information systems technician training series material/navedtra-14226.pdfinformation systems...

96
DISTRIBUTION STATEMENT A: Approved for public release; distribution is unlimited. NONRESIDENT TRAINING COURSE October 1997 Information Systems Technician Training Series Module 5—Communications Center Operations NAVEDTRA 14226 NOTICE Any reference within this module to “Radioman” or the former “Radioman rating” should be changed to “Information Systems Technician” and the “Information Systems Technician (IT) rating”. The subject matter presented relates to the occupational standards for the IT rating.

Upload: others

Post on 28-Jul-2020

11 views

Category:

Documents


2 download

TRANSCRIPT

Page 1: Information Systems Technician Training Series material/NAVEDTRA-14226.pdfInformation Systems Technician Training Series Module 5—Communications Center Operations NAVEDTRA 14226

DISTRIBUTION STATEMENT A: Approved for public release; distribution is unlimited.

NONRESIDENT

TRAININGCOURSE

October 1997

Information SystemsTechnician Training SeriesModule 5—Communications Center

Operations

NAVEDTRA 14226

NOTICE

Any reference within this module to “Radioman” or the former“Radioman rating” should be changed to “Information SystemsTechnician” and the “Information Systems Technician (IT) rating”.The subject matter presented relates to the occupationalstandards for the IT rating.

Page 2: Information Systems Technician Training Series material/NAVEDTRA-14226.pdfInformation Systems Technician Training Series Module 5—Communications Center Operations NAVEDTRA 14226

DISTRIBUTION STATEMENT A: Approved for public release; distribution is unlimited.

Although the words “he,” “him,” and“his” are used sparingly in this course toenhance communication, they are notintended to be gender driven or to affront ordiscriminate against anyone.

Page 3: Information Systems Technician Training Series material/NAVEDTRA-14226.pdfInformation Systems Technician Training Series Module 5—Communications Center Operations NAVEDTRA 14226

i

PREFACE

By enrolling in this self-study course, you have demonstrated a desire to improve yourself and the Navy.Remember, however, this self-study course is only one part of the total Navy training program. Practicalexperience, schools, selected reading, and your desire to succeed are also necessary to successfully roundout a fully meaningful training program.

COURSE OVERVIEW: In completing this nonresident training course, you will demonstrate aknowledge of the subject matter by correctly answering questions on the following subjects: CenterOperations, Voice Communications, Emission Control, and Cryptosecurity.

THE COURSE: This self-study course is organized into subject matter areas, each containing learningobjectives to help you determine what you should learn along with text and illustrations to help youunderstand the information. The subject matter reflects day-to-day requirements and experiences ofpersonnel in the rating or skill area. It also reflects guidance provided by Enlisted Community Managers(ECMs) and other senior personnel, technical references, instructions, etc., and either the occupational ornaval standards, which are listed in the Manual of Navy Enlisted Manpower Personnel Classificationsand Occupational Standards, NAVPERS 18068.

THE QUESTIONS: The questions that appear in this course are designed to help you understand thematerial in the text.

VALUE: In completing this course, you will improve your military and professional knowledge.Importantly, it can also help you study for the Navy-wide advancement in rate examination. If you arestudying and discover a reference in the text to another publication for further information, look it up.

1997 Edition Prepared byRMCS(SW/AW) Deborah Hearn and

DPC(SW) Walter Shugar, Jr.

Published byNAVAL EDUCATION AND TRAINING

PROFESSIONAL DEVELOPMENTAND TECHNOLOGY CENTER

NAVSUP Logistics Tracking Number0504-LP-026-8650

Page 4: Information Systems Technician Training Series material/NAVEDTRA-14226.pdfInformation Systems Technician Training Series Module 5—Communications Center Operations NAVEDTRA 14226

ii

Sailor’s Creed

“I am a United States Sailor.

I will support and defend theConstitution of the United States ofAmerica and I will obey the ordersof those appointed over me.

I represent the fighting spirit of theNavy and those who have gonebefore me to defend freedom anddemocracy around the world.

I proudly serve my country’s Navycombat team with honor, courageand commitment.

I am committed to excellence andthe fair treatment of all.”

Page 5: Information Systems Technician Training Series material/NAVEDTRA-14226.pdfInformation Systems Technician Training Series Module 5—Communications Center Operations NAVEDTRA 14226

CONTENTS

CHAPTER PAGE

1. Center Operations. . . . . . . . . . . . . . . . . . . . . . . . . . 1-1

2. Voice Communications . . . . . . . . . . . . . . . . . . . . . . . 2-1

3. Emission Control . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-1

4. Cryptosecurity . . . . . . . . . . . . . . . . . . . . . . . . . . 4-1

APPENDIX

I. Glossary . . . . . . . . . . . . . . . . . . . . . . . . . . . . AI-1

II. Glossary of Acronyms and Abbreviations . . . . . . . . . . . . AII-1

III. References Used to Develop the TRAMAN. . . . . . . . . . . AIII-1

INDEX.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . INDEX-1

NONRESIDENT TRAINING COURSE follows the index

iii

Page 6: Information Systems Technician Training Series material/NAVEDTRA-14226.pdfInformation Systems Technician Training Series Module 5—Communications Center Operations NAVEDTRA 14226

SUMMARY OF THE RADIOMANTRAINING SERIES

MODULE 1

Administration and Security—This module covers Radioman duties relating toadministering AIS and communication systems. Procedures and guidance forhandling of classified information, messages, COMSEC material and equipment,and AIS requirements are discussed.

MODULE 2

Computer Systems—This module covers computer hardware startup, includingperipheral operations and system modification. Other topics discussed includecomputer center operations, media library functions, system operations, andtroubleshooting techniques. Data file processes, memory requirements, anddatabase management are also covered.

MODULE 3

Network Communications—This module covers network administration, LANhardware, and network troubleshooting. Related areas discussed are networkconfilguration and operations, components and connections, and communicationlines and nodes.

MODULE 4

Communications Hardware—This module covers various types ofcommunications equipment, including satellites and antennas. Subjects discussedinclude hardware setup procedures, COMSEC equipment requirements, distresscommunications equipment, troubleshooting equipment, satellite theory, andantenna selection and positioning.

MODULE 5

Communications Center Operations—This module covers center operations,including transmit message systems, voice communications, center administration,quality control, and circuit setup/restorations. Guidelines for setting EMCON andHERO conditions and cryptosecurity requirements are also discussed.

iv

Page 7: Information Systems Technician Training Series material/NAVEDTRA-14226.pdfInformation Systems Technician Training Series Module 5—Communications Center Operations NAVEDTRA 14226

CREDITS

Trademark Credits

Microsoft is a registered trademark of Microsoft Corporation.

v

Page 8: Information Systems Technician Training Series material/NAVEDTRA-14226.pdfInformation Systems Technician Training Series Module 5—Communications Center Operations NAVEDTRA 14226

vi

INSTRUCTIONS FOR TAKING THE COURSE

ASSIGNMENTS

The text pages that you are to study are listed atthe beginning of each assignment. Study thesepages carefully before attempting to answer thequestions. Pay close attention to tables andillustrations and read the learning objectives.The learning objectives state what you should beable to do after studying the material. Answeringthe questions correctly helps you accomplish theobjectives.

SELECTING YOUR ANSWERS

Read each question carefully, then select theBEST answer. You may refer freely to the text.The answers must be the result of your ownwork and decisions. You are prohibited fromreferring to or copying the answers of others andfrom giving answers to anyone else taking thecourse.

SUBMITTING YOUR ASSIGNMENTS

To have your assignments graded, you must beenrolled in the course with the NonresidentTraining Course Administration Branch at theNaval Education and Training ProfessionalDevelopment and Technology Center(NETPDTC). Following enrollment, there aretwo ways of having your assignments graded:(1) use the Internet to submit your assignmentsas you complete them, or (2) send all theassignments at one time by mail to NETPDTC.

Grading on the Internet: Advantages toInternet grading are:

• you may submit your answers as soon asyou complete an assignment, and

• you get your results faster; usually by thenext working day (approximately 24 hours).

In addition to receiving grade results for eachassignment, you will receive course completionconfirmation once you have completed all the

assignments. To submit your assignmentanswers via the Internet, go to:

https://courses.cnet.navy.mil

Grading by Mail: When you submit answersheets by mail, send all of your assignments atone time. Do NOT submit individual answersheets for grading. Mail all of your assignmentsin an envelope, which you either provideyourself or obtain from your nearest EducationalServices Officer (ESO). Submit answer sheetsto:

COMMANDING OFFICERNETPDTC N3316490 SAUFLEY FIELD ROADPENSACOLA FL 32559-5000

Answer Sheets: All courses include one“scannable” answer sheet for each assignment.These answer sheets are preprinted with yourSSN, name, assignment number, and coursenumber. Explanations for completing the answersheets are on the answer sheet.

Do not use answer sheet reproductions: Useonly the original answer sheets that weprovide—reproductions will not work with ourscanning equipment and cannot be processed.

Follow the instructions for marking youranswers on the answer sheet. Be sure that blocks1, 2, and 3 are filled in correctly. Thisinformation is necessary for your course to beproperly processed and for you to receive creditfor your work.

COMPLETION TIME

Courses must be completed within 12 monthsfrom the date of enrollment. This includes timerequired to resubmit failed assignments.

Page 9: Information Systems Technician Training Series material/NAVEDTRA-14226.pdfInformation Systems Technician Training Series Module 5—Communications Center Operations NAVEDTRA 14226

vii

PASS/FAIL ASSIGNMENT PROCEDURES

If your overall course score is 3.2 or higher, youwill pass the course and will not be required toresubmit assignments. Once your assignmentshave been graded you will receive coursecompletion confirmation.

If you receive less than a 3.2 on any assignmentand your overall course score is below 3.2, youwill be given the opportunity to resubmit failedassignments. You may resubmit failedassignments only once. Internet students willreceive notification when they have failed anassignment--they may then resubmit failedassignments on the web site. Internet studentsmay view and print results for failedassignments from the web site. Students whosubmit by mail will receive a failing result letterand a new answer sheet for resubmission of eachfailed assignment.

COMPLETION CONFIRMATION

After successfully completing this course, youwill receive a letter of completion.

ERRATA

Errata are used to correct minor errors or deleteobsolete information in a course. Errata mayalso be used to provide instructions to thestudent. If a course has an errata, it will beincluded as the first page(s) after the front cover.Errata for all courses can be accessed andviewed/downloaded at:

https://www.advancement.cnet.navy.mil

STUDENT FEEDBACK QUESTIONS

We value your suggestions, questions, andcriticisms on our courses. If you would like tocommunicate with us regarding this course, weencourage you, if possible, to use e-mail. If youwrite or fax, please use a copy of the StudentComment form that follows this page.

For subject matter questions:

E-mail: [email protected]: Comm: (850) 452-1501

DSN: 922-1501FAX: (850) 452-1370(Do not fax answer sheets.)

Address: COMMANDING OFFICERNETPDTC N3116490 SAUFLEY FIELD ROADPENSACOLA FL 32509-5237

For enrollment, shipping, grading, orcompletion letter questions

E-mail: [email protected]: Toll Free: 877-264-8583

Comm: (850) 452-1511/1181/1859DSN: 922-1511/1181/1859FAX: (850) 452-1370(Do not fax answer sheets.)

Address: COMMANDING OFFICERNETPDTC N3316490 SAUFLEY FIELD ROADPENSACOLA FL 32559-5000

NAVAL RESERVE RETIREMENT CREDIT

If you are a member of the Naval Reserve,you may earn retirement points for successfullycompleting this course, if authorized undercurrent directives governing retirement of NavalReserve personnel. For Naval Reserve retire-ment, this course is evaluated at 3 points. (Referto Administrative Procedures for NavalReservists on Inactive Duty, BUPERSINST1001.39, for more information about retirementpoints.)

Page 10: Information Systems Technician Training Series material/NAVEDTRA-14226.pdfInformation Systems Technician Training Series Module 5—Communications Center Operations NAVEDTRA 14226
Page 11: Information Systems Technician Training Series material/NAVEDTRA-14226.pdfInformation Systems Technician Training Series Module 5—Communications Center Operations NAVEDTRA 14226

ix

Student Comments

Course Title:Information Systems Technician Training SeriesModule 5—Communications Center Operations

NAVEDTRA: 14226 Date:

We need some information about you:

Rate/Rank and Name: SSN: Command/Unit

Street Address: City: State/FPO: Zip

Your comments, suggestions, etc.:

Privacy Act Statement: Under authority of Title 5, USC 301, information regarding your military status isrequested in processing your comments and in preparing a reply. This information will not be divulged withoutwritten authorization to anyone other than those within DOD for official use in determining performance.

NETPDTC 1550/41 (Rev 4-00

Page 12: Information Systems Technician Training Series material/NAVEDTRA-14226.pdfInformation Systems Technician Training Series Module 5—Communications Center Operations NAVEDTRA 14226
Page 13: Information Systems Technician Training Series material/NAVEDTRA-14226.pdfInformation Systems Technician Training Series Module 5—Communications Center Operations NAVEDTRA 14226

CHAPTER 1

CENTER OPERATIONS

Upon completing this chapter, you should be able to do the following:

Identify the procedures for transmitting messages via automated systems andmanual circuits.

Identify the procedures for monitoring and reporting of circuit backlogs.

Identify the steps to verify broadcast number continuity.

Determine the procedures for preparing, updating, and verifying thecommand guard list (CGL) and the master station log (MSL).

Identify the procedures to verify STU-III systems parameters for remote/dial-in users and explain the need to set up and operate the STU-III terminals withremote/dial-in users.

Determine the procedures for the preparation of the communications plan.

Identify the steps to reset communications systems to RADAY.

Determine communications protocols applied to circuit set up/restorations.

List the steps to activate, deactivate, and place communications circuits instandby, set up, or restoration.

Identify the procedures to transmit or receive cryptographic keying materialvia OTAT/OTAR.

Define the steps to analyze network capacity and reliability.

Telecommunications capabilities are continuallyadvancing as technology improves. Because ofadvances in technology, we are seeing greatimprovements in the quality and speed ofcommunications, and an increase in our informationtransfer capabilities. The Navy’s modern automatedsystems greatly reduce writer-to-reader times inmessage handling, and the volume of messages that canbe processed is steadily increasing.

ASHORE AUTOMATEDTELECOMMUNICATIONS SYSTEMS

Two new shore command systems that are comingon-line in the 1990s are the Navy Standard TeleprinterAshore (NSTA) and the Manual Relay Center

Modernization Program (MARCEMP). We willdiscuss these two new systems as well as the other in-place automated shore systems and their interfacecomponents.

NAVY STANDARD TELEPRINTERASHORE

With the introduction of the Navy StandardTeleprinter (NST) at afloat commands, there was a needto replace antiquated communications systems ashorewith a system compatible with the NSTs. To meet thisneed, the Navy has developed the Navy StandardTeleprinter Ashore (NSTA) program.

The heart of the NSTA program is the PersonalComputer Message Terminal (PCMT) and its

1-1

Page 14: Information Systems Technician Training Series material/NAVEDTRA-14226.pdfInformation Systems Technician Training Series Module 5—Communications Center Operations NAVEDTRA 14226

associated software. The PCMT (shown in figure l-l)is a PC-based microcomputer. The PCMT is a majorstep toward modernizing the entire NavalTelecommunications System.

Personal Computer Message Terminal

The Personal Computer Message Terminal(PCMT) is a remarkable military message-processingsoftware package that runs on a combination of IBM-compatible PC- or AT-class desktop microcomputersand input/output devices called bus interface units(BIUs). The PCMT has the following advantages:

For sites having a message relay requirement,the PCMT system eliminates handling torn papertape.

For small naval telecommunications centers(NTCs), the PCMT provides a sophisticated,easy-to-use automated message-handlingsystem.

For Local Digital Message Exchange (LDMX)or Naval Communications Processing andRouting System (NAVCOMPARS) subscribersthat must be served remotely, the PCMT canprovide an excellent, low-cost remote terminalcapability. Received traffic can be reviewed at aterminal and selected messages shifted to aprinter when a hardcopy is needed. The systemwill allow the operator to compose and save anynumber of partially completed pro formamessages. Subsequently, these messages canquickly and easily be retrieved, completed, andsent whenever needed.

The PCMT allows messages to be exchanged viadiskette media. For users who wish to exchangeAUTODIN message traffic with their own PC-

Figure 1-1.—Personal Computer Message Terminal (PCMT)with printer.

1-2

based systems, the PCMT provides an excellentvehicle for doing so.

PCMT System

The PCMT message-processing system is a store-and-forward system that provides full accountability forall messages transmitted and received. The PCMTconsists of a microcomputer configured with an 84-keykeyboard, monitor, hard disk, and one or two floppydiskette drives. The PCMT also includes a medium-speed printer for printing message logs and hard-copymessages when required. Bus interface units (BIUs) arerequired to interface between the PCMT and theautomated shore systems.

The PCMT microprocessor has 640K (minimum)of random-access memory (RAM) and uses theMicrosoft® Disk Operating System (MS/DOS). ThePCMT has a 5 1/4- and 3 l/2-inch disk drive capability.The minimum hard disk has a capacity of 10 millionbytes. The hard disk varies based on software and userstorage requirements. The PCMT may have either anonremovable or removable drive, depending upon theuser’s security requirements.

The MS/DOS software is designed for a singleworkstation operation with operator-enteredcommands controlling the workstation. Powerful,easy-to-use message edit software will help the operatorcorrect errors in input data from diskettes and generatemessages. The monitors are monochrome except wherethe software has been coded to display pertinentinformation in color. In the next paragraphs, we willdescribe some of the capabilities of the PCMT.

The PCMT system assigns a messageaccountability number (MAN) to each complete orpartial message processed. Once a MAN is assigned,the system reports each step in the processing of thatmessage. This is done by automatically generated andon-demand log entries and on-demand messageaccountability reports. Message accountability reportsidentify all processing activity completed or pendingfor each message processed by the system.

The system also generates a log entry each time acomplete or partial message is received, transmitted, orcanceled. All messages received from or delivered to adiskette are further identified in the log entries andmessage accountability reports by the appropriatediskette volume identification.

The PCMT can be used to recall a specific messagefrom the hard disk, which can be printed on an output

Page 15: Information Systems Technician Training Series material/NAVEDTRA-14226.pdfInformation Systems Technician Training Series Module 5—Communications Center Operations NAVEDTRA 14226

device. The operator can recall a message by providinga message accountability number (MAN), a componentidentification number (CIN), or a channel servicenumber (CSN). The operator can also recall a messagewith an originating station routing indicator (OSRI),station serial number (SSN), or time of file (TOF).

The PCMT also provides significant paperreduction since information on receipt and delivery ofmessage traffic is recorded on diskettes instead of paper.The PCMT stores messages on the hard disk until theoperator requests delivery. The PCMT then outputsmessages to a diskette, thereby reducing manualprocessing steps.

The PCMT system is setup so that narrative anddata pattern (card image) traffic received from theserving LDMX and NAVCOMPARS can be deliveredto the printer and/or diskettes. Data pattern traffic isusually delivered only to diskettes. Messages deliveredto diskettes are segregated by routing indicators so thatmessage centers receive only those messages addressedto them.

An operator can use the PCMT to enter a narrativeor card image message, or create anew message using asimple keyboard/display screen editor. The terminalallows the operator to save a partially completedmessage on a diskette, recall it, and continue to edit it.At some communications centers, the operator can enternarrative or card image data pattern traffic preparedelsewhere.

Simple PC-based application programs that can beused in an office environment to review and prepareboth narrative and card image messages are beingdeveloped. Once a day, the PCMT system will generatea summary report that identifies all traffic processed bythe terminal during the previous 24-hour period.

The PCMT is the outgrowth of a program begun byCOMNAVTELCOM (now COMNAVCOMTEL-COM) in 1982 to provide automation support for fleetmessage relay centers. The Navy had a continuingrequirement to exchange message traffic over HF radiochannels terminated at a relay site. Unfortunately, suchchannels impressed transmission garbles on anymessage they carried.

Since NAVCOMPARS required that message datapresented by a TTY circuit be letter-perfect,NAVCOMPARS could not terminate such circuitsdirectly. In the past, a message received on thesecircuits had to be punched out onto paper tape andprinted simultaneously. The fleet center operator wouldthen examine the printed copy and, if there were no

errors, feed the paper tape into a reader that was on-lineto NAVCOMPARS. If there was an error, either the shipwould have to resend the message or the operator wouldhave to recut the message’s paper tape on a Model 28TTY.

The process was slow, manpower intensive, anderror prone. The system built in response to this need isnow what we call the Manual Relay CenterModernization Program (MARCEMP).

MANUAL RELAY CENTERMODERNIZATION PROGRAM

The Manual Relay Center Modernization Program(MARCEMP) was first certified for operational use in1988 as part of the NSTA program. However, evenbefore certification, it was recognized that the systemcould serve as the basis for a much more generalizedlow-cost message-processing system. The typicalMARCEMP system is a PCMT configuration.

The MARCEMP provides significant automationsupport for all aspects of HF message relay operationswithin the fleet. Since all HF fill-period terminationand primary ship-shore traffic circuits have beenterminated directly into a state-of-the-art computer-based system, the need to handle tom paper tape hasbeen completely eliminated.

The MARCEMP system automatically checksformal messages for errors and sends them on when noerrors are found. The system also makes available to afleet center operator an advanced, full-screen computerterminal editor. The operator can use the terminal editorto correct format errors in the message that occur due totransmission garbles. The terminal editor can also beused to carry on an operator-to-operator dialogue withafloat communications personnel to coordinatecorrective action.

The system provides a complete message audit trailand detailed accountability reports, which help ensurethat all traiffic is properly handled. Its modular andflexible design permits it to be easily tailored to meet thevarying individual needs of the large or small fleetcenter. MARCEMP can handle up to 24 send and 24receive circuits simultaneously. MARCEMP can alsoprocess approximately 3,500 narrative or operator-to-operator dialogue messages daily.

A number of significant enhancements have beenadded to the MARCEMP version 1.0 baseline system.These enhancements have resulted in the PCMTversion 2.0 as another configuration of the NSTA

1-3

Page 16: Information Systems Technician Training Series material/NAVEDTRA-14226.pdfInformation Systems Technician Training Series Module 5—Communications Center Operations NAVEDTRA 14226

program. This version is configured as a singleworkstation. Version 3.0 can be configured as amultiple workstation or single workstation PCMTsystem to replace both the earlier version 1.0MARCEMP and version 2.0 PCMT. The PCMTversion 3.0 can do everything MARCEMP and PCMTversion 2.0 can do—and much more.

GATEGUARD SUBSYSTEM

The GateGuard subsystem is an Automatic DigitalNetwork (AUTODIN) Interface Terminal (AIT) thatprovides user office automation systems (OASs) agateway to the AUTODIN system. (AUTODIN isdiscussed later.) GateGuard also acts as a security guarddevice; hence, the name GateGuard. The GateGuardsubsystem will eventually allow commands(subscribers) to interface directly with the AUTODINsystem. This direct interface eliminates the manualhandl ing of messages by the serv ic ingtelecommunications center (TCC).

Currently, a servicing TCC processes (transmit andreceive) message traffic from the AUTODIN system forits subscribers. The GateGuard subsystem willeventually eliminate the need for TCCs becausesubscribers will be able to process their own messagesthrough GateGuard. Subscribers will also be able toroute messages via their local area networks (LANs)using desktop computers.

The GateGuard system is comprised of threeelements:

An AUTODIN Gateway Terminal (AGT),

A gateway communications link to anAutomated Information System (AIS), and

A Guard Device (GD).

The AGT functions as a RIXT look-alike send-and-receive terminal connected to one of the AUTODINsubscriber terminals, such as the LDMX,NAVCOMPARS, or PCMT. The AGT serves as theprimary AUTODIN interface point for a singleorganization.

The AGT has software that will operate onmicrocomputer systems designed to be operated byorganization admin personnel. For example, in a smallcommand, the AGT is located in the commandingofficer’s outer office and is operated by the Yeoman orsecretary.

The communications link connecting theAUTODIN Subscriber Terminal (AST) with the AGTpasses through the Guard Device (GD). The mainpurpose of the GD is to assist in enforcing systemsecurity policy. Specifically, the GD serves to isolatesensitive data in the serving AST from data processedby the AGT. It does so by ensuring that each messageprocessed has been properly encapsulated and assigneda security code that the AGT is cleared to process.

The serving AST provides long-term archivestorage for all messages sent to or received from theAGT. When the AGT is served by an LDMX, anoperator at the AGT is able to recall messages from thatsystem automatically. The operator is also able toidentify the desired message by its originator and date-time group, originating station routing indicator, stationserial number, time of file, or by the processingsequence number assigned to the message by thatsystem.

The following is a simplified description of how theGateGuard subsystem works:

Various offices in a command have desktopcomputers that are interconnected by the command’sLAN. Messages drafted on any computer in the systemcan be stored in a central computer. These messages canbe accessed by any computer in the LAN. Themessages can then be reviewed and checked foraccuracy in format and content. When a message isreleased, the command sends it to the AUTODINsystem via the GateGuard subsystem. At no time doesthe message leave the computer channels.

