Transcript PPT: Common Core 107 Communications
SEABEE COMBAT WARFARE COMMON CORE
Communications/ Electronic Key Management System (EKMS) Fundamental
Communications/ EKMS Fundamentals
•
Reference:
•
Navy Electronic Key Management System (EKMS 1).
•
MCRP 3-40.3(series) FMFM 3-36 Radio Operators
•
TM 11-5820-890-10-8 Operators Manual, SINCGARS GROUND COMBAT NET RADIO, ICOM
Communications/ EKMS Fundamentals
•
Reference:
•
PUB. NO. 10515-0103-4100, AN/PRC 150 MANPACK Radio Operators Manual
•
PUB. NO. 10515-0109-4100, AN/PRC-117F Operations Manual
•
MCWP 6-22 Communications And Information System
Communications/ EKMS Fundamentals
•
Reference:
•
NAVEDTRA 14235, SEABEE COMBAT HANDBOOK, Vol. 2
Overview
• Communication Terms • Communications Security (COMSEC) • Two-Person Integrity (TPI) • Electronic Key Management System (EKMS)
Overview
• Receiver-Transmitter (RT) “Radio”-AN/PRC 119, AN/PRC 117, AND AN/PRC 150.
• Phonetic alphabet, numerals, and pro-words • Line Of Sight (LOS) • Purpose Of Retransmissions
Communications / EKMS
PQS Question 107.1 Discuss Communication Security ( COMSEC) and the Role of Electronic Key Management System (EKMS) Local element
COMSEC/EKMS
An organization that requires
COMSEC
material must obtain such material through an EKMS or COMSEC account managed by a designated
EKMS Manager
. When it is not possible to draw needed COMSEC material from an existing EKMS account (either within the organization or located in close proximity thereto), the requirement to establish a new EKMS account must be validated by the organization's Immediate Superior in Command (ISIC).
COMSEC/EKMS
At least 45 days is required to establish an EKMS account and to provide the initial COMSEC material.
Communications / EKMS
PQS Question 107.2 What is meant by Two Person Integrity (TPI) and how it is related to COMSEC?
TPI
TPI is a system of handling and storing, designed to prevent single-person access to certain COMSEC material – TPI handling requires that at least two persons, authorized access to COMSEC keying material, be in constant view of each other and the COMSEC material requiring TPI whenever that material is accessed and handled. Each individual must be capable of detecting incorrect or unauthorized security procedures with respect to the task being performed.
– TPI storage requires the use of two approved combination locks (each with a different combination) with no one person authorized access to both combinations.
Communications / EKMS
PQS Question 107.3 Discuss the following terms: a.
b.
c.
d.
e.
f.
Controlled Cryptographic Item ( CCI) Physical Security Practice Dangerous to Security (PDS) Emergency Action Plan / Emergency Destruction Plan (EAP/EDP) Data Transfer Device (DTD) COMSEC Incident
Controlled Cryptographic Item (CCI) A secure telecommunications or information handling equipment, or associated cryptographic component, which is unclassified but controlled. Designated items will bear the designation Controlled Cryptographic Item or CCI.
General Access requirments for CCI
(1) A security clearance is not required for access to un-keyed CCI. Normally, access must be restricted to U.S. citizens whose duties require such access.
(2) Un-keyed CCI and/or CCI keyed with unclassified key marked or designated CRYPTO, must be stored in a manner that affords protection against pilferage, theft, sabotage, or tampering, and ensures that access and accounting integrity are maintained.
CCI Access
Access Requirements for Resident Aliens:
Resident aliens who are U.S. Government employees, U.S. Government contractor employees, or National Guard, active duty, or reserve members of the U.S. Armed Forces may be granted access to CCI provided their duties require access.
Access Requirements for Foreign Nationals:
Non-U.S. citizens who are employed by the U.S. Government at foreign locations where there is a significant U.S. military presence (two or more military bases) may handle CCI material in connection with warehouse functions, provided they are under the direct supervision of an individual who has been granted access to CCI material.
Physical Security
:
Physical security is the COMSEC component that results from all physical measures necessary to safeguard classified equipment, material, and documents from access or observation by unauthorized persons.
