Communications are essential
for gathering data and planning operations and supervising performance.
Communications are also essential for performing C2 functions.
Effective management of DISCOM functions depends on adequate communications
to keep abreast of changing situations and requirements.
The DISCOM relies on its organic
communications assets and the division signal battalion for communications
support. A large number of units operate in the DSA. This density
factor may require support units to find alternate methods for
communication. The length of transmissions and the accuracy with
which they are sent directly affect the support mission. CSS planners
should consider using couriers and wire communications as alternatives
for getting the support mission done. These alternatives lessen
the security risk of substantial radio use.
Communications equipment and
systems in the corps and division are changing. The current area
communications system is described below. This system will be
replaced by the MSE system. Current FM (AN/VRC-12 series)radios
and AM (AN/GRC-106) radios will be replaced by the SINCGARS and
the improved high frequency radios.
These changes will affect
the DISCOM in the area of connectivity to the area system. The
command operations company of the division signal battalion installs,
operates, and maintains the automatic telephone and switchboard
facilities for access to the area system. The company also installs
and maintains local subscriber circuits. Under MSE, DISCOM personnel
will run wire from unit locations to the MSE interface point.
The amount of wire needed is based on the dispersion requirements
of the particular situation.
With the deployment of MSE,
the wire-laying for all units will have to be covered by unit
SOP. It must cover who does it and in what priority, The actual
communications means will remain essentially the same. The DISCOM
will depend on combat net radios and wire to access the area communications
system. Automated hardware systems terminals will be subscribers
to the area system via wire.
Figure 4-1 depicts the current
area communications system. The command operations company of
the division signal battalion provides communications support
for the DISCOM HHC/MMC. The following is a list of the communications
facilities and services provided by this company:
-
Installs and operates a radio
teletypewriter terminal in the division's general purpose net.
-
Installs and maintains cable
and wire for local telephone circuits. DISCOM personnel will help
the signal battalion personnel during the initial installation.
-
Installs and operates the
multichannel terminals in the division communications system.
- Installs, operates, and maintains automatic telephone and switching facilities. These facilities provide access to the area system and local telephone subscriber circuits (DISCOM switchboard).
-
Provides telephone equipment
for the DISCOM HHC and DMMC (see Figure 4-2).
-
Provides a record traffic
receiving and distribution center.
-
Installs and operates a net
radio interface facility for single channel voice radio access
to the division's telephone system.
Under MSE, the existing 2-wire switchboards and telephones will not be compatible with the 4-wire digital system. The DISCOM HHC, however, will keep the switchboard for internal operations and for local security.
MSE is the area common user
voice communications system within the corps. It is the primary
means for command and control from the corps rear to brigade rear.
It will be deployed from the corps rear boundary forward to the
maneuver battalion main CP. The MSE system is comprised of four
functional areas:
-
Area coverage.
-
Wire subscriber access.
-
Subscriber terminals.
-
Mobile subscriber access.
Area coverage means that MSE provides common user support to a geographic area, as opposed to dedicated support to a specific unit or customer. Figure 4-3, shows the deployment of area nodes across a corps area. These nodes are called node centers. These centers are shown in Figure 4-4. They are under the control of the corps signal officer,
At division level, the signal
battalion operates four of these nodes. The small and large node
extension switchboards are connected to these nodes via line-of-
sight radios. The following switchboards are organic to the division
signal battalion:
-
16 SEN switchboards capable
of supporting 26 to 41 subscribers each.
-
1 LEN switchboard capable
of supporting 176 customers.
Figure 4-5 shows
a typical deployment of switchboards within the division. The
G3 will determine the location of switchboards based on the recommendations
of the division C-E officer.
The C-E officer considers
the commander's intent, customer requirements, and other factors
of METT-T.
Telephone installer-repairer
personnel install and maintain local telephones for the DISCOM
headquarters.
Under MSE, the existing 2-wire
switchboards and telephones will not be compatible with the 4-wire
digital system. The DISCOM HHC, however, will keep the switchboard
for internal operations and for local security.
Switchboard locations cannot
be consistently related to specific units.
Wire subscriber access points
will provide the entry point (interface) between fried subscriber
terminal and the MSE area system. The fixed sub-scriber terminaland its equipment are owned and operated by the users. The signal
units operate the MSE area system. Figures 4-6 and 4-7
show the MSE switchboard configurations. It is through one of
these configurations that the DISCOM HHC/MMC ties into the area
system.
The following are the two
types of interface points:
-
The signal distribution panel
(junction box) J1077. Each panel can provide up to 13 subscriber
access points.
-
Remote multiplexer combiners
which provide up to eight subscriber access points.
Subscriber terminals used
by the DISCOM are digital nonsