AUSTRALIAN ARMY CADETS CADET ADVANCED RADIO OPERATORS COURSE
- Slides: 107
AUSTRALIAN ARMY CADETS CADET ADVANCED RADIO OPERATORS COURSE
Topic 7 ©LTCOL G. R. Newman-Martin 2011
SECURITY ©LTCOL G. R. Newman-Martin 2011
SECURITY RULES, OK? ©LTCOL G. R. Newman-Martin 2011
SECURITY TAKING MEASURES TO PREVENT ACCESS ©LTCOL G. R. Newman-Martin 2011
SECURITY TAKING MEASURES TO PREVENT ACCESS BY NON-AUTHORISED PERSONS / GROUPS ©LTCOL G. R. Newman-Martin 2011
SECURITY TAKING MEASURES TO PREVENT ACCESS BY NON-AUTHORISED PERSONS / GROUPS TO INFORMATION WHICH THEY SHOULD NOT ACCESS ©LTCOL G. R. Newman-Martin 2011
SHORT-TERM INFORMATION ©LTCOL G. R. Newman-Martin 2011
SHORT-TERM INFORMATION …is information which is concerned with operations under way ©LTCOL G. R. Newman-Martin 2011
SHORT-TERM INFORMATION …is information which is concerned with operations under way …. . and which could give the opposition an advantage in the short term ©LTCOL G. R. Newman-Martin 2011
LONG-TERM INFORMATION ©LTCOL G. R. Newman-Martin 2011
LONG-TERM INFORMATION Information of details of: Units Formations Future intentions ©LTCOL G. R. Newman-Martin 2011
LONG-TERM INFORMATION Not to be encoded in low-grade tactical code except in emergency ©LTCOL G. R. Newman-Martin 2011
LONG-TERM INFORMATION Not to be encoded in low-grade tactical code except in emergency …and then only after every other secure means of transmission has been considered ©LTCOL G. R. Newman-Martin 2011
LONG-TERM INFORMATION Can be gained from: Direct breaches • inadvertent • careless ©LTCOL G. R. Newman-Martin 2011
LONG-TERM INFORMATION Can be gained from: Indirect breaches • Operators’ and users’: • peculiarities ©LTCOL G. R. Newman-Martin 2011
LONG-TERM INFORMATION Can be gained from: Indirect breaches • Operators’ and users’: • peculiarities • idiosyncracies ©LTCOL G. R. Newman-Martin 2011
LONG-TERM INFORMATION Can be gained from: Indirect breaches • Operators’ and users’: • peculiarities • idiosyncracies • operating techniques
©LTCOL G. R. Newman-Martin 2011
RULES FOR MAINTENANCE OF SECURITY ©LTCOL G. R. Newman-Martin 2011
RULES FOR MAINTENANCE OF SECURITY § Use of prescribed procedures is mandatory ©LTCOL G. R. Newman-Martin 2011
RULES FOR MAINTENANCE OF SECURITY § Use of prescribed procedures is mandatory § Use correct RATEL procedure ©LTCOL G. R. Newman-Martin 2011
RULES FOR MAINTENANCE OF SECURITY § Use of prescribed procedures is mandatory § Use correct RATEL procedure § Brevity – transmissions short & concise as possible, consistent with clarity ©LTCOL G. R. Newman-Martin 2011
RULES FOR MAINTENANCE OF SECURITY § Use of prescribed procedures is mandatory § Use correct RATEL procedure § Brevity – transmissions short & concise as possible, consistent with clarity § Have a clear idea of what you are going to say, before you transmit ©LTCOL G. R. Newman-Martin 2011
RULES FOR MAINTENANCE OF SECURITY § Use of prescribed procedures is mandatory § Use correct RATEL procedure § Brevity – transmissions short & concise as possible, consistent with clarity § Have a clear idea of what you are going to say, before you transmit § Enforce rules for transmission security ©LTCOL G. R. Newman-Martin 2011
RULES FOR MAINTENANCE OF SECURITY § Use of prescribed procedures is mandatory § Use correct RATEL procedure § Brevity – transmissions short & concise as possible, consistent with clarity § Have a clear idea of what you are going to say, before you transmit § Enforce rules for transmission security § THINK BEFORE SPEAKING! ©LTCOL G. R. Newman-Martin 2011
