITY • Code words ©LTCOL G. R. Newman-Martin 2011

AIDS TO SECURITY • Code words • Nicknames ©LTCOL G. R. Newman-Martin 2011

AIDS TO SECURITY • Code words • Nicknames ©LTCOL G. R. Newman-Martin 2011

AIDS TO SECURITY • Code words • Nicknames • Low-grade tactical codes ©LTCOL G.

AIDS TO SECURITY • Code words • Nicknames • Low-grade tactical codes ©LTCOL G. R. Newman-Martin 2011

AIDS TO SECURITY • Code words • Nicknames • Low-grade tactical codes • Radio

AIDS TO SECURITY • Code words • Nicknames • Low-grade tactical codes • Radio appointment titles ©LTCOL G. R. Newman-Martin 2011

AIDS TO SECURITY • Code words • Nicknames • Low-grade tactical codes • Radio

AIDS TO SECURITY • Code words • Nicknames • Low-grade tactical codes • Radio appointment titles • Address groups and call-signs ©LTCOL G. R. Newman-Martin 2011

AIDS TO SECURITY • Code words • Nicknames • Low-grade tactical codes • Radio

AIDS TO SECURITY • Code words • Nicknames • Low-grade tactical codes • Radio appointment titles • Address groups and call-signs • Veiled speech ©LTCOL G. R. Newman-Martin 2011

What is a ‘code word’? • A single word which has been assigned: •

What is a ‘code word’? • A single word which has been assigned: • a security classification ©LTCOL G. R. Newman-Martin 2011

What is a ‘code word’? • A single word which has been assigned: •

What is a ‘code word’? • A single word which has been assigned: • a security classification • a classified meaning ©LTCOL G. R. Newman-Martin 2011

What is a ‘code word’? • A single word which has been assigned: •

What is a ‘code word’? • A single word which has been assigned: • a security classification • a classified meaning • Meaning is registered and safeguarded ©LTCOL G. R. Newman-Martin 2011

What is a ‘code word’? • A single word which has been assigned: •

What is a ‘code word’? • A single word which has been assigned: • a security classification • a classified meaning • Meaning is registered and safeguarded • Use of unauthorised codewords is prohibited ©LTCOL G. R. Newman-Martin 2011

LOW-GRADE TACTICAL CODES ©LTCOL G. R. Newman-Martin 2011

LOW-GRADE TACTICAL CODES ©LTCOL G. R. Newman-Martin 2011

LOW-GRADE TACTICAL CODES • Operations codes (OPSCODES) • Numeral codes (NUMCODES) • Authentication tables

LOW-GRADE TACTICAL CODES • Operations codes (OPSCODES) • Numeral codes (NUMCODES) • Authentication tables ©LTCOL G. R. Newman-Martin 2011

LOW-GRADE TACTICAL CODES • Provide temporary security ©LTCOL G. R. Newman-Martin 2011

LOW-GRADE TACTICAL CODES • Provide temporary security ©LTCOL G. R. Newman-Martin 2011

LOW-GRADE TACTICAL CODES • Provide temporary security • Need to be decoded before they

LOW-GRADE TACTICAL CODES • Provide temporary security • Need to be decoded before they can be understood ©LTCOL G. R. Newman-Martin 2011

LOW-GRADE TACTICAL CODES • Provide temporary security • Need to be decoded before they

LOW-GRADE TACTICAL CODES • Provide temporary security • Need to be decoded before they can be understood • Can be broken with time ©LTCOL G. R. Newman-Martin 2011

LOW-GRADE TACTICAL CODES • Provide temporary security • Need to be decoded before they

LOW-GRADE TACTICAL CODES • Provide temporary security • Need to be decoded before they can be understood • Can be broken with time • Code tables are classified, accountable items

OPSCODES ©LTCOL G. R. Newman-Martin 2011

OPSCODES ©LTCOL G. R. Newman-Martin 2011

OPSCODES • Substitute text of a message by prearranged material ©LTCOL G. R. Newman-Martin

