PLEASE SIGN MY GUESTBOOK
Principals for Radio Communications in a Tactical Environment
1. Keep transmissions short. Long transmissions will allow the enemy to find your signal. If your signal is found, they can…
A. Listen in
B. disrupt, interfere and jam
C. Find your location and kill you
2. Create Authentications. You want to ensure the person you are communicating with is a “friendly“. When authentications are created, you’ll give a word, letters, phrase, or numbers and wait for the authenticating predetermined response from the distant station. For example, I’d say, “This is A2N22, authenticate horse”. The distant station looks on his sheet and gives the corresponding response.
Now, It never hurts to have some informal challenge/response that your trusted members are aware of. They come in handy when other methods of authentication fail.
4. Don’t stay in one place for long. If your signal is found on the radio bands, the enemy could slowly and methodically inch ever closer to your location by using direction finding techniques.
5. Change Frequencies often, but not at fixed intervals. Also, if you can, transmit on one frequency and receive on another. This will cause some difficulties for the enemy to find your signal on the radio bands.
Use all the bands at your disposal, but understand your distant stations may not have all the bands you do.
6. Camouflage your station. If you’re tactical, you’ll want to set up where you won’t easily be seen from the ground, or the air. You can set up your station among and under trees, You can use shrubbery leaves, dirt etc to blend your vehicle in with the ground. Open your hood, Cover all glass/mirrors/headlights with whatever you have. Use clothing, blankets etc. If you need to run a generator, run it during the day. The sound travels much farther at night.
Polarizing your antenna to vertical transmits better through trees, however opposing polarization (horizontal) of receiving station may impede effective communication. When possible, coordinate polarizations of antennas.
7. A detailed list of authentications, frequencies, call signs, and additional instructions must be developed and implemented. This information must be kept in confidence! Allowing this information to fall into enemy hands would be detrimental.
sample authenication instructions):
Day challange Reply
01 Dog Pony
02 Rice Field
03 Snow Shoe
04 Wax Muffin
05 Driver Sailor
06 Moose lodger
07 Pork Blast
08 Weak Sift
09 Zone forrest
(Sample instructions for Frequency changes):
Day Frequency Before 6pm CST After 6 pm CST
01 14.250 3.925
02 7.256 3.977
04 7.265 3.825
(note: if interference add 10 kHz)
8. When transmitting, use as little power as possible.
9. When transmitting to a known location, use a directional antenna. These last two rules here (8 and 9) will reduce the risk of the enemy intercepting your signal.
On the battlefield, success of your military may depend upon the quick, efficient delivery of messages. There is a format for tactical messages. The format consists of 10 lines:
1. Destination station
2. Originating station
3. Message Number- precedence and Date/time group: (MSG25R 062601639S) (S-denotes my military timezone)
4. “To” line - who the message is for recipients name/rank/office etc…
5. “From line” - fm (senders name/rank/position
6. Subject Brief comment comprising message topic
7. Break (typed ‘bt’)
8. Body of message
9. Bt
10. (over) typed ’K’
Here is an example:
K2V
DE M9N25 (DE - stands for ‘this is’)
Msg27R 06252010S
To: CPT zittman CO HHB 5 Division artillery
Fm: Cpl Loomis CID Forscom
Bt
Cpt Zittman, we found a mole in your unit. PFC Cole is sending sensitive Intelligence to the enemy. Confine him immediately.
Will be in touch at a later date.
Bt
K
This is where the radio operator will wait for a reply of “Roger” Then you will sign off.
WATCH; Donald Trump's RNC Speech (FULL VERSION)
-
This is a speech Donald Trump needed to make, and the left immediately
began to characterize it as "dark".
I watched the coverage on PBS and the pundits cr...
8 years ago
No comments:
Post a Comment