RULES FOR MAINTENANCE OF SECURITY § Use of prescribed procedures is mandatory § Use correct RATEL procedure § Brevity – transmissions short & concise as possible, consistent with clarity § Have a clear idea of what you are going to say, before you transmit § Enforce rules for transmission security § THINK BEFORE SPEAKING! § Do not use unauthorised codes or unauthorised prowords
RULES FOR TRANSMISSION SECURITY
RULES FOR TRANSMISSION SECURITY Only authorised transmissions are to be made ©LTCOL G. R. Newman-Martin 2011
RULES FOR TRANSMISSION SECURITY Only authorised transmissions are to be made Practices specifically prohibited by this rule: • Violations of communications silence ©LTCOL G. R. Newman-Martin 2011
RULES FOR TRANSMISSION SECURITY Only authorised transmissions are to be made Practices specifically prohibited by this rule: • Violations of communications silence • Unofficial conversations between operators ©LTCOL G. R. Newman-Martin 2011
RULES FOR TRANSMISSION SECURITY Only authorised transmissions are to be made Practices specifically prohibited by this rule: • Violations of communications silence • Unofficial conversations between operators • Transmitting on directed net without permission ©LTCOL G. R. Newman-Martin 2011
RULES FOR TRANSMISSION SECURITY Do not give away information ©LTCOL G. R. Newman-Martin 2011
RULES FOR TRANSMISSION SECURITY Do not give away information Practices specifically prohibited by this rule: • unauthorised use of plain language ©LTCOL G. R. Newman-Martin 2011
RULES FOR TRANSMISSION SECURITY Do not give away information Practices specifically prohibited by this rule: • unauthorised use of plain language • compromising classified callsigns by: ©LTCOL G. R. Newman-Martin 2011
RULES FOR TRANSMISSION SECURITY Do not give away information Practices specifically prohibited by this rule: • unauthorised use of plain language • compromising classified callsigns by: • plain language disclosure ©LTCOL G. R. Newman-Martin 2011
RULES FOR TRANSMISSION SECURITY Do not give away information Practices specifically prohibited by this rule: • unauthorised use of plain language • compromising classified callsigns by: • plain language disclosure • linking them with unclassified callsigns ©LTCOL G. R. Newman-Martin 2011
RULES FOR TRANSMISSION SECURITY Do not give away information Practices specifically prohibited by this rule: • unauthorised use of plain language • compromising classified callsigns by: • plain language disclosure • linking them with unclassified callsigns • transmitting the operator’s personal sign or name
AIDS TO SECURITY ©LTCOL G. R. Newman-Martin 2011
AIDS TO SECURITY • Code words ©LTCOL G. R. Newman-Martin 2011
AIDS TO SECURITY • Code words • Nicknames ©LTCOL G. R. Newman-Martin 2011
AIDS TO SECURITY • Code words • Nicknames • Low-grade tactical codes ©LTCOL G. R. Newman-Martin 2011
AIDS TO SECURITY • Code words • Nicknames • Low-grade tactical codes • Radio appointment titles ©LTCOL G. R. Newman-Martin 2011
AIDS TO SECURITY • Code words • Nicknames • Low-grade tactical codes • Radio appointment titles • Address groups and call-signs ©LTCOL G. R. Newman-Martin 2011
AIDS TO SECURITY • Code words • Nicknames • Low-grade tactical codes • Radio appointment titles • Address groups and call-signs • Veiled speech ©LTCOL G. R. Newman-Martin 2011