OPSCODES • Substitute text of a message by prearranged material ©LTCOL G. R. Newman-Martin 2011

OPSCODES • Substitute text of a message by prearranged material • Can only be

OPSCODES • Substitute text of a message by prearranged material • Can only be understood by sender and intended receiver ©LTCOL G. R. Newman-Martin 2011

OPSCODES • Substitute text of a message by prearranged material • Can only be

OPSCODES • Substitute text of a message by prearranged material • Can only be understood by sender and intended receiver • This delays understanding by receiver until message is decoded ©LTCOL G. R. Newman-Martin 2011

OPSCODES • Substitute text of a message by prearranged material • Can only be

OPSCODES • Substitute text of a message by prearranged material • Can only be understood by sender and intended receiver • This delays understanding by receiver until message is decoded • Provide only short-term security ©LTCOL G. R. Newman-Martin 2011

OPSCODES • Substitute text of a message by prearranged material • Can only be

OPSCODES • Substitute text of a message by prearranged material • Can only be understood by sender and intended receiver • This delays understanding by receiver until message is decoded • Provide only short-term security • OPSCODE tables must be changed daily

NUMCODES ©LTCOL G. R. Newman-Martin 2011

NUMCODES ©LTCOL G. R. Newman-Martin 2011

NUMCODES • Substitute numbers within plain text message by prearranged material ©LTCOL G. R.

NUMCODES • Substitute numbers within plain text message by prearranged material ©LTCOL G. R. Newman-Martin 2011

NUMCODES • Substitute numbers within plain text message by prearranged material • Can only

NUMCODES • Substitute numbers within plain text message by prearranged material • Can only be understood by sender and intended receiver ©LTCOL G. R. Newman-Martin 2011

NUMCODES • Substitute numbers within plain text message by prearranged material • Can only

NUMCODES • Substitute numbers within plain text message by prearranged material • Can only be understood by sender and intended receiver • Prevents unauthorised listeners from understanding numbers (e. g. grid references) immediately ©LTCOL G. R. Newman-Martin 2011

NUMCODES • Substitute numbers within plain text message by prearranged material • Can only

NUMCODES • Substitute numbers within plain text message by prearranged material • Can only be understood by sender and intended receiver • Prevents unauthorised listeners from understanding numbers (e. g. grid references) immediately • Delays understanding by receiver until numbers are decoded ©LTCOL G. R. Newman-Martin 2011

NUMCODES • Substitute numbers within plain text message by prearranged material • Can only

NUMCODES • Substitute numbers within plain text message by prearranged material • Can only be understood by sender and intended receiver • Prevents unauthorised listeners from understanding numbers (e. g. grid references) immediately • Delays understanding by receiver until numbers are decoded • Provide only short-term security ©LTCOL G. R. Newman-Martin 2011

NUMCODES • Substitute numbers within plain text message by prearranged material • Can only

NUMCODES • Substitute numbers within plain text message by prearranged material • Can only be understood by sender and intended receiver • Prevents unauthorised listeners from understanding numbers (e. g. grid references) immediately • Delays understanding by receiver until numbers are decoded • Provide only short-term security • NUMCODE tables must be changed daily ©LTCOL G. R. Newman-Martin 2011

AUTHENTICATION TABLES ©LTCOL G. R. Newman-Martin 2011

AUTHENTICATION TABLES ©LTCOL G. R. Newman-Martin 2011

AUTHENTICATION TABLES USED TO: • CHALLENGE THE IDENTITY OF A STATION ©LTCOL G. R.