When messages are sent to subscribers via theAUTODIN system, the GateGuard subsystem will beable to identify messages for the various subscribers byplain language addresses (PLAs) or routing indicators(RIs). In some cases, GateGuard will use a key word orphrase in the message text to identify the subscriber forwhich the message is intended.

GateGuard will examine each message for which itaccepts delivery responsibility, determine messagecompleteness, and determine if it contains internallyconsistent security labels. If GateGuard detects anydiscrepancies, the software will not allow the messageto be forwarded or delivered to a diskette. However, themessage can still be routed to a local printer connectedto the GateGuard subsystem.

1- 4

Page 17: Information Systems Technician Training Series material/NAVEDTRA-14226.pdfInformation Systems Technician Training Series Module 5—Communications Center Operations NAVEDTRA 14226

AUTOMATIC DIGITAL NETWORK

The Automatic Digital Network (AUTODIN) is aworldwide computerized communications system.AUTODIN provides for the transmission of narrativeand data pattern traffic on a store-and-forward basis.

AUTODIN provides reliable, secure, and efficientcommunications. AUTODIN also incorporates errordetection and contains the highest speed transmissionequipment currently available. AUTODIN is part of theDefense Communications System (DCS) and ismanaged by the Defense Communications Agency(DCA).

Interface equipments translate all AUTODINinputs into common machine language, makingAUTODIN compatible with many computer codes,speeds, and media, such as cards and tapes. Because ofthis, communications equipment within the NTS can beintegrated into the AUTODIN system.

AUTODIN Switching Centers

The backbone of the AUTODIN system is theAutomatic Switching Center (ASC). There are eightASCs in the continental United States and five ASCsoverseas (Europe and the Pacific).

The ASCs are interconnected into a digital networkby trunk lines. Each center has local lines that link it toeach subscriber (communications center) terminal.Messages entering the AUTODIN system at any of thesubscriber terminals are forwarded through theirrespective switching centers. The ASCs acceptmessages from subscribers, determine theclassifications and precedence of the messages, andrelay the messages to the addressed subscribers.

AUTODIN Operational Modes

There are five AUTODIN system operationalmodes. These modes provide variation of speed andoperation capabilities based on the equipmentconfigurations of the message center subscribers. Thefollowing paragraphs describe each mode:

Mode I —A duplex operation with automaticerror and channel controls. Mode I operationallows independent and simultaneous two-wayoperation between two stations. The channelcontrol characters acknowledge receipt of validline blocks and messages or allow return of errorinformation to the subscriber. The terminal

(switching center) responds automatically tothese characters by continuing or stoppingtransmission and displaying action informationto the operator. A magnetic tape terminal is anexample of terminal equipment using mode I.

Mode II —A duplex operation normallyassociated with TTY or teleprinter equipmentswith independent and simultaneous two-wayoperation capability. There are no automaticerror and charnel controls in mode II operation.Message accountability is maintained throughchannel sequence numbers and service messageactions.

Mode III —A duplex operation with automaticerror and channel controls but only one-waytransmission capability. The return is used onlyfor error control and channel coordinationresponse. The mode III channel is reversible on amessage basis. Control characters are used in thesame manner as in mode I.

Mode IV —A unidirectional operation (sendonly or receive only) without error control andchannel coordination. The mode IV channel isnonreversible and is equivalent to half-duplexoperation of mode II.

Mode V —A duplex operation, normallyassociated with TTY or teleprinter equipment,with independent and simultaneous two-waytransmission. Control characters acknowledgereceipt of messages and display limitedinformation to the operator. Messageaccountability is maintained through the use ofchannel sequence numbers.

Input and output (I/O) devices, such as teleprinters,provide the central AUTODIN computer with thenecessary means to communicate with the user. Outputdevices provide the means for changing the computer-processed data into a form specified by or intelligible tothe users. The selection of I/O devices depends on thespecific use for which a computer is intended.

Generally, I/O devices must meet several basicrequirements. First, they must be able to modify all dataso that it is acceptable to the computer during the inputphase of the operation. The devices must also be able topresent data in usable form during the output phase andoperate quickly and efficiently with the computer.

1-5

Page 18: Information Systems Technician Training Series material/NAVEDTRA-14226.pdfInformation Systems Technician Training Series Module 5—Communications Center Operations NAVEDTRA 14226

I/O devices use coded languages. These languagesare:

ASCII Code —American Standard Code forInformation Interchange, eight-level paper tape;and

ITA #2 Code —American version ofinternational TTY alphabet, five-level papertape.

Message Header Programming

At the beginning of each AUTODIN message is aheader (format line 2) containing pertinent informationon the destination of the message. The originator canaddress a message either to a single addressee or tomultiple addresses. This system saves time andrequires fewer communications facilities, since onlyone message is prepared by the originator and sent to theswitching center.

The timing system contained in AUTODINequipment briefly connects a switching center to eachsubscriber terminal in turn. Computer memories act asreservoirs for the incoming messages of each subscriberterminal. The computer is programmed to connect eachterminal in turn during a cycle. Messages received intheir entirety are scheduled for output to the addressees’charnels as their turns arrive in the cycle.

AUTODIN has built-in safeguards that can detectalmost any type of hardware or format error.Additionally, a complete (reference) copy of all relayedmessages is kept on AUTODIN computer tape. Aseparate (journal) copy is made of only the addressee(s).Using this journal copy as an index enables the systemto locate the reference copy of any message.

AUTODIN Tape Messages

The AUTODIN system is programmed to acceptproperly cut tapes and route them through the variousswitching centers and terminals en route to theirultimate destination. The system is then able to producea tape and hardcopy for the designated addressee(s).

When preparing a message tape for the AUTODINsystem, you must adhere to certain tape-cuttingprocedures. For example, format lines 1, 2, and 4 mustnot deviate; otherwise, the ASC will reject the message.The next paragraphs discuss the most important pointson proper preparation of tape messages for transmissionin the AUTODIN system.

ROUTING INDICATORS. —Within theAUTODIN network, a message tape is routed throughthe AUTODIN system to the addressee(s) by a routingindicator. Routing indicators are combinations of notless than four nor more than seven letters.

A routing indicator begins with the letter R or Q.The letter R indicates that the routing indicator is part ofthe worldwide tape relay system. The letter Q indicatesthat the routing indicator is within a self-containednetwork within a command or theater.

The second letter of the routing indicator identifiesthe nation or international alliance to which theindicator belongs. For example, the letter U refers to theUnited States. Therefore, RU indicates that themessage tape is part of the worldwide network and isdestined to a station in the United States.

The third letter of the routing indicator identifies thegeographical area in which a particular station is locatedor from which it is served. This is necessary for relaypurposes because the second letter may indicate a largenation within which there are a number of subdivisionsor stations. For example, many stations in the UnitedStates are designated by the third letter C. Therefore,the first three letters of “RUC” indicate that the tape ispart of the worldwide network, destined for the UnitedStates, and to a certain geographical area within theUnited States.

The fourth and subsequent letters of a routingindicator designate relay and tributary stations withinthe tape relay network. Like the first three letters, thefourth and subsequent letters may vary, depending uponlocation, area, and other factors.

TRANSMISSION IDENTIFICATION(FORMAT LINE 1). —As a means of maintainingtraffic continuity, TTY terminals (modes II, IV, and V)must prefix each message header with a messagetransmission identification (TI). The ASC validates theelements in the TI. Modes I and III do not require formatline 1. The TI is constructed without spaces and must beaccurately prepared without corrections. For example,a correctly prepared TI might appear as follows:

VZCZCJTA (FIGS) 123 (LTRS) (2CR 1LF)

The elements of the TI and their meanings are asfollows:

l V —Ensures that the first character ofintelligence is not lost or garbled;

l ZCZ —Indicates the start of the message;

1-6

Page 19: Information Systems Technician Training Series material/NAVEDTRA-14226.pdfInformation Systems Technician Training Series Module 5—Communications Center Operations NAVEDTRA 14226

. JTA —Station/channel designator letters;

. xxx —Three-digit number indicating thesequential number of transmissions.

The station/channel designators vary for eachchannel and are determined by the status of theoriginating station. For example, if a minor relay ortributary station originates a TI to a major relay station,the first two characters consist of the fifth and sixthletters of the station routing indicator. The thirdcharacter identifies the channel. Channel designatorsstart with the letter A, progress alphabetically, and areassigned to all connected channels. For example, atributary station having the routing indicator

RUWTABA would use the designator “ABA” for thefirst outgoing channel and “ABB,” “ABC,” and so on,for additional outgoing channels.

MESSAGE HEADER (FORMAT LINE2). —The message header is a basic 43-position header(figure 1-2). The message header is the starting pointfor the operator who is preparing the message tape.When preparing the header, the operator mustremember that it must be letter-perfect.

The following paragraphs describe each position ofthe header:

Position 1 (Precedence) —The prosign Z(FLASH), O (IMMEDIATE), P (PRIORITY), or R

Figure 1-2.—Message header (format line 2).

1-7

Page 20: Information Systems Technician Training Series material/NAVEDTRA-14226.pdfInformation Systems Technician Training Series Module 5—Communications Center Operations NAVEDTRA 14226

(ROUTINE) is the first element. The prosign Y(YANKEE) is an emergency command precedence(ECP) and is assigned to emergency action messages(EAMs). The prosign Y indicates that a message hasFLASH preemption capability. EAMs are processedahead of all other traffic and interrupt lower precedencetraffic already in processing within the AUTODINsystem.

Positions 2 and 3 (Language and MediaFormat) —The language and media format (LMF)consists of two alphabetical characters. The LMF is themode used to insert a message into the AUTODINsystem. The LMF of the originating station is placed inposition 2, and the LMF of the preferred output deviceof the addressee is placed in position 3. For example, infigure 1-2, positions 2 and 3 have the character T. Thecharacter Tin position 2 indicates that the originator’stransmitting mode is paper tape (TTY/teleprinter) (five-level ITA2 code). The character T in position 3indicates that the output device at the receiving end willbe paper tape (TTY) (five-level ITA2 code). If thecharacter C was used in position 3, this would indicatethat the message was prepared and transmitted on papertape and the output device at the receiving messagecenter would be magnetic tape. Automated DigitalNetwork (AUTODIN) Operating Procedures, JANAP128, lists the LMFs used in the AUTODIN system.

Position 4 (Classification) —The lettersauthorized to indicate the message classification orspecial handling in this position are:

Positions 5 through 8 (Content Indicator Code[CIC]/Communication Action Identifier[CAI]) —These positions of the header are acombination of either four letters or three letters and onenumber. These combinations are used to indicatemessage content and to provide identification forcommunications handling. For example, in figure 1-2,the CAI in positions 5 through 8 is ZYUW. Thisidentifies the message as a narrative message. A CAI ofZFH2 would mean that the message is being forwardedto the addressee for information only. A CAI of ZYVW

would indicate that the message is a service message. Acomplete listing of these codes is found in JANAP 128.

Position 9 (Separator) —At this point in theheader, the operator must press the space bar to insertthe TTYcode equivalent for space on the message tape.

Positions 10 through 16 (Originator) —Theappropriate routing indicator of the originating stationis placed in these positions.

Positions 17 through 20 (Station SerialNumber) —The station serial number (SSN) of thesending station is inserted here. The SSN serves twospecific purposes. First, when used in combination withthe originator’s routing indicator, it provides positiveidentification for each transmission. Second, in the endof message (EOM) validation (discussed later in thissection), the SSN appearing in format line 15 provides ameans by which the ASCs can check for the existence ofstraggler messages.

The SSN is expressed in four numeric characters,beginning with 0001 and continuing consecutivelythrough 9999. A new series begins when the number9999 is reached. Operating stations may use SSNs toidentify local activities, channels, or positions within astation by assigning each activity a specific block ofnumbers. For example, one station may be assignednumbers 0001 to 2000; the next station 2001 to 4000,and so on.

Position 21 (Separator) —This position requiresthe same information as that for position 9.

Positions 22 through 24 (Julian Date) —TheJulian date is the date that the message was receivedfrom the originator for transmission by thecommunications center. The first day of the calendaryear is Julian 001, and each day is numberedconsecutively thereafter.

Positions 25 through 28 (Time Filed) —The timefiled is the time that the message was received from theoriginator by the communications center fortransmission. Each filing time is expressed inGreenwich mean time (GMT) and must contain fournumerical characters.

Positions 29 through 33 (ClassificationRedundancy) —For security reasons, the classificationdesignator used in position 4 is repeated here. Position29 is filled with a hyphen as a sentinel. Theclassification designator in position 4 is repeated inpositions 30 through 33.

1-8

Page 21: Information Systems Technician Training Series material/NAVEDTRA-14226.pdfInformation Systems Technician Training Series Module 5—Communications Center Operations NAVEDTRA 14226

Position 34 through end-of-routing signal (start-of-routing signal and addressees) —The positionsreserved for routing are made up of two sections: start-of-routing signal and the addressees’ routing indicators.The start-of-routing signal consists of two consecutivehyphens and will always precede the first addresseerouting indicator. Addressee routing indicators arelisted immediately following the start-of-routing signal.A message can have a maximum of 500 routingindicators in these positions. If a message contains 501or more routing indicators, the message will require twoseparate transmission. In this case, all routingindicators that have the same first four letters should bein one transmission

End-of-Routing Signal —The end-of-routingsignal consists of a period (.) and is inserted in theposition immediately following the last addresseerouting indicator.

SECURITY WARNING (FORMAT LINE4). —A security warning is the first component offormat line 4. The appropriate operating signal (ZNR orZNY) will always be followed by a classificationcharacter repeated five times. The operating signal andclassification characters are as follows:

ZNR UUUUU —For off-line encrypted messagesand classified messages transmitted in the clear;

ZNY EEEEE —For unclassified EFTO messages;and

ZNY, followed by CCCCC, SSSSS, orTTTTT —For Confidential, Secret, or Top Secretmessages, respectively.

For SPECAT and SPECAT SIOP-ESI messages,the five redundant security characters are followed byan oblique (/) AAAAA for SIOP-ESI or BBBBB forall other SPECAT messages. For example, format line 4for a Top Secret SPECAT message would be:

ZNY TTTTT/AAAAA(2CR, 1LF)

END OF MESSAGE (EOM) (FORMAT LINES15 AND 16). —Format line 15 is the EOM validationline that is used to inhibit suspected straggler messages.Format line 15 consists of the SSN in format line 2preceded by the number sign (#). Format line 16consists of the EOM functions. The EOM functionsconsist of normal teleprinter ending procedure whenfive-level Baudot code is used (2CR, 8LF, 4Ns,12LTRS). However, for ASCII, 12 delete functions areused (12DEL). The EOM for the message with formatline 2 shown in figure 1-2 would be as follows:

Format lines 1, 2, 4, and 5 must all be accuratelyprepared. Backspacing, lettering out, double-spacing,or using two or more FIGURES and LETTERSfunctions in sequence will cause the ASC to reject themessage during attempted transmission from theoriginating station. The EOM validation appearing informat line 15 and the EOM function in format line 16must be prepared in uninterrupted sequence, be letter-perfect, and be without corrections.

General Teleprinter Rules

A leader must precede the header to ensureacceptance and transmission of the first character of themessage header. The leader for the five-level Baudotcode (most common) consists of at least six blanks andsix letter functions. The leader for the ASCII (eight-level Baudot code) consists of at least six nulls and sixdelete functions. This will ensure acceptance andtransmission of the first character of the messageheader.

When a message is assigned dual precedence, thehigher precedence is shown in format line 2 (position 1).Both precedences are shown in format line 5.

Communications personnel of tributary stationsmust ensure that a record is made of the time of file(TOF) and the time available for delivery (TAD). Thesetimes are used to determine message-processing times.

Message Lengths

Messages cannot exceed more than 20 lines ofheading and text, beginning with format line 5.Messages that exceed the 20-line limit must be dividedinto pages for transmission. The second and succeedingpages of a message are identified by the page number,the routing indicator of the station of origin, and theSSN. The security classification of classified messagesfollows the page identification. After the first letter ofthe classification, you must separate each letter by onespace from the previous letter. For example:

On unclassified messages, "UNCLAS" is placed afterthe page identification with no spaces separating theletters.

1-9

Page 22: Information Systems Technician Training Series material/NAVEDTRA-14226.pdfInformation Systems Technician Training Series Module 5—Communications Center Operations NAVEDTRA 14226

When a message exceeds five textual pages, themessage must be divided into transmission sections.The message should be separated at a convenient pointon the last permissible page of a transmission section.This normally will be at the end of a sentence orcryptopart. Each section must be numbered in plainlanguage at the beginning of the text following theclassification or abbreviation “UNCLAS.” Forexample:

UNCLAS SECTION 1 OF 2

In long encrypted messages, when a transmissionsection starts with a new cryptopart, the designation ofthe cryptopart follows the designation of thetransmission section. Also, when a numerical groupcount is associated with an off-line encrypted messageand is indicated in format line 10, the count mustindicate the number of groups in the textual sectionbeing transmitted— not the number in the completemessage. Cryptopart identification is included in thegroup count; the page identification and transmissionsection are not.

Statistical and meteorological messages can haveup to 100 lines of text without paging when theinclusion of paging information would disruptprocessing by the user. However, you should dividethese types of messages into transmission sections ifthey exceed 100 lines of text.

Misrouted and Missent Messages

A misrouted message is one that contains anincorrect routing instruction. This normally occurswhen the originating communications center assigns anincorrect routing indicator during message headerpreparation. Misrouted messages are usually notdiscovered until they reach the communications centerof the called routing indicator. Communicationspersonnel of a tributary station in receipt of a misroutedmessage must take the following actions:

Obtain the correct routing indicator, if possible;

Apply a header change to the misrouted messageand retransmit it to the correct routing indicator;and

Originate a service message to the originatingstation advising of the reroute action and thecorrect routing indicator.

A missent message is one that contains a correctrouting indicator but is transmitted to a station other

than the one represented by the routing indicator.Missent messages can be caused by an equipmentmalfunction, incorrect switching, or operator error.Communications personnel of a tributary station inreceipt of a missent message must take the followingactions:

Reintroduce the message into the AUTODINsystem as a suspected duplicate (SUSDUPE)after applying a header change; and

Forward a routine service message to theconnected ASC citing the complete header andtime of receipt (TOR) and advising that themessage has been protected.

Suspected Duplicates

When a station suspects that a message may havebeen previously transmitted, but definite proof or priortransmission cannot be determined, the message shouldbe forwarded as a suspected duplicate (SUSDUPE) byapplying a header change. However, if a stationreceives a message that is already marked“SUSDUPE,” the station should file the message if themessage was previously received and delivered to theaddressee. If there is no indication that the message waspreviously received and delivered, it should beforwarded.

Stations receiving unmarked duplicatetransmissions should immediately forward a routineservice message to the originating station. This servicemessage should cite the complete header format of theduplicated message, including the TOR of the originaland duplicate transmissions. If the initial copy wasdelivered to the addressee, the station should file themessage.

Upon receipt of service messages concerningduplicates, communications personnel at theoriginating station must take the following actions:

Check transmission records to determine thevalidity of the duplication report;

Ensure that in-station procedures are adequate toguide operating personnel in the retransmissionof SUSDUPE messages;

Have maintenance personnel performequipment checks if an equipment malfunctionis suspected to be the cause of duplication; and

1-10

Page 23: Information Systems Technician Training Series material/NAVEDTRA-14226.pdfInformation Systems Technician Training Series Module 5—Communications Center Operations NAVEDTRA 14226

Advise the connected ASC by routine servicemessage if only one transmission can beaccounted for.

An ASC receiving notification of a duplicatetransmission should search its records to determine ifthe message was received in duplicate. If the messagewas not received in duplicate, it must be traced on astation-to-station basis to determine the point ofduplication.

Magnetic Tape Messages

Magnetic tape is one of the principal media used inelectronic data processing equipments (EDPEs).Magnetic tape terminal stations (MTTSs) in theAUTODIN provide for the rapid exchange of largevolumes of data in a relatively short period of time. Thebasic mode of MTTS operation with other AUTODINtributary stations is either full duplex or on a store-and-forward basis.

In the continental United States, terminals that havecompatible equipment and circuit speeds and areconnected to the same ASC may communicate directlyby Hybrid AUTODIN Red Patch Service (HARPS).HARPS provides a direct subscriber-to-subscriberencrypted circuit. HARPS uses the same circuit andequipment normally used in the message-switchingcomponent of the network. Communications centersnot serviced by HARPS communicate by normalmessage switching, which automatically performs thenecessary speed, format, and code conversions.

Operating Rules

All received tape reels must be periodicallydismounted and made available for delivery asscheduled by a receiving activity and system manager.A magnetic tape reel accepted by a communicationsfacility for transmission is screened and arranged fortransmission according to majority messageprecedence levels contained on the reel. Establishmentof transmission schedules is the responsibility of thecommands concerned. Prior coordination is necessaryto provide for efficient use of the equipment and circuittime. Schedules are limited to 30 minutes per period.

Most facilities establish their own procedures formaintaining reel accountability and ensuring thatmessage transmission has been accomplished.Message header and EOT printouts are finished by themessage originator with each reel of tape to betransmitted. If a message cannot be transmitted, the

MTTS operator returns the reel to the originator,identifying the message (or messages) that could not besent. The originator is also provided the reason for thenontransmission, if known.

Terminal equipment should not be used to changemessage media format for customer convenience; forexample, changing from magnetic tape to narrativerecords.

Operating Precautions

Communications station master records, such ashistory tapes and journal records, remain with thecommunications facility until destroyed. History tapesare labeled to prevent them from being inadvertentlydelivered to addressees with live traffic tapes.

Recorded information is very close to the edge ofthe tape. Tape-edge indentations, caused by carelesstape handling, will seriously affect the accuracy ofmagnetic tape recordings. You should be aware thattape splices are not permitted in reels of tape used fortraffic.

Message Formats

Message formats used within the AUTODINrequire that each message contain a message heading,text, and EOT record. The textual material on magnetictapes may consist of a wide variety of informationrecorded in either structured or nonstructured formats,depending upon the type of system.

EOT is either a single N or four consecutive Ns.The header, text, and EOT cards of magnetic tapemessages are always transmitted in the AUTODINcommon language code (ASCII). This is accomplishedby automatic code conversion logic provided in themagnetic tape terminal.

The text of magnetic tape messages can be preparedby the EDPE system in 80-character data images, seriesrecord images, or by variable-length record images.The length of data records to be transmitted byAUTODIN may vary according to user requirements.For general transmission of data throughout the system,computerized terminals must be capable of transmittingrecords that contain from 18 to 1,200 characters.

Subscribers desiring to transmit messages thatcontain fewer than 18 or more than 1,200 charactersmust ensure that the addressee is capable of receivingsuch records prior to transmission. Typical line formatsof magnetic tape message records are described inJANAP 128.

1-11

Page 24: Information Systems Technician Training Series material/NAVEDTRA-14226.pdfInformation Systems Technician Training Series Module 5—Communications Center Operations NAVEDTRA 14226

Magnetic tape messages prepared for transmissionare limited to a maximum of 40,000 characters (fivehundred 80-character data records) that include theheader, text, and EOT records. The preparation ofmagnetic tape messages, formats, routing, contents, andsequence on tape is the responsibility of the messageoriginator.

Message and Tape Reel Accountability

Each tape reel given to the MTTS operator fortransmission must bear a tape label containing thefollowing information:

Reel number;

Number of messages recorded on tape;

Highest precedence used;

Highest security classification;

Date and time filed;

Tape density;

LMF used;

Beginning and ending SSNs; and

Time delivered to the MTTS operator.

Each blank reel of tape furnished to the MTTSoperator for mounting on the receive tape transportcontains a tape label with the following informationrecorded in the sequence of handling:

A statement that the reel is blank;

Reel number;

Highest classification ever recorded;

Time the reel is mounted on the receivetransport;

Time the reel is removed from the receivetransport;

Time the reel is delivered to the addressee; and

Number and types of message on the reel andother applicable reel information.

All originated tape reels must be retained for at least10 days. The header and EOT printouts finished theMTTS operator for both originated and terminatedtraffic are maintained as a station communications

record for at least 30 days. Other logs recommended forMTTS operation are the master station log and the reeldelivery log.

The master station log reflects the current operationstatus of the terminal equipments and circuits. This logshould also reflect equipment and circuit outages,causes of the outages, and the corrective actionsinitiated.

The reel delivery log should indicate the reelnumber and the time the reel was delivered to thetransmitting operator or the addressee.

AUTODIN Security

Required security protection must be extended toall classified traffic transmitted through the AUTODIN.The ASC automatically checks and compares thesecurity classification stated in the header of themessage against the authorized security level of theincoming circuit. Transmission of a message with ahigher security level than authorized will result in themessage being rejected by the ASC.

In addition, an automatic system-generated servicewill be transmitted by the ASC to the originatingstation. The purpose of this service is to advise theoriginating station of possible security compromises.Also, the ASC automatically checks and compares thesecurity classification contained in the header of eachmessage against the security classification of eachdestination. A security mismatch occurs for eachdestination that does not indicate a matching securitylevel.

