Custom Search
|
|
FILE FILLERS Because of repeated reference to previously sent message traffic, you must be able to locate all messages easily and quickly. Therefore, you must always return a message to the same file from which it was removed and in the proper filing order. When you remove a message from a file, always insert a filler, or tickler, in its place. Fillers are locally prepared forms that identify the message by the original DTG, the message originator, information as to where the message is located, and the personal sign of the person removing the message from the file and completing the filler. For readdressal messages, a filler is made for each readdressal date-time group. The message itself is filed under the original date-time group. Figure 2-10 shows an example of a message filler, or tickler. Messages and fillers are filed in ascending date-time group order. The earliest message of the radio day (raday) will be at the bottom of the file. Automated systems print the DTG of each message on the lower right-hand corner of each message. For messages processed on nonautomated systems, the DTG should
Figure 2-10.-Example of a message filler. also be printed on the lower right-hand corner. This aids personnel in easily locating messages in the files. When a message is removed from a file, it is important that it be refiled as soon as possible. The importance of maintaining well-kept files and of moderating among the various watch sections cannot be overemphasized. Maintaining accurate files and records and observing proper procedures contribute to an efficient shipboard or shore communications organization. You should be aware that different ships and stations may do basic procedures in slightly different ways. All commands, however, must conform to the requirements contained in communications operating instructions and publications. RETENTION OF FILES Communication logs and files are retained by a communications center for a specified time period, as shown in table 2-1. After the time period indicated, the logs and files should be destroyed either by burning or shredding. Because of the volume of message traffic processed, logs and files can take up significant space in the message center; therefore, they should be destroyed in a timely manner.
Table 2-1.-Retention Period of Logs and Files COMMUNICATIONS PLANNING The primary objectives of communications planning are: To provide for effective connectivity to support the exercise of command and the exchange of essential information; and To advise the commander of the implications of communication capabilities and limitations for the operation plan and its execution. The communications plan has to consider reliability, security, and speed. The communications planner chooses facilities and methods that will best satisfy operational requirements. The plan provides for the command and control capability by which the operation will be controlled and directed. To be effective, the communications planner needs comprehensive knowledge of the organizational structure established for the operation and the capabilities and limitations of the communications and command center facilities available to the force. COMMUNICATIONS REQUIREMENTS The operational tasks assigned to various units require radio nets that link units engaged in the same activity or task. Communications circuits follow the command lines of the task unit or contribute to its tactical effectiveness by providing for essential information exchange. These considerations provide the essential elements for determining communications requirements. PROTECTION OF COMMUNICATIONS Enemy interception and disruption of communications are of primary concern to any communications planner. Every facet of communications facilities, methods, and procedures needs to be examined in terms of security, vulnerability to deception, and the electronic protection (EP) required for maximum protection. Security is the safeguarding of information. As it pertains to communications, security is usually referred to in terms of communications security (COMSEC) and signal security (SIGSEC). Security will be discussed in more depth in chapter 3. Various devices and procedures are used to increase security, including: l Authentication- A security measure designed to protect communications systems against acceptance of false transmissions or simulations by establishing the validity of a transmission, message, or originator. l Codes- Any system of communication in which arbitrary groups of symbols represent units of plain text. Codes are often used for brevity and/or security. l Ciphers- Any cryptologic system in which arbitrary symbols or groups of symbols represent units of plain text. l Radio Silence- A condition in which all or certain radio equipment is kept inoperative (frequency band and/or types of equipment are specified). l Monitoring- The act of listening, carrying out surveillance on, and/or recording the emissions of one's own or allied forces for the purpose of maintaining and improving procedural standards and Security. l Identification Friend or Foe (IFF)- A system using electromagnetic transmissions to which equipment carried by friendly forces automatically responds. For example, by emitting predetermined IFF pulses, friendly forces can distinguish themselves from enemy forces. Communications Deception Communications deception, part of the field of tactical deception, is the use of devices, operations, and techniques with the intent of confusing or misleading the user of a communications link or a navigation system. EA and EP Electronic attack (EA) is that division of electronic warfare (EW) involving actions taken to prevent or reduce an enemy's effective use of the electromagnetic spectrum. Enemy EA concerns the communications planner because overcoming enemy jamming and deception imposes certain restrictions on general communications operations procedures. Electronic protection (EP) is that division of EW involving actions taken to ensure friendly effective use of the electromagnetic spectrum despite an enemy's use of electronic warfare. The planner must be aware of EP capabilities available. |
|