PPT: Common Core 107 Communications

Download Report

Transcript PPT: Common Core 107 Communications

SEABEE COMBAT WARFARE COMMON CORE

Communications/ Electronic Key Management System (EKMS) Fundamental

Communications/ EKMS Fundamentals

Reference:

Navy Electronic Key Management System (EKMS 1).

MCRP 3-40.3(series) FMFM 3-36 Radio Operators

TM 11-5820-890-10-8 Operators Manual, SINCGARS GROUND COMBAT NET RADIO, ICOM

Communications/ EKMS Fundamentals

Reference:

PUB. NO. 10515-0103-4100, AN/PRC 150 MANPACK Radio Operators Manual

PUB. NO. 10515-0109-4100, AN/PRC-117F Operations Manual

MCWP 6-22 Communications And Information System

Communications/ EKMS Fundamentals

Reference:

NAVEDTRA 14235, SEABEE COMBAT HANDBOOK, Vol. 2

Overview

• Communication Terms • Communications Security (COMSEC) • Two-Person Integrity (TPI) • Electronic Key Management System (EKMS)

Overview

• Receiver-Transmitter (RT) “Radio”-AN/PRC 119, AN/PRC 117, AND AN/PRC 150.

• Phonetic alphabet, numerals, and pro-words • Line Of Sight (LOS) • Purpose Of Retransmissions

Communications / EKMS

PQS Question 107.1 Discuss Communication Security ( COMSEC) and the Role of Electronic Key Management System (EKMS) Local element

COMSEC/EKMS

An organization that requires

COMSEC

material must obtain such material through an EKMS or COMSEC account managed by a designated

EKMS Manager

. When it is not possible to draw needed COMSEC material from an existing EKMS account (either within the organization or located in close proximity thereto), the requirement to establish a new EKMS account must be validated by the organization's Immediate Superior in Command (ISIC).

COMSEC/EKMS

At least 45 days is required to establish an EKMS account and to provide the initial COMSEC material.

Communications / EKMS

PQS Question 107.2 What is meant by Two Person Integrity (TPI) and how it is related to COMSEC?

TPI

TPI is a system of handling and storing, designed to prevent single-person access to certain COMSEC material – TPI handling requires that at least two persons, authorized access to COMSEC keying material, be in constant view of each other and the COMSEC material requiring TPI whenever that material is accessed and handled. Each individual must be capable of detecting incorrect or unauthorized security procedures with respect to the task being performed.

– TPI storage requires the use of two approved combination locks (each with a different combination) with no one person authorized access to both combinations.

Communications / EKMS

PQS Question 107.3 Discuss the following terms: a.

b.

c.

d.

e.

f.

Controlled Cryptographic Item ( CCI) Physical Security Practice Dangerous to Security (PDS) Emergency Action Plan / Emergency Destruction Plan (EAP/EDP) Data Transfer Device (DTD) COMSEC Incident

Controlled Cryptographic Item (CCI) A secure telecommunications or information handling equipment, or associated cryptographic component, which is unclassified but controlled. Designated items will bear the designation Controlled Cryptographic Item or CCI.

General Access requirments for CCI

(1) A security clearance is not required for access to un-keyed CCI. Normally, access must be restricted to U.S. citizens whose duties require such access.

(2) Un-keyed CCI and/or CCI keyed with unclassified key marked or designated CRYPTO, must be stored in a manner that affords protection against pilferage, theft, sabotage, or tampering, and ensures that access and accounting integrity are maintained.

CCI Access

Access Requirements for Resident Aliens:

Resident aliens who are U.S. Government employees, U.S. Government contractor employees, or National Guard, active duty, or reserve members of the U.S. Armed Forces may be granted access to CCI provided their duties require access.

Access Requirements for Foreign Nationals:

Non-U.S. citizens who are employed by the U.S. Government at foreign locations where there is a significant U.S. military presence (two or more military bases) may handle CCI material in connection with warehouse functions, provided they are under the direct supervision of an individual who has been granted access to CCI material.

Physical Security

:

Physical security is the COMSEC component that results from all physical measures necessary to safeguard classified equipment, material, and documents from access or observation by unauthorized persons.

When a commander or designated representative has determined that an individual has a need to know and is eligible for access, then access to classified cryptographic information will be formally authorized. The authorization process must include an introduction to the unique nature of cryptographic information, its unusual sensitivity, the special security regulations governing its handling and protection, and the penalties prescribed for its disclosure. Reportable violations include— – Loss of material.

– Unauthorized viewing.

– Capture of individuals having access to COMSEC information

Practice Dangerous TO Security (PDS)

PDSs, while not reportable to the national level (NSA), are practices, which have the

potential to jeopardize the

security of COMSEC material,

if allowed to perpetuate.

Examples of NON-reportable PDSs – (1) Improperly completed accounting reports (i.e., unauthorized signatures, missing signatures or required accounting information, incomplete short title information).

– (2) Physical COMSEC keying material transferred with status markings still intact.

– (3) Mailing of SF 153 Forms with status dates annotated for material listed.

– (4) COMSEC material not listed on account, local element (LE), or user inventory documents when documentation exists to indicate that the material is charged to the account.

– (5) Issue of keying material in hardcopy form marked/designated CRYPTO, without authorization, to a LE more than 30 days before its effective period.

– (6) Late destruction (includes key in a fill device) of COMSEC material (i.e., destruction not completed within the timeframes in this manual), except where a waiver has been

Practice Dangerous TO Security (PDS)

Examples of Reportable PDS outside of the command:

(1) Premature or out-of-sequence use of keying material before its effective date, as long as the material was not reused.

NOTE: Premature use is defined as an on-the-air

Attempt to establish communications/transmit data. If material prematurely used is reused without consent of the CONAUTH, report as a CRYPTOGRAPHIC incident.

(2) Inadvertent (i.e., early) destruction of COMSEC material, or destruction without authorization of the controlling authority (CONAUTH), as long as the destruction was properly documented.

NOTE: Whenever this occurs, annotate the

destruction record of the material as follows: “Material destruction was not authorized, but was properly destroyed and witnessed.

(3) Not completing and returning FC Inventory IAW except where a waiver has been granted.

(4) No Special or Combined Inventory was conducted due to Change of Command IAW Article 766.c.(3) or change of Manager

Emergency Action Plan Emergency Destruction Plan

Emergency Destruction Planning: Three categories of COMSEC material which may require destruction in hostile emergencies are: – COMSEC keying material – COMSEC-related material (e.g., maintenance manuals, operating instructions, and general doctrinal publications) – Equipment

Emergency Action Plan Emergency Destruction Plan

a. Precautionary Destruction: When precautionary destruction is necessary, destroy keying material and non-essential manuals in accordance with EKMS EAP/EDP procedures.

b. Complete Destruction: When sufficient personnel and facilities are available, assign different persons to destroy the material in each category by means of separate destruction facilities and follow the priorities listed herein asincorporated into your EAP/EDP.

Emergency Action Plan Emergency Destruction Plan

• Every command that holds classified COMSEC

or CCI

material must prepare emergency plans for safeguarding such material in the event of an emergency.

• For commands located within the continental United States (CONUS), planning must consider natural disasters (e.g., fire, flood, tornado, and earthquake), civil/mob actions, and terrorism.

• For commands located outside of CONUS and deployable commands, planning must consider both natural disasters

and

hostile actions (e.g., enemy attack, terrorism, mob action, or civil uprising).

These plans will be incorporated into the overall Emergency Action Plan (EAP)/Emergency Destruction Plan (EDP) of the command. Further instructions for EAP/EDP can be found in the EKMS Manual or the S6 shop.

Data Transfer Device

The DTD is an integral component of the EKMS. It is used to securely distribute key generated by the LMD/KP to consumers. The consumers are either an end cryptographic unit (ECU) or another DTD. The DTD is also able to replace current common fill devices (FDs).

Data Transfer Device

The DTD is a small, lightweight, electronically programmable fill device in a ruggedized case. The DTD has a keyboard for input of commands and an alphanumeric screen to display the status of the unit and operator instructions.

Data Transfer Device

For compatibility with existing equipment, the DTD has a 6-pin Input/output connector A fill device application program is provided with the DTD to perform functions comparable to those currently performed by the KYK-13, KYX-15A, and KOI-18. This software also allows the DTD to handle keys with lengths other than 128 bits.