In the event of a security mismatch, the ASC takesthe following actions:

In a single-address message, the ASC rejects themessage and alarms appear at the originatingterminal indicating that the message needsretransmission.

In a multiple-address message with at least onedeliverable destination, the ASC accepts themessage and delivers it to all valid destinations.For invalid routing indicators, an automaticallygenerated service retransmits the message to theoriginating routing indicator and advises that themessage needs retransmission.

In-station operating procedures should be carefullyplanned and rigidly enforced to prevent inadvertenttransmission of classified messages to unauthorizedstations or agencies. Complete security precautions andoperating rules are contained in JANAP 128.

1-12

Page 25: Information Systems Technician Training Series material/NAVEDTRA-14226.pdfInformation Systems Technician Training Series Module 5—Communications Center Operations NAVEDTRA 14226

NAVAL COMMUNICATIONS PROCESSINGAND ROUTING SYSTEM

The Naval Communications Processing andRouting System (NAVCOMPARS) is an automatedsystem that serves as the interface between AUTODINor other networks ashore and operational units of theNavy. There are five NAVCOMPARS sites: NCTAMSEASTPAC, NCTAMS WESTPAC, NCTAMS MED,NCTAMS LANT, and NAVCOMMTELSTA Stockton,California. The primary purpose of NAVCOMPARS isto provide security, speed, and systems compatibilityfor the Naval Telecommunications System (NTS). TheNAVCOMPARS system provides the followingservices:

On-line communications with AUTODINswitching centers;

On-line communications with tactical anddedicated circuits;

Off-line communications interface capabilities;

Processing of JANAP 128-formatted messages;

Conversion of DD Form 173 messages toJANAP 128 format;

Conversion of modified ACP 126-formattedmessages to JANAP 128 format;

Filing, retrieving, and accountability ofmessages;

Local delivery analysis;

Distribution assignment;

Message store-and-forward capability to fleetunits;

Fleet support through broadcast management orfull-period terminations and primary ship-shorecircuits;

Broadcast keying and screening;

On-line communications with the WorldwideMilitary Command and Control System(WWMCCS); and

On-line communications with Common UserDigital Information Exchange System(CUDIXS) and Remote Information ExchangeTerminals (RIXTs). (CUDIXS and RIXTsystems are discussed later.)

Automation of these functions and serviceseliminates manual processing and minimizes relateddelays and errors. Automation also improvesoriginator-to-addressee delivery time and allows thetimely exchange of information critical to the command and control of forces afloat.

LOCAL DIGITAL MESSAGE EXCHANGE

The Local Digital Message Exchange (LDMX)provides automatic outgoing message routing andreformatting for Navy activities ashore. Itsimultaneously transmits and receives messages overthe AUTODIN and other remote terminal circuits. TheLDMX system provides high-speed processing, systemreliability, secure communications, flexibility,statistical information, and accounting data.

High-Speed Processing

The LDMX system provides high-speedcommunications processing. On-line to AUTODIN andother circuits, the LDMX system automaticallyreceives, identifies, and files traffic for processing andfuture reference. Incoming messages are automaticallyarranged by precedence; then processed, edited, andprinted on reproducible mats for delivery.

Outgoing traffic is entered by magnetic or papertape. The system formats the outgoing message, createsa header, and validates the message identifiers,precedence, and classification. The LDMX system alsosearches system files to assign the correct routingindicator and arranges the message by precedence forautomatic transmission. Operating at full capacity, thesystem can process up to 7,500 messages per day.

System Reliability

Message-processing reliability has been greatlyimproved by automatic message identification andheader preparation and by system look-up files insteadof manual files. The elimination of most manualfunctions and validation of those remaining greatlyreduce misroutes and nondeliveries. The systemcontinues to operate in either a semiautomatic ormanual mode if a major component becomesinoperable.

Secure Communications

All message security fields are validated. If amismatch is detected in the LDMX system, the messagewill be displayed to an inrouter or an outrouter for

1-13

Page 26: Information Systems Technician Training Series material/NAVEDTRA-14226.pdfInformation Systems Technician Training Series Module 5—Communications Center Operations NAVEDTRA 14226

review and action. Depending on user requirements,video display terminal (VDT) operators may beprevented from displaying or recalling Top Secret andSPECAT messages. The purpose of this precaution is toreduce the possibility of a security violation.

Flexibility

The LDMX system eliminates most manualprocessing without imposing stringent limitations onthe user. Tailored to meet the unique situations at eachcommand, the LDMX can be responsive to individualcommand requirements and variances.

Statistical and Management Reports

A significant feature of the LDMX system is thenatural accumulation of statistical information andaccounting data. This provides accurate verification ofthe reliability and performance of the system. Message-processing data is summarized in a series of statisticalanalysis summaries that include the following:

A bar chart providing an hourly volume ofincoming or outgoing messages;

A summary report showing the number andaverage length of incoming or outgoingmessages, the number of messages delivered to aremote printer, and the number of classificationsand precedences;

A listing of service messages sent and received;

A listing of duplicated, misrouted, and missentmessages; and

A speed-of-service report, giving maximum,average, and minimum processing times (byprecedence, classification, or selectedoriginator).

FLEET COMMUNICATIONS SYSTEMS

The systems for afloat units are compatible withthose used ashore. Next, we will discuss the types ofautomated systems used afloat.

NAVAL MODULAR AUTOMATEDCOMMUNICATIONS SYSTEM

The Naval Modular Automated CommunicationsSystem (NAVMACS) is a shipboard message-processing system developed to meet commandmissions. The NAVMACS provides accurate, secure,

and expedient communications for various classes ofships and flagships. The hardware, software, andfictional capabilities of the NAVMACS are based onthe needs of individual ships and commands.

The current versions of NAVMACS are (V)1, (V)2,(V)2-MPD (message-preparation device), (V)3, and(V)5/(V)5A. NAVMACS capabilities are augmented ina building-block manner from the most basic system,(V)1, through the most sophisticated system,(V)5/(V)5A.

NAVMACS (V)1

The NAVMACS (V)1 configuration providesautomation for the receipt and processing of up to fourchannels of incoming broadcast message traffic. Thisconfiguration provides one channel of incoming andoutgoing high-speed satellite link message traffic fromand to the CUDIXS (discussed shortly). The systemincorporates the equipments and computer programnecessary to perform the automatic address screeningand management functions required in the processing ofincomming messages. It also incorporates the storage,formatting, and accountability functions used in theship-to-shore delivery of messages transmitted viasatellite and the shore-to-ship delivery of messagesreceived via broadcast and satellite.

NAVMACS (V)2

The NAVMACS (V)2 configuration provides thesame message processing and delivery functions usedin the (V)1 configuration for up to four channels ofincoming broadcast message traffic. It provides onechannel of incoming and outgoing high-speed satellitelink message traffic from and to CUDIXS. TheNAVMACS (V)2 configuration upgrades the (V)lsystem in the following ways:

Adds automatic MILSTRIP paper tape messageprocessing;

Adds message output to medium-speed printersinstead of low-speed printers; and

Uses magnetic tape program loading instead ofpaper tape loading.

NAVMACS (V)2-MPD

The NAVMACS (V)2-MPD configuration has thesame capabilities as the NAVMACS (V)2 version butuses a different program for operator language and

1-14

Page 27: Information Systems Technician Training Series material/NAVEDTRA-14226.pdfInformation Systems Technician Training Series Module 5—Communications Center Operations NAVEDTRA 14226

system printouts. The MPD program provides anadditional capability for on-line message compositionand editing ability, and outgoing message error analysis(before transmission). It also provides a proof copywith paper tape for off-ship transmission. The (V)2-MPD system consists of the same equipments as the(V)2 system with the addition of MPD units, which aremodified video displays.

NAVMACS (V)3

The NAVMACS (V)3 configuration automatescertain processing functions required in the handling ofnarrative messages. It serves as an afloat terminalwithin those communications networks using broadcastand point-to-point modes of operation on bothconventional and satellite transmission paths.

The (V)3 configuration interfaces with up to fourchannels of fleet broadcast, and up to four channels offull-period termination send-and-receive circuits. Italso interfaces with one channel of incoming andoutgoing high-speed satellite link message traffic to andfrom CUDIXS.

The (V)3 configuration also interfaces with off-linetorn tape and manual transmit/receive circuits of anytype. The (V)3 system provides the capability of on-line message composition and on-line message retrievalfom magnetic tape.

NAVMACS (V)5/(V)5A

The NAVMACS (V)5/(V)5A system is anautomated communications processing system capableof interfacing a mix of input/output channels. Thissystem is enhanced with the addition of remoteterminals for message input. It includes up to fourincoming broadcast channels and eight itinerant, netted,and fully dedicated communication network channels.It also includes one incoming/outgoing high-speedsatellite link with CUDIXS and onboard peripheraldevices.

The (V)5/(V)5A system includes a remote terminalcapability for direct input/output of narrative and datapattern messages to high-volume onboard user areas.Remote terminals consist of a medium-speed printer,video display, and paper tape reader/punch, or acombination thereof, depending on the uniquerequirements of the various remote terminals.

COMMON USER DIGITAL INFORMATIONEXCHANGE SYSTEM

The Common User Digital Information ExchangeSystem (CUDIXS) provides a bidirectional, ship-to-shore-to-ship, high-speed digital data communicationslink between a ship and a NCTAMS orNAVCOMMTELSTA. Subscriber stations use theNAVMACS as their terminal. The link consists of asingle Fleet Satellite Communications (FLTSATCOM)half-duplex channel. The link is dedicated tosynchronous communications between the CUDIXSshore station (Net Control Station (NCS)) and thesubscribers afloat. Each CUDIXS communications linkcan operate with up to 60 subscribers. There are twotypes of subscribers: special and primary.

Special subscribers are those ships that are assignedsubscriber identification (SID) numbers 1 through 10.Special subscribers can send and receive narrativetraffic to and from CUDIXS.

Primary subscribers are assigned SID numbers 11through 60. Primary subscribers are restricted to a sendcapability only. They can receive their shore-to-shipmessage traffic via other means, such as the fleetbroadcast or fill-period terminations. Both types ofsubscribers can send or receive operator-to-operator(order wire) messages.

CUDIXS/Subscriber Net Cycle

CUDIXS/subscriber communications areaccomplished through a modified round robin networkdiscipline. The basic round robin net operating concepttransfers net control from one subscriber to the next on aprearranged basis, completing one net cycle when eachparticipating subscriber has transmitted.

In the CUDIXS/subscriber modified round robinoperating concept, transmission timing and schedulingare determined solely by the CUDIXS shore stationdesignated the NCS. Each net cycle starts when theNCS transmits a Sequence Order List (SOL) along withnarrative traffic and operator-to-operator messages.The SOL specifies the order in which each subscribertransmits during the next net cycle and the amount oftime allocated each transmission slot. Each subscriber,in turn, will transmit at a time computed frominformation in the SOL.

A net cycle can range from 20 to 120 seconds,depending upon the amount of transmit time requestedby the subscribers and the amount of data transferred.

1-15

Page 28: Information Systems Technician Training Series material/NAVEDTRA-14226.pdfInformation Systems Technician Training Series Module 5—Communications Center Operations NAVEDTRA 14226

System Performance/Message Accountability

CUDIXS provides a shore operator with severalmeans of monitoring system performance andmaintaining message accountability for all messagesprocessed by the CUDIXS NCS. Specifically, thesystem assigns sequence numbers to all messagesprocessed, provides link status, traffic statistics, andsystem summary information in system reports. Thesystem also allows the operator to assign parametervalues that control net operations and to generatevarious alerts concerning immediate communicationsdifficulties.

System Interfaces

CUDIXS serves as an extension of AUTODIN bystoring and forwarding messages, normally withoutneed for human intervention. CUDIXS interfaces withAUTODIN via the NAVCOMPARS and processesnarrative traffic for general fleet communicationsteleprinter messages.

In accomplishing its tasks, CUDIXS supplementsthe traffic responsibilities previously assumed by ship-to-shore and broadcast HF circuits. CUDIXS canrecognize EMERGENCY COMMAND, FLASH,IMMEDIATE, PRIORITY, and ROUTINE messageson a first-in-first-out (FIFO) basis within precedence.Through system reports, the operator has the followingcapabilities:

Detailed information on every messageprocessed by CUDIXS;

Overall statistics on the volume of messagetraffic processed over the link; and

Information on the quality of l inkcommunications with each net subscriber.

COMMUNICATIONS DATA PROCESSINGSYSTEM

The Communications Data Processing System(CDPS) provides the USS Tarawa (LHA-1) class shipswith the necessary communications hardware andsoftware to process narrative traffic and to ensure circuitreliability. CDPS is one of the most complex of theautomated systems afloat and offers the followingcapabilities:

Automatic broadcast screening;

Frequency management;

subscriber.

As with many of the automated systems, theoperator has the ability to modify system configurationfrom the control console. The operator must know howto properly use, operate, and perform system changes.Your job will involve setting up and operatinginput/output (I/O) devices. Some systems allow theoperator to patch receivers, transmitters, modems, andantennas directly from the console.

As a Radioman, part of your routine duties will be toenergize electronic equipment and monitor powerlevels. In the event of primary power failure, equipmentmust be brought up on emergency or back-up powersystems. Many of the automated systems in use todayhave uninterrupted power sources (UPS) or batterybackups to preclude a complete system failure.

For more information on power requirements forindividual components, refer to the equipment technicalor operator manuals. You should become familiar withemergency power requirements and procedures priorto an actual emergency.

SUBMARINE SATELLITE INFORMATIONEXCHANGE SUBSYSTEM

The Submarine Satellite Information ExchangeSubsystem (SSIXS) provides the commanding officersof SSN and SSBN submarines with an optional satellitepath to complement existing VLF/LF/HF broadcasts.The subsystem provides a rapid exchange of teleprinterinformation between SSN and SSBN submarines andshore stations.

1-16

Automatic message logging;

Automatic message continuity checks;

On-line message preparation and storage;

Backup control and operation;

High-speed data interface;

On-line operational readiness testing;

Quality monitoring with computer aid;

Message error analysis;

Circuit status and record-keeping functions;

Construction of communications circuits; and

Ability to act as a CUDIXS special or primary

Page 29: Information Systems Technician Training Series material/NAVEDTRA-14226.pdfInformation Systems Technician Training Series Module 5—Communications Center Operations NAVEDTRA 14226

To use the SSIXS, the submarine must be in a line-of-sight position with a satellite. The submarine mustalso be in a tactical situation that permits exposure of itsmast-mounted antenna.

The SSIXS provides access to a satellite paththrough a programmable mixture of query-response andbroadcast-without-query functions. This type of accessprovides maximum operational flexibility to thesubmarine commander.

All transmissions on the SSIXS provide automatic,reliable, long-range, high-data-rate, andcryptographically secure UHF communicationsbetween submarines, and between submarines andshore stations.

AUTOMATED VOICECOMMUNICATIONS SYSTEMS

The telephone is and will continue to be aconvenient and fast way to communicate. In thissection, we will discuss the Secure Telephone UnitThird Generation and the Defense Switched Network(DSN), which is an updated version of the AutomaticVoice Network (AUTOVON).

SECURE TELEPHONE UNIT THIRDGENERATION

The Secure Telephone Unit Third Generation(STU-III) is the newest communications system thatmeets the need for protecting vital and sensitiveinformation over a telephone system. The STU-III is a

compact, self-contained desktop unit capable ofproviding the user with clear and secure voice and datatransmissions. The unit is fully TEMPEST protectedand is certified by the National Security Agency for useup to and including Top Secret material.

The STU-III is unique in that it works as an ordinarytelephone and as a secure telephone network to otherSTU-III terminals. For secure transmissions, the STU-III uses a unique keying system.

The three manufacturers of the STU-III terminalsfor the Navy are AT&T, Motorola, and General Electric.Figure 1-3 shows an AT&T STU-III terminal.

The STU-III is operated the same as any telephone.That is, you pick up the handset, wait for a dial tone,then dial the number of the person you want to call. Allcalls on the STU-III are always initiated in the clearvoice mode. Once the party you have called hasanswered, you have the option of talking to that personin the clear voice mode, clear data mode, secure voicemode, or the secure data mode.

Terminal Setup

The STU-III terminal uses special keys with adesignator of KSD-64A. The KSD-64A is a plasticdevice that resembles an ordinary key. Two types ofkeys are used with the STU-III, the seed key and thecrypto-ignition key (CIK). The seed key is a specialkeying material used for the initial electronic setup ofthe terminal. The CIK key is used by the users toactivate the secure mode.

Figure 1-3.—AT&T STU-III terminal.

1-17

Page 30: Information Systems Technician Training Series material/NAVEDTRA-14226.pdfInformation Systems Technician Training Series Module 5—Communications Center Operations NAVEDTRA 14226

When the STU-III terminal is installed, the STU-IIIcustodian sets up the terminal with the seed key. A seedkey is issued to a particular terminal only. The seed keycontains a microchip that is embedded electronicallywith identification information. This informationincludes the level of security authorized for thatterminal.

Once the custodian inserts the seed key into theterminal, the information on the key is transferred to theinternal memory of the terminal. At this point, the seedkey no longer contains any information and isconsidered to be “empty.”

The information in the terminal is electronicallyregistered with the Key Management Center (KMC)located in Finksburg, Maryland. The KMC is the centralauthority responsible for controlling the key materialand issuing reports of compromised keys. The user candiscuss classified information up to the security levelthat has been keyed to the terminal.

The crypto-ignition keys (CIKs) can now be madefor users to activate the secure mode. The CIKs are“empty” keys with no information embedded in themetal strip. When the empty keys are inserted into theterminal, some of the information that is now stored inthe terminal from the seed key and other information inthe memory is transferred onto the metal strips. Thisinformation becomes an electronic “password” on theCIKs for that particular terminal, making the CIKsunusable on other terminals. The terminal maintains alist of authorized CIKs for each key in its memory.

When using a STU-III with remote or dial-in, usersparameters will be set according to the SecureTelephone Unit Third Generation (STU-III) COMSECMaterial Management Manual (CMS 6) and locallygenerated instructions.

Levels of security classification, keyinginstructions, rekey instruction, CIK management willbe decided by the user and the user’s communicationsfacility. All users must meet the minimum securityclearance requirements.

Training on the STU-III will be documented inaccordance with CMS 6 and local instructions.

Secure Mode

As we mentioned earlier, the secure mode of theSTU-III is activated and deactivated using a CIK.When the CIK (figure 1-3) is inserted into the terminal,the STU-III can be used in the secure mode up to theclassification of the keying material. Without the CIK,the STU-III operates as an ordinary telephone.

Calls are always initiated in the clear. To go from aclear to a secure voice transmission, either caller simplypresses his or her SECURE VOICE button after the CIKis used to activate the secure mode.

Once a secure link has been initiated, the two STU-III terminals begin exchanging information. Theinformation exchanged includes the identity of the CIKof the distant-end person, the list of compromised CIKS,and the common level of classified security informationto which the two callers have access.

When two terminals communicate in the securemode, each terminal automatically displays theauthentication (identification) information of thedistant terminal. This information is scrolled throughthe display window during secure call setup. The firstline of the identification information and theclassification are displayed for the duration of thesecure call.

The information displayed indicates the approvedclassification level for the call, but does not authenticatethe person using the terminal. Each terminal user isresponsible for viewing this information to identify thedistant party and the maximum security classificationlevel authorized for the call.

STU-III Administration

The STU-III terminals and keys are COMSECmaterial. The terminals and keys may be administeredeither through the STU-III custodian or the CMScustodian. Both the terminals and keys are issued tousers and must be signed for. Since the seed key isclassified, it must be afforded protection for the level ofclassification in accordance with Secure Telephone UnitThird Generation (STU-III) COMSEC MaterialManagement Manual, CMS 6.

Because CIKs permit the STU-III terminals to beused in the secure mode, the CIKs must be protectedagainst unauthorized access and use. CIKs may beretained by the users who sign for them on local custody.Users must take precautions to prevent unauthorizedaccess and must remember to remove the CIKs from theassociated terminals.

When the terminals are unkeyed, they must beprovided the same protection as any high-valuegovernment item, such as a personal computer. Whenthe terminal is keyed, the terminal assumes the highestclassification of the key stored within and must beprotected in accordance with the classification of thatkey.

1-18

Page 31: Information Systems Technician Training Series material/NAVEDTRA-14226.pdfInformation Systems Technician Training Series Module 5—Communications Center Operations NAVEDTRA 14226

DEFENSE SWITCHED NETWORK

The Defense Communications System (DCS)Defense Switched Network (DSN) is atelecommunications telephone interconnectednetwork. This system is found on most military andother Federal Government installations in the UnitedStates and overseas.

This system upgraded the Automatic VoiceNetwork (AUTOVON) and will evolve into an all-digital network in the 1990s. The DSN incorporatescapabilities that were not available in the AUTOVONsystem, such as automatic callback, call forwarding,call transfer, and call waiting.

Precedence of Calls

The precedence of a call indicates the degree ofpreference to be given a call relative to all other calls inprogress. A preemption feature provides the ability todisconnect a call of lower precedence and seize theaccess line or interswitch trunk to complete a call ofhigher precedence. A unique aspect of the DSN is thatswitches have been programmed to determine whatprecedence treatment must be given each call.

The combined features of precedence andpreemption used in DSN are called multilevelprecedence and preemption (MLPP). The effectivenessof this system depends on the proper use of theprecedence system by the users.

All users should be familiar with the system and thetypes of calls assigned to each precedence. Each usershould ensure that his or her call is not assigned aprecedence higher than that justified by thecircumstance or information involved.

The DSN offers five types of call treatment. Theprecedences and their applications are listed below inrelative order of priority in handling.

FLASH OVERRIDE (FO) —FO takesprecedence over and preempts all calls on the DSN andis not preemptible. FO is reserved for the President ofthe United States, Secretary of Defense, Chairman ofthe Joint Chiefs of Staff, chiefs of military services, andothers as specified by the President.

FLASH (F) —FLASH calls override lowerprecedence calls and can be preempted by FLASHOVERRIDE only. Some of the uses for FLASH areinitial enemy contact, major strategic decisions of greaturgency, and presidential action notices essential tonational survival during attack or preattack conditions.

IMMEDIATE (1) —IMMEDIATE precedencepreempts PRIORITY and ROUTINE calls and isreserved for calls pertaining to situations that gravelyaffect the security of the United States. Examples ofIMMEDIATE calls are enemy contact, intelligenceessential to national security, widespread civildisturbance, and vital information concerning aircraft,spacecraft, or missile operations.

PRIORITY (P) —PRIORITY precedence is forcalls requiring expeditious action or furnishingessential information for the conduct of governmentoperations. Examples of PRIORITY calls areintelligence; movement of naval, air, and ground forces;and important information concerning administrativemilitary support functions.

ROUTINE (R) —ROUTINE precedence is forofficial government communications that require rapidtransmission by telephone. These calls do not requirepreferential handling.

Security

Local command policy normally states that theDSN is to be used only for the most essential officialcalls. The DSN system must never be used to makepersonal or unofficial calls.

Telephone circuits, particularly those routed byhigh frequency and microwave, are susceptible tomonitoring and interception. The DSN is not a securesystem! Users must take care and use common sense toavoid divulging classified information. Giving hints ortalking “around” a classified subject can lead to thecompromise of classified information.

TRANSMIT MESSAGES VIA MANUALCIRCUITS

In these days of super speed burst messagetransmission the use of manual relaying or transmittingof messages is not the norm. You should locate, identify,and use locally produced instructions, publications, andreferences.

ENEMY CONTACT REPORTING

Enemy contact reports are normally made onlyonce when you are in direct communications with theofficer in tactical command (OTC), a higher authority,or a shore radio station. Enemy contact reports aresignaled using basic R/T procedures as modified bychapter 6 of ACP 125. Details of enemy contact

1-19

Page 32: Information Systems Technician Training Series material/NAVEDTRA-14226.pdfInformation Systems Technician Training Series Module 5—Communications Center Operations NAVEDTRA 14226

reporting are contained in Allied Maritime TacticalInstructions and Procedures, ATP 1, Volume I. Thereare two conditions under which enemy contact reportsare to be made more than once:

When DO NOT ANSWER procedures are used(texts are transmitted twice in this procedure).

When the text consists of emergency alarmsignals. In this case, the text is transmitted twice,separated by the proword I SAY AGAIN, with atime group in the ending.

When required, authentication is used in contactreports. Lack of proper authentication, however, shouldnot prevent retransmission or relay of the message tohigher authority.

There are two types of contact reports: initial andamplifying. As you would expect, initial reports areused to report initial contact or sightings. These reportsshould be sent as expeditiously as possible withimmediate, pertinent information (type vessel, location,basic track, and so forth). The amplifying reportscontain all necessary amplifying information to be fullyanalyzed by higher authority or command.

CODE AND CIPHER MESSAGES

Code words, such as VERDIN in the textEXECUTE PLAN VERDIN, are sent as plain languagewords. Encrypted groups, such as DRSRM, are spelledphonetically: DELTA, ROMEO, SIERRA, ROMEO,MIKE.