AUTHENTICATION TABLES USED TO: • CHALLENGE THE IDENTITY OF A STATION ©LTCOL G. R. Newman-Martin 2011

AUTHENTICATION TABLES USED TO: • CHALLENGE THE IDENTITY OF A STATION • ESTABLISH THE

AUTHENTICATION TABLES USED TO: • CHALLENGE THE IDENTITY OF A STATION • ESTABLISH THE AUTHENTICITY OF: ©LTCOL G. R. Newman-Martin 2011

AUTHENTICATION TABLES USED TO: • CHALLENGE THE IDENTITY OF A STATION • ESTABLISH THE

AUTHENTICATION TABLES USED TO: • CHALLENGE THE IDENTITY OF A STATION • ESTABLISH THE AUTHENTICITY OF: • A STATION ©LTCOL G. R. Newman-Martin 2011

AUTHENTICATION TABLES USED TO: • CHALLENGE THE IDENTITY OF A STATION • ESTABLISH THE

AUTHENTICATION TABLES USED TO: • CHALLENGE THE IDENTITY OF A STATION • ESTABLISH THE AUTHENTICITY OF: • A STATION • A TRANSMISSION ©LTCOL G. R. Newman-Martin 2011

AUTHENTICATION TABLES USED TO: • CHALLENGE THE IDENTITY OF A STATION • ESTABLISH THE

AUTHENTICATION TABLES USED TO: • CHALLENGE THE IDENTITY OF A STATION • ESTABLISH THE AUTHENTICITY OF: • A STATION • A TRANSMISSION • A MESSAGE

The movie ‘Crimson Tide’ depicts the use of authentication tables to authenticate operational command

The movie ‘Crimson Tide’ depicts the use of authentication tables to authenticate operational command messages ©LTCOL G. R. Newman-Martin 2011

NICKNAMES ©LTCOL G. R. Newman-Martin 2011

NICKNAMES ©LTCOL G. R. Newman-Martin 2011

NICKNAMES PRE-ARRANGED CLASSIFIED WORDS ©LTCOL G. R. Newman-Martin 2011

NICKNAMES PRE-ARRANGED CLASSIFIED WORDS ©LTCOL G. R. Newman-Martin 2011

NICKNAMES PRE-ARRANGED CLASSIFIED WORDS CONVEY HIDDEN MEANINGS OTHER THAN THEIR USUAL MEANINGS ©LTCOL G.

NICKNAMES PRE-ARRANGED CLASSIFIED WORDS CONVEY HIDDEN MEANINGS OTHER THAN THEIR USUAL MEANINGS ©LTCOL G. R. Newman-Martin 2011

NICKNAMES PRE-ARRANGED CLASSIFIED WORDS CONVEY HIDDEN MEANINGS OTHER THAN THEIR USUAL MEANINGS USED FOR:

NICKNAMES PRE-ARRANGED CLASSIFIED WORDS CONVEY HIDDEN MEANINGS OTHER THAN THEIR USUAL MEANINGS USED FOR: • COMMUNICATIONS DRILL FOR: ©LTCOL G. R. Newman-Martin 2011

NICKNAMES PRE-ARRANGED CLASSIFIED WORDS CONVEY HIDDEN MEANINGS OTHER THAN THEIR USUAL MEANINGS USED FOR:

NICKNAMES PRE-ARRANGED CLASSIFIED WORDS CONVEY HIDDEN MEANINGS OTHER THAN THEIR USUAL MEANINGS USED FOR: • COMMUNICATIONS DRILL FOR: • CLOSING DOWN, IMPOSING/LIFTING RADIO SILENCE, CHANGING FREQUENCY ©LTCOL G. R. Newman-Martin 2011

NICKNAMES PRE-ARRANGED CLASSIFIED WORDS CONVEY HIDDEN MEANINGS OTHER THAN THEIR USUAL MEANINGS USED FOR:

NICKNAMES PRE-ARRANGED CLASSIFIED WORDS CONVEY HIDDEN MEANINGS OTHER THAN THEIR USUAL MEANINGS USED FOR: • COMMUNICATIONS DRILL FOR: • CLOSING DOWN, IMPOSING/LIFTING RADIO SILENCE, CHANGING FREQUENCY • SUBSTITUTING FOR UNPRONOUNCEABLE NAMES ©LTCOL G. R. Newman-Martin 2011

NICKNAMES PRE-ARRANGED CLASSIFIED WORDS CONVEY HIDDEN MEANINGS OTHER THAN THEIR USUAL MEANINGS USED FOR:

NICKNAMES PRE-ARRANGED CLASSIFIED WORDS CONVEY HIDDEN MEANINGS OTHER THAN THEIR USUAL MEANINGS USED FOR: • COMMUNICATIONS DRILL FOR: • CLOSING DOWN, IMPOSING/LIFTING RADIO SILENCE, CHANGING FREQUENCY • SUBSTITUTING FOR UNPRONOUNCEABLE NAMES • PROVISION OF LOW-GRADE COVER FOR REFERENCE TO GEOGRAPHICAL FEATURES e. g. OBJECTIVES, BOUNDS, ROUTES, REPORT LINES ©LTCOL G. R. Newman-Martin 2011

Other low-grade security measures Radio Appointment Titles Callsigns Address Groups ©LTCOL G. R. Newman-Martin

Other low-grade security measures Radio Appointment Titles Callsigns Address Groups ©LTCOL G. R. Newman-Martin 2011

Veiled Speech § The art of referring to a future event by reference to

Veiled Speech § The art of referring to a future event by reference to the past ©LTCOL G. R. Newman-Martin 2011

Veiled Speech § The art of referring to a future event by reference to

Veiled Speech § The art of referring to a future event by reference to the past § Consists of a reference to events of which unauthorised persons or groups have no knowledge. ©LTCOL G. R. Newman-Martin 2011

Veiled Speech § The art of referring to a future event by reference to

Veiled Speech § The art of referring to a future event by reference to the past § Consists of a reference to events of which unauthorised persons or groups have no knowledge. § Poor aid to security ©LTCOL G. R. Newman-Martin 2011

Veiled Speech § The art of referring to a future event by reference to

Veiled Speech § The art of referring to a future event by reference to the past § Consists of a reference to events of which unauthorised persons or groups have no knowledge. § Poor aid to security § Should be used sparingly – operators and users can never be sure of what knowledge unauthorised persons have. ©LTCOL G. R. Newman-Martin 2011

NET SECURITY MEASURES ©LTCOL G. R. Newman-Martin 2011

NET SECURITY MEASURES ©LTCOL G. R. Newman-Martin 2011

Net Security Measures Those actions taken to protect security ©LTCOL G. R. Newman-Martin 2011

Net Security Measures Those actions taken to protect security ©LTCOL G. R. Newman-Martin 2011

Net Security Measures Those actions taken to protect security They include instructions for: •

Net Security Measures Those actions taken to protect security They include instructions for: • opening and closing communications ©LTCOL G. R. Newman-Martin 2011

Net Security Measures Those actions taken to protect security They include instructions for: •

Net Security Measures Those actions taken to protect security They include instructions for: • opening and closing communications • authentication ©LTCOL G. R. Newman-Martin 2011

Net Security Measures Those actions taken to protect security They include instructions for: •

Net Security Measures Those actions taken to protect security They include instructions for: • opening and closing communications • authentication • radio silence, change of frequency ©LTCOL G. R. Newman-Martin 2011

Net Security Measures Those actions taken to protect security They include instructions for: •

Net Security Measures Those actions taken to protect security They include instructions for: • opening and closing communications • authentication • radio silence, change of frequency • action in cases of compromise etc. ©LTCOL G. R. Newman-Martin 2011

Net Security Measures Information that is subject to periodic change ©LTCOL G. R. Newman-Martin

Net Security Measures Information that is subject to periodic change ©LTCOL G. R. Newman-Martin 2011

Net Security Measures Information that is subject to periodic change …. and which is

Net Security Measures Information that is subject to periodic change …. and which is required to implement net security measures ©LTCOL G. R. Newman-Martin 2011

Net Security Measures Information that is subject to periodic change …. and which is

Net Security Measures Information that is subject to periodic change …. and which is required to implement net security measures …. is outlined in RATEL SOIs for particular exercises ©LTCOL G. R. Newman-Martin 2011

Net Security Measures Information that is subject to periodic change …. and which is