AN/CYZ-10

The AN/CYZ-10 is the full keyboard version and the AN/CYZ-10A is the limited keyboard version of the DTD.

COMSEC Incident

To some degree, every item of COMSEC material is accounted for and controlled because of the role it plays in the cryptographic processes that protect or authenticate U.S. Government information transmitted electrically.

To counter the threat posed to secure communications by COMSEC material mishandling, losses, or thefts

, the National Security Agency (

NSA

) established the National COMSEC Incident Reporting and Evaluation System or

NCIRES

.

COMSEC Incident

The COMSEC incident reporting APPLICABILITY: (1) Classified and unclassified COMSEC keying material marked or designated CRYPTO (includes NSA-produced electronic key and tape key and field generated electronic key generated from a key variable generator (e.g., KG-83/KGX-93/KP) or STU-III Operational and Seed Key.

(2) Controlled Cryptographic Item (CCI) equipment.

(3) Classified COMSEC equipment.

(4) Floppy disks containing key or other EKMS information.

(5) Malicious codes/viruses on the EKMS system.

(6) Classified COMSEC-accountable maintenance manuals, operating instructions, and publications.

Communications/ EKMS Fundamentals

C

PQS Question 107.4 Explain the three different types of “supersession” a. Regular b. Irregular c. emergency

Supersession

COMSEC MATERIAL SUPERSESSION

Supersession refers to a time when a particular item of COMSEC material is no longer eligible for use. COMSEC material is superseded in one of three ways: – Regular – Irregular – Emergency

Supersession Regular

Regular supersession

: is based on a specific,

pre-determined supersession date

for each edition of material. For example, each edition of a monthly key-tape is superseded on the first day of the month after its implementation; each edition of ten-day material is superseded on the 11th, 21st, and the 31st of the month.

Supersession Irregular

Irregular supersession

: it is

not pre-determined

but which

occurs as a result of use

. Editions and individual segments of irregularly superseded COMSEC material are to be destroyed after the material has been used operationally, when the CONAUTH directs supersession, or, in the case of maintenance key, it may be used until the key becomes unserviceable. Irregular supersession is normally associated with one-time pads, test key, maintenance key, publications, and equipment.

Supersession Emergency

Emergency supersession

:

An unplanned change of supersession

, usually as the result of a compromise.

Communications/ EKMS Fundamentals

PQS Question 107.5 Explain the function and the contents of Communications Electronic Operating Instruction (CEOI)

CEOI

The CEOI contains the technical guidance required to establish and maintain communications support of operations. The CEOI amplifies the communication and information systems (CIS) standing operating procedures (SOP) by providing detailed guidance for the coordination and control of communications means and functions.

CEOI

Input is normally requested from subordinate commands by higher HQ. Sufficient copies of the CEOI should be maintained by the issuing HQ to allow issue to other units that may be attached for an operation.

CEOI

The following information and instructions can usually be included in the CEOI: – Call sign assignments.

– Frequency assignments.

– Radio guard charts.

– Radio net identifiers.

– Telephone directory names and numbers.

– Identification and marking panel codes.

– Signal panel message instructions.

– Pyrotechnic and smoke codes. – Ground-to-air signals.

– Sound warning signals.

COMMUNICATIONS-ELECTRONICS OPERATING INSTRUCTIONS (ACEOI)

A locally generated ACEOI containing daily changing frequencies and call signs can be produced to support specific operations or special exercises (Kennel Bear, Gallant Eagle, and homeport field exercises). Units desiring a special ACEOI must submit a written request to higher HQs a minimum of 30 days in advance of the requirement. Units conducting training at deployment sites are required to request frequencies through the local area frequency coordinator.

COMMUNICATIONS-ELECTRONICS OPERATING INSTRUCTIONS (ACEOI)

The request for an ACEOI will contain: • a. Unit(s) involved • b. Inclusive dates, and number of days required • c. Net name(s) or circuit titles • d. Location of adjacent units • e. Number of copies required • f. Required delivery date • g. Point of contact, email address, and telephone number • Note: Call signs contained in a locally generated ACEOI are not compatible with effective editions of the AKAC.

