Share on Google+Share on FacebookShare on LinkedInShare on TwitterShare on DiggShare on Stumble Upon
Custom Search
 
  

 

CODE AND CIPHER MESSAGES

Code words, such as VERDIN in the text EXECUTE PLAN VERDIN, are sent as plain language words. Encrypted groups, such as DRSRM, are spelled phonetically: DELTA, ROMEO, SIERRA, ROMEO, MIKE.

The phonetic alphabet is used for the names of signal flags as well as for spelling words, letter groups, and so on. Signal flags are combined into code groups that have meanings of their own. DELTA ROMEO ONE, for example, might mean "prepare to hover." Signal flag A is ALFA, flag B is BRAVO, and so on. Meanings of such code groups are given in appropriate signal publications.

Because flag signals are also sent by R/T, you must be able to differentiate between the two uses of the phonetic letters when you hear them. Here is the way-if the phonetic alphabet is used, the proword I SPELL precedes it and each phonetic letter is recorded as a letter. If you hear I SPELL, followed by DELTA OSCAR, write it as DO. On administrative nets, the proword SIGNALS, followed by DELTA OSCAR, means the groups have been taken from a signal book and should be recorded as such. Prowords are not used on nets used primarily for conveying signals.

Therefore, you may assume that alphabet flags are intended.

The duties of an R/T operator require a knowledge of the special language developed for tactical maneuvering, air control, antiair warfare, naval gunfiie support, electronic countermeasures, antisubmarine warfare, and other specialized uses. Words, phrases, and abbreviations used in R/T for these specialized uses are called operational brevity codes. A complete list of operational brevity code words is found in Operational Brevity Codes, ACP 165.

You should understand that the words and phrases of the brevity code provide no communications security. The purposes of the codes are to:

Standardize the vocabulary;

Improve the accuracy of the transmission; and

Shorten transmission time.

AUTHENTICATION

Authentication is a security measure designed to protect a communications system against fraudulent transmissions. There are specific times when you will have to use authentication procedures. Several types of authentication systems are in use, and the method of authentication will vary with the system that you are using. Authentication systems are accompanied by specific instructions outlining the method of use. You can find more information about the types of authentications and specific reasons when and why to use the authentication process in Communications Instructions-Security (U), ACP 122, and in NTP 5.

COMMUNICATIONS CENTER ADMINISTRATION

We will now show you some of the basic logs, command guard list (CGL), and changing call signs that deal with communications center administration. These short instructions are in no way a complete list of communications center operations. Each command has its own check-off lists or SOPs of how their command runs its center.

CIRCUIT BACKLOGS

Each circuit operator will notify the supervisor when the circuit status changes, when a backlog of traffic develops, when an outgoing transmission is delayed, or when any deviation from prescribed procedures is recognized. Circuit operators will report the backlog or potential for backlogs (logged-out equipment, poor reception) to the supervisor, who will in turn pass the information up the chain of command to the CWO and will also log the information into the master station log (MSL).

When relieved, the circuit operator will pass on information pertaining to the circuit(s), when it is not covered in the circuit status standard operating procedures.

A broadcast form provides for the number of messages received, the classification of the message, and also provides a record of destruction for classified message traffic. A check-off sheet (stock number 0196-LF-301-2350) is available through the supply system for keeping a record of broadcast numbers received and transmitted.

COMMAND GUARD LISTS

Each command is responsible for maintaining an accurate list of all AIGS, CADS, general messages, and task organization assignments required to fulfill its mission, and to supply this guard list to a serving communications center.

The command guard list must be verified with the communication plan to ensure that it is accurate and any discrepancies are corrected prior to updating. This is normally done when a change in tasking, operating area, or mission occurs.

DAILY CALL SIGNS

FLTCINC communications operating plan will prescribe the specific form of call sign to be employed based on the network used and operating conditions.

Call signs are to be used when first establishing a net, when reporting into a previously established net, and in the transmission and address components when a message is required to be relayed to a station that is on a different net.

Daily call signs, by their very name, direct you to change the call signs daily, using various issued publications. Refer to local operating instructions for instructions on how to verify the type of daily call signs you are using for specific situations.







Western Governors University
 


Privacy Statement - Copyright Information. - Contact Us

Integrated Publishing, Inc. - A (SDVOSB) Service Disabled Veteran Owned Small Business