When a commander or designated representative has determined that an individual has a need to know and is eligible for access, then access to classified cryptographic information will be formally authorized. The authorization process must include an introduction to the unique nature of cryptographic information, its unusual sensitivity, the special security regulations governing its handling and protection, and the penalties prescribed for its disclosure. Reportable violations include— – Loss of material.
– Unauthorized viewing.
– Capture of individuals having access to COMSEC information
Practice Dangerous TO Security (PDS)
PDSs, while not reportable to the national level (NSA), are practices, which have the
potential to jeopardize the
security of COMSEC material,
if allowed to perpetuate.
Examples of NON-reportable PDSs – (1) Improperly completed accounting reports (i.e., unauthorized signatures, missing signatures or required accounting information, incomplete short title information).
– (2) Physical COMSEC keying material transferred with status markings still intact.
– (3) Mailing of SF 153 Forms with status dates annotated for material listed.
– (4) COMSEC material not listed on account, local element (LE), or user inventory documents when documentation exists to indicate that the material is charged to the account.
– (5) Issue of keying material in hardcopy form marked/designated CRYPTO, without authorization, to a LE more than 30 days before its effective period.
– (6) Late destruction (includes key in a fill device) of COMSEC material (i.e., destruction not completed within the timeframes in this manual), except where a waiver has been
Practice Dangerous TO Security (PDS)
Examples of Reportable PDS outside of the command:
(1) Premature or out-of-sequence use of keying material before its effective date, as long as the material was not reused.
NOTE: Premature use is defined as an on-the-air
Attempt to establish communications/transmit data. If material prematurely used is reused without consent of the CONAUTH, report as a CRYPTOGRAPHIC incident.
(2) Inadvertent (i.e., early) destruction of COMSEC material, or destruction without authorization of the controlling authority (CONAUTH), as long as the destruction was properly documented.
NOTE: Whenever this occurs, annotate the
destruction record of the material as follows: “Material destruction was not authorized, but was properly destroyed and witnessed.
(3) Not completing and returning FC Inventory IAW except where a waiver has been granted.
(4) No Special or Combined Inventory was conducted due to Change of Command IAW Article 766.c.(3) or change of Manager
Emergency Action Plan Emergency Destruction Plan
Emergency Destruction Planning: Three categories of COMSEC material which may require destruction in hostile emergencies are: – COMSEC keying material – COMSEC-related material (e.g., maintenance manuals, operating instructions, and general doctrinal publications) – Equipment
Emergency Action Plan Emergency Destruction Plan
a. Precautionary Destruction: When precautionary destruction is necessary, destroy keying material and non-essential manuals in accordance with EKMS EAP/EDP procedures.
b. Complete Destruction: When sufficient personnel and facilities are available, assign different persons to destroy the material in each category by means of separate destruction facilities and follow the priorities listed herein asincorporated into your EAP/EDP.
Emergency Action Plan Emergency Destruction Plan
• Every command that holds classified COMSEC
or CCI
material must prepare emergency plans for safeguarding such material in the event of an emergency.
• For commands located within the continental United States (CONUS), planning must consider natural disasters (e.g., fire, flood, tornado, and earthquake), civil/mob actions, and terrorism.
• For commands located outside of CONUS and deployable commands, planning must consider both natural disasters
and
hostile actions (e.g., enemy attack, terrorism, mob action, or civil uprising).
These plans will be incorporated into the overall Emergency Action Plan (EAP)/Emergency Destruction Plan (EDP) of the command. Further instructions for EAP/EDP can be found in the EKMS Manual or the S6 shop.
Data Transfer Device
The DTD is an integral component of the EKMS. It is used to securely distribute key generated by the LMD/KP to consumers. The consumers are either an end cryptographic unit (ECU) or another DTD. The DTD is also able to replace current common fill devices (FDs).
Data Transfer Device
The DTD is a small, lightweight, electronically programmable fill device in a ruggedized case. The DTD has a keyboard for input of commands and an alphanumeric screen to display the status of the unit and operator instructions.
Data Transfer Device
For compatibility with existing equipment, the DTD has a 6-pin Input/output connector A fill device application program is provided with the DTD to perform functions comparable to those currently performed by the KYK-13, KYX-15A, and KOI-18. This software also allows the DTD to handle keys with lengths other than 128 bits.
