( US Army Strategic Communications Command ... - Survival Books
( US Army Strategic Communications Command ... - Survival Books
( US Army Strategic Communications Command ... - Survival Books
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
WWW.SURVIVALEBOOKS.COM<br />
FM 11-23<br />
6-6. Electronic Warfare follows. (Refer to FM 32-5 for a more detailed<br />
discussion.)<br />
All actual or suspected jamming and imitative discussion<br />
communications activities by the enemy will be<br />
reported to the net control station (NCS). To reduce<br />
a. Cryptosecurity.<br />
the effects of jamming, special attention is (1) Use only authorized cryptosystems.<br />
required to the provisions for alternative means (2) Insure strict compliance with the operof<br />
communication. General guidance for employ- ating instructions.<br />
ment of electronic counter-countermeasures in<br />
unit radio operations is provided in FM 32-20. (3) Use cryptosystems designed to provide<br />
the degree and term of security required.<br />
6-6. <strong>Communications</strong> Security b. Physical Security.<br />
<strong>Communications</strong> security is defined as the protec- (1) Maintain proper safeguards against caption<br />
resulting from all measures designed to deny ture theft or unauthorized observation of mesto<br />
unauthorized persons information of value sages and COMSEC materials at all times.<br />
which might be derived from the possession and<br />
study of telecommunications, or to mislead unau- (2) Maintain adequate emergency evacuation<br />
thorized persons in their interpretations of the and destruction plans and practice them freresults<br />
of such a study. <strong>Communications</strong> security quently.<br />
includes cryptosecurity, physical security, and (3) Guard against carelessnes and laxity by<br />
transmission security.<br />
frequent inspections and tests of security measa.<br />
Cryptosecurity is that component of com- ures.<br />
munications security which results from the<br />
provision of technically sound cryptosystems and<br />
c. Transmission Security.<br />
their proper use.<br />
(1) Use radio transmission only when other<br />
means of communications are not adequate.<br />
b. Physical security, as included here, is that<br />
part of communications security concerned with (2) Be aware that all means of transmission,<br />
physical measures designed to prevent unautho- not only radio, are subject to interception by unaurized<br />
access to equipment, facilities, material, and thorized personnel. Restrict unclassified plain landocuments.<br />
Refer to AR 380-5 and AR 380-40 for guage transmission to a minimum.<br />
detailed information.<br />
(3) Maintain circuit discipline and avoid exc.<br />
Transmission security is that component of traneous transmissions.<br />
communications security which results from all (4) Assign call signs/words and frequencies<br />
measures designed to protect transmissions from in a random manner and change them simultaunauthorized<br />
interception, traffic analysis, and neously at frequent intervals.<br />
imitative deception.<br />
(5) Make transmissions brief.<br />
6-7. Application of <strong>Communications</strong><br />
(6) Use broadcast and intercept transmission<br />
methods when possible.<br />
Security<br />
(7) Use only prescribed communications op-<br />
The basic objective of COMSEC is to prevent un- eration procedures.<br />
authorized personnel from gaining useful information<br />
from communications. This objective can (8) Use authentication properly.<br />
only be realized if all personnel are security con- (9) Use minimum power required.<br />
scious and are aware of their personal responsibilities<br />
in this regard. COMSEC should be a habit 6-8. <strong>Communications</strong> Security Assistance<br />
. . a state of mind developed through training<br />
and application in daily routine. All personnel COMSEC assistance for facilities used by signal<br />
should be thoroughly familiar with and follow units may be provided, as appropriate, by tactical<br />
the security practices designed to minimize the support elements of the U.S. <strong>Army</strong> Security<br />
value of communications as a source of intellig- Agency (<strong>US</strong>ASA) group of a field army or by<br />
ence to unauthorized personnel. A summary of <strong>US</strong>ASA (theater) headquarters, in accordance<br />
the more basic practices for effective COMSEC with AR 10-122.<br />
6-2