Net Security Measures Information that is subject to periodic change …. and which is required to implement net security measures …. is outlined in RATEL SOIs for particular exercises …. & includes details of nicknames, callsigns and frequencies. ©LTCOL G. R. Newman-Martin 2011

DEFENCE AGAINST RADIO JAMMING ©LTCOL G. R. Newman-Martin 2011

DEFENCE AGAINST RADIO JAMMING ©LTCOL G. R. Newman-Martin 2011

DEFENCE AGAINST RADIO JAMMING • USE RADIO ONLY WHEN NECESSARY ©LTCOL G. R. Newman-Martin

DEFENCE AGAINST RADIO JAMMING • USE RADIO ONLY WHEN NECESSARY ©LTCOL G. R. Newman-Martin 2011

DEFENCE AGAINST RADIO JAMMING • • USE RADIO ONLY WHEN NECESSARY KEEP CONVERSATIONS SHORT

DEFENCE AGAINST RADIO JAMMING • • USE RADIO ONLY WHEN NECESSARY KEEP CONVERSATIONS SHORT ©LTCOL G. R. Newman-Martin 2011

DEFENCE AGAINST RADIO JAMMING • • • USE RADIO ONLY WHEN NECESSARY KEEP CONVERSATIONS

DEFENCE AGAINST RADIO JAMMING • • • USE RADIO ONLY WHEN NECESSARY KEEP CONVERSATIONS SHORT CUT DOWN YOUR RADIATION – LOW POWER ©LTCOL G. R. Newman-Martin 2011

DEFENCE AGAINST RADIO JAMMING • • USE RADIO ONLY WHEN NECESSARY KEEP CONVERSATIONS SHORT

DEFENCE AGAINST RADIO JAMMING • • USE RADIO ONLY WHEN NECESSARY KEEP CONVERSATIONS SHORT CUT DOWN YOUR RADIATION – LOW POWER CHOOSE SITE WELL ©LTCOL G. R. Newman-Martin 2011

DEFENCE AGAINST RADIO JAMMING • • • USE RADIO ONLY WHEN NECESSARY KEEP CONVERSATIONS

DEFENCE AGAINST RADIO JAMMING • • • USE RADIO ONLY WHEN NECESSARY KEEP CONVERSATIONS SHORT CUT DOWN YOUR RADIATION – LOW POWER CHOOSE SITE WELL USE CARE BUT BE AS BRIEF AS POSSIBLE WHEN TUNING IS NECESSARY ©LTCOL G. R. Newman-Martin 2011

DEFENCE AGAINST RADIO JAMMING • • • USE RADIO ONLY WHEN NECESSARY KEEP CONVERSATIONS

DEFENCE AGAINST RADIO JAMMING • • • USE RADIO ONLY WHEN NECESSARY KEEP CONVERSATIONS SHORT CUT DOWN YOUR RADIATION – LOW POWER CHOOSE SITE WELL USE CARE BUT BE AS BRIEF AS POSSIBLE WHEN TUNING IS NECESSARY USE CORRECT PROCEDURE ©LTCOL G. R. Newman-Martin 2011

DEFENCE AGAINST RADIO JAMMING • • USE RADIO ONLY WHEN NECESSARY KEEP CONVERSATIONS SHORT

DEFENCE AGAINST RADIO JAMMING • • USE RADIO ONLY WHEN NECESSARY KEEP CONVERSATIONS SHORT CUT DOWN YOUR RADIATION – LOW POWER CHOOSE SITE WELL USE CARE BUT BE AS BRIEF AS POSSIBLE WHEN TUNING IS NECESSARY USE CORRECT PROCEDURE AVOID MANNERISMS, IDIOSYNCRACIES AND ACCENTS TO REMAIN ANONYMOUS AND INDISTINGUISHABLE FROM OTHER RADIO USERS ©LTCOL G. R. Newman-Martin 2011

GOTTA QUESTION PUNK… …WELL DO YA? ©LTCOL G. R. Newman-Martin 2011

GOTTA QUESTION PUNK… …WELL DO YA? ©LTCOL G. R. Newman-Martin 2011