25.02.2015 Views

VOLUME I Multinational Maritime Tactical Instructions and Procedures

VOLUME I Multinational Maritime Tactical Instructions and Procedures

VOLUME I Multinational Maritime Tactical Instructions and Procedures

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

MTP 1(D), Vol. I<br />

Table 4-1. Authentication Policies<br />

IMITATIVE DECEPTION<br />

Occasion for Use<br />

1. When challenged. (A station never responds to a challenge unless<br />

it follows on immediately from a transmission they have<br />

made.)<br />

2. a. When Spoofing is suspected.<br />

b. To check identity of originator of an unexpected message.<br />

3. On Receipt of a message:<br />

a. Authenticated wrongly<br />

b. On which authentication is more than 2 minutes time late.<br />

c. Which was not authenticated when it should have been.<br />

4. a. Joining a circuit.<br />

b. Rejoining a circuit after a long absence (in excess of an hour).<br />

5. a. Imposing radio silence.<br />

b. Broadcasting to a unit under silence, or transmitting ‘blind’.<br />

Type of Authentication<br />

Respond to challenge in accordance<br />

with Challenge <strong>and</strong> Reply<br />

procedure.<br />

Challenge <strong>and</strong> Reply<br />

Challenge <strong>and</strong> Reply<br />

Challenge <strong>and</strong> Reply<br />

Challenge <strong>and</strong> Reply<br />

Challenge <strong>and</strong> Reply<br />

Challenge <strong>and</strong> Reply<br />

Challenge <strong>and</strong> Reply<br />

Transmission<br />

Transmission<br />

c. Requiring a unit to break silence.<br />

Transmission<br />

6. Making enemy contact or amplifying reports. Transmission<br />

7. Changing authentication policy in force. Transmission<br />

8. Ordering to change watch, circuit, or frequency. Transmission<br />

9. Initiating EPM procedures. Transmission<br />

10. Detaching a unit; changing screening stations; or employment of Transmission<br />

escorts <strong>and</strong> helicopters.<br />

11. Altering course of speed of the main body. Transmission<br />

12. Transmitting groups from Action Table. Transmission<br />

13. Calling ZIPPO. Transmission<br />

14. As directed by the comm<strong>and</strong> (i.e., when important tactical signals Transmission<br />

are made).<br />

marker in attempting imitative deception would be to assess the forces ability to recognize <strong>and</strong> respond<br />

to his efforts. With this level of imitative deception threat <strong>and</strong> the possibility of it continuing for a period,<br />

it will probably be the OTCs wish to relax from his full degree of authentication.<br />

c. Ordering Authentication Policies. The authentication policy is ordered by the brevity<br />

word OYSTER.<br />

4134 — 4139 SPARE<br />

4140 ANTIAIR WARFARE (AAW) COMMUNICATIONS<br />

AAW communications are used for picture compilation <strong>and</strong> weapon system coordination.<br />

Well-coordinated AAW measures require a rapid <strong>and</strong> reliable flow of data between units of the force.<br />

When coordinating AAW activities one or more of the following nets — AAW reporting net, AAW<br />

4-7 CHANGE 1

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!