Share on Google+Share on FacebookShare on LinkedInShare on TwitterShare on DiggShare on Stumble Upon
Custom Search
 
  

 

USE OF OPERATING SIGNALS

Operating signals are not designed for R/T transmission. In R/T procedures, operating information is normally conveyed in concise phrases. However, in two circumstances it is permissible to use operating signals contained in Communication Instructions, Operating Signals, ACP 131, instead of standard R/T phrases. These circumstances are where there are language difficulties and where practical if there is no risk of confusion.

In such instances, operating signals must be preceded by the word "PROSIGN" or "OPERATING SIGNAL." Prosigns and operating signals are transmitted using only authorized phonetic equivalents. The prosign INT is transmitted in its prosign equivalent; that is, INTERROGATIVE. The prowords I SPELL and FIGURES are not used. Examples of prosigns and operating signals are:

RADIOTELEPHONE SECURITY

In addition to adhering to circuit discipline, all users are responsible for observing proper security precautions on R/T nets. For example, many units at sea use classified call signs on tactical nets. If the operator does not know the operating situation, the classified call could be linked to the unclassified call sign for that ship.

Such unauthorized disclosures are why BEADWINDOW procedures have been introduced into the R/T process.

BEADWINDOW

BEADWINDOW is a real-time procedure used to alert circuit operators that an unauthorized disclosure has occurred over a nonsecured circuit.

BEADWINDOW also warns other operators on the net of the disclosure. This serves as an educational aid. The long-term benefits of the BEADWINDOW procedure include an increased awareness of the proper use of voice circuits throughout the fleet and better security of uncovered Navy voice communications.

BEADWINDOW procedures deal with Essential Elements of Friendly Information (EEFIs). EEFIs are established by operational commanders. EEFIs identify specific items of information which, if revealed and correlated with other information, would degrade the security of military operations, projects, or missions in the applicable areas. EEFIs can, therefore, vary from operation to operation or from area to area. Table 2-3 contains an EEFI key number and key word definition list.

BEADWINDOW CODE WORDS

The BEADWINDOW procedure uses the code word "BEADWINDOW" and a number combination (from the EEFI list) that is transmitted immediately to the unit disclosing an EEFI. The code word notifies the unit that it has committed the disclosure, and the number combination provides specific identity of the item disclosed. For example, when any station of the net commits a disclosure of an EEFI, net control (or any station observing the disclosure) calls the violator with

Table 2-3.-Essential Elements of Friendly Information (EEFIs)

a normal call-up. The calling station then says the word "BEADWINDOW" followed by the number of the EEFI the violator disclosed.

The only authorized reply to the BEADWINDOW message is "ROGER-OUT." This method allows the reported unit to take immediate action to correct the insecure practice. In this particular situation, if the call sign of the net control is "Control" and the call sign of the violator is USS Frances Scott Key, Control's report would be:

The EEFI list should be posted in clear sight of the operator at all nonsecure voice positions for quick reference. You should remember that procedural violations are not security violations; therefore, they don't fall in the BEADWINDOW category.

IMPORTANCE OF RADIOTELEPHONE VOICE PROCEDURES

Poor voice communications can create confusion, reduce reliability and speed, and nullify security precautions. Poor procedures can ultimately have an adverse effect on the mission of a ship.

A commanding officer, regardless of the mission of the ship, has only one real-time means of communicating with his commander and other units of a force-radiotelephone. Your ship maybe required to guard (monitor) 10 or more voice circuits, each having a specific purpose and specific procedures. Few of these circuits are operated from communications spaces except on small ships, such as submarines or destroyers. On larger ships, the circuits are handled from the bridge and the combat information center (CIC).

As an operator, you are responsible for providing reliable transmitter and receiver services to these remote operating positions. This entails establishing communications on a net or circuit before making that net or circuit available to the remote operators. If you do not know the various nets that are guarded by your ship and the purpose of these nets, the overall communications of the ship can be degraded. This could impede the progress of the entire operation.

Modern, high-speed naval operations make the elimination of confused R/T operations an absolute necessity. For example, a hunter-killer force searching for an enemy submarine is not permitted the luxury of a 5- or 10-minute delay in executing a screening signal.

An unnecessary delay such as this could defeat the purpose (speed) of the officer in tactical command (OTC) when using R/T. A 1-minute delay by an aircraft carrier pilot in executing a vectoring signal because he did not understand the message could easily result in the pilot's death.

During shakedown operations, a submarine could risk collision with its escort vessel during emergency surfacing procedures if voice communications are not clearly understood.

When possible, you must use only standard phraseology, authorized prowords, and brevity code words. Standard procedures enhance reliability and clarity. Moreover, variations from standard circuit procedures provide an ideal situation for enemy imitative deception.







Western Governors University
 


Privacy Statement - Copyright Information. - Contact Us

Integrated Publishing, Inc. - A (SDVOSB) Service Disabled Veteran Owned Small Business