The phonetic alphabet is used for the names ofsignal flags as well as for spelling words, letter groups,and so on. Signal flags are combined into code groupsthat have meanings of their own. DELTA ROMEOONE, for example, might mean “prepare to hover.”Signal flag A is ALFA, flag B is BRAVO, and so on.Meanings of such code groups are given in appropriatesignal publications.

Because flag signals are also sent by R/T, you mustbe able to differentiate between the two uses of thephonetic letters when you hear them. Here is theway—if the phonetic alphabet is used, the proword ISPELL precedes it and each phonetic letter is recordedas a letter. If you hear I SPELL, followed by DELTAOSCAR, write it as DO. On administrative nets, theproword SIGNALS, followed by DELTA OSCAR,means the groups have been taken from a signal bookand should be recorded as such. Prowords are not usedon nets used primarily for conveying signals.

Therefore, you may assume that alphabet flags areintended.

The duties of an R/T operator require a knowledgeof the special language developed for tacticalmaneuvering, air control, antiair warfare, naval gunfiiesupport, electronic countermeasures, antisubmarinewarfare, and other specialized uses. Words, phrases,and abbreviations used in R/T for these specialized usesare called operational brevity codes. A complete list ofoperational brevity code words is found in OperationalBrevity Codes, ACP 165.

You should understand that the words and phrasesof the brevity code provide no communicationssecurity. The purposes of the codes are to:

Standardize the vocabulary;

Improve the accuracy of the transmission; and

Shorten transmission time.

AUTHENTICATION

Authentication is a security measure designed toprotect a communications system against fraudulenttransmissions. There are specific times when you willhave to use authentication procedures. Several types ofauthentication systems are in use, and the method ofauthentication will vary with the system that you areusing. Authentication systems are accompanied byspecific instructions outlining the method of use. Youcan find more information about the types ofauthentications and specific reasons when and why touse the authentication process in CommunicationsInstructions—Security (U), ACP 122, and in NTP 5.

COMMUNICATIONS CENTERADMINISTRATION

We will now show you some of the basic logs,command guard list (CGL), and changing call signs thatdeal with communications center administration.These short instructions are in no way a complete list ofcommunications center operations. Each command hasits own check-off lists or SOPs of how their commandruns its center.

CIRCUIT BACKLOGS

Each circuit operator will notify the supervisorwhen the circuit status changes, when a backlog oftraffic develops, when an outgoing transmission isdelayed, or when any deviation from prescribed

1-20

Page 33: Information Systems Technician Training Series material/NAVEDTRA-14226.pdfInformation Systems Technician Training Series Module 5—Communications Center Operations NAVEDTRA 14226

procedures is recognized. Circuit operators will reportthe backlog or potential for backlogs (logged-outequipment, poor reception) to the supervisor, who willin turn pass the information up the chain of command tothe CWO and will also log the information into themaster station log (MSL).

When relieved, the circuit operator will pass oninformation pertaining to the circuit(s), when it is notcovered in the circuit status standard operatingprocedures.

A broadcast form provides for the number ofmessages received, the classification of the message,and also provides a record of destruction for classifiedmessage traffic. A check-off sheet (stock number 0196-LF-301-2350) is available through the supply systemfor keeping a record of broadcast numbers received andtransmitted.

COMMAND GUARD LISTS

Each command is responsible for maintaining anaccurate list of all AIGS, CADS, general messages, andtask organization assignments required to fulfill itsmission, and to supply this guard list to a servingcommunications center.

The command guard list must be verified with thecommunication plan to ensure that it is accurate and anydiscrepancies are corrected prior to updating. This isnormally done when a change in tasking, operatingarea, or mission occurs.

DAILY CALL SIGNS

FLTCINC communications operating plan willprescribe the specific form of call sign to be employedbased on the network used and operating conditions.

Call signs are to be used when first establishing anet, when reporting into a previously established net,and in the transmission and address components when amessage is required to be relayed to a station that is on adifferent net.

Daily call signs, by their very name, direct you tochange the call signs daily, using various issuedpublications. Refer to local operating instructions forinstructions on how to verify the type of daily call signsyou are using for specific situations.

MASTER STATION LOG (MSL)

The MSL is the official narrative record maintainedto record significant events (e.g., power failures,

complete system outages, major equipment outages orimpairments such as HAZCON’S and any other eventthat may have an impact on operations, timeverification, shift or watch changes, special tests, etc.).Every communication space must maintain a MasterStation Log.

Entries must be made in chronological order. Theshift or watch supervisor is required to sign the log whenlogging “on” and “off” duty and at the end of theRADAY.

If the MSL is an automated log, it shall be designedso that it does not allow alternations. For manual logs, ahard copy of the MSL must be filed at the end of eachRADAY. MSLs must be retained for a minimum of 12months.

THE COMMUNICATIONS PLAN

The communications plan satisfies thecommunications requirements of an operation. Itspecifies circuits, channels, and facilities to be used andstipulates the policies and procedures that areapplicable. The plan is, in effect, an assignment ofcommunications tasks to be performed by subordinatecommanders or by supporting commands.

The planner first establishes requirements forcommunications and then determines the best means forsatisfying them. This process may reveal shortages orinadequacies in what is available. If inadequacies areidentified, it may become necessary to share circuits orfacilities, as well as to merge or consolidaterequirements. All possibilities should be considered tosupport valid operational requirements.

In planning communications, the planner mustevaluate such factors as the performance, capabilities,and capacities of systems and facilities, as well as thepersonnel. These factors are merely guides andaverages. They represent the sum result of experiencein previous similar situations, and are considered onlyafter any local factors are determined. These factorschange from time to time and must all be available forfinal determination of communications requirements.

QUALITY CONTROL

The AN/SSQ-88/A/B system was designed toprovide a means of monitoring and evaluatingperformance of any communications system used byforces afloat. You will utilize this system with RCSinterface as well as various other types of monitoringsystems; for example, oscilloscopes, meggers, andvisual, just to name a few.

1-21

Page 34: Information Systems Technician Training Series material/NAVEDTRA-14226.pdfInformation Systems Technician Training Series Module 5—Communications Center Operations NAVEDTRA 14226

You will be checking for various signal qualitycharacteristics, including dc distortion, audiodistribution levels, frequency accuracy of RF signals,spectrum analysis and loop current. Thosemeasurements are broad categories and can be brokendown to specific tests for specific systems.

You will correct all discrepancies, complete theappropriate reports, and send them to the properauthority or file them for further reference.

CIRCUITSETUP/RESTORATIONS

RADAY is the start of a new 24-hour period. At thattime all designated systems will restart. It can be acrypto restart, the simple methods of starting (opening)a new log, or message numbering system, starting at thenumber 0001.

RADAY starts at 0001Z worldwide. The 0000Ztime frame does not exist and WILL NOT be used. Thefollowing restart items is a rudimentary list to give theuser an idea of areas and items that require restart at thebeginning of the new radio day.

DETERMINE COMMUNICATIONSPROTOCOLS

Protocols are generally set by the CINCs, areacommander, Naval instructions, and local instructions.Protocols are also determined by the mission and thearea of operations.

COMMUNICATIONS CIRCUITS

The use of communications circuits require thatthose circuits at various times of the day be placedonline, in reserve, or taken offline. The reasons have todo with whether the circuit is needed immediately, orcan be placed on ready reserve for use, or if therequirement for that particular circuit has expired.

Activate

Activating communications circuit usually meansturning on or starting a circuit to allow forcommunications signals to ride (or pass) on them.When a circuit is activated, it will be logged in an activestatus on the status board. A circuit can be activated forany number of reasons, including specialcommunications, overload, or installation of a newcircuit path.

Deactivate

To terminate or deactivate a circuit is to stop using that path and remove all your equipment from thatparticular path. The deactivated circuit is then loggedout on the status board.

Standby

By placing communications circuits standby, youare placing them in hold. They are ready for activationor deactivation should the need arise. Again, this typeof circuit is placed on the status board so that thesupervisor knows the status of each of the circuits underhis control.

SHIFT FREQUENCIES

Shifting frequencies or changing frequencies isaccomplished to allow for stronger propagation of thecircuits. When the signal strength begins to decay, theoperator will shift frequencies to another or strongerfrequencies in accordance with naval and localinstructions.

TRANSMIT OR RECEIVECRYPTOGRAPHIC KEYING MATERIALVIA OTAT/OTAR

Some of the new cryptosystems will use a 128-bitelectronic key that is called over-the-air-rekey (OTAR)or over-the-air transfer (OTAT). Using this systemreduces the amount of physical keying material held onboard a command.

The key can be extracted using a KYK-13 or KYX-15/KYX-15A. The key is then loaded into anothercryptosystem.

For amplifying information, refer to ProceduresManual for Over-the-Air Transfer (OTAT) and Over-the-Air Rekey (OTAR) and Field Generation and Over-the-Air Distribution of Tactical Electronic Key, NAG-16/TSEC.

ANALYZE NETWORKCAPACITY AND RELIABILITY

When trying to analyze a network’s capacity andreliability, you must first establish the criteria or level atwhich you wish the system to work. Does the networkhave set boundaries, or can it be expanded to includeupdated or new parameters? Many avenues can be

1-22

Page 35: Information Systems Technician Training Series material/NAVEDTRA-14226.pdfInformation Systems Technician Training Series Module 5—Communications Center Operations NAVEDTRA 14226

explored to find the most efficient methods and levels atwhich a network can work.

Accurate documentation is a key factor for showingthe user what, where, total numbers, and reliability ofthe network.

You will find that with the correct numbers you cansee where a system or network is falling short or surgingahead of the set projection data.

SUMMARY

In this chapter you have been introduced tocommunications systems, networks, and administrationconcerns in their most basic forms.

Not all of our work is concerned with strategic ortactical operations. Establishing circuits or networks,quality control, and the various operations of the STU-III are just a few of the many facets of our complex anddiverse jobs.

1-23

Page 36: Information Systems Technician Training Series material/NAVEDTRA-14226.pdfInformation Systems Technician Training Series Module 5—Communications Center Operations NAVEDTRA 14226
Page 37: Information Systems Technician Training Series material/NAVEDTRA-14226.pdfInformation Systems Technician Training Series Module 5—Communications Center Operations NAVEDTRA 14226

CHAPTER 2

VOICE COMMUNICATIONS

Upon completing this chapter you should be able to do the following:

Identify circuit procedures, discipline, and techniques in voicecommunications.

Describe radiotelephone (R/T) security elements, voice procedures, andbasic message formats.

Explain the use of R/T call signs, circuits, and nets.

Explain the use of R/T executive methods.

Identify the use and format for R/T circuit logs.

Whether you are ashore or at sea, your professionalduties as a Radioman will include radiotelephone (R/T)communications. You should understand thatuncovered (nonsecure) radio transmissions are the leastsecure means of communications, and that R/T voicecommunications are the least secure of all radiocommunications. Despite these drawbacks, R/Tcommunications play an important part in our day-to-day fleet operations and in the control of coastal andharbor shipping.

CIRCUIT PROCEDURES

R/T is the easiest, most convenient method ofrelaying real-world situation traffic from ship to ship,ship to shore, or shore to ship. All that is necessary isthat you pick up a transmitter handset and speak into it.

A radiotelephone circuit would quickly becomeunusable if everyone on the circuit failed to follow thesame rules and procedures. Much of what isaccomplished over an R/T circuit involves propertechniques and training, coupled with common senseand experience. It is impossible to cover everyconceivable situation that may arise when using voicecommunications. There are many simple R/Tprocedures that apply to these circuits.

CIRCUIT DISCIPLINE

Unless using secure voice communicationsequipment, you must assume that everything you saywhen using R/T is being intercepted. The inherentdangers of interception can be significantly reduced byadhering to the principles of strict circuit discipline.

R/T transmissions should be as short and concise aspossible without sacrificing clarity. It is important thatall personnel using voice communications be instructedin the proper use of the handset and R/T equipment.They must also be cautioned on the likelihood oftransmission intercept.

Adherence to prescribed operating proceduresis mandatory! Deviations from these procedures createconfusion, reduce reliability and speed, and tend tonullify security precautions. Once you know the properoperating procedures, you can use your initiative andcommon sense to satisfy specific operatingrequirements.

Although circuit discipline is discussed here withrespect to its connection with R/T procedures, you mustunderstand that the requirement for circuit disciplineapplies to all communications circuits—not just R/Tcircuits. Every operator must recognize and avoid thefollowing malpractice, which could endangercommunications security:

2-1

Page 38: Information Systems Technician Training Series material/NAVEDTRA-14226.pdfInformation Systems Technician Training Series Module 5—Communications Center Operations NAVEDTRA 14226

Linkage or compromise of classified call signsand address groups by plain language orassociation with unclassified call signs;

Linkage or compromise of encrypted call signsand address groups by association with other callsigns, address groups, or plain language (forexample, use of encrypted call signs in the calland unencrypted call signs in the messageaddress);

Misuse and confusion of call signs, routingindicators, address groups, and addressindicating groups (AIGs) (which could result inthe nondelivery of an important message, acompromise, or the linking of classified andunclassified call signs and address groups);

Violation of emission control (EMCON)conditions;

Unofficial conversation between operators;

Transmitting on a directed net withoutpermission;

Transmitting the operator’s personal sign;

Excessive repetition of prowords;

Use of plain language in place of applicableprowords;

Unnecessary transmissions;

Incorrect and unauthorized procedures;

Identification of unit locations;

Excessively long calls (when a station is calledand does not answer within a reasonable time,presumably because a condition of radio silenceprevails, the message may be transmitted in theblind or by some other method);

Use of profane, indecent, or obscene language;and

Failure to maintain radio watches on designated

DO:

frequencies and at prescribed times.

CIRCUIT TECHNIQUES

You should use the following guide in developinggood voice circuit techniques. To enhance yourproficiency, you should practice the techniques on a

training net. Remember, though, that nothing can takethe place of good common sense.

Listen before transmitting. Unauthorized break-in causes confusion and often blocks atransmission in progress to the extent that neithertransmission gets through.

Speak clearly and distinctly. Both slurredsyllables and clipped speech are hard tounderstand. A widespread error amonguntrained operators is failure to emphasizevowels sufficiently.

Speak slowly. Give the receiving operator achance to get your message down. This can savetime and repetitions.

Avoid extremes of pitch. A high-pitched voicecuts through interference best, but is shrill andunpleasant if too high. A lower pitch is easier onthe ear, but is difficult to understand throughbackground noises if too low.

Be natural. Maintain a normal speaking rhythm.Group words in a natural manner. Send yourmessage phrase for phrase instead of word forword.

Use standard pronunciation. Talkers who use thealmost standard pronunciation of a broadcastnetwork announcer are easiest to understand.

Speak in a moderately strong voice in order tooverride unavoidable background noises and toprevent dropouts.

Keep correct distance between lips and handset.A distance of about 2 inches is correct for mosthandsets. If the distance is too great, speechbecomes inaudible and background noisesinterfere. If the distance is too small, blaring andblasting result.

Give an accurate evaluation in response to arequest for a radio check. A transmission withfeedback or a high level of background noise isnot “loud and clear,” even though the messagecan be understood.

Pause momentarily after each normal phrase,and interrupt your carrier. This allows any otherstation with higher precedence traffic to break in.

2-2

Page 39: Information Systems Technician Training Series material/NAVEDTRA-14226.pdfInformation Systems Technician Training Series Module 5—Communications Center Operations NAVEDTRA 14226

Table 2-1—Phonetic AlphabetAdhere strictly to prescribed procedures. Up-to-da te R/T procedures are found inRadiotelephone Procedure, ACP 125.

Transact your business and get off the air.Excessive preliminary calls waste time.

DO NOT:

Transmit while surrounded by others loudlydiscussing the next maneuver or event. Itconfuses the receiving stations and could be aserious security violation.

Hold the handset button in the push-to-talkposition until absolutely ready to transmit. Yourcarrier will block other communications on thenet.

Hold a handset in such a position that there is apossibility of having feedback from the earphoneadded to other background noises.

Hold a handset loosely. A firm pressure on thepush-to-talk button prevents unintentionalrelease and consequent signal dropout.

Tie up a circuit with test signals. Usually, 10seconds is sufficient for testing.

PHONETIC ALPHABET

Some letters of the alphabet have similar sounds;therefore, it is easy to confine the sounds of theseletters. For this reason, the standard phoneticequivalents of the letters of the alphabet are used in R/Tcommunications. Using the phonetic alphabet savesmany corrections and constant repetitions that wouldotherwise be necessary. Table 2-1 contains the alphabetwith a list of its phonetic and spoken equivalents. Thebolded portions of the spoken equivalents are the partsof the word that should be given the greatest emphasiswhen spoken.

When signals from naval signal books aretransmitted by voice, names of flags (ALFA, BRAVO,and so on) are used since they appear in the signalbooks. Difficult words within the text of plain textmessages may be phonetically spelled, using thephonetic alphabet, preceded by the proword I SPELL.When the operator can pronounce the word to bespelled, he or she does so before and after the spelling ofthe word to be identified. For example, a phrase in a

2-3

plain text message might contain the words “KisatchieReservation.” Upon reaching these two words, theoperator would say, “. . .Kisatchie, I SPELL, KILO,INDIA, SIERRA, ALFA, TANGO, CHARLIE,HOTEL, INDIA, ECHO, Kisatchie, Reservation . . .”(rest of text).

Page 40: Information Systems Technician Training Series material/NAVEDTRA-14226.pdfInformation Systems Technician Training Series Module 5—Communications Center Operations NAVEDTRA 14226

When a text is composed of pronounceable words,the words are spoken as such. When a text is encrypted,the groups are transmitted by the phonetic equivalentsof the individual letters and without the proword ISPELL. For example, the encrypted group DRSRM isspoken “DELTA, ROMEO, SIERRA, ROMEO,MIKE” and is counted as one group.

PRONUNCIATION OF NUMERALS

You must use care in distinguishing numerals fromsimilarly pronounced words. When transmittingnumerals, you may use the proword FIGURESpreceding such numbers. For example, the text of anR/T message contains the phrase “From TenCompanies.” There is a possibility that the phrasewould sound like “From Tin Companies” if spoken as itis written. An operator, therefore, could use theproword FIGURES when this phrase is reached in thetext by saying “From FIGURES One Zero Companies.”The operator could also use the proword I SPELL here.For example, upon reaching the same phrase in the textof the message, an operator could transmit “From Ten, ISPELL, TANGO, ECHO, NOVEMBER, Ten,Companies.”

When numerals are transmitted, their correctpronunciation is as follows:

The numeral 0 is always spoken as “zero,” never as“oh.” Decimal points are spoken as “day-see-mal.”

Numbers are transmitted digit for digit except thatexact multiples of thousands are spoken as such. Thereare, however, special cases, such as antiair warfarereporting procedures, when the normal pronunciation

of numerals is prescribed and digit-for-digittransmission does not apply. For example, in the casegiven, the number 17 is pronounced “seventeen”; not“one seven.” The following is a list of numbers andtheir normal R/T pronunciation:

DECIMALS, DATES, ANDABBREVIATIONS

As we mentioned earlier, the decimal point isspoken as “day-see-mal.” For example, 920.4 would bespoken as “Niner Too Zero Day-see-mal Fower.”

Dates are spoken digit for digit, with the monthsspoken in full. For example, the date 20 September isspoken as “Too Zero September.”

There are some rules that you should rememberconcerning abbreviations in the text of an R/T message.For example, initials are spoken phonetically whenused alone or with short titles. The phrase “Para A” isspoken as “Para Alfa.” The initials “ACP” would bespoken as “Alfa Charlie Papa.”

Personal initials are spoken phonetically, prefixedby the proword INITIALS. For example, the name “W.T. DOOR” would be spoken as “INITIALS WhiskeyTango Door.”

Familiar abbreviations that are frequently used innormal speech may be transmitted in abbreviated formon R/T. For example, the word “NATO” is spoken as“NATO.” The ship “USS Canopus” is spoken as “USSCanopus.”

PUNCTUATION

When punctuation is necessary in an R/T message,the punctuation is pronounced as follows:

2-4

Page 41: Information Systems Technician Training Series material/NAVEDTRA-14226.pdfInformation Systems Technician Training Series Module 5—Communications Center Operations NAVEDTRA 14226

Roman numerals, when used, are transmitted in thesame manner as the corresponding Arabic numerals andpreceded by the word “ROMAN.” For example, theRoman numeral III is pronounced “ROMAN Tree.”

USE OF PROWORDS

Table 2-2 contains a list of authorized prowords forgeneral use. Prowords are used to expedite messagehandling on circuits where R/T procedures are used. Inno case may a proword or combination of prowords besubstituted for the textual component of a message.Between units of different nationalities, prowords maybe replaced by their equivalent prosigns where theseexist. These should be spelled out using the authorizedphonetic equivalents.

Table 2-2.—Radiotelephone Prowords, Equivalent Prosigns, and Operating Signals

2-5

Page 42: Information Systems Technician Training Series material/NAVEDTRA-14226.pdfInformation Systems Technician Training Series Module 5—Communications Center Operations NAVEDTRA 14226

Table 2-2.—Radiotelephone Prowords, Equivalent prosign~ and Operating Signals—Continued

2-6

Page 43: Information Systems Technician Training Series material/NAVEDTRA-14226.pdfInformation Systems Technician Training Series Module 5—Communications Center Operations NAVEDTRA 14226

Table 2-2.—Radiotelephone Prowords, Equivalent Prosigns, and Operating Signals—Continued

2-7

Page 44: Information Systems Technician Training Series material/NAVEDTRA-14226.pdfInformation Systems Technician Training Series Module 5—Communications Center Operations NAVEDTRA 14226

Table 2-2.—Radiotelephone Prowords, Equivalent Prosigns, and Operating Signals—Continued

USE OF OPERATING SIGNALS RADIOTELEPHONE SECURITY

Operating signals are not designed for R/Ttransmission. In R/T procedures, operatinginformation is normally conveyed in concise phrases.However, in two circumstances it is permissible to useoperating signals contained in CommunicationInstructions, Operating Signals, ACP 131, instead ofstandard R/T phrases. These circumstances are wherethere are language difficulties and where practical ifthere is no risk of confusion.

In such instances, operating signals must bepreceded by the word “PROSIGN” or “OPERATINGSIGNAL.” Prosigns and operating signals aretransmitted using only authorized phonetic equivalents.The prosign INT is transmitted in its prosign equivalent;that is, INTERROGATIVE. The prowords I SPELLand FIGURES are not used. Examples of prosigns andoperating signals are:

2-8

In addition to adhering to circuit discipline, all usersare responsible for observing proper securityprecautions on R/T nets. For example, many units at seause classified call signs on tactical nets. If the operatordoes not know the operating situation, the classified callcould be linked to the unclassified call sign for that ship.Such unauthorized disclosures are whyBEADWINDOW procedures have been introducedinto the R/T process.

BEADWINDOW

BEADWINDOW is a real-time procedure used toalert circuit operators that an unauthorized disclosurehas occurred over a nonsecured circuit.BEADWINDOW also warns other operators on the netof the disclosure. This serves as an educational aid. Thelong-term benefits of the BEADWINDOW procedureinclude an increased awareness of the proper use ofvoice circuits throughout the fleet and better security ofuncovered Navy voice communications.

Page 45: Information Systems Technician Training Series material/NAVEDTRA-14226.pdfInformation Systems Technician Training Series Module 5—Communications Center Operations NAVEDTRA 14226

BEADWINDOW procedures deal with Essential BEADWINDOW CODE WORDSElements of Friendly Information (EEFIs). EEFIs

The BEADWINDOW procedure uses the codeare established by operational commanders. EEFIsword “BEADWINDOW” and a number combination

identify specific items of information which, if revealed (from the EEFI list) that is transmitted immediately toand correlated with other information, would degrade the unit disclosing an EEFI. The code word notifies thethe security of military operations, projects, or missions unit that it has committed the disclosure, and thein the applicable areas. EEFIs can, therefore, vary from number combination provides specific identity of theoperation to operation or from area to area. Table 2-3 item disclosed. For example, when any station of thecontains an EEFI key number and key word definition net commits a disclosure of an EEFI, net control (or anylist. station observing the disclosure) calls the violator with

Table 2-3.—Essential Elements of Friendly Information (EEFIs)

2-9

Page 46: Information Systems Technician Training Series material/NAVEDTRA-14226.pdfInformation Systems Technician Training Series Module 5—Communications Center Operations NAVEDTRA 14226

a normal call-up. The calling station then says the word“BEADWINDOW” followed by the number of theEEFI the violator disclosed.

The only authorized reply to the BEADWINDOWmessage is “ROGER-OUT.” This method allows thereported unit to take immediate action to correct theinsecure practice. In this particular situation, if the callsign of the net control is “Control” and the call sign ofthe violator is USS Frances Scott Key, Control’s reportwould be:

The EEFI list should be posted in clear sight of theoperator at all nonsecure voice positions for quickreference. You should remember that proceduralviolations are not security violations; therefore, theydon’t fall in the BEADWINDOW category.

IMPORTANCE OF RADIOTELEPHONEVOICE PROCEDURES

Poor voice communications can create confusion,reduce reliability and speed, and nullify securityprecautions. Poor procedures can ultimately have anadverse effect on the mission of a ship.

