25.02.2015 Views

VOLUME I Multinational Maritime Tactical Instructions and Procedures

VOLUME I Multinational Maritime Tactical Instructions and Procedures

VOLUME I Multinational Maritime Tactical Instructions and Procedures

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

(7) Attention to equipment maintenance to produce minimal internal noise <strong>and</strong> nullify the possibility<br />

of radiation of encrypted or unencrypted traffic from the superstructure of the transmitting unit or<br />

other improper antenna.<br />

b. COMSEC procedures form an integral part of electronic protective measures (EPM).<br />

4132 AUTHENTICATION<br />

a. Principles. Authentication is used as a measure of protection against imitative deception on<br />

communication circuits. Current authentication procedures are based upon the following principles:<br />

(1) Authentication should not be used unless warranted by the degree of risk that imitative deception<br />

may be attempted by the enemy.<br />

(2) When used, the amount of circuit time devoted to the procedure should be the minimum consistent<br />

with the achievement of an acceptable level of protection against the unit employing imitative<br />

deception.<br />

b. Risk of Imitative Deception. Risk exists on all types of uncovered circuits, <strong>and</strong> tactical voice<br />

circuits are an obvious potential target. Morse circuits, which may replace certain RATT channels that<br />

have been subjected to heavy ECM, may be vulnerable to imitative deception. The risk of imitative<br />

deception will depend upon what the enemy has to gain from its employment in any tactical situation <strong>and</strong><br />

governs the establishment of the authentication policy (see Article 4133).<br />

NOT RELEASABLE<br />

c. Authentication <strong>Procedures</strong>. Present authentication rules call for the Challenge <strong>and</strong> Reply<br />

mode whenever possible, because it is significantly more secure than the Transmission mode. It does not<br />

follow that the lower level of security attainable through the latter is not an acceptable compromise<br />

between security <strong>and</strong> circuit occupancy, when it is backed up by Challenge <strong>and</strong> Reply, if the credibility of a<br />

given message is in doubt. This is amplified in Table 4-1, but it should be noted that it is relatively easy for<br />

an experienced unit employing imitative deception to obtain an indate transmission authentication from<br />

one circuit <strong>and</strong> to use it on another; <strong>and</strong> it is, therefore, a cardinal rule that a receiving station always<br />

initiates a Challenge <strong>and</strong> Reply whenever the transmitting station has not been identified as friendly.<br />

4133 AUTHENTICATION POLICIES<br />

a. Definitions.<br />

(1) Policy ALFA — Enemy forces are likely to use imitative deception; or the use of imitative deception<br />

has been confirmed <strong>and</strong> a resulting change in policy ordered by the OTC.<br />

(2) Policy BRAVO — Imitative deception is unlikely to be used by the enemy.<br />

b. Use of Authentication Policies.<br />

MTP 1(D), Vol. I<br />

(1) If the tactical situation is in favor of the enemy trying to conduct imitative deception, the full degree<br />

of authentication is to be implemented as in Policy ALFA (Occasions 1 to 14 in Table 4-1). This<br />

also applies when imitative deception has already been confirmed. To guard against the situation in<br />

which the marker attempts imitative deception simply to test the forces reaction (<strong>and</strong> the OTC does not<br />

wish to reveal the practical effects of Policy ALFA), Policy BRAVO may be ordered by the OTC.<br />

(2) In Policy BRAVO, authentication is used infrequently (Occasions 1 to 8 in Table 4-1). The initial<br />

stage of a marking situation is typical of one in which Policy BRAVO would be appropriate: the<br />

marker is intent on monitoring rather than interfering with communications. The only benefit to the<br />

4-6 CHANGE 2

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!