What is a ‘code word’? • A single word which has been assigned: • a security classification ©LTCOL G. R. Newman-Martin 2011
What is a ‘code word’? • A single word which has been assigned: • a security classification • a classified meaning ©LTCOL G. R. Newman-Martin 2011
What is a ‘code word’? • A single word which has been assigned: • a security classification • a classified meaning • Meaning is registered and safeguarded ©LTCOL G. R. Newman-Martin 2011
What is a ‘code word’? • A single word which has been assigned: • a security classification • a classified meaning • Meaning is registered and safeguarded • Use of unauthorised codewords is prohibited ©LTCOL G. R. Newman-Martin 2011
LOW-GRADE TACTICAL CODES ©LTCOL G. R. Newman-Martin 2011
LOW-GRADE TACTICAL CODES • Operations codes (OPSCODES) • Numeral codes (NUMCODES) • Authentication tables ©LTCOL G. R. Newman-Martin 2011
LOW-GRADE TACTICAL CODES • Provide temporary security ©LTCOL G. R. Newman-Martin 2011
LOW-GRADE TACTICAL CODES • Provide temporary security • Need to be decoded before they can be understood ©LTCOL G. R. Newman-Martin 2011
LOW-GRADE TACTICAL CODES • Provide temporary security • Need to be decoded before they can be understood • Can be broken with time ©LTCOL G. R. Newman-Martin 2011
LOW-GRADE TACTICAL CODES • Provide temporary security • Need to be decoded before they can be understood • Can be broken with time • Code tables are classified, accountable items
OPSCODES ©LTCOL G. R. Newman-Martin 2011
OPSCODES • Substitute text of a message by prearranged material ©LTCOL G. R. Newman-Martin 2011
OPSCODES • Substitute text of a message by prearranged material • Can only be understood by sender and intended receiver ©LTCOL G. R. Newman-Martin 2011
OPSCODES • Substitute text of a message by prearranged material • Can only be understood by sender and intended receiver • This delays understanding by receiver until message is decoded ©LTCOL G. R. Newman-Martin 2011
OPSCODES • Substitute text of a message by prearranged material • Can only be understood by sender and intended receiver • This delays understanding by receiver until message is decoded • Provide only short-term security ©LTCOL G. R. Newman-Martin 2011
OPSCODES • Substitute text of a message by prearranged material • Can only be understood by sender and intended receiver • This delays understanding by receiver until message is decoded • Provide only short-term security • OPSCODE tables must be changed daily
NUMCODES ©LTCOL G. R. Newman-Martin 2011
NUMCODES • Substitute numbers within plain text message by prearranged material ©LTCOL G. R. Newman-Martin 2011
NUMCODES • Substitute numbers within plain text message by prearranged material • Can only be understood by sender and intended receiver ©LTCOL G. R. Newman-Martin 2011
NUMCODES • Substitute numbers within plain text message by prearranged material • Can only be understood by sender and intended receiver • Prevents unauthorised listeners from understanding numbers (e. g. grid references) immediately ©LTCOL G. R. Newman-Martin 2011
NUMCODES • Substitute numbers within plain text message by prearranged material • Can only be understood by sender and intended receiver • Prevents unauthorised listeners from understanding numbers (e. g. grid references) immediately • Delays understanding by receiver until numbers are decoded ©LTCOL G. R. Newman-Martin 2011