A commanding officer, regardless of the mission ofthe ship, has only one real-time means ofcommunicating with his commander and other units ofa force—radiotelephone. Your ship maybe required toguard (monitor) 10 or more voice circuits, each having aspecific purpose and specific procedures. Few of thesecircuits are operated from communications spacesexcept on small ships, such as submarines or destroyers.On larger ships, the circuits are handled from the bridgeand the combat information center (CIC).

As an operator, you are responsible for providingreliable transmitter and receiver services to theseremote operating positions. This entails establishingcommunications on a net or circuit before making thatnet or circuit available to the remote operators. If you donot know the various nets that are guarded by your shipand the purpose of these nets, the overallcommunications of the ship can be degraded. Thiscould impede the progress of the entire operation.

Modern, high-speed naval operations make theelimination of confused R/T operations an absolutenecessity. For example, a hunter-killer force searchingfor an enemy submarine is not permitted the luxury of a5- or 10-minute delay in executing a screening signal.

An unnecessary delay such as this could defeat thepurpose (speed) of the officer in tactical command(OTC) when using R/T. A 1-minute delay by an aircraftcarrier pilot in executing a vectoring signal because hedid not understand the message could easily result in thepilot’s death.

During shakedown operations, a submarine couldrisk collision with its escort vessel during emergencysurfacing procedures if voice communications are notclearly understood.

When possible, you must use only standardphraseology, authorized prowords, and brevity codewords. Standard procedures enhance reliability andclarity. Moreover, variations from standard circuitprocedures provide an ideal situation for enemyimitative deception.

BASIC RADIOTELEPHONE MESSAGEFORMAT

Radiotelephone uses a 16-line message format(table 2-4) that is comparable to formats in teleprintercommunications. Radiotelephone messages also havethe same three military message forms: plaindress,abbreviated plaindress, and codress.

By far, the most common message form in R/Ttraffic is the abbreviated plaindress. In fact, theabbreviated plaindress message is sometimes soabbreviated that it closely resembles the basic messageformat. The three major message parts-heading, text,and ending—are there, however. Each of these majorparts is reduced to components and elements.

All format lines do not necessarily appear in everymessage. When a line is used, it must be placed in themessage in the order shown in table 2-4. Anabbreviated plaindress message may omit any or all ofthe following: precedence, date, date-time group(DTG), and/or group count. A codress message is one inwhich the entire address is encrypted within the text.The heading of a codress message contains onlyinformation necessary to enable communicationspersonnel to handle it properly.

Notice that prowords, not prosigns, are used invoice communications. Because prowords are spoken,it is important that you, as the operator, be completelyfamiliar with them. Refer to table 2-2 for a list of manyof the commonly used prowords, their explanations,and their equivalent prosigns. Throughout this chapter,prowords are shown in all capital letters.

2-10

Page 47: Information Systems Technician Training Series material/NAVEDTRA-14226.pdfInformation Systems Technician Training Series Module 5—Communications Center Operations NAVEDTRA 14226

Table 2-4.—Radiotelephone Message Format

2-11

Page 48: Information Systems Technician Training Series material/NAVEDTRA-14226.pdfInformation Systems Technician Training Series Module 5—Communications Center Operations NAVEDTRA 14226

In the following paragraphs, we will discuss theformat lines used in the R/T message format. Refer totable 2-4.

FORMAT LINES 1, 2, 3, AND 4

Format line 1 is not used in R/T procedures. Formatlines 2 and 3 contain the call sign, the prowordMESSAGE, and the transmission identification.

The call may take one of the following forms:

Full Call

“Kamehameha (station called),

THIS IS

Vallejo” (station calling)

Abbreviated Call

“THIS IS

Vallejo” (station calling).

Normally, a full call is used when first establishing anet and when reporting into a previously establishednet. A full call is also used in the transmissioninstructions and address components when a message isrequired to be relayed to a station on a different net.

Once communications are established and noconfusion will result, an abbreviated call may be used.To further expedite voice communications, thereceiving station may omit the proword THIS IS whenthe station is responding to a call and communicationsare good. Additionally, the call may be omitted entirelywhen two stations are in continuous communication orthe net is not shared by a third station.

When a collective call sign is used and some of theaddressees are to be exempted, you do so in the call byusing the proword EXEMPT, followed by the callsign(s) of the station(s) exempted. For example:

“Edison (collective call)

EXEMPT

Tecumseh (station exempted),

THIS IS

Vallejo” (station calling).

Notice that only one station is exempted in this call-up. If there had been more than one station, each stationwould have been spoken before the proword THIS IS.

After the call, transmit the proword MESSAGE ifyou wish to indicate that a message you are about totransmit requires recording. For example:

“Vallejo (station called),

THIS IS

Kamehameha (station calling)

MESSAGE” (message is to follow).

The transmission identification is normally astation serial number used mostly in teleprinterprocedures. When used in voice communications, thetransmission identification is the last element of formatlines 2 and 3, consisting of the station serial numberpreceded by the proword NUMBER.

Format line 4 contains the transmissioninstructions, which may consist of the prowordsRELAY TO, WORDS TWICE, DO NOT ANSWER, orREAD BACK. The use of these prowords is explainedlater.

FORMAT LINE 5

Format line 5 contains the precedence, DTG, andany necessary message instructions. The precedence isthe first element of format line 5. In the case of a dual-precedence message, the higher precedence istransmitted first; for example, “PRIORITYROUTINE.” The DTG is preceded by the prowordTIME. An example of this format line is as follows:

“Vallejo, THIS IS Polk, RELAY TO Key,PRIORITY, TIME, Tree Zero Wun Fower FowerFife Zulu.”

Message instructions are not normally required inR/T messages. When included, they consist of short andconcise instructions that indicate the status of themessage. Message instructions remain with themessage until the message reaches its destined station.For example, if the message is a suspected duplicate, thephrase “This Message Is A Suspected Duplicate”immediately follows the DTG.

FORMAT LINES 6, 7, 8, AND 9

Format lines 6, 7, 8, and 9 form the address of themessage and are recognized by the prowords FROM,TO, INFO, and EXEMPT, respectively. When theoriginator and the addressee are in directcommunication, the call may serve as the address.Table 2-5 is an example of an R/T transmission showingelements of the heading components (format lines 2through 9).

2-12

Page 49: Information Systems Technician Training Series material/NAVEDTRA-14226.pdfInformation Systems Technician Training Series Module 5—Communications Center Operations NAVEDTRA 14226

Table 2-5.—R/T Message Showing All Possible Elements ofthe Address Components.

FORMAT LINE 10

Format line 10 is identified by the prowordGROUPS, followed by the number of groups, or“GROUP NO COUNT.” This line may contain anaccounting symbol in addition to the group designation.Accounting symbols are seldom used on R/T circuits.However, they may appear on messages received forrelay from circuits using other procedures. Accountingsymbols are a combination of letters used to indicate theagency, service, or activity that assumes financialresponsibility for the message.

Since R/T messages are usually short, a group countis seldom used. However, if a group count is sent, thenumber of groups is preceded by the proword GROUPSand appears in the message prefix. When a message istransmitted before the group count is determined, theproword GROUP NO COUNT is used in lieu of thegroup count. The actual group count may then betransmitted in the final instructions and be inserted inthe message prefix by the receiving operator. Theproword GROUP NO COUNT is included in messages

bearing an accounting symbol when groups are notcounted.

FORMAT LINES 11 THROUGH 16

Format line 11 contains the proword BREAK. Thisline separates the heading from the text. The use of thisproword is not required except where confusion may bepossible between the heading and text.

Format line 12 is the text of the message andexpresses the idea of the originator. The primarydifference between R/T text and other types ofcommunication is that R/T text must be spoken.Therefore, it is important that new operators thoroughlyfamiliarize themselves with the proper phrases andprowords that are commonly used in communicationstexts.

Format line 13 contains the proword BREAK. Thisline separates the text from the ending. Like format line11, this proword should be used when confusion mayoccur between the text and the ending.

Format line 14 is used only in abbreviatedplaindress messages when a time group is transmittedhere. When used, it takes the place of a DTG in formatline 5. For example, a DTG may not be determinedprior to transmission. In such cases, it may be omitted informat line 5 and be sent as a time group in format line14. When used, format line 14 consists of the prowordTIME, followed by the time group plus the zone suffix.For example, you are in time zone B and you are sendinga time group of 310850 in format line 14. You wouldtransmit the time group as:

“TIME Three One Zero Eight Five Zero Bravo.”

Format line 15 contains any final instructions.When used, this line may contain prowords (such asWAIT, CORRECTION, MORE TO FOLLOW,AUTHENTICATION IS), operating signals, addressgroups, call signs, and plain language designators.

Format line 16 is identified by the proword OVERor OUT. Every transmission ends with either OVER orOUT. However, the proword OVER may be omittedwhen two stations are in continuous communicationwith each other on a circuit not shared with a thirdstation. In transmissions where the proword DO NOTANSWER is used, the transmissions must end with theProword OUT.

2-13

Page 50: Information Systems Technician Training Series material/NAVEDTRA-14226.pdfInformation Systems Technician Training Series Module 5—Communications Center Operations NAVEDTRA 14226

RADIOTELEPHONE CALL SIGNS

Call signs used in radiotelephone are commonlyknown as voice call signs. They consist of spokenwords, which can be transmitted and understood morerapidly and more effectively than actual names of shipsand afloat commands, or phonetic equivalents ofinternational radio call signs. Under certaincircumstances, however, the phonetically spelledinternational call sign is used in R/T for stationidentification. At other times, a ship’s name serves asthe call sign.

R/T call signs may be assigned by an operationorder (OPORD), a tactical communication plan(COMMPLAN), or permanently by commonly heldcommunications publications. R/T call signs may beeither permanent or temporary, and they may beinternationally usable or locally issued. In any event,call signs are used to identify the station and to establishcommunications. A station’s call sign can be any of thefollowing:

The name of the ship or aircraft tail number;

A voice call sign listed in Joint Voice Call SignBook, JANAP 119;

An allied voice call sign listed in Tactical CallSign Book (U), ACP 110; and/or

A call sign for ships listed in Call Sign Book forShips, ACP 113.

Voice Communications, NTP 5, lists publicationsthat contain encrypted and daily changing call signs.

A ship must use its call sign when first establishinga net or when reporting into a previously establishednet. After this initial contact, an abbreviated form ofcommunications may be used.

If call sign encryption is in effect and a ship or unitname appears in the text, the name should be replacedby the encrypted call sign or address group of the ship orunit. When used in this manner, the call sign or addressgroup may be preceded by the proword CALL SIGN orADDRESS GROUP, as applicable.

ACP 113 CALL SIGNS

ACP 113 lists the international call signs and hullnumbers for ships under military control. The call signsin this publication are unclassified. International callsigns are used for all nonmilitary communications andmilitary communications using unencrypted call signs.

2-14

JANAP 119 VOICE CALL SIGNS

Voice call signs contained in JANAP 119 arepronounceable words. They are for tactical use and aredesigned to facilitate speed on tactical radio circuits.Secure voice call signs can be achieved only by aconscientiously applied system for changing call signson a frequent and periodic basis.

CALL SIGNS ON LOCAL HARBORCIRCUITS

JANAP 119 does not assign voice call signs toadministrative shore activities. Consequently, a shipcannot use a tactical call on administrative ship-shorecircuits. When operating on ship-shore R/T circuits, aship may use its international call sign. Operators mustspeak the call sign phonetically. For example, youwould speak the international call sign NOKB as“November Oscar Kilo Bravo.” The proceduredescribed in the next paragraph may also be used.

In U.S. ports and U.S.-controlled ports overseas,the name of the ship serves as the voice call sign. As arule, the USS prefix, hull designation and number, orthe first name or initials of the ship need not be includedin the voice call unless essential for clarity. Thisprocedure also applies to shore activities onadministrative nets. Each activity may use itsadministrative title in an abbreviated form, consistentwith clarity. For example, Mobile Technical Unit 2 mayhave a voice call of MOTU on an administrative circuit.

Port authorities that control local harbor voicecircuits are identified by the word “CONTROL.” Forexample, let’s say that the Key is entering port in NewLondon, Conn. Key’s initial call to New LondonControl to check into the local harbor net would be:

“Control, THIS IS Key, OVER.”

If Key were to call Fuel Control, its call would be:

“Fuel Control, THIS IS Key, OVER.”

You must remember that the simplified type of callis authorized only in U.S. ports or U. S.-controlled ports.If a ship is in a port not under U.S. control, it mustconform to the international practice of usingphoneticized international call signs on R/T circuits.

RADIOTELEPHONE CIRCUITS

Voice communications requirements are groupedinto two basic categories: operational or tactical, andadministrative.

Page 51: Information Systems Technician Training Series material/NAVEDTRA-14226.pdfInformation Systems Technician Training Series Module 5—Communications Center Operations NAVEDTRA 14226

OPERATIONAL OR TACTICALCIRCUITS

Most voice circuits used at sea are operational ortactical nets; some circuits, however, are often used topass administrative traffic. These circuits aresubcategorized into two distinct types: short and longrange.

Short-range operational communications normallyuse the UHF frequency spectrum (225 to 400 MHz) andlow-power, line-of-sight equipment. Because of thesefrequency and equipment characteristics, the maximumeffective range is usually 20 to 25 miles. This limitedUHF range offers no security, and transmissions arealways subject to enemy interception. However, sincethese transmissions are limited somewhat to the localgeographic area, interception by an enemy would bedifficult. On the other hand, the range of UHFcommunications may be extended through the properuse of relay procedures.

More and more, our modern and high-speed shipsmust report to OTCs from longer distances than theolder ships they replaced. Long-range frequencies in themedium- and high-frequency spectrum (2 to 32 MHz)are, therefore, used. From your study of module 4, youwill remember that the propagation characteristics ofthese frequencies make them desirable for long-rangecommunications. To further increase the rangecapabilities of long-range communications, we usesingle-sideband (SSB) methods.

ADMINISTRATIVE CIRCUITS

Administrative circuits are normally used only inport and may include both short- and long-rangecommunications. Voice circuits that are neitheroperational nor tactical are included in theadministrative category. Seldom is there such a circuitin at-sea communication plans.

Harbor common circuits and tug control nets aretwo examples of administrative nets. Naturally, thesenets assume an operational function during situationsrequiring emergency procedures, such as naturaldisasters and civil uprisings. Circuit requirements varyfrom port to port, as established by the senior officerpresent afloat (SOPA). Both the UHF and MF/HFcircuits may be used for administrative nets.

TYPES OF NETS

There are two types of R/T nets: directed and free.The type of net to be used is determined by the

operational situation. Regardless of the type of net used,a Net Control Station (NECOS) is assigned to monitorthe circuit or circuits and enforce circuit discipline.

NECOS is the senior net member or designatedauthority. The NECOS is responsible for implementingoperational procedures and enforcing discipline andsecurity on the net. Enforcement of circuit discipline,however, is not the only reason for having a NECOS.Sometimes there are so many stations sharing acommon circuit that a NECOS is necessary to facilitatethe handling and passing of R/T traffic.

Directed Net

On a directed net, stations must obtain permissionfrom the NECOS before communicating with otherstations on the net. The exception to this rule is when astation has FLASH traffic to send. Also, transmissionson the directed net may be accomplished with apredetermined schedule.

Free Net

On the free net, member stations don’t need NECOSpermission to transmit. Net members must ensure thatthe net is not in use before initiating a call-up. A free net,however, does not relieve the NECOS of theresponsibility for enforcing operational procedures andmaintaining proper circuit discipline.

Both free and directed nets normally use collectivecall signs. Figure 2-1 diagrams an R/T net that consistsof the following stations: USS Key, USS Mariano G.Vallejo, USS James K. Polk, USS Kamehameha, andUSS Tecumseh. In this example, we will assume that theNECOS is Key. Notice that the collective call sign forthe entire net is Poseidon.

Figure 2-1.—Radiotelephone net.

2-15

Page 52: Information Systems Technician Training Series material/NAVEDTRA-14226.pdfInformation Systems Technician Training Series Module 5—Communications Center Operations NAVEDTRA 14226

OPENING THE NET

The responsibility for opening the net for the firsttime or reopening the net after it has been temporarilysecured belongs to Key. To accomplish this on a freenet, Key would transmit:

“Poseidon, THIS IS Key, OVER.”

After the transmission, all stations answer inalphabetical order:

“Key, THIS IS Kamehameha, OVER,”

“Key, THIS IS Polk, OVER,” (and so on until allstations have responded).

After all stations on the net have answered, Key thensends:

“Poseidon, THIS IS Key, OUT.”

This last message from Key informs all stations thattheir transmissions were heard and there is no traffic forthem at the time.

If a station does not reply to the collective callwithin 5 seconds, the next station answers in propersequence. Barring any difficulties the station may have,the delinquent station answers last. If the delinquentstation is having difficulty that prevents an answer to thecall, it reports in to the net as soon as possible with thetransmission:

“Key, THIS IS (name of station).

Reporting In To Net, OVER.”

At this time on the free net, and following apreliminary call, the stations concerned would starttransmitting traffic to each other. For example, ifVallejo has traffic for Kamehameha, it would letKamehameha know this with the call:

“Kamehameha, THIS IS Vallejo, OVER.”

Kamehameha would acknowledge with:

“Vallejo, THIS IS Kamehameha, OVER.”

Vallejo would then send its traffic.

On the directed net, when all communications overthe net are controlled by the NECOS, Key would call themember stations and announce that the net is directed.In this initial transmission, Key would requestinformation on the status of any outstanding messages.For example:

“Poseidon, THIS IS Key, This Is A Directed Net, OfWhat Precedence And For Whom Are YourMessages, OVER.”

2-16

Each subordinate station then answers inalphabetical order, indicating its traffic on hand. Forexample:

“Key, THIS IS Polk, I Have One IMMEDIATE AndOne PRIORITY For You, OVER.”

“Key, THIS IS Vallejo, No Traffic, OVER.” (Otherstations respond.)

After all stations have checked into the net, Keywould ROGER for the transmissions and commence toclear traffic in the order of priority. For example:

“Poseidon, THIS IS Key, ROGER, Polk Send YourIMMEDIATE, OVER.”

After Polk has sent its transmission and obtained areceipt, net control then gives permission to transmit tothe station with the next higher precedence traffic.

After the initial traffic is cleared, stations havingmessages to transmit to other stations on the net mustfirst obtain permission from net control. For example:

“Key, THIS IS Tecumseh, I Have One ROUTINEFor Polk, OVER.”

Net control then answers:

“THIS IS Key, Send Your Message, OVER.”

As you can see from our examples, circuitdiscipline is essential. Regardless of whether a singleship is entering port or several ships are engaged in amajor fleet exercise, voice communications arerequired. The number of necessary circuits and netsincreases with the complexity of the task and thenumber of units participating.

Whether the net is free or directed, the Net ControlStation has the primary responsibility for expeditingmessage traffic. Each station is responsible for assistingnet control in the proper passing of traffic. Adherence toproper operating procedures and communicationsstandards is essential in keeping a net free of backlogsand tie-ups.

ESTABLISHING COMMUNICATIONS

We have already discussed the procedure for callingand answering on free and directed nets. There will alsobe times when you will need to establishcommunications with a ship or station on a temporarybasis to pass message traffic. This consists of nothingmore than a simple call-up to initiate contact and todetermine whether communications conditions aregood. For example, if the USS Ohio wants to contact

Page 53: Information Systems Technician Training Series material/NAVEDTRA-14226.pdfInformation Systems Technician Training Series Module 5—Communications Center Operations NAVEDTRA 14226

the USS Alabama on a commonly guarded frequency,Ohio’s initial call would be:

“Alabama, THIS IS Ohio, OVER.”

Upon hearing the initial call, Alabama would reply:

“Ohio, THIS IS Alabama, OVER.”

At this point, Ohio would initiate another call-up andindicate that it has traffic to pass to Alabama.

To use the circuit more efficiently, the operatorshould observe the following procedures:

Write down all messages or their substance priorto transmission, including those that must bedelivered by the receiving operator to anotherperson and those that are preceded by theproword MESSAGE.

Listen to make sure that the circuit is clear beforeinitiating a transmission.

Speak in a clear, natural voice and pause aftereach natural phrase.

If technically practical, during the transmission

Table 2-6.—Prowords Concerning Signal Strength andReadability

of a message, the operator should pause aftereach natural phrase and momentarily interrupthis transmission (carrier). This will allowanother station to break in if necessary.

Sometimes the operator must initiate test signals forthe adjustment of either a transmitter or a receiver. Suchsignals should not exceed 10 seconds and should becomposed of spoken numerals (1, 2, 3, and so on),followed by the call sign of the station transmitting thesignals.

SEQUENCE OF CALL SIGNS

Call signs or address groups in message headingsshould be arranged alphabetically in the order in whichthey are to be transmitted, whether plain or encrypted.For this purpose, the slant sign (/) and numerals 1through 0 are considered the 27th through the 37thletters of the alphabet. When abbreviated call signs areused on a net, the sequence of answering a collectivecall should be the same as if full call signs were used.This will prevent confusion when these call signs arechanged from full to abbreviated.

SIGNAL STRENGTH AND READABILITY

A station is presumed to have good signal strengthand readability unless the operator is notified otherwise.Queries concerning signal strength and readability

should not be exchanged unless one station cannotclearly hear another station. The proword RADIOCHECK is the standard phrase used in a call-up thatquestions signal strength and readability. For example,let’s assume that USS Alabama initiates a call to USSOhio and wishes to know the status of communicationsconditions. Alabama’s initial call would be:

“Ohio, THIS IS Alabama, RADIO CHECK,OVER.”

Upon hearing this transmission satisfactorily anddetermining that communications conditions are clear,Ohio would then answer:

“Alabama, THIS IS Ohio, ROGER, OVER.”

The omission of comment on signal strength andreadability is understood by Alabama to mean that thereception is loud and clear. If any adverse conditionsexisted that were impeding Ohio’s ability to maintainsatisfactory communications, Ohio would have usedone of the phrases (considered prowords) in table 2-6.

2-17

Page 54: Information Systems Technician Training Series material/NAVEDTRA-14226.pdfInformation Systems Technician Training Series Module 5—Communications Center Operations NAVEDTRA 14226

For example, if Ohio did not consider the transmission

satisfactory, Ohio might reply:

“Alabama, THIS IS Ohio , WEAK AndDISTORTED, OVER.”

A station that wishes to inform another station ofsignal strength and readability does so by means of ashort report of actual reception. A short report maybe“Weak but readable” or “Weak with interference.” Suchreports as “Five by” or “Four by four” are not authorizedand are not indicative of signal strength and quality ofreception.

COMMUNICATIONS CONDITIONS

Situations exist where atmospheric conditions andinterference do not present problems to successfulcommunications. During good conditions, messageparts need only be transmitted once, and, dependingupon the operational situation, preliminary calls aresometimes optional.

At other times, conditions are anything but idealand can present problems to even an experiencedoperator. Normal operating procedure requires anoperator to transmit all call signs twice whencommunications conditions are bad. During badconditions, phrases, words, or groups to be transmittedtwice are indicated by the use of the proword WORDSTWICE. Reception may be verified by use of theproword READ BACK. For example, if badcommunications conditions exist and Tecumseh has amessage for Kamehameha that reads “Moor StarboardSide Tender,” the transmission would be:

“Kamehameha , Kamehameha , THIS IS ,Tecumseh, Tecumseh, WORDS TWICE, WORDSTWICE, Moor Starboard Side Tender MoorStarboard Side Tender, OVER.”

Upon receipt of the message, Kamehameha would

communications conditions, Tecumseh could haveended the above transmission with the proword READBACK, sent twice. This would require Kamehameha toread back the message verbatim in WORDS TWICEform, thus ensuring that the message was properlyreceived.

Another method of using the READ BACKprocedure is to do so without using WORDS TWICE. IfTecumseh wanted Kamehameha to read back themessage to ensure reception but did not want to use theWORDS TWICE procedure, Tecumseh’s transmissionwould be:

2-18

“Kamehameha, THIS IS Tecumseh, READ BACKText, BREAK, Moor Starboard Side Tender,OVER.”

Kamehameha would then answer:

“Tecumseh, THIS IS Kamehameha, I READBACK Text, Moor Starboard Side Tender, OVER.”

Satisfied that Kamehameha has properly received themessage, Tecumseh would then send:

“Kamehameha, THIS IS Tecumseh, That IsCorrect, OUT.”

If Kamehameha repeated back the message incorrectly,Tecumseh would have used the proword WRONG,followed by the correct version. Kamehameha wouldthen repeat back the necessary portions until the entiremessage was correctly received.

When using the WORDS TWICE or READ BACKprocedure, you should remember several rules. First,the prowords THIS IS and OVER are not repeated twicewhen using the WORDS TWICE procedure. Theseprowords are not spoken twice in the originaltransmission nor in the repeat back version. Second, theproword ROGER is not necessary to indicate receipt ofthe message in the READ BACK procedure. If themessage is correct in its repeated back version, youwould use the phrase “THAT IS CORRECT, OUT.”