AN/CYZ-10
The AN/CYZ-10 is the full keyboard version and the AN/CYZ-10A is the limited keyboard version of the DTD.
COMSEC Incident
To some degree, every item of COMSEC material is accounted for and controlled because of the role it plays in the cryptographic processes that protect or authenticate U.S. Government information transmitted electrically.
To counter the threat posed to secure communications by COMSEC material mishandling, losses, or thefts
, the National Security Agency (
NSA
) established the National COMSEC Incident Reporting and Evaluation System or
NCIRES
.
COMSEC Incident
The COMSEC incident reporting APPLICABILITY: (1) Classified and unclassified COMSEC keying material marked or designated CRYPTO (includes NSA-produced electronic key and tape key and field generated electronic key generated from a key variable generator (e.g., KG-83/KGX-93/KP) or STU-III Operational and Seed Key.
(2) Controlled Cryptographic Item (CCI) equipment.
(3) Classified COMSEC equipment.
(4) Floppy disks containing key or other EKMS information.
(5) Malicious codes/viruses on the EKMS system.
(6) Classified COMSEC-accountable maintenance manuals, operating instructions, and publications.
Communications/ EKMS Fundamentals
C
PQS Question 107.4 Explain the three different types of “supersession” a. Regular b. Irregular c. emergency
Supersession
COMSEC MATERIAL SUPERSESSION
Supersession refers to a time when a particular item of COMSEC material is no longer eligible for use. COMSEC material is superseded in one of three ways: – Regular – Irregular – Emergency
Supersession Regular
Regular supersession
: is based on a specific,
pre-determined supersession date
for each edition of material. For example, each edition of a monthly key-tape is superseded on the first day of the month after its implementation; each edition of ten-day material is superseded on the 11th, 21st, and the 31st of the month.
Supersession Irregular
Irregular supersession
: it is
not pre-determined
but which
occurs as a result of use
. Editions and individual segments of irregularly superseded COMSEC material are to be destroyed after the material has been used operationally, when the CONAUTH directs supersession, or, in the case of maintenance key, it may be used until the key becomes unserviceable. Irregular supersession is normally associated with one-time pads, test key, maintenance key, publications, and equipment.
Supersession Emergency
Emergency supersession
:
An unplanned change of supersession
, usually as the result of a compromise.
Communications/ EKMS Fundamentals
PQS Question 107.5 Explain the function and the contents of Communications Electronic Operating Instruction (CEOI)
CEOI
The CEOI contains the technical guidance required to establish and maintain communications support of operations. The CEOI amplifies the communication and information systems (CIS) standing operating procedures (SOP) by providing detailed guidance for the coordination and control of communications means and functions.
CEOI
Input is normally requested from subordinate commands by higher HQ. Sufficient copies of the CEOI should be maintained by the issuing HQ to allow issue to other units that may be attached for an operation.
CEOI
The following information and instructions can usually be included in the CEOI: – Call sign assignments.
– Frequency assignments.
– Radio guard charts.
– Radio net identifiers.
– Telephone directory names and numbers.
– Identification and marking panel codes.
– Signal panel message instructions.
– Pyrotechnic and smoke codes. – Ground-to-air signals.
– Sound warning signals.
COMMUNICATIONS-ELECTRONICS OPERATING INSTRUCTIONS (ACEOI)
A locally generated ACEOI containing daily changing frequencies and call signs can be produced to support specific operations or special exercises (Kennel Bear, Gallant Eagle, and homeport field exercises). Units desiring a special ACEOI must submit a written request to higher HQs a minimum of 30 days in advance of the requirement. Units conducting training at deployment sites are required to request frequencies through the local area frequency coordinator.
COMMUNICATIONS-ELECTRONICS OPERATING INSTRUCTIONS (ACEOI)
The request for an ACEOI will contain: • a. Unit(s) involved • b. Inclusive dates, and number of days required • c. Net name(s) or circuit titles • d. Location of adjacent units • e. Number of copies required • f. Required delivery date • g. Point of contact, email address, and telephone number • Note: Call signs contained in a locally generated ACEOI are not compatible with effective editions of the AKAC.