NUMCODES • Substitute numbers within plain text message by prearranged material • Can only be understood by sender and intended receiver • Prevents unauthorised listeners from understanding numbers (e. g. grid references) immediately • Delays understanding by receiver until numbers are decoded • Provide only short-term security ©LTCOL G. R. Newman-Martin 2011
NUMCODES • Substitute numbers within plain text message by prearranged material • Can only be understood by sender and intended receiver • Prevents unauthorised listeners from understanding numbers (e. g. grid references) immediately • Delays understanding by receiver until numbers are decoded • Provide only short-term security • NUMCODE tables must be changed daily ©LTCOL G. R. Newman-Martin 2011
AUTHENTICATION TABLES ©LTCOL G. R. Newman-Martin 2011
AUTHENTICATION TABLES USED TO: • CHALLENGE THE IDENTITY OF A STATION ©LTCOL G. R. Newman-Martin 2011
AUTHENTICATION TABLES USED TO: • CHALLENGE THE IDENTITY OF A STATION • ESTABLISH THE AUTHENTICITY OF: ©LTCOL G. R. Newman-Martin 2011
AUTHENTICATION TABLES USED TO: • CHALLENGE THE IDENTITY OF A STATION • ESTABLISH THE AUTHENTICITY OF: • A STATION ©LTCOL G. R. Newman-Martin 2011
AUTHENTICATION TABLES USED TO: • CHALLENGE THE IDENTITY OF A STATION • ESTABLISH THE AUTHENTICITY OF: • A STATION • A TRANSMISSION ©LTCOL G. R. Newman-Martin 2011
AUTHENTICATION TABLES USED TO: • CHALLENGE THE IDENTITY OF A STATION • ESTABLISH THE AUTHENTICITY OF: • A STATION • A TRANSMISSION • A MESSAGE
The movie ‘Crimson Tide’ depicts the use of authentication tables to authenticate operational command messages ©LTCOL G. R. Newman-Martin 2011
NICKNAMES ©LTCOL G. R. Newman-Martin 2011
NICKNAMES PRE-ARRANGED CLASSIFIED WORDS ©LTCOL G. R. Newman-Martin 2011
NICKNAMES PRE-ARRANGED CLASSIFIED WORDS CONVEY HIDDEN MEANINGS OTHER THAN THEIR USUAL MEANINGS ©LTCOL G. R. Newman-Martin 2011
NICKNAMES PRE-ARRANGED CLASSIFIED WORDS CONVEY HIDDEN MEANINGS OTHER THAN THEIR USUAL MEANINGS USED FOR: • COMMUNICATIONS DRILL FOR: ©LTCOL G. R. Newman-Martin 2011
NICKNAMES PRE-ARRANGED CLASSIFIED WORDS CONVEY HIDDEN MEANINGS OTHER THAN THEIR USUAL MEANINGS USED FOR: • COMMUNICATIONS DRILL FOR: • CLOSING DOWN, IMPOSING/LIFTING RADIO SILENCE, CHANGING FREQUENCY ©LTCOL G. R. Newman-Martin 2011
NICKNAMES PRE-ARRANGED CLASSIFIED WORDS CONVEY HIDDEN MEANINGS OTHER THAN THEIR USUAL MEANINGS USED FOR: • COMMUNICATIONS DRILL FOR: • CLOSING DOWN, IMPOSING/LIFTING RADIO SILENCE, CHANGING FREQUENCY • SUBSTITUTING FOR UNPRONOUNCEABLE NAMES ©LTCOL G. R. Newman-Martin 2011
NICKNAMES PRE-ARRANGED CLASSIFIED WORDS CONVEY HIDDEN MEANINGS OTHER THAN THEIR USUAL MEANINGS USED FOR: • COMMUNICATIONS DRILL FOR: • CLOSING DOWN, IMPOSING/LIFTING RADIO SILENCE, CHANGING FREQUENCY • SUBSTITUTING FOR UNPRONOUNCEABLE NAMES • PROVISION OF LOW-GRADE COVER FOR REFERENCE TO GEOGRAPHICAL FEATURES e. g. OBJECTIVES, BOUNDS, ROUTES, REPORT LINES ©LTCOL G. R. Newman-Martin 2011
Other low-grade security measures Radio Appointment Titles Callsigns Address Groups ©LTCOL G. R. Newman-Martin 2011
Veiled Speech § The art of referring to a future event by reference to the past ©LTCOL G. R. Newman-Martin 2011
Veiled Speech § The art of referring to a future event by reference to the past § Consists of a reference to events of which unauthorised persons or groups have no knowledge. ©LTCOL G. R. Newman-Martin 2011
Veiled Speech § The art of referring to a future event by reference to the past § Consists of a reference to events of which unauthorised persons or groups have no knowledge. § Poor aid to security ©LTCOL G. R. Newman-Martin 2011
Veiled Speech § The art of referring to a future event by reference to the past § Consists of a reference to events of which unauthorised persons or groups have no knowledge. § Poor aid to security § Should be used sparingly – operators and users can never be sure of what knowledge unauthorised persons have. ©LTCOL G. R. Newman-Martin 2011
NET SECURITY MEASURES ©LTCOL G. R. Newman-Martin 2011
Net Security Measures Those actions taken to protect security ©LTCOL G. R. Newman-Martin 2011
Net Security Measures Those actions taken to protect security They include instructions for: • opening and closing communications ©LTCOL G. R. Newman-Martin 2011
Net Security Measures Those actions taken to protect security They include instructions for: • opening and closing communications • authentication ©LTCOL G. R. Newman-Martin 2011
Net Security Measures Those actions taken to protect security They include instructions for: • opening and closing communications • authentication • radio silence, change of frequency ©LTCOL G. R. Newman-Martin 2011
Net Security Measures Those actions taken to protect security They include instructions for: • opening and closing communications • authentication • radio silence, change of frequency • action in cases of compromise etc. ©LTCOL G. R. Newman-Martin 2011
Net Security Measures Information that is subject to periodic change ©LTCOL G. R. Newman-Martin 2011
Net Security Measures Information that is subject to periodic change …. and which is required to implement net security measures ©LTCOL G. R. Newman-Martin 2011
Net Security Measures Information that is subject to periodic change …. and which is required to implement net security measures …. is outlined in RATEL SOIs for particular exercises ©LTCOL G. R. Newman-Martin 2011
Net Security Measures Information that is subject to periodic change …. and which is required to implement net security measures …. is outlined in RATEL SOIs for particular exercises …. & includes details of nicknames, callsigns and frequencies. ©LTCOL G. R. Newman-Martin 2011
DEFENCE AGAINST RADIO JAMMING ©LTCOL G. R. Newman-Martin 2011
DEFENCE AGAINST RADIO JAMMING • USE RADIO ONLY WHEN NECESSARY ©LTCOL G. R. Newman-Martin 2011
DEFENCE AGAINST RADIO JAMMING • • USE RADIO ONLY WHEN NECESSARY KEEP CONVERSATIONS SHORT ©LTCOL G. R. Newman-Martin 2011
DEFENCE AGAINST RADIO JAMMING • • • USE RADIO ONLY WHEN NECESSARY KEEP CONVERSATIONS SHORT CUT DOWN YOUR RADIATION – LOW POWER ©LTCOL G. R. Newman-Martin 2011
DEFENCE AGAINST RADIO JAMMING • • USE RADIO ONLY WHEN NECESSARY KEEP CONVERSATIONS SHORT CUT DOWN YOUR RADIATION – LOW POWER CHOOSE SITE WELL ©LTCOL G. R. Newman-Martin 2011
DEFENCE AGAINST RADIO JAMMING • • • USE RADIO ONLY WHEN NECESSARY KEEP CONVERSATIONS SHORT CUT DOWN YOUR RADIATION – LOW POWER CHOOSE SITE WELL USE CARE BUT BE AS BRIEF AS POSSIBLE WHEN TUNING IS NECESSARY ©LTCOL G. R. Newman-Martin 2011
DEFENCE AGAINST RADIO JAMMING • • • USE RADIO ONLY WHEN NECESSARY KEEP CONVERSATIONS SHORT CUT DOWN YOUR RADIATION – LOW POWER CHOOSE SITE WELL USE CARE BUT BE AS BRIEF AS POSSIBLE WHEN TUNING IS NECESSARY USE CORRECT PROCEDURE ©LTCOL G. R. Newman-Martin 2011
DEFENCE AGAINST RADIO JAMMING • • USE RADIO ONLY WHEN NECESSARY KEEP CONVERSATIONS SHORT CUT DOWN YOUR RADIATION – LOW POWER CHOOSE SITE WELL USE CARE BUT BE AS BRIEF AS POSSIBLE WHEN TUNING IS NECESSARY USE CORRECT PROCEDURE AVOID MANNERISMS, IDIOSYNCRACIES AND ACCENTS TO REMAIN ANONYMOUS AND INDISTINGUISHABLE FROM OTHER RADIO USERS ©LTCOL G. R. Newman-Martin 2011
GOTTA QUESTION PUNK… …WELL DO YA? ©LTCOL G. R. Newman-Martin 2011
- Australian army radio appointment titles
- Acf values and standards powerpoint
- Army cadet force values and standards powerpoint
- Air cadet first aid badge
- Casevac procedure australia
- Askalibrarian csuohio
- Texas a&m hazing
- Principles of flight air cadets
- Where on an airship would white navigation lights be seen
- Principles of flight air cadets
- Leading cadet principles of flight exam answers
- Mcjrotc ribbons
- Smeac briefing
- Sheffield sea cadets
- Sheffield sea cadets
- South carolina corps of cadets
- Leicestershire police cadets
- Turbine operation
- Us army chaplain center and school
- Advanced radio mapping
- Trunking vs conventional radio system
- Army tasp unit coordinator
- Army traffic safety course
- How the army runs
- Guard force management
- Army traffic safety introductory course
- Memory forensics training
- Basic instructor course texas
- Advanced land navigation
- Onedrive uniovi
- Tcole advanced instructor course
- Tcole advanced instructor course
- Ao advanced course
- Building with bricks
- Course number and title
- Chaine parallèle muscle
- Cadet accountability system citadel
- Rcsu pacific
- Cadet private first class
- Citadel counseling center
- Cadet de la défense toulon
- Cadet captions
- Airport authority hong kong organisation chart
- Hong kong air cadet corps
- Cadet corps uniform
- Cadet class b uniform
- California cadet corps website
- Cacc uniform
- California cadet corps class c uniform
- Air cadet abuse
- To be recognized as an “ace of aces” a cadet must
- Cadet rule in navigation
- Afjrotc distinguished cadet badge
- Zodiac cadet fastroller
- Jrotc cadet appearance and grooming standards
- Logistik unicorp size chart
- Mologne cadet health clinic
- Asp brunei
- Nc teacher cadet program
- Leadership assessment report
- Beihang
- Beihang
- Six cadet corps objectives
- What is the compass we use for navigating when walking?
- Cadet rule in navigation
- Ca character
- Afjrotc ribbons
- Appearance standards
- Cadet advisory council
- Cadet portfolio
- James pelosi
- Cadet great start
- Cadet automation systems
- Cmpd envision academy
- Jclc summer camp
- 507 sqn
- Halton police cadet
- Capr 52-10
- Currents waves
- Performance and development framework
- Alexander v heise
- Australian primary health care research institute
- Australian gothic definition
- When did the australian gold rush start
- Blueprint career development
- Stair nosing australia
- Australian physical features
- Slidetodoc.com
- Australian standards for texture modified foods and fluids
- Information and communication technology capability meaning
- Truncated sentences examples
- Desert animals australia
- Australian business arts foundation
- Australian society for simulation in healthcare
- Australian nursing and midwifery education centre
- Australian antarctic data centre
- Granlund manager
- Australian labyrinth network
- National literacy and numeracy learning progressions
- Australian flag stars represent
- Australian philanthropic services
- Australian aboriginal creation myth
- Aehrc
- Australian curriculum framework for junior doctors
- Nonrhotic
- Australian barcode
- Defence force school of languages
- The australian connection zusammenfassung kapitel 7