In a collective call where only some of the stationsrepresented are to read back, those stations should bespecified by transmitting their appropriate call signspreceding the proword READ BACK. When the orderto read back is given, only those stations directed to doso will read back. The remaining stations called willkeep silent unless directed by the calling station toreceipt. When not preceded by identifying call signs,the proword READ BACK means that all stations are toread back if the call is a collective one.

CORRECTIONS

When a transmitting operator makes an error, theoperator uses the proword CORRECTION to correct it.The operator then repeats the last word, group, proword,or phrase correctly sent, corrects the error, and proceeds

Tecumseh made a mistake in the message toKamehameha. The method Tecumseh uses to correctthat mistake is:

“Kamehameha, THIS IS Tecumseh, MoorOutboard Side, CORRECTION, Moor StarboardSide Tender, OVER.”

ROGER for it. To ensure reception during bad

with the message. For example, let's assume that

Page 55: Information Systems Technician Training Series material/NAVEDTRA-14226.pdfInformation Systems Technician Training Series Module 5—Communications Center Operations NAVEDTRA 14226

If an error in a message is not discovered until theoperator is some distance beyond the error, the operatormay make the correction at the end of the message.Let’s assume that Key is communicating with Polk.

During Key’s transmission, Key makes a mistake in thetime group but the mistake is not discovered until nearthe end of the transmission. The procedure Key wouldmake to correct the mistake is:

“Polk, THIS IS Key, TIME Zero Eight Two FourZulu, BREAK, Request Status Deep Dive, BREAK,CORRECTION, TIME Zero Eight Two Five Zulu,OVER.”

REPETITIONS

When words are missed or cannot be determined,stations may request repetitions before receipting for

obtaining repetitions are SAY AGAIN, ALL BEFORE,ALL AFTER, WORD BEFORE, WORD AFTER, andTO. For example, in the previous message from Key toPolk, assume that Polk missed the entire message after

that portion of the message would be:

“Key, THIS IS Polk, SAY AGAIN ALL AFTERRequest, OVER.”

Key would then reply:

“THIS IS Key, I SAY AGAIN ALL AFTERRequest—Status Deep Dive, BREAK, OVER.”

Upon satisfactory receipt, Polk would send:

“THIS IS Polk, ROGER, OUT.”

the message. The prowords most often used for

the word “Request.” Polk's request for a repetition for

This same procedure applies for the proword ALLBEFORE.

The repetition procedure is also used when a stationrequests that a particular word be repeated. This is doneby using either of the prowords WORD AFTER orWORD BEFORE. For example:

“Key, THIS IS Polk, SAY AGAIN WORD AFTERStatus, OVER.”

Key then replies:

“THIS IS Key, I SAY AGAIN WORD AFTERStatus-Deep, OVER.”

The WORD BEFORE procedure would beaccomplished in the same way by simply substitutingthe prowords.

The use of the proword TO is as follows:

“Key, THIS IS Polk, SAY AGAIN Request TODive, OVER.”

Key would then reply:

“THIS IS Key, I SAY AGAIN Request TODive—Request Status Deep Dive, OVER.”

Upon satisfactory receipt, Polk would reply:

“THIS IS Polk, ROGER, OUT.”

An important rule to remember is that when yourequest repetitions in the heading of an R/T messagecontaining FROM, TO, INFO, or EXEMPT addressees,the prowords are the key to the repetition procedures.Repetitions may be requested for all of that portion ofthe heading preceding or following a proword or thatportion between any two prowords. For example, Keysends the following message to Polk:

“Polk, THIS IS Key, MESSAGE, PRIORITY,TIME, Zero Eight Zero Nine Three Zero Zulu,FROM Key, TO Polk, INFO Tecumseh, BREAK,Proceed Naval Underwater Sound Laboratories,Rendezvous SAQAD, I SPELL, Sierra, Alfa,Quebec, Alfa, Delta, SAQAD, Representative,BREAK, OVER.”

Polk misses the portion of the message before theaddress and sends:

“Key, THIS IS Polk, SAY AGAIN ALL BEFOREFROM, OVER.”

Key then sends:

“Polk, THIS IS Key, I SAY AGAIN ALL BEFOREFROM—Polk, THIS IS Key, MESSAGE,PRIORITY, TIME, Zero Eight Zero Nine ThreeZero Zulu, OVER.”

Upon understanding the missing portion, Polk sends:

“Key, THIS IS Polk, ROGER, OUT.”

This same procedure can be applied to all repetitionprowords. An important point for you to remember isthat requests for repetition must include those portionsof the heading before, after, or between the applicableprowords.

CANCELING MESSAGES

Before the ending proword OVER or OUT is sent, astation can cancel a message transmission by using theproword DISREGARD THIS TRANSMISSION,OUT. For example, if Key should realize, while sendinga message, that the message is being sent in error, Keywould cancel the transmission as follows:

2-19

Page 56: Information Systems Technician Training Series material/NAVEDTRA-14226.pdfInformation Systems Technician Training Series Module 5—Communications Center Operations NAVEDTRA 14226

“. . . Proceed Underwater Sound Laboratories,

DISREGARD THIS TRANSMISSION, OUT.”

After a message has been completely transmitted, itcan be canceled only by another message. For example:

“Polk, THIS IS Key, Cancel My Zero Eight ZeroNine Three Zero Zulu, TIME Zero Nine Five Zero Zulu,OVER.”

Polk transmits:

“Key, THIS IS Polk, ROGER, OUT.”

RECEIPT OF A MESSAGE

No message is considered delivered on an R/Tcircuit until the transmitting station receives a receipt.A receipt is effected by the use of the proword ROGER.The receiving station can transmit a receipt after eachmessage or after a string of messages if there is morethan one message to be receipted for.

In a collective net, the transmitting station maydetermine that speed of handling should be the primaryconsideration. In this case, one station in the net maybedirected to receipt for the message or messages and noother station may answer until instructed to do so. This,however, does not prohibit any station in the net fromrequesting repetition.

ACKNOWLEDGMENT OF R/T MESSAGES

You should not confuse an acknowledgment with areply or receipt. An acknowledgment is a reply from anaddressee indicating that a certain message wasreceived, understood, and can be complied with. Areceipt means only that the message was receivedsatisfactorily. Only the commanding officer or his orher authorized representat ive can authorize

A request for acknowledgment is accomplished byuse of the word “acknowledge” (not a proword) as thefinal word of the text. The reply is the proword WILCO.If the commanding officer can acknowledge at once, thecommunications operator may receipt for the messagewith WILCO because the meaning of ROGER iscontained in WILCO. If the acknowledgment cannot bereturned immediately, the communications operatorreceipts for the message with ROGER, and replies withWILCO later. The return transmission to a request foran acknowledgment is either ROGER or WILCO; never

c o m m u n i c a t i o n s p e r s o n n e l t o s e n d a nacknowledgment.

“Polk , THIS IS Key , Reques t Spec ia lCommunications Training, Acknowledge, OVER.”

The commanding officer wishes to consider the requestbefore acknowledging; the operator sends:

“Key, THIS IS Polk, ROGER, OUT.”

After consideration, the commanding officer of Polkunderstands and can comply with the message. Theoperator then transmits:

“Key, THIS IS Polk, WILCO, OUT.”

VERIFICATION OF R/T MESSAGES

When a receiving station requests verification of anR/T message, the originating station verifies themessage with the originating person, checks thecryptography (if the message is encrypted), and sendsthe correct version. For example:

“Key, THIS IS Polk, VERIFY your Zero Eight ZeroNine Three Zero Zulu—SAY AGAIN FROM TOINFO, OVER.”

Key then transmits:

“THIS IS Key, ROGER, OUT.”

After checking with the originating officer, Keydetermines that the portion to be verified is correct astransmitted previously and sends:

“Polk, THIS IS Key, I VERIFY My Zero Eight ZeroNine Three Zero Zulu, I SAY AGAIN, FROM TOINFO—FROM Key, TO Polk, INFO, OVER.”

Polk receipts for the transmission:

“THIS IS Polk, ROGER, OUT.”

BREAK-IN PROCEDURES

A station having a message of higher precedencethan the transmission in progress may break in andsuspend that transmission in the following manner:

FLASH message—The station should break in atonce and transmit the message.

IMMEDIATE message—The station may break inat once and pass the message. The station may make apreliminary call before transmitting the message, ifnecessary. On a directed net, the station must obtaincontrol approval before transmitting the message.

PRIORITY message—The station should use thesame procedure as for IMMEDIATE, except that onlylong ROUTINE messages should be interrupted.

both. For example, Polk receives the followingtransmission from Key:

2-20

Page 57: Information Systems Technician Training Series material/NAVEDTRA-14226.pdfInformation Systems Technician Training Series Module 5—Communications Center Operations NAVEDTRA 14226

cease transmissions immediately. Silence must be

“FLASH, FLASH, FLASH, POLK, THIS IS Key,FLASH, OVER.”

. . . . ”

You should be aware that the break-in procedure isnot to be used during the transmission of a tacticalmessage except to report an enemy contact. Theprecedence of the message spoken three times means to

maintained until the station breaking in has passed themessage. In the following example, assume thatTecumseh is transmitting a message to Kamehameha ona free net and Key has a FLASH message for Polk. Keybreaks in with the following transmission:

Polk replies:

“THIS IS Polk, ROGER, OVER.”

Key then proceeds with the FLASH traffic and obtains aproper ROGER, thus freeing the net for furthertransmissions. After hearing “ROGER,” Kamehameharecontacts Tecumseh for the remainder of the traffic thatwas being sent before the break-in:

“Tecumseh, THIS IS Kamehameha, ALL AFTER

On a directed net, the station wishing to break in wouldfirst obtain permission from net control. For example,referring to figure 2-1, assume that Vallejo i stransmitting a message to Kamehameha and Polk hasFLASH traffic for Tecumseh. Polk notifies Key (netcontrol):

FLASH For Tecumseh, OVER.”

Key then answers:

“Polk, THIS IS Key, Send Your FLASH, OVER.”

Upon hearing the authorization, Tecumseh transmits:

“THIS IS Tecumseh, OVER.”

Polk proceeds:

“Tecumseh, THIS IS Polk, FLASH (sendsmessage), OVER.”

The preceding transmission would conclude afterPolk had received a proper ROGER for the FLASHtraffic. The two stations that were broken (Vallejo andKamehameha) would reestablish communicationsusing proper R/T procedures.

EMERGENCY SILENCE

Emergency silence may be imposed on an R/T netonly by competent authority. If an authentication

system is in effect, a station must always authenticate atransmission that:

Imposes emergency silence;

Lifts emergency silence; and

Calls stations during periods of emergencysilence. When emergency silence is imposed, noreceipt or answer for such transmissions isrequired.

To impose emergency silence, the NECOS speaksthe proword SILENCE three times. For example, referto figure 2-1 and assume that Key (net control) wasauthorized to impose emergency silence. Key wouldtransmit:

“Poseidon, THIS IS Key, SILENCE, SILENCE,SILENCE, TIME One Four Four Zero Zulu, OUT.”

To impose emergency silence on a particularfrequency but not on all frequencies used in the net, Keywould use the proword SILENCE (spoken three times),followed by a frequency or the frequency designator tobe silenced. SILENCE (spoken three times), followed

immediately on all nets. All transmissions end with theproword OUT.

To lift emergency silence, Key would send thefollowing transmission:

“Poseidon, THIS IS Key, SILENCE LIFTED,TIME One Five One Zero Zulu, OUT.”

EXECUTIVE METHOD FORRADIOTELEPHONE

by the words “all nets,”means to cease transmissions

“FLASH, FLASH, FLASH, Key, THIS IS Polk.”

maneuvers. Abbreviated plaindress format is normally

The Executive Method for R/T is used to execute atactical message at a given instant. This method is usedto ensure that two or more units make simultaneous

used for Executive Method messages. These messagesnever have a time group included in the messageending. There are two variations of the ExecutiveMethod: delayed and immediate.

DELAYED EXECUTIVE METHOD

A tactical message sent by the Delayed ExecutiveMethod must carry the warning proword EXECUTIVETO FOLLOW in the message instructions immediatelypreceding the text. The executive signal is sent later inthe form of “standby—EXECUTE,” the latter wordbeing the instant of execution. For example, referring to

2-21

Page 58: Information Systems Technician Training Series material/NAVEDTRA-14226.pdfInformation Systems Technician Training Series Module 5—Communications Center Operations NAVEDTRA 14226

figure 2-1, assume that Key sends the followingmessage by the Delayed Executive Method to thecollective call Poseidon:

“Poseidon, THIS IS Key, EXECUTE TOFOLLOW, Fire One Water Slug, OVER.”

All stations respond in alphabetical order of full callsigns:

“THIS IS Kamehameha, ROGER, OUT.”

“THIS IS Polk, ROGER, OUT.”

“THIS IS Tecumseh, ROGER, OUT.”

“THIS IS Vallejo, ROGER, OUT.”

When ready to execute, Key transmits:

“Poseidon, THIS IS Key, Standby, EXECUTE,OVER.”

The stations then respond in alphabetical order of fullcall signs with:

“THIS IS (station), ROGER, OUT.”

If communications conditions are good, Key candesignate only one station to receipt for everyone toensure that the transmission is heard. As part of theexecute signal, Key could have transmitted:

“Poseidon, THIS IS Key, Standby, EXECUTE,Polk, OVER.”

Polk would then ROGER with:

“THIS IS Polk, ROGER, OUT.”

When considerable time has elapsed between theEXECUTE TO FOLLOW message and the actualexecution message, the text to be executed should berepeated prior to the words “Standby—EXECUTE.”The text should also be repeated when it is only aportion of a message or one of several outstanding

Times of opening and closing by individualstations;

Causes of any delays on the circuit;

Frequency adjustments and changes;

Unusual occurrences, such as procedural andsecurity violations; and

“EXECUTE TO FOLLOW” messages.Changing of the watch.

IMMEDIATE EXECUTIVE METHOD

In cases of urgency, the execute signal may betransmitted in the final instructions element of themessage to which it refers. The use of the ImmediateExecutive Method does not allow stations to obtainverifications, repetitions, acknowledgments, orcancellations before the message is executed. Thesemessages should be in plain language or limited to basicTURN, CORPEN, and SPEED signals.

The Immediate Executive Method uses the warningproword IMMEDIATE EXECUTE in the message

instructions instead of the proword EXECUTE TOFOLLOW. The text of the signal is transmitted twice,separated by the proword I SAY AGAIN. The executesignal is transmitted in the final instructions. Forexample:

“Poseidon, THIS IS Key, IMMEDIATEEXECUTIVE, BREAK, Shift Your Rudder, I SAYAGAIN, Shift Your Rudder, STANDBY,EXECUTE, Polk, Vallejo, OVER.”

Notice that Key includes both Polk and Vallejo asROGER addressees. Again, this is done to ensure thatthe transmission is received by everyone involved,provided communications are good. However, ifcommunications are bad, all stations in the net mustROGER the execution. Upon hearing their calls, Polkand Vallejo would answer:

“Key, THIS IS Polk, ROGER, OUT”

“Key, THIS IS Vallejo, ROGER, OUT.”

RADIOTELEPHONE CIRCUITLOGS

R/T circuit logs must be maintained on all R/T netsor circuits unless otherwise directed. The circuit logshows a complete and continuous record of alltransmitted and received traffic, as well as the operatingcondition on that radio day. Circuit logs contain thefollowing information:

NTP 5 contains the complete list of data required in anR/T circuit log.

When operating conditions permit and when thereare no instructions to the contrary, an operator shouldrecord every transmission heard, regardless of thesource or completeness. This rule applies to all tactical,command, and reporting nets. On other nets, a modifiedlog may be kept.

Some nets may require only a modified log forready reference. However, on nets or circuits thatrequire complete logs, automatic recording devices

2-22

Page 59: Information Systems Technician Training Series material/NAVEDTRA-14226.pdfInformation Systems Technician Training Series Module 5—Communications Center Operations NAVEDTRA 14226

should be used to ensure a total record. Time should beautomatically or manually recorded at intervals not toexceed 5 minutes.

When a message is addressed to or is to be relayedby the receiving station, the message must be written infull on a message blank. Only details needed to identifythe message are inserted in the radio log. If the messagedoes not need to be recorded in full on a message blank,the transmission should be recorded as completely asfeasible in the circuit log.

When opening a new circuit or starting a log for anew day, the operator writes or types in his or her nameand rank/rate or grade in full. Upon being relieved orclosing the circuit, the operator must sign the log. Theoncoming operator then writes or types his or her nameand rank/rate or grade in full in the log. perform their duties. They are responsible for

Log entries are never erased. Any necessarychanges are made by drawing a neat single line throughthe original entry and indicating the changed version

adjacent to the lined out entry. When using thetypewriter, the operator may use the slant key to deleteerroneous entries. All changes must be initialed by theoperator making the change.

SUMMARY

Circuit discipline is achieved through the properuse of radio equipment, adherence to prescribedfrequencies and operating procedures, proper training,and monitoring. The lack of circuit discipline, as well asbasic negligence, inaccuracy, and laxity, is responsiblefor violations that endanger the integrity and security ofR/T transmissions.

It is essential that operators be well trained in propercommunications voice procedures to competently

maintaining circuit discipline at all times. Reliability,security, and speed of communications are reducedwhen operators don’t follow prescribed procedures.

2-23

Page 60: Information Systems Technician Training Series material/NAVEDTRA-14226.pdfInformation Systems Technician Training Series Module 5—Communications Center Operations NAVEDTRA 14226
Page 61: Information Systems Technician Training Series material/NAVEDTRA-14226.pdfInformation Systems Technician Training Series Module 5—Communications Center Operations NAVEDTRA 14226

CHAPTER 3

EMISSION CONTROL

Upon completing this chapter, you should be able to do the following

Identify EMCON and the procedures, including criteria, objectives,notification, and authority to set EMCON conditions both at sea and ashore.

Identify the procedures, including criteria and actuation of HEROconditions.

Identify alternate methods of communication during HERO and EMCONconditions, including electronic systems UHF AUTOCAT, SATCAT, andMIDDLEMAN and non-electronic relay systems PIGEON POST and BEANBAG.

Emission control (EMCON) is the management ofelectromagnetic and acoustic emissions. EMCON isused to prevent an enemy from detecting, identifying,and locating friendly forces. It is also used to minimizeelectromagnetic interference among friendly systems.EMCON is normally imposed by the electronic warfarecoordinator (EWC) to control all electromagneticradiations. Once EMCON is imposed, general orspecific restrictions may be added to the EMCON order,depending on the operational, intelligence, or technicalfactors for the area affected.

For radiomen, EMCON usually means either fullradio silence or HF EMCON. The most securecommunications methods during EMCON reduce, butdo not eliminate, the possibility of identification. It isassumed that any electromagnetic radiation will beimmediately detected and the position of thetransmitting ship will be fixed by an enemy. You willfind detailed information on the implementation ofEMCON and its degree of adjustment in FleetCommunications, NTP 4, and Electronic WarfareCoordination, NWP 10140 (NWP 3-51.1).

SETTING EMCON CONDITIONS

Setting EMCON requires four basic steps: criteria,objectives, notification, and authority. Details of thesesteps are found in the above listed publications. Basicrequirements are listed below.

CRITERIA

To react to EMCON changes, each ship will preparean EMCON bill that provides for implementing theEMCON condition in effect by:

Outl ining planning considerat ions forestablishing the appropriate shipboard emitterstatus

Assigning specific duties and responsibilities topersonnel who control electromagnetic oracoustic emitters

Establishing an EMCON control center withoverall responsibility for shipboard emitterradiation status

Designating intermediate control stations asrequired through which specific equipment iscontrolled

Designating individual responsibility for eachshipboard emitter

Providing procedures for intraship reporting,verification (check off) of emitter status, andmonitoring of own ship’s emitter status.

OBJECTIVES

The objectives of EMCON are to deny the enemyany way that it may locate your position, to support the

3-1

Page 62: Information Systems Technician Training Series material/NAVEDTRA-14226.pdfInformation Systems Technician Training Series Module 5—Communications Center Operations NAVEDTRA 14226

efforts to disrupt the enemy’s electiveness, and to allowyour actions to go unnoticed. To accomplish theseobjectives, EMCON conditions are designed with thefollowing guidelines:

Minimize detection by enemy sensors

Allow effective friendly command and control(C2)

Support operations security (OPSEC)

Support operational deception (OPDEC)

Minimize interference among friendly systems

Degrade effectiveness of enemy C2

NOTIFICATION

All ships need to keep command and controlinformed of any actions that may restrict, change, oralter in any way communication functions. The mostfundamental of these actions follow:

If at all possible, ships should notify the shorestation of scheduled periods of EMCON due toradiation restr ict ions (HERO, HERF,RADHAZ) or other events (man aloft, aircraftoperations, etc.) prior to the actual restrictiveperiod.

If EMCON is imposed without notice, relayprocedures to deliver outgoing traffic may beattempted. Shore stations must be alert to thesudden, unscheduled imposition of EMCON andthe accompanying lack of any transmission fromthe ship.

Guidance for each EMCON condition must beposted at each stat ion or space withresponsibility for setting or monitoring a givenEMCON condition for the emitters.

If the ship should enter EMCON without priornotice, the shore station will keep a listeningmonitor on the ship’s frequencies until the shipreturns to the air. Additionally, a listening watchwill be kept on the HICOM (covered anduncovered) net for possible contact from theship.

Once a ship with a multichannel (VFCT)termination has returned to the air on previouslyassigned frequencies, the orderwire will berestored before the traffic circuits. If the ship

3-2

maintains a single channel (FSK) termination,the circuit will be reestablished via the technicalcontrol center.

AUTHORITY TO IMPOSE EMCON

EMCON is imposed as directed by the task group,squadron, or local instructions and standard operationsprocedures.

HAZARDS OF ELECTROMAGNETICRADIATION TO ORDNANCE

(HERO)

A danger of RF radiation is the risk of prematurefiring of ordnance or explosion of their warheads duringloading and offloading operations. The hazard toelectronic explosive devices (EEDs) occurs because ofthe heat generated by a current passing through thesensitive wires surrounding a temperature-sensitiveexplosive. If energy is dissipated into the wires, currentwill flow, the explosive will become hot, and anexplosion can result.

CRITERIA

When ordnance or their warheads are loaded,unloaded, or transferred, shipboard HERO conditionsmay sometimes prohibit the transmission of RFfrequency energy below 30 MHz. To maintaincommunication when HERO conditions are in effect,you will be required to use other frequencies orcommunication methods.

ACTUATION

Transmitters and their antennas have only onepurpose, which is to radiate electromagnetic energy.The initiating elements of ordnance items need only tobe supplied with the proper amount of energy for anexplosion to take place. RF energy may enter a weaponthrough a hole or crack in the skin of the weapon. RFenergy may also be conducted into the weapon by thefiring leads or other wires that penetrate the weaponenclosure.

The probability of unintentional EED actuation isnot totally predictable since detonation depends uponsuch variables as frequency, field strength, andenvironment. In general, ordnance systems that haveproven to be susceptible to RF energy are mostsusceptible during loading, unloading, and handling inRF electromagnetic fields.

Page 63: Information Systems Technician Training Series material/NAVEDTRA-14226.pdfInformation Systems Technician Training Series Module 5—Communications Center Operations NAVEDTRA 14226

ALTERNATE METHODS

There will be times when you are unsure of theexact frequency of the active ordnance. In thesecircumstances you will be required to use alternatemethods for communications. The alternate methods ofrelaying communications during HERO conditionsinclude both electrical and nonelectrical relay systems.

Electrical

To provide an uninterrupted flow of essentialcommunications without violating HERO and EMCONlimitations, techniques called AUTOCAT, SATCAT,and MIDDLEMAN were developed. These techniquesextend the range of relay procedures using amplitudemodulation UHF transmission via HF or satellite. InAUTOCAT, a ship provides the method forautomatically relaying UHF transmissions; inSATCAT, an airborne platform provides the method. InMIDDLEMAN, the objective is obtained; however, themethod requires an operator to copy the message withsubsequent manual retransmission.

AUTOCAT, SATCAT and MIDDLEMAN usethree different types of circuit configurations forreception and relay of UHF transmissions. Thesecircuits are:

A voice circuit where some units send andreceive on one frequency, and other units sendand receive on any other frequency;

A voice circuit where all units transmit on onefrequency and receive on another frequency;

A RATT circuit where all units transmit on one

frequency and receive on another frequency.

Non-Electronic Relay Systems

There are two additional message relay systems.

These systems, which utilize non-electronic relay

systems, are PIGEON POST and BEAN BAG.

l

l

PIGEON POST provides a method of traffic

delivery to shore by aircraft;

BEAN BAG provides a method for small ships

to deliver message traffic via helo to shore or to a

unit that is terminated full period for further

transmission.

SUMMARY

EMCON is one of those facets of security that is

required to properly perform your duties within general

security guidelines. You must perform your duties in

such a manner as to protect the integrity and overallvalue of secure communications.

We have discussed a number of differing types of

communications, but have not covered procedures indetail. Use of local instructions, Task Force/Group

battle orders, or other methods of relaying

communications is required.