Communications/ EKMS Fundamentals

PQS Question 107.6

Define the following terms: a.

b.

c.

d.

Essential Elements of Friendly Information (EEFI) Commanders Critical Information Requirements (CCIR) Command, Control, Communications, Computers and Intelligence (C4) Communications Information System Officer (CISO)

Commander’s Critical Information Requirements (CCIR) The information required for situational awareness falls into three general categories: – information about the enemy – information about the environment, – information about friendly forces. The identification of CCIRs is a means to focus and direct the collection and processing of information in those categories.

Commander’s Critical Information Requirements (CCIR) CCIRs are the information regarding the enemy and friendly activities and the environment identified by the commander as critical to maintaining

situational awareness, planning future activities, and facilitating timely decision-making

. Designation of CCIRs reduces the volume of information to a manageable level and helps to ensure the accuracy, relevance, and timeliness of that information.

Commander’s Critical Information Requirements (CCIR) CCIRs is comprised of: – priority intelligence requirements (

PIR

s), – friendly force information requirements (

FFIR

s), – essential elements of friendly information (

EEFI

s)

Essential Elements of Friendly Information (EEFI) EEFIs are specific facts about friendly intentions, capabilities, and activities needed by adversaries to plan and execute effective operations against our forces. Identification of the EEFIs is key to planning effective INFOSEC, operations security, and other force protection operations.

Communications Information System Officer (CISO)

The CISO is responsible to the commander for all matters concerning the planning and employment of CIS within the command. As a general or executive staff officer, the CISO serves as an advisor, planner, supervisor, and coordinator.

Command, Control, Communications, Computers and Intelligence (C4) The GCCS implements the joint C4I for the warrior concept. This concept calls for the capability to move a joint force anywhere on the globe at any time and to provide that force with the information necessary to accomplish its mission. The GCCS is a revolutionary approach designed to resolve joint C2 interoperability issues and evolve incompatible, Service-specific C2 programs into a single integrated C2 system. GCCS.

C4I

C4I

MAGTF C4I is the concept for the integration of Marine Corps tactical information systems and the migration of selected systems MAGTF C4I provides commanders and their staffs at all levels of the MAGTF with the capability to send, receive, process, filter, and display data to aid them in their decision-making process. MAGTF C4I also provides a shared situational awareness through a common picture of the battlespace.

Communications/ EKMS Fundamentals

PQS Question 107.7 What is the primary tactical Radio used by the NCF and what man-pack is used in infantry operations.

Single-channel radio

Single-channel radio is the primary tactical means of communication for MAGTF/NCF units. Single-channel radio communications equipment is easy to operate. The networks are easily established, rapidly reconfigured, and, most importantly, easily maintained on the move. Single-channel radio provides secure voice communications and supports limited data information exchange.

Single-channel radio

The most widely employed tactical radios provide integrated communications security (

COMSEC

) and jam resistance through

frequency hopping

. Tactical Single-channel radios operate in the three military radio frequency bands HF- high frequency VHF- very high frequency UHF- ultra high frequency

Single-channel radio

Single-channel radio:

VHF

and

UHF

bands is normally limited to line of sight.

HF

band can support long-range communications. Satellite Communications (

SATCOM

) provides mobility, flexibility, and ease of operation with unlimited range.

Single-channel radio

SINGARS

The primary MAGTF/NCF VHF radio is the single channel ground and airborne radio system (SINCGARS). SINCGARS is a family of lightweight combat radios that serves as the primary means of communications for command and control and fire support on the battlefield.

SINGARS

The system provides high security against threat electronic warfare (EW) by using

frequency hopping with integrated COMSEC

. It is capable of voice and data transmission (up to 16 kbps under optimum conditions and over limited distances) over the VHF-FM frequency range of 30 to 87.975 MHz

AN/PRC 119

Man-pack AN/PRC-119 is typically used in infantry operations,

AN/PRC 119

3 ft tape, 10 ft whip antennae 30 to 87.975 MHz freq.

