13.11.2014 Views

( US Army Strategic Communications Command ... - Survival Books

( US Army Strategic Communications Command ... - Survival Books

( US Army Strategic Communications Command ... - Survival Books

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

WWW.SURVIVALEBOOKS.COM<br />

FM 11-23<br />

6-6. Electronic Warfare follows. (Refer to FM 32-5 for a more detailed<br />

discussion.)<br />

All actual or suspected jamming and imitative discussion<br />

communications activities by the enemy will be<br />

reported to the net control station (NCS). To reduce<br />

a. Cryptosecurity.<br />

the effects of jamming, special attention is (1) Use only authorized cryptosystems.<br />

required to the provisions for alternative means (2) Insure strict compliance with the operof<br />

communication. General guidance for employ- ating instructions.<br />

ment of electronic counter-countermeasures in<br />

unit radio operations is provided in FM 32-20. (3) Use cryptosystems designed to provide<br />

the degree and term of security required.<br />

6-6. <strong>Communications</strong> Security b. Physical Security.<br />

<strong>Communications</strong> security is defined as the protec- (1) Maintain proper safeguards against caption<br />

resulting from all measures designed to deny ture theft or unauthorized observation of mesto<br />

unauthorized persons information of value sages and COMSEC materials at all times.<br />

which might be derived from the possession and<br />

study of telecommunications, or to mislead unau- (2) Maintain adequate emergency evacuation<br />

thorized persons in their interpretations of the and destruction plans and practice them freresults<br />

of such a study. <strong>Communications</strong> security quently.<br />

includes cryptosecurity, physical security, and (3) Guard against carelessnes and laxity by<br />

transmission security.<br />

frequent inspections and tests of security measa.<br />

Cryptosecurity is that component of com- ures.<br />

munications security which results from the<br />

provision of technically sound cryptosystems and<br />

c. Transmission Security.<br />

their proper use.<br />

(1) Use radio transmission only when other<br />

means of communications are not adequate.<br />

b. Physical security, as included here, is that<br />

part of communications security concerned with (2) Be aware that all means of transmission,<br />

physical measures designed to prevent unautho- not only radio, are subject to interception by unaurized<br />

access to equipment, facilities, material, and thorized personnel. Restrict unclassified plain landocuments.<br />

Refer to AR 380-5 and AR 380-40 for guage transmission to a minimum.<br />

detailed information.<br />

(3) Maintain circuit discipline and avoid exc.<br />

Transmission security is that component of traneous transmissions.<br />

communications security which results from all (4) Assign call signs/words and frequencies<br />

measures designed to protect transmissions from in a random manner and change them simultaunauthorized<br />

interception, traffic analysis, and neously at frequent intervals.<br />

imitative deception.<br />

(5) Make transmissions brief.<br />

6-7. Application of <strong>Communications</strong><br />

(6) Use broadcast and intercept transmission<br />

methods when possible.<br />

Security<br />

(7) Use only prescribed communications op-<br />

The basic objective of COMSEC is to prevent un- eration procedures.<br />

authorized personnel from gaining useful information<br />

from communications. This objective can (8) Use authentication properly.<br />

only be realized if all personnel are security con- (9) Use minimum power required.<br />

scious and are aware of their personal responsibilities<br />

in this regard. COMSEC should be a habit 6-8. <strong>Communications</strong> Security Assistance<br />

. . a state of mind developed through training<br />

and application in daily routine. All personnel COMSEC assistance for facilities used by signal<br />

should be thoroughly familiar with and follow units may be provided, as appropriate, by tactical<br />

the security practices designed to minimize the support elements of the U.S. <strong>Army</strong> Security<br />

value of communications as a source of intellig- Agency (<strong>US</strong>ASA) group of a field army or by<br />

ence to unauthorized personnel. A summary of <strong>US</strong>ASA (theater) headquarters, in accordance<br />

the more basic practices for effective COMSEC with AR 10-122.<br />

6-2

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!