3-3

Page 64: Information Systems Technician Training Series material/NAVEDTRA-14226.pdfInformation Systems Technician Training Series Module 5—Communications Center Operations NAVEDTRA 14226
Page 65: Information Systems Technician Training Series material/NAVEDTRA-14226.pdfInformation Systems Technician Training Series Module 5—Communications Center Operations NAVEDTRA 14226

CHAPTER 4

CRYPTOSECURITY

Upon completing this chapter, you should be able to do the following:

Identify the procedures, methods, and steps for the destruction of Secret andbelow material.

Identify the procedures used for the verification of destruction records ofSecret and below material.

Identify the procedures for receipt, inspection, inventory, control,destruction, and verification of destruction of SPECAT or Top Secret andabove material.

Identify the procedures for receipt, inspection, inventory, control,destruction, and verification of destruction of COMSEC material.

Identify the procedures used when submitting required CMS reports to theCMS custodian.

In this chapter we will address both generalclassified material and COMSEC material that dealswith cryptosecurity in broad terms. The COMSECportion is written from the perspective of the localholder’s, local holder alternate’s, and user’sresponsibilities.

Personne l Secur i t y Program Regu la t ions

As a Radioman, you will be required to handlemany different types of material. You must know thecorrect procedures for receiving, inventorying,destroying, and providing all required documentationfor this material.

General classified material usually is consideredclassified messages, publications, and instructions.COMSEC material is material used to protect U.S.Government transmission, communications, and theprocessing of classified and sensitive unclassifiedinformation. This is related to national securityprotection from unauthorized persons and materiala l lowing fo r the au then t i c i ty o f a l l suchcommunications.

The protection of vital and sensitive informationmoving over government communications systems iscrucial to the effective conduct of the government andspecifically to the planning and execution of militaryoperations. For amplifying information on the handlingof classified material, consult Information and

(OPNAVINST 5510. 1). For COMSEC material, referto Communications Security Material System (CMS)Policy and Procedures Manual, CMS 1.

SECRET AND BELOW MATERIALDESTRUCTION

Classified material that is no longer required shouldnot be allowed to accumulate. Superseded and obsoleteclassified materials that have served their purposeshould be destroyed in accordance with CMS 1 andlocal requirements.

The following information is presented not with theintent to give complete instructions or requirements; butrather as an overview of basic methods.

METHODS OF DESTRUCTION

Routine destruction of Secret and below materialmay be accomplished by burning, pulping, pulverizing,or shredding. Every command has a locally produceddestruction SOP; this SOP will detail the specificrequirements for your duty station.

4-1

Page 66: Information Systems Technician Training Series material/NAVEDTRA-14226.pdfInformation Systems Technician Training Series Module 5—Communications Center Operations NAVEDTRA 14226

DESTRUCTION INVENTORY

Secret material will be destroyed following the two-person rule without a record of destruction. If only oneperson destroys Secret material, a record of destructionmust be made.

When destroying Confidential material, personnelmust have a clearance level equal to or greater than thematerial. No record of destruction is required.

The commanding officer may impose additionalcontrols at his or her discretion.

COMPLETE DESTRUCTION REPORTS

Destruction reports will be made in accordancewith OPNAVINST 5510.1 and local instructions.

VERIFY DESTRUCTION RECORDS

To verify destruction records, the senior person willensure that the material has been completely destroyedand only residue remains. All blanks are filled incorrectly on the destruction report (if one is required),and it is turned into the proper authority.

SPECAT OR TOP SECRET AND ABOVEMATERIALS

Classified material that is of a more sensitive naturerequires more “eyes-on” and “paper-trail” procedures.These materials must be provided control andaccounting that relates to their assigned classification.This will limit the dissemination, reproduction, andviewing by personnel who, in the course of their duties,require access.

RECEIVE

SPECAT or Top Secret will normally be handled atthe E-6 and above level. If receipt of this material is arecurring event at the command, follow the guidelinesin OPNAVINST 5510.1, and local instructions.

INSPECT

Upon receipt of SPECAT, TOP Secret, or abovematerial, ensure that all receipts and material areidentified and verified prior to acceptance of thematerial.

Material will be logged in the Top Secret log andplaced in the appropriate safe.

CONTROL

Access to SPECAT, Top Secret, or above materialwill be closely guarded on a need-to-know basis. Allmaterial must be accounted for by signature.

DESTROY

Top Secret material will be destroyed by twowitnessing officials. Those performing the destructionmust have a clearance level equal to or greater than thematerial being destroyed.

Destruction of SPECAT and Top Secret and abovematerial was covered in depth in module 1.

VERIFY DESTRUCTION

For information and procedures relating toverifying the destruction of SPECAT and Top Secretorabove material, refer to OPNAVINST 5510.1 and localinstructions.

COMSEC MATERLAL

Communications security (COMSEC) is aframework that allows the NAVY a unique distributionsystem that takes into account strict accountability andcontrol procedures. The requirements for this systemare exacting to ensure proper use of the cryptosystemsin all areas.

RECEIVE

To receive material into local custody is to acceptthe responsibility for the proper handling, safeguarding,accounting, and disposition of COMSEC materialissued by the custodian and user personnel. Everyperson who receives COMSEC material must completea CMS Responsibility Acknowledgement Form, whichis located in Annex K of CMS 1. This signed form mustbe on file with the CMS Custodian.

INSPECT

Local holders (LHs) will inspect the material that isissued for their use. They should verify that all materiallisted on the SF-153 is physically accounted for, checkthat all short titles and accounting numbers match, and

4-2

Page 67: Information Systems Technician Training Series material/NAVEDTRA-14226.pdfInformation Systems Technician Training Series Module 5—Communications Center Operations NAVEDTRA 14226

have any questions for use or storage answered prior toacceptance of the material.

INVENTORY

LH custodians must main a local custody filecontaining effective signed local custody documents.These will list all material in their possession. A watchstation must maintain a watch-to-watch inventory thatlists all COMSEC material held. This material is to belisted by short title, edition, accounting numbers, andquantity.

CONTROL

Watch-to-watch inventory is used to maintaincontrol of effective material and material to be used inthe future. Effective and supersession dates for allCOMSEC material (less equipment and relatedcomponents and devices) that the watch holds musthave clearly marked dates in accordance with Article760 of CMS 1.

DESTROY

Destruction of superseded material must beaccurately documented and conducted within therequired time frame. Article 790 of CMS 1 containsdestruction procedures, and chapter 5 delineatespersonnel, methods, and time periods for destroyingCOMSEC material.

VERIFY DESTRUCTION

Refer to CMS 1 and local instructions forprocedures to verify destruction of all COMSECmaterials.

REQUIRED CMS REPORTSSUBMITTED TO CMS

CUSTODIAN

CMS reports to the CMS Custodian normallyinclude destruction reports and SF-153’s that containmaterial that is to be returned to the CMS Custodian.

Further information on reports that the CMSCustodian may require are found in detail in CMS 1 andits various annexes.

SUMMARY

Security precautions will protect the integrity of thesystems that are in place as long as you, as the radioman,understand and carry out the correct methods forhandling, inventorying and destruction of requiredc lass i f i ed o r COMSEC mate r ia l . Secur i tyconsiderations presented in this chapter will notguarantee protection, nor do that try to cover all

familiarize yourself with all requirements at thecommand or area that you are working in.

required areas. You will have to research and

4-3

Page 68: Information Systems Technician Training Series material/NAVEDTRA-14226.pdfInformation Systems Technician Training Series Module 5—Communications Center Operations NAVEDTRA 14226
Page 69: Information Systems Technician Training Series material/NAVEDTRA-14226.pdfInformation Systems Technician Training Series Module 5—Communications Center Operations NAVEDTRA 14226

APPENDIX I

GLOSSARY

A F

AUTHENTICATION— A security measure designedto protect a communications or command systemagainst fraudulent transmissions or simulation.

A U T O M A T I C D I G I T A L N E T W O R K( A U T O D I N ) — A worldwide automaticcommunications system that provides automaticdata service.

B L

BEADWINDOW— A term describing a real-timeprocedure used to alert circuit operators that anunauthorized disclosure has occurred.

C

CARRIER— the unmodulated signal originallyproduced in the oscillator section of a transmitter.

CONFIDENTIAL— Information the unauthorizeddisclosure of which could reasonably be expectedto cause damage to the national security.

CRYPTOSYSTEM— Information encompassing allthe associated items of cryptomaterial that are usedtogether to provide a single means of encryption ordecryption.

D

DEFENSE SWITCHED NETWORK (DSN)— Anonsecure telecommunicat ions telephoneinterconnected network among military and othergovernment installations (formerly AUTOVON).

DIRECTED NET— A net in which member stationsmust obtain permission from the net control station(NECOS) prior to communicating with otherstations on the net.

E

EMISSION CONTROL (EMCON)— General orspecific restrictions placed on electromagneticradiations for a particular area or areas.

FREE NET— A communications net of which memberstations need not obtain permission of the netcontrol station (NECOS) to transmit.

G

GATEGUARD— A security subsystem that allowscommands to interface directly with the AUTODINsystem as part of the NSTA program.

LOCAL HOLDER— A command or activity whoseCOMSEC material needs are met by drawing thematerial from a single CMS account.

M

MANUAL RELAY CENTER MODERNIZATIONPROGRAM (MARCEMP)— An automationsupport system for all aspects of HF message relayoperation in the Fleet Center.

P

PROSIGNS— Letters, or combinations of letters, thatconvey frequently sent orders or instructions in asimple, standard format.

PROWORDS— The phonetic equivalent of prosigns.

S

SECRET— Information the unauthorized disclosure ofwhich could reasonably be expected to causeserious damage to the national security.

S E C U R E T E L E P H O N E U N I T T H I R DGENERATION (STU-III)— Desktop phone unitthat provides users with both clear and secure voiceand data transmissions.

SEED KEY— Special keying material used for theinitial electronic set-up of the STU-III terminal.

SERVICE MESSAGE— A short, concise messagebetween communication personnel requiringprompt attention.

AI-1

Page 70: Information Systems Technician Training Series material/NAVEDTRA-14226.pdfInformation Systems Technician Training Series Module 5—Communications Center Operations NAVEDTRA 14226
Page 71: Information Systems Technician Training Series material/NAVEDTRA-14226.pdfInformation Systems Technician Training Series Module 5—Communications Center Operations NAVEDTRA 14226

APPENDIX II

GLOSSARY OF ACRONYMS ANDABBREVIATIONS

A

AGT— AUTODIN Gateway Terminal

AIG— Address indicating groups

AIS— Automated Information System

AIT— AUTODIN Interface Terminal

ASC— AUTODIN Switching Center

AST— AUTODIN Subscriber Terminal

AUTODIN— Automatic Digital Network

AUTOVON— Automatic Voice Network

B

BIU— BUS interface unit

C

C2— Command and control

CAI— Communication Action Identifier

CDPS— Communication Data Processing System

CIC— Combat Information Center; Content IndicatorCode

CIK— Crypto-ignition key

CIN— Component identification number

CMS— Communications Security Material System

COMSEC— Communications security

COMNAVCOMTELCOM— Commander, NavalComputer and Telecommunications Command

CUDIXS— Common User Digital InformationExchange System

CSN— Channel service number

D

DCS— Defense Communications System

DSN— Defense Switched Network

E

EDPE— Electronic data processing equipments

EEFI— Essential Elements of Friendly Information

EMCON— Emission control

EOM— End of message

EWC— Electronic warfare coordinator

F

FIFO— First-in-first-out

FLTSATCOM— Fleet Satellite Communications

G

GD— Guard device

GMT— Greenwich mean time

H

HARPS— Hybrid AUTODIN Red Patch Service

HERO— Hazards of Electromagnetic Radiation toOrdnance

I

I/O— Input and output

K

KMC— Key Management Center

L

LDMX— Local Digital Message Exchange

LH— Local Holder

M

MAN— Message accountability number

MARCEMP— Manual Relay Center ModernizationProgram

MLPP— Multilevel precedence and preemption

AII-1

Page 72: Information Systems Technician Training Series material/NAVEDTRA-14226.pdfInformation Systems Technician Training Series Module 5—Communications Center Operations NAVEDTRA 14226

MSL— Master Station Log

MS/DOS— Microsoft® Disk Operating System

MTTS— Magnetic tape terminal station

R

N

NAVCOMPARS— Naval CommunicationsProcessing and Routing System

N A V M A C S — Nava l Modula r Automated

Communications System

NCS— Net Control Station

NECOS— Net Control Station

NST— Navy Standard Teleprinter

NSTA— Navy Standard Teleprinter Ashore

NTC— Naval Telecommunications Center

OT

RAM— Random-access memory

RI— Routing indicator

RIXT— Remote Information Exchange Terminals

R/T— Radiotelephone

S

SID— Subscriber identification

SOPA— Senior officer present afloat

SSIXS— Submarine Satellite Information ExchangeSubsystem

SSN— Station serial number

STU-III— Secure Telephone Unit Third Generation

SUSDUPE— Suspected duplicate

OAS— Office automation system

OPDEC— Operational deception

OPSEC— Operational security

OTAR— Over-the-air Rekey

OTAT— Over-the-air Transfer

P

PCMT— Personal Computer Message Terminal

PLA— Plain language address

TCC— Telecommunications Center

V

(V)— Version (e.g., (V)5...fifth version)

VDT— Video display terminal

W

WWMCCS— Worldwide Military Command andControl System

AII-2

Page 73: Information Systems Technician Training Series material/NAVEDTRA-14226.pdfInformation Systems Technician Training Series Module 5—Communications Center Operations NAVEDTRA 14226

APPENDIX III

REFERENCES USED TO DEVELOPTHE TRAMAN

Automatic Digital Network (AUTODIN) Operating Procedures, JANAP 128(J),Joint Chiefs of Staff, Washington, D.C., July 1993.

Basic Operational Communications Doctrine (U), NWP4(B) (NWP 6-01), Chief ofNaval Operations, Washington, D.C., September 1989.

Call Sign Book for Ships, ACP 113(AC), Joint Chiefs of Staff, Washington, D.C.,April 1986.

Communication Instructions—General (U), ACP 121(F), Joint Chiefs of Staff,Washington, D.C., April 1983.

Communications Instructions—Security (U), ACP 122, Joint Chiefs of Staff,Washington, D.C., 1981.

Communications Instructions—Tape Relay Procedures, ACP 127(G), Joint Chiefsof Staff, Washington, D.C., November 1988.

Communications Instructions—Tape Relay Procedures, ACP 127 US SUPP-1(H),Joint Chiefs of Staff, Washington, D.C., May 1984.

Communications Instructions—Teletypewriter (Teleprinter) Procedures, ACP126(C), Joint Chiefs of Staff, Washington, D.C., May 1989.

Communications Security Material System (CMS) Policy and Procedures Manual,CMS 1, Department of the Navy, Washington, D.C., March 1993.

Department of the Navy Information and Personnel Security Program Regulation,OPNAVINST 5510.1H, Chief of Naval Operations, Washington, D.C., May1991

Fleet Communications (U), NTP 4(C), Commander, Naval TelecommunicationsCommand, Washington, D.C., June 1988.

Joint Voice Call Sign Book, JANAP 119, Joint Chiefs of Staff, Washington, D.C.,January 1984.

Radiotelephone Procedure, ACP 125(E), Joint Chiefs of Staff, Washington, D.C.,August 1987.

Secure Telephone Unit Third Generation (STU-III) Comsec Material ManagementManual (CMS6), Communications Security Material System, Washington,D.C., October 1990.

AIII-1

Page 74: Information Systems Technician Training Series material/NAVEDTRA-14226.pdfInformation Systems Technician Training Series Module 5—Communications Center Operations NAVEDTRA 14226

Telecommunications Users Manual, NTP 3(I), Commander, NavalTelecommunications Command, Washington, D.C., January 1990.

Voice Communications, NTP 5(B), Naval Telecommunications Command,Washington, D.C., August 1984.

AIII-2

Page 75: Information Systems Technician Training Series material/NAVEDTRA-14226.pdfInformation Systems Technician Training Series Module 5—Communications Center Operations NAVEDTRA 14226

I N D E X

A

AGT, 1-4

AIS, 1-4

AIT, 1-4

ASC, 1-5

ASCII Code, 1-6

Authentication, 1-20

background, 1-20

AUTODIN, 1-2, 1-4

Automatic Switching Center, 1-5

background, 1-5

general teleprinter rules, 1-9

interfaces, 1-5

magnetic tape messages, 1-11

message accountability, 1-12

message formats, 1-11

message header, 1-7

message header programming, 1-6

message lengths, 1-9

misrouted and missent messages, 1-10

operating precautions, 1-11

operating rules, 1-11

operational modes, 1-5

routing indicators, 1-6

security, 1-12

suspected duplicates, 1-10

tape messages, 1-6

tape reel accountability, 1-12

transmission identification, 1-6

B

BEADWINDOW, 2-8

BIUs, 1-2

C

Circuit procedures, 2-1

decimals, dates, and abbreviations, 2-4

discipline, 2-1

operating signals, 2-8

phonetic alphabet, 2-3

phonetic numerals, 2-4

prowords, 2-5

punctuation, 2-4

techniques, 2-2

Circuit setup/restorations, 1-22

activate, 1-22

analyze networks, 1-22

background, 1-22

communications circuits, 1-22

deactivate, 1-22

OTAT/OTAR, 1-22

protocols, 1-22

shift frequencies, 1-22

standby, 1-22

Code and Cipher messages, 1-20

uses, 1-20

Command guard lists, 1-21

Common User Digital Information Exchange System(CUDIXS), 1-15

message accountability, 1-16

subscribers, 1-15

subscriber net cycle, 1-15

system interfaces, 1-16

system performance, 1-16

Communications Center administration, 1-20

circuit backlogs, 1-20

command guard lists, 1-21

communications plan (COMPLAN), 1-21.

INDEX-1

Page 76: Information Systems Technician Training Series material/NAVEDTRA-14226.pdfInformation Systems Technician Training Series Module 5—Communications Center Operations NAVEDTRA 14226

Communications Center administration—Continued

daily call signs, 1-21

master station log, 1-21

Communications Data Processing System (CDPS),

1-16

background, 1-16

equipments, 1-16

Communications Plan (COMPLAN), 1-21

COMNAVCOMTELCOM, 1-3

COMSEC Material, 4-2

control, 4-3

destruction, 4-3

inspect, 4-2

inventory, 4-3

receive, 4-2

reports, 4-3

verification, 4-3

Cryptosecurity, 4-1

background, 4-1

material destruction, 4-1

D

Defense Communications Agency (DCA), 1-5

Defense Communications System (DCS), 1-5

Defense Switched Network (DSN), 1-19

background, 1-19

precedence of calls, 1-19

security, 1-19

E

Electronic data processing equipments (EDPEs), 1-11

Emission control, 3-1

authority to impose, 3-2

background, 3-1

conditions, 3-1

criteria, 3-1

HERO, 3-1

Emission control—Continued

notification, 3-2

objectives, 3-1

Enemy Contact Reporting, 1-19

background, 1-19

types, 1-20

F

Fleet Communications Systems, 1-14

Common User Digital Information ExchangeSystem (CUDIXS), 1-15

Communication Data Processing System (CDPS),1-16

Defense Switched Network (DSN), 1-19

Naval Modular Automated CommunicationsSystem (NAVMACS), 1-14

Secure Telephone Unit Third Generation (STU-III), 1-17

Submarine satellite Information ExchangeSubsystem (SSIXS), 1-16

Fleet Satellite Communications (FLTSATCOM), 1-15

G

GateGuard, 1-4

AGT, 1-4

AIS, 1-4

elements, 1-4

guard device (GD), 1-4

interfaces, 1-4

operation, 1-4

requirements, 1-4

TCC processing, 1-4

H

HERO, 3-2

actuation, 3-2

alternate methods, 3-3

background, 3-2

criteria, 3-2

INDEX-2

Page 77: Information Systems Technician Training Series material/NAVEDTRA-14226.pdfInformation Systems Technician Training Series Module 5—Communications Center Operations NAVEDTRA 14226

HERO—Continued

electrical, 3-3

non-electronic relay systems, 3-3

Hybrid AUTODIN Red Patch Service (HARPS), 1-11

I

ITA #2 Code, 1-6

L

LDMX, 1-13

flexibility, 1-14

high-speed processing, 1-13

secure communications, 1-13

statistical and management reports, 1-14

system reliability, 1-13

M

Magnetic Tape Terminal Stations (MTTSs), 1-11

MARCEMP, 1-3

background, 1-3

interfaces, 1-3

requirements, 1-3

Master Station Log (MSL), 1-21

Material destruction, 4-1

control, 4-2

destruction, 4-2

inspection, 4-2

inventory, 4-2

methods, 4-1

receive, 4-2

reports, 4-2

verification, 4-2

N

NAVCOMPARS, 1-2, 1-13

background, 1-13

services, 1-13

NAVMACS, 1-14

Net control station (NCS), 1-15

Nets, radiotelephone, 2-15

acknowledgement of messages, 2-20

break-in procedures, 2-20

canceling messages, 2-19

communications conditions, 2-18

corrections, 2-18

directed, 2-15

emergency silence, 2-21

establishing communications, 2-16

free, 2-15

opening the net, 2-16

receipt of messages, 2-20

repetitions, 2-19

responsibilities, 2-15

sequence of call signs, 2-17

signal strength and readability, 2-17

verification of messages, 2-20

NSTA, 1-1

O

OAS, 1-4

Operating signals, 2-8

P

PCMT, 1-2

message accountability, 1-2

recall processes, 1-2

requirements, 1-2

Phonetic alphabet, 2-3

Phonetic numerals, 2-4

Plain Language Addresses (PLAs), 1-4

Prowords, 2-5

Q

Quality Control, 1-21

AN/SSQ-88/A/B system, 1-21

INDEX-3

Page 78: Information Systems Technician Training Series material/NAVEDTRA-14226.pdfInformation Systems Technician Training Series Module 5—Communications Center Operations NAVEDTRA 14226

R

Radiotelephone call signs, 2-14

background, 2-14

call signs, ACP 113, 2-14

call signs, harbor circuits, 2-14

call signs, JANAP 119, 2-14

references, 2-14

Radiotelephone circuits, 2-15

administrative, 2-15

logs, 2-23

nets, 2-15

operation, 2-15

tactical, 2-15

Radiotelephone executive methods, 2-21

delayed executive, 2-21

immediate executive, 2-22

Radiotelephone message format, 2-10

format lines, 2-12

Radiotelephone security, 2-8

background, 2-8

BEADWINDOW procedures, 2-8

code words, 2-9

Radiotelephone voice procedures, 2-9

background, 2-9

elements, 2-9

operator responsibilities, 2-9

Relay systems, 3-3

AUTOCAT, 3-3

BEANBAG, 3-3

MIDDLEMAN, 3-3

Relay systems—Continued

PIGEON POST, 3-3

SATCAT, 3-3

Remote Information Exchange Terminals (RIXTs),

1-13

Routing indicators (RIs), 1-4, 1-6

S

Secure Telephone Unit Third Generation (STU-III),

1-17

administration/management, 1-18

background, 1-17

key use, 1-18

secure mode, 1-18

terminal setup, 1-17

Submarine Satellite Information Exchange Subsystem

(SSIXS), 1-16

background, 1-17

uses, 1-17

Suspected Duplicate (SUSDUPE), 1-10

T

TCC, 1-4

V

Voice communications, 2-1

background, 2-1

circuit procedures, 2-1

W

Worldwide Military Command and Control System

(WWMCCS), 1-13

INDEX-4

Page 79: Information Systems Technician Training Series material/NAVEDTRA-14226.pdfInformation Systems Technician Training Series Module 5—Communications Center Operations NAVEDTRA 14226

Assignment Questions

Information: The text pages that you are to study areprovided at the beginning of the assignment questions.

Page 80: Information Systems Technician Training Series material/NAVEDTRA-14226.pdfInformation Systems Technician Training Series Module 5—Communications Center Operations NAVEDTRA 14226
Page 81: Information Systems Technician Training Series material/NAVEDTRA-14226.pdfInformation Systems Technician Training Series Module 5—Communications Center Operations NAVEDTRA 14226

ASSIGNMENT 1

1-23.Textbook Assignment: “Center Operations,” chapter 1, pages 1-1 through

1.2.3.4.

1-1. The PCMT system is thecentral part of what largerNavy communications system?

NSTAMARCEMPIMARSATDSN

1-2. What does the PCMT softwarepackage combine formessage-processing?

1. BIUs and IBM-compatiblePC desktopmicrocomputers

2. PC-compatible desktopmicrocomputers

3. Desktop microcomputersand mainframe computers

4. Mainframe computers andHAVC super computers

1-3. What type ofmessage-processing system isthe PCMT system?

BasicdBaseStore-and-forwardNetwork

1-4. What is the minimum amountof RAM for the PCMTmicroprocessor to have?

1. 1GB2. 2GB3. 760K4. 640K

1-5. When trying to recall amessage from the hard diskon the PCMT system, you canrecall it by its MAN, CIN,or what other factor?

1. DTG2. TOR3. CSN4. TOT

1-6. The PCMT outputs its messagetraffic for the user to whatdevice?

1. Hard drive2. Diskette3. CD - ROM4. CD

1-7. Which of the followingsystems replaced NAVCOMPARS?

1. NSTA2. DSN3. INMARSAT4. MARCEMP

1-8. What is the maximum numberof send and receive channelsthat can be handledsimultaneously usingMARCEMP?

1. 12 send/24 receive2. 24 send/12 send3. 12 send/12 receive4. 24 send/24 receive

1.2.3.4.

1

Page 82: Information Systems Technician Training Series material/NAVEDTRA-14226.pdfInformation Systems Technician Training Series Module 5—Communications Center Operations NAVEDTRA 14226

1-9. Approximately what maximumnumber of narrative oroperator-to-operatormessages are processed dailyon MARCEMP?

1. 1,5002. 2,8003. 3,5004. 4,000

1-10. What does the GateGuardsubsystem provide for theuser?

1. A path to AUTODIN2. A secure access to the

Internet3. A means to send message

traffic to thecommunications center

4. A user friendly terminalin which to communicatewith the computer

1-11. What are the three elementsof the GateGuard System?

1. AIT, OAS, and TCC2. AGT, GD, and AIT3. AGT, AIS, and GD4. TCC, OAS, and GD

1-12. Besides serving as a gatewayto AUTODIN, GateGuard haswhich of the followingfunctions?

1. Speeds processing time2. Removes interference

from the communicationscenter

3. Allows use of allnetworks

4. Serves as security guarddevice

the GD?

1. AST, AGT, then to GD2. AGT, ASR, then to the

firewall3. AST to GD4. AGT, AST, then to GD

What does the AST provide tothe AGT?

Long-term storageLong-term archivestorageTemporary storageStore and forward

Who manages the AUTODINsystem?

2

1-13.

1-14.

1-15.

1-16.

1-17.

1-18.

What is the path usingGateGuard from the AST to

1.2.

3.4.

1. NSA2. CNCTC3. DCA4. DCS

What is the “backbone” ofthe AUTODIN system?

1. TCC2. RCS3. DCA4. ASC

What is the total number ofAUTODIN operational modes?

1. 72. 63. 54. 4

Which mode is used withunidirectional operationonly?

I2. II3. III4. IV

1.

Page 83: Information Systems Technician Training Series material/NAVEDTRA-14226.pdfInformation Systems Technician Training Series Module 5—Communications Center Operations NAVEDTRA 14226

1-19. What are two types of I/Ocoded languages?

1.2.3.

ASCII and HollerithASCII and ITA #2ITA #2 and HollerithFive level tape and cardpunch

4.

1-20. Routing indicators have whatminimum number of letters?

1. Seven2. Six3. Five4. Four

1-21. In a routing indicator whatdoes the third letteridentify?

1.2.

International allianceGeographical areaDesignate relayTributary station

3.4.

1-22. During transmission of amessage, what is the symbolZCZC used for?

1. Signifies the start ofthe message

2. Starts the routingindicator series

3. The station designator4. Geographical area for

the final processingstation

1-23. What precedence of messagetraffic will (a) preempt allother traffic, and (b) whatis its position in themessage header?

1-24. In the classificationposition of a message, theletter “A” represents whatclassification or specialhandling instruction?

1. Top Secret2. Secret3. SPECAT4. Confidential

1-25. In positions 5 through 8, aCAI of ZYVW tells theoperator that this is whattype of message?

1. EAM2. Service3. Information4. Pass-through

1-26. At a tributary station theTOF and TAD are used forwhat reason?

1. Determinemessage-processing times

2. Calculate delivery timesonly

3. Calculate delivery andsource times

4. Determine messagereceipt times

1-27. What types of messages of upto 100 lines can be sentwithout paging the text?

1. NAVAIR and NOTAMs2. HYDROLANT and HYDROPAC3. Statistical and

meteorologicalData image and tributary4.

1. (a) Yankee (b) 12. (a) Yankee (b) 33. (a) Immediate

(a) ECP(b) 1

4. (b) 2

3

Page 84: Information Systems Technician Training Series material/NAVEDTRA-14226.pdfInformation Systems Technician Training Series Module 5—Communications Center Operations NAVEDTRA 14226

are not sure, you should

1-28. When a message may have beentransmitted before, but you

forward the message withwhat marking in the header?

1. RETRANS2. SUSDUPE3. EDPE4. MTTS

1-29. When, if ever, will astation usually notice thata message has been missentto the command?

1.

2.3.4.

Upon its arrival at thecommandAt the ASC switchAt the TCCNever

1-30. How do you as an operatoridentify a misroutedmessage?

1. It has one or moreincorrect PLAs

2. It has no routinginstructions

3. It has no securitycoding

4. It contains incorrectrouting instructions

1-31. In which of the followingtypes of tapes are you NOTpermitted to have splices?

1. History2. Backup3. Data pattern4. Traffic

1-32.

1-33.

1-34.

1-35.

If a message has mismatchedsecurity classifications ina single-address message,what action will the ASCtake?

1. Drop to the serviceclerk at the ASC

2. Correct the mismatch3. Reject the message back

to the originator only4. Reject the message and

alert the originatingterminal

What version is consideredthe most sophisticated ofall the NAVMACS systems?

1. V12. V1-MPD3. V34. (V)5/(V)5A

For Navy use, NAVMACS isbased on which of thefollowing factors?

1 . Security2 . Needs of the individual

ships or commands3 . Fleet communications

area wide requirements4 . Software and hardware

considerations

In the system designatedNAVMACS (V)2-MPD, what doesMPD stand for?

1.2.

3.

4.

Modified video displaysMilitary visualdeploymentsMulti-facet variabledisplaysMulti-functional digitaldownload

4

Page 85: Information Systems Technician Training Series material/NAVEDTRA-14226.pdfInformation Systems Technician Training Series Module 5—Communications Center Operations NAVEDTRA 14226

1-36.

1-37.

1-38.

1-39.

1-40.

Which of the NAVMACS systemshas up to four channels offull-period terminationsend-and-receive circuits?

1 . (V) 12 . (V) 23 . (V) 34 . (V)5/(V)5A

What system in the fleetcommunication systemsutilizes SID numbers?

1. NAVMACS2. CDPS3. SSIXS4. CUDIXS

Of the many fleetcommunication systems, whichone provides an optionalsatellite path to complementexisting VLF/LF/HFbroadcasts?

1. CUDIXS2. CDPS3. NAVMACS4. SSIXS

1. 10 to 120 sec2. 20 to 120 sec3. 25 to 120 sec4. 30 to 120 sec

What class of ships utilizesthe CDPS?

1. DDG2. LHA3. FFG4 .

1-41.

1-42.

1-43.

1-44.

When a submarine uses SSIXS,what (a) position must bemaintained totransmit/receive to/from thesatellite and (b) in whattactical situation?

1. (a) Over-the-horizon(b) deep running

2. (a) Line-of-sight(b) mast-mounted antenna

exposed3. (a) Surface-to-air

(b) submerged4. (a) Ship-to-shore

(b) long wire extended

What system is used betweensubmarines and submarinesand shore stations?

1. CDPS2. CUDIXS3. NAVMACS4. SSIXS

What organization hascertified the use of STU-IIIequipment up to Top Secret?

1. COMNAVCOMTELCOM2. SPAWAR3. CIA4. NSA

How is secure mode in theSTU-III unit activated anddeactivated?

What is the net cycle rangeon a CUDIXS/Subscriber NetCycle?

1.

2.

3.4.

Turning the key to thelocal position to placethe call and then to theremote once the calledparty has answeredActivated by the userkey and deactivated byits removalUsing a CIKBy unplugging andre-plugging the STU-III

FF

5

Page 86: Information Systems Technician Training Series material/NAVEDTRA-14226.pdfInformation Systems Technician Training Series Module 5—Communications Center Operations NAVEDTRA 14226

1-45.

1-46.

1-47.

1-48.

1-49.

To obtain information on themanagement of STU-IIIterminals, you should usewhat publication?

1. CMS 62. CMS 13. CMS 54. CMS 3B

1-50.

you do with this report?

Precedence and preemptionused in DSN are known bywhich of the followingterms?

1. MLPP2. PREEMPT3. PREC4. OVERRIDE

What is the total number ofcall treatments on the DSNsystem?

1 . One2 . Five3 . Six4 . Four

Of the call treatments,which one is preempted onlyby FO?

1. F2. I3. P4. R

Of the following systems,which is NOT secure?

1. CDPS2. CUDIX3. DSN4. STU-III

1-51.

1-52.

1-53.

1-54.

6

As an operator you havereceived an immediatecontact report which doesNOT have the properauthentication. What should

1 .

2 .

3 .

4 .

Try to reverify themessagePlace the message in thehold box for thesupervisorRelay or retransmit themessageDisregard the message

Which of the followingmethods is used to protect asystem against fraudulenttransmissions?

1. Semaphore2. Authentication3. Nancy system4. Ship-to-shore

Who is responsible forpreparing the command guardlist?

1.2.3.4.

1.2.3.4.

Each commandThe TYCOMEach area commanderThe FLTCINCs

For what minimum period isthe MSL retained?

30 days90 days6 months

12 months

What are the two type ofkeys used with the STU-III?

1. CIK and blank2. CIK and seed3. Seed and ignition4. Seed and master

Page 87: Information Systems Technician Training Series material/NAVEDTRA-14226.pdfInformation Systems Technician Training Series Module 5—Communications Center Operations NAVEDTRA 14226

1-55.

1-56.

1-57.

1-58.

1-59.

How many differentmanufacturers of the STU-IIIare there?

1. One2. Two3. Three4. Four

When using the STU-IIIterminal,what modes ofoperation are open to youruse?

1. Fax and bursttransmission

2. Clear voice and cleardata

3. Secure voice and securedata

4. Both 2 and 3 above

Where in the CIK is theinformation contained toseed the STU-III terminal?

1. In the microchips2. In the expandable memory3. In the ignition points4. In the metal strip

In what publication will youfind R/T procedures forreporting enemy contacts?

1. ACP 1252. ACP 1353. NTP 34. NTP 4

In what publication will youfind enemy contact reportinstructions and procedures?

1-60. What does the communicationsplan do for your command?

1.

2.

3.

4.

Satisfies thecommunicationsrequirements for anoperationOutlines the changingfactors from ocean areato ocean areaGives the exact numberof personnel who will berequired to operate thevarious systems duringthe eventOutlines the wholecommunications picturefor each system

1-61. What is the nomenclature ofthe monitoring andevaluating system used byafloat forces?

1. AN/SYS-802. URC/143/T-13. AN/SSQ-88/A/B4. QC-SYS-84

1-62. At what time does RADAYstart worldwide?

1. 2359Z2. 0000Z3. 0001Z4. 0002Z

1. ACP 1242. ACP 1253. ATP 3, VOL I4. ATP 1, VOL I

7

Page 88: Information Systems Technician Training Series material/NAVEDTRA-14226.pdfInformation Systems Technician Training Series Module 5—Communications Center Operations NAVEDTRA 14226

ASSIGNMENT 2Textbook Assignment: “Voice Communications,” chapter 2, pages 2-1 through

2-23; “Emission Control,” chapter 3, pages 3-1 through3-3; and “Cryptosecurity,” chapter 4, pages 4-1through 4-3.

2-1. What is the easiest and mostconvenient method ofrelaying traffic from shipto ship ship to shore, orshore to ship?

1. R/T2. SECVOX3. DSN4. SNEAKER-NET

2-2. Which of the following isNOT a good circuittechnique?

1. Pause a few secondsafter each normal phraseand interrupt yourcarrier

2. Speak slowly3. Group words in a natural

manner4. Hold the handset button

in the push-to-talkposition until ready totransmit

2-3. What are prowords used for?

call?”

1.

2.

3.

4.

To expedite messagehandling on circuitswhere radio-telephoneprocedures are usedTo replace “Q” and “Z”signalsTo replace the phoneticalphabetTo allow area commandersto use brevity codes toexpedite all codedtraffic

2-4.

2-5.

2-6.

2-7.

What proword is used toreplace “addresseesimmediately following areexempted from the collective

1. EXECUTE2. EXEMPT3. INFO4. IMMEDIATE EXECUTE

What proword is theequivalent of ZOF?

1. SERVICE2. SPEAK SLOWER3. TIME4. RELAY

In what publication will youfind CommunicationInstructions, OperatingSignals?

1. ACP 1312. JANAP 1263. ACP 1354. JANAP 128

What is the real-timeprocedure that tells anoperator on a nonsecurevoice circuit that he or shehas made an unauthorizeddisclosure?

1. RAINFORM2. WARNING ONE3. BEADWINDOW4. SECURITY

8

Page 89: Information Systems Technician Training Series material/NAVEDTRA-14226.pdfInformation Systems Technician Training Series Module 5—Communications Center Operations NAVEDTRA 14226

2-8.

2-9.

2-10.

2-11.

EEFI 03 is transmitted overa nonsecure voice circuit toyou as an operator. Whattype of information have yourevealed?

1. Position2. Operations3. Capabilities4. COMSEC

After being “BEADWINDOWED,”what is your only response?

1. RETRANSMITTING AGAIN INSECURE FORMAT

2. ROGER, STANDING BY3. RETRANSMITTING FOR

CLARITY FOR USER4. ROGER, OUT

Where is the EEFI listposted?

1. Inside VOXCOM area2. In clear sight at all

nonsecure voicepositions

3. On the back of thenonsecure phone

4. In the standing ordersof the day

On a large ship where willyou find most of the voicecircuits that a commandingofficer needs?

CIC2 . Radio3 . Radio two4 . Captain’s cabin

2-12.

2-13.

2-14.

2-15.

2-16.

What publication lists thepublications that containencrypted and daily changingcall signs?

1 . ACP 1102 . ACP 1133 . NTP 54 . NTP 4

Circuits that are used inport and are neithertactical nor operational arecategorized as what type?

1 . TACTCKT2 . Port operations3 . Tug control4 . Administrative

Who establishes the circuitrequirements from port toport?

1 . SOPA2 . Port Captain3 . Tug Control4 . Senior Pilot

What are the types of nets?

1 . Free and control2. Control and directed3. Directed and free4 . Control, directed, and

NECOS

What is NECOS’s function?1 .

1.

2.

3.

4.

Responsible foroperational procedures,discipline, andsecurityShares a common circuitfor security advisementCollectively monitorsall circuits forsecurityDirects the net in acivilian uprising ornatural disaster

9

Page 90: Information Systems Technician Training Series material/NAVEDTRA-14226.pdfInformation Systems Technician Training Series Module 5—Communications Center Operations NAVEDTRA 14226

2-17. What is the differencebetween (a) a free net and(b) a directed net?

1.

2.

3.

4.

1.

2-18.opening or reopening a net?

(a) You can use the netwithout permission(b) you must getpermission from NECOS(a) You can use eithersecure or nonsecurecircuits(b) you must use onlythe secure net(a) You can only usenonsecure circuits(b) you are free to useeither secure ornonsecure circuits(a) You can only call upthose ships or commandson an administrative net(b) the NECOS will tellyou whom you may call up

Who is responsible for

1. CIC2. NECOS3. Communications Area

Master Station4. The last ship using the

net

2-19. When a ship needs to passtraffic to another ship, howlong in duration should thetest signal be to tune the receiver or transmitter?

1. 10 sec2. 20 sec3. 25 sec4. 30 sec

2-20. What is the correct methodof receipting for a R/Tmessage?

1. Pass in the blind thenumbers being receiptingfor

2. Send a formatted class Atype of message

3. Use the proword ROGER4. Get on the secure voice

and pass back thereceipted message

2-21. You are the only ship whenyou receive a delayedexecutive method message.What is the correct methodto respond?

2.3.4.

2-22.

THIS IS (STATION),ROGER, OUTTHIS IS (STATION). OUT(STATION), ROGER, OUT(STATION), OUT

You have received an“EXECUTE TO FOLLOW” commandand several minutes haveelapsed. What will be thecorrect EXECUTE command toinitiate action?

1. EXECUTE2. Standby, EXECUTE3. EXECUTE, EXECUTE4. EXECUTE TO FOLLOW,

EXECUTE

2-23. In what publication will youfind a complete list of therequired information to befound on a R/T log?

1. NWP 0 (NWP 1-01)2. NTP 53. NTP 34. NTP 4

10

Page 91: Information Systems Technician Training Series material/NAVEDTRA-14226.pdfInformation Systems Technician Training Series Module 5—Communications Center Operations NAVEDTRA 14226

2-24. When, if ever, can youlegally erase an entry in alog?

1 . If an entry contains amisspelling

2 . If an entry was notplaced at the correcttime and the operatormust completely rewritethe log with the correctentry placed at thecorrect time

3 . If an entry containsincorrect information

4 . Never

2-25. What are the two actions anoperator must take tocorrect a log entry?

1. Use the X key totypeover the incorrectinformation and usewhite out to correct theerroneous entry

2. Use the slant key totype the information tobe deleted and initialthe entry

3. Erase the entry andretype it in full

4. Retype the entryunderneath and thenstrike out theerroneous material withthe slash key

2-26. What does EMCON mean?

1. Emergency condition2. Emission control3. Enemy control4. Emission condition

2-27.

2-28.

2-29.

What is EMCON?

1 .

2.

3 .

4 .

1.2.3.4.

The system to facilitatehow emergency conditionsare handledAn area that isoff-limits forbroadcasting into enemycontrolled spacesAn emission conditionthat limits poweroutputsThe management ofelectromagnetic andacoustic emissions

Who usually imposes EMCON?

EWCCIC officerRadio officerCommanding officer

As an operator, why do younot want to transmit anytype of communicationsduring EMCON?

1.

2.

3.

4.

You can burn up atransformerRadiation patterns willallow your position tobe distortedYou can be detected, andyour position will beknownHigh levels of RF energywill be present in theradio shack

11

Page 92: Information Systems Technician Training Series material/NAVEDTRA-14226.pdfInformation Systems Technician Training Series Module 5—Communications Center Operations NAVEDTRA 14226

2-30.

2-31.

2-32.

2-33.

In what publications willyou find the necessarydetailed requirements,procedures, and guidelinesto help you with theimplementation of EMCON?

1. NTP 3 and NWP 3 (NWP1-02)

2 . NTP 3 and NTP 43 . NWP 10-1-40 (NWP 3-51.1)

and NWP 4 (NWP 6-01)4 . NTP 4 and NWP 10-1-40

(NWP 3-51.1)

Which of the following stepsshould be taken on each shipconcerning EMCON?

1. Provide a check-off ofemitter status

2 . Designate individualsresponsible for eachemitter

3 . Establish an EMCONcontrol center withoverall responsibility

4 . All of the above

Who is responsible forplanning and establishing ashipboard emitter status?

1 . The TYCOM2 . Each ship3 . The FLTCINCs4 . The EWCs

Which of the following isNOT an objective of EMCON?

1.

2 .3 .4 .

Reduce the power outputof the emitters aboardshipSupport OPSECDegrade the enemy’s C2Allow effective friendly

2-34.

2-35.

2-36.

2-37.

12

When, if ever, should a shipnotify the shore station ofimpending EMCON requirementsfor radiation restrictions?

1.

2.

3.

4.

Only if required inwriting by the TYCOMBefore the restrictiveperiodOnly during “Spook Ops”,and only if required bythe mission statementNever; this could leadto the enemyintercepting themessage

When returning to the airafter EMCON, a ship with aVFCT termination is requiredto establish what circuitfirst?

1 . The multichannelbroadcast

2 . SAR monitoring3 . DAMA4 . The orderwire

What is the frequency rangethat is prohibited for useduring HERO conditions?

1. 10-15 MHz2. 20-25 MHz3. Below 30 MHz4. Above 35 MHz

Why is RF radiationconsidered a threat?

1. RF burns2. Premature firing of

ordnance or explosion3. High radiation pattern

emissions4. An overcrowded frequency

bandC2

Page 93: Information Systems Technician Training Series material/NAVEDTRA-14226.pdfInformation Systems Technician Training Series Module 5—Communications Center Operations NAVEDTRA 14226

2-38.

2-39.

2-40.

2-41.

What is the main cause ofEEDs exploding during HERO?

1. Heat2. Cold3. Reversal in polarity4. Dropping

What is the purpose oftransmitters and their

developed for use duringEMCON and HERO conditions?

antennas?

1. To relay voiceintelligencetransmissions

2 . To direct highpatterns

3 . To utilize lowpatterns

4. To radiateelectromagnetic energy

When are ordnance mostsusceptible to RF energyfields?

1. One hour prior to firing2. When they are being

armed3. During loading,

unloading and handling4. During dry firing

What are the alternatemethods to communicateduring HERO or EMCONconditions and limitations?

1. Non-electrical andsubsonic

2. Electrical andnon-electrical

3. Electrical and ferrous4. Non-electrical and

distributed

2-42.

2-43.

2-44.

2-45.

What is the total number ofalternate electricalcommunications methods

1. One2. Two3. Three4. Four

During AUTOCAT, whatprovides the means forrelaying the transmissions?

1. A ship2. An airplane, and the

Nancy system3. A ship, an operator, and

an LF transmitter4. A ship, a COD flight,

and two copies of eachmessage

What is the main differencein the three types ofalternate electrical methodsof communications?

1. Physical means oftransportation

2. Circuit configurations3. Electrical means of

radiation4. Equipment restraints

What are the two types ofnon-electrical relay systemsnow in use?

1. MIDDLEMAN and BEAN BAG2. AUTOCAT and SATCAT3. SATCAT AND PIGEON POST4. PIGEON POST and BEAN BAG

13

Page 94: Information Systems Technician Training Series material/NAVEDTRA-14226.pdfInformation Systems Technician Training Series Module 5—Communications Center Operations NAVEDTRA 14226

2-46.

2-47.

2-48.

2-49.

2-50.

What non-electrical relaymethod uses aircraft?

1. CARRIER PIGEON2. COD FLIGHT3. PIGEON POST4. SMALL BOY

What non-electrical relaymethod utilizes helicopters?

1. BEAN BAG2. TIGHT DOOR3. OPEN HATCH4. LOST RANGER

What is the type of materialthat is used to protect U.S.Government transmissions,communications, andprocessing of sensitiveunclassified information?

1. TOP SECRET2. SECRET3. COMSEC4. Classified

In what publication will youfind detailed information onCOMSEC material handling?

1. CMS 12. CMS 53. CMS 34. CMS 6

What instruction covers thehandling of classifiedmaterial?

1. OPNAVINST C55102. SECNAVINST 25153. SECNAVINST 5238.14. OPNAVINST 5510.1

14

2-51. Which of the followingmethods is NOT an authorizedtechnique of destruction?

1. Pulverizing2. Chipping3. Shredding4. Pulping

2-52. If only a single persondestroys Secret materialwhat records, if any, arerequired?

1. Disclosure2. Destruction3. Eradication4. None

2-53. What type of record, if any,is required when destroyingConfidential material?

1 . Eradication2 . Destruction3 . Disclosure4 . None

2-54. Who ensures that thematerial that is beingdestroyed has beencompletely destroyed andonly residue is left?

1. The senior personpresent

2. The CMS custodian3. The communications

officer4 . The executive officer

2-55. What is the requiredpaygrade level for receiptof SPECAT, Top Secret orabove material?

1. E-1 through E-92. E-5 and above3. E-6 and above4. E-7 and above

Page 95: Information Systems Technician Training Series material/NAVEDTRA-14226.pdfInformation Systems Technician Training Series Module 5—Communications Center Operations NAVEDTRA 14226

2-56. How do you account for whohas physical control ofSPECAT, Top Secret, or abovematerial?

1. By signature2. By identification card3. Letter of appointment4. All of the above

2-57. What type of form isrequired for you to handleand use COMSEC material?

1 . Local User form2 . CMS Responsibility

Acknowledgement form3 . Local Holder form4 . COMSEC Material Issue

form

2-58. Where will you find theoriginal form that allowsyou to handle and use COMSECmaterial?

1. CMS 5, Annex I2. CMS 3B, Annex A3. NAG 16, Annex FF4. CMS 1, Annex K

2-59. Where is the form kept thatallows you as a user tohandle and receipt forCOMSEC material?

1. With DCMS2. With the Local User

custodian3. With the Local Holder

custodian4. With the CMS custodian

2-60. Each communication watchstation, section, or crewhas an inventory of all theCOMSEC material that thewatch holds. The materialis listed by accountingnumbers, edition, shorttitle, and what other item?

1. Number of unopened keycards

2. Prior destroyed editions3. Quantity4. Number of superseded

canisters

2-61. In what publication andarticle will you find howCOMSEC material must bemarked for effective andsuperseded dates?

1. CMS 1, Art. 7602. CMS 1, Art. 1003. CMS 5, Art. 1224. CMS 6, Art. 002

2-62. Which of the followingchapters of CMS 1 detailsthe personnel, methods, andtime periods for destroyingCOMSEC material?

1. One2. Five3. Seven4. Eight

15

Page 96: Information Systems Technician Training Series material/NAVEDTRA-14226.pdfInformation Systems Technician Training Series Module 5—Communications Center Operations NAVEDTRA 14226

2-63. When you as the LH custodianare required to returnunused material to the CMScustodian, you should usewhat form?

1. SF-1002. SF-2103. SF-1534. Unutilized Material

Delivery

16