Communications/ EKMS Fundamentals
PQS Question 107.6
Define the following terms: a.
b.
c.
d.
Essential Elements of Friendly Information (EEFI) Commanders Critical Information Requirements (CCIR) Command, Control, Communications, Computers and Intelligence (C4) Communications Information System Officer (CISO)
Commander’s Critical Information Requirements (CCIR) The information required for situational awareness falls into three general categories: – information about the enemy – information about the environment, – information about friendly forces. The identification of CCIRs is a means to focus and direct the collection and processing of information in those categories.
Commander’s Critical Information Requirements (CCIR) CCIRs are the information regarding the enemy and friendly activities and the environment identified by the commander as critical to maintaining
situational awareness, planning future activities, and facilitating timely decision-making
. Designation of CCIRs reduces the volume of information to a manageable level and helps to ensure the accuracy, relevance, and timeliness of that information.
Commander’s Critical Information Requirements (CCIR) CCIRs is comprised of: – priority intelligence requirements (
PIR
s), – friendly force information requirements (
FFIR
s), – essential elements of friendly information (
EEFI
s)
Essential Elements of Friendly Information (EEFI) EEFIs are specific facts about friendly intentions, capabilities, and activities needed by adversaries to plan and execute effective operations against our forces. Identification of the EEFIs is key to planning effective INFOSEC, operations security, and other force protection operations.
Communications Information System Officer (CISO)
The CISO is responsible to the commander for all matters concerning the planning and employment of CIS within the command. As a general or executive staff officer, the CISO serves as an advisor, planner, supervisor, and coordinator.
Command, Control, Communications, Computers and Intelligence (C4) The GCCS implements the joint C4I for the warrior concept. This concept calls for the capability to move a joint force anywhere on the globe at any time and to provide that force with the information necessary to accomplish its mission. The GCCS is a revolutionary approach designed to resolve joint C2 interoperability issues and evolve incompatible, Service-specific C2 programs into a single integrated C2 system. GCCS.
C4I
C4I
MAGTF C4I is the concept for the integration of Marine Corps tactical information systems and the migration of selected systems MAGTF C4I provides commanders and their staffs at all levels of the MAGTF with the capability to send, receive, process, filter, and display data to aid them in their decision-making process. MAGTF C4I also provides a shared situational awareness through a common picture of the battlespace.
Communications/ EKMS Fundamentals
PQS Question 107.7 What is the primary tactical Radio used by the NCF and what man-pack is used in infantry operations.
Single-channel radio
Single-channel radio is the primary tactical means of communication for MAGTF/NCF units. Single-channel radio communications equipment is easy to operate. The networks are easily established, rapidly reconfigured, and, most importantly, easily maintained on the move. Single-channel radio provides secure voice communications and supports limited data information exchange.
Single-channel radio
The most widely employed tactical radios provide integrated communications security (
COMSEC
) and jam resistance through
frequency hopping
. Tactical Single-channel radios operate in the three military radio frequency bands HF- high frequency VHF- very high frequency UHF- ultra high frequency
Single-channel radio
Single-channel radio:
VHF
and
UHF
bands is normally limited to line of sight.
HF
band can support long-range communications. Satellite Communications (
SATCOM
) provides mobility, flexibility, and ease of operation with unlimited range.
Single-channel radio
SINGARS
The primary MAGTF/NCF VHF radio is the single channel ground and airborne radio system (SINCGARS). SINCGARS is a family of lightweight combat radios that serves as the primary means of communications for command and control and fire support on the battlefield.
SINGARS
The system provides high security against threat electronic warfare (EW) by using
frequency hopping with integrated COMSEC
. It is capable of voice and data transmission (up to 16 kbps under optimum conditions and over limited distances) over the VHF-FM frequency range of 30 to 87.975 MHz
AN/PRC 119
Man-pack AN/PRC-119 is typically used in infantry operations,
AN/PRC 119
3 ft tape, 10 ft whip antennae 30 to 87.975 MHz freq.
2320 channels/freq.'s Sends and receives secure voice and digital data 6 secure channels for SC or frequency hopping 2 additional Single Channels (SC) for plain text Transmits 200 meters to 10 Kilometers or more Batteries last 4 (BB690) to 30 (BA5590) hrs depending on type & use
Communications/ EKMS Fundamentals
PQS Question 107.8 Identify the following capabilities for the “ Radio” Transmitter Transmitter (RT) 1523: (AN/PRC119) a. Characteristics b. Frequency range c. Configuration d. Antennas e. Power Sources
AN/PRC-119
AN/PRC 119A General Characteristics
• VHF SINCGARS Radio • 30 to 87.975 MHz freq.
• 2320 channels/freq.'s • Sends and receives secure voice and digital data
AN/PRC 119A General Characteristics
• 6 Comsec channels/ 6 Frequency hopping channels • 8 Single Channels (SC) for plain text • Transmits 200 meters to 10 Kilometers or more • Batteries last 4 (BB690) to 30 (BA5590) hrs depending on type & use
AN/PRC 119A Antenna Systems
• Antenna Systems – 3ft Tape- up to 5 miles – 10ft whip- up to 10 miles – OE-254- up to 36 miles
Communications/ EKMS Fundamentals
PQS Question 107.9
Identify the following capabilities for the “Radio” Receiver Transmitter (RT) 1694 (AN/PRC) 150: a. Characteristics b. Frequency Range c. Configuration d. Antennas e. Power sources
AN/PRC-150
AN/PRC-150
Communications/ EKMS Fundamentals
PQS Question 107.10
Identify The Following Capabilities For The “Radio” Receiver Transmitter (RT) 1796 (AN/PRC 117) a. Characteristics b. Frequency Range c. Configuration d. Antennas e. Power sources
AN/PRC-117
Communications/ EKMS Fundamentals
•
PQS Question 107.11
Explain The Functions Of The Following Communications Assets: – Satellite Signals Navigations (AN/PSN 11) – Data Transfer Device (AN/AZY-10)
• • • • • •
Global Positioning System AN/PSN 11
General Characteristics PLGR - “Plugger” GPS Receives encrypted code Anti-jam capability
AN/CYZ-10
AN/CYZ-10
The DTD is cargo-pocket size, weighs1.5 pounds, and requires three 3-volt batteries or one 9-volt battery. DTD’s primary function is to serve as a common fill device to load COMSEC keys into any cryptographic equipment. The DTD can receive, store, and transfer frequency hopping data between DTDs or PCs. The DTD can also receive, store, display, and edit CEOI information and transfer one time period of CEOI information over the air by using a SINCGARS radio.
Communications/ EKMS Fundamentals
PQS Question 107.12
Discuss The Proper Use Of The Phonetic Alphabet, Numerals, and Pro-words.
Phonetic Alphabet
Numerals
Pro-words
Pro-words
Communications/ EKMS Fundamentals
PQS Question 107.11
Explain Line-of sight (LOS)
Line-of-Sight
Line-of-Sight
The direct wave is that part of the radio wave which travels directly from the transmitting antenna to the receiving antenna. This part of the wave is limited to the line of sight (LOS) distance between the transmitting and receiving antennas, plus the small distance added by atmospheric refraction and diffraction of the wave around the curvature of the Earth.
This distance can be extended by increasing the height of the transmitting antenna, the receiving antenna, or both.
Communications/ EKMS Fundamentals
PQS Question 107.14
Discuss the purpose of a Retransmission (RETRANS) site.
Retransmission Site
The Operation of single channel radios in Mountainous or in urbanized terrain is poor due to factors such as terrain, electrical interference and climatic conditions. To improve Communications a Retransmission site is put in place usually at a high point so that the obstacles blocking the transmission paths can be redirected to establish a positive line of sight.
Retransmission Site
HF radios do not require or rely on line of sight as much as VHF radios because operating frequencies are lower, and power output is greater. The problem is that HF radios are not organic to small units. To overcome this, the VHF signals must be retransmitted.
Retransmission Site
Retransmission stations in aerial platforms can provide the most effective means if they are available. Organic retransmission is more likely to be used. The antenna should be hidden or blended in with surroundings. This will help prevent the enemy from using it as a landmark to “home in” his artillery bombardment. Antennas can be concealed by water towers, existing civilian antennas, or steeples.