2320 channels/freq.'s Sends and receives secure voice and digital data 6 secure channels for SC or frequency hopping 2 additional Single Channels (SC) for plain text Transmits 200 meters to 10 Kilometers or more Batteries last 4 (BB690) to 30 (BA5590) hrs depending on type & use

Communications/ EKMS Fundamentals

PQS Question 107.8 Identify the following capabilities for the “ Radio” Transmitter Transmitter (RT) 1523: (AN/PRC119) a. Characteristics b. Frequency range c. Configuration d. Antennas e. Power Sources

AN/PRC-119

AN/PRC 119A General Characteristics

• VHF SINCGARS Radio • 30 to 87.975 MHz freq.

• 2320 channels/freq.'s • Sends and receives secure voice and digital data

AN/PRC 119A General Characteristics

• 6 Comsec channels/ 6 Frequency hopping channels • 8 Single Channels (SC) for plain text • Transmits 200 meters to 10 Kilometers or more • Batteries last 4 (BB690) to 30 (BA5590) hrs depending on type & use

AN/PRC 119A Antenna Systems

• Antenna Systems – 3ft Tape- up to 5 miles – 10ft whip- up to 10 miles – OE-254- up to 36 miles

Communications/ EKMS Fundamentals

PQS Question 107.9

Identify the following capabilities for the “Radio” Receiver Transmitter (RT) 1694 (AN/PRC) 150: a. Characteristics b. Frequency Range c. Configuration d. Antennas e. Power sources

AN/PRC-150

AN/PRC-150

Communications/ EKMS Fundamentals

PQS Question 107.10

Identify The Following Capabilities For The “Radio” Receiver Transmitter (RT) 1796 (AN/PRC 117) a. Characteristics b. Frequency Range c. Configuration d. Antennas e. Power sources

AN/PRC-117

Communications/ EKMS Fundamentals

PQS Question 107.11

Explain The Functions Of The Following Communications Assets: – Satellite Signals Navigations (AN/PSN 11) – Data Transfer Device (AN/AZY-10)

• • • • • •

Global Positioning System AN/PSN 11

General Characteristics PLGR - “Plugger” GPS Receives encrypted code Anti-jam capability

AN/CYZ-10

AN/CYZ-10

The DTD is cargo-pocket size, weighs1.5 pounds, and requires three 3-volt batteries or one 9-volt battery. DTD’s primary function is to serve as a common fill device to load COMSEC keys into any cryptographic equipment. The DTD can receive, store, and transfer frequency hopping data between DTDs or PCs. The DTD can also receive, store, display, and edit CEOI information and transfer one time period of CEOI information over the air by using a SINCGARS radio.

Communications/ EKMS Fundamentals

PQS Question 107.12

Discuss The Proper Use Of The Phonetic Alphabet, Numerals, and Pro-words.

Phonetic Alphabet

Numerals

Pro-words

Pro-words

Communications/ EKMS Fundamentals

PQS Question 107.11

Explain Line-of sight (LOS)

Line-of-Sight

Line-of-Sight

The direct wave is that part of the radio wave which travels directly from the transmitting antenna to the receiving antenna. This part of the wave is limited to the line of sight (LOS) distance between the transmitting and receiving antennas, plus the small distance added by atmospheric refraction and diffraction of the wave around the curvature of the Earth.

This distance can be extended by increasing the height of the transmitting antenna, the receiving antenna, or both.

Communications/ EKMS Fundamentals

PQS Question 107.14

Discuss the purpose of a Retransmission (RETRANS) site.

Retransmission Site

The Operation of single channel radios in Mountainous or in urbanized terrain is poor due to factors such as terrain, electrical interference and climatic conditions. To improve Communications a Retransmission site is put in place usually at a high point so that the obstacles blocking the transmission paths can be redirected to establish a positive line of sight.

Retransmission Site

HF radios do not require or rely on line of sight as much as VHF radios because operating frequencies are lower, and power output is greater. The problem is that HF radios are not organic to small units. To overcome this, the VHF signals must be retransmitted.

Retransmission Site

Retransmission stations in aerial platforms can provide the most effective means if they are available. Organic retransmission is more likely to be used. The antenna should be hidden or blended in with surroundings. This will help prevent the enemy from using it as a landmark to “home in” his artillery bombardment. Antennas can be concealed by water towers, existing civilian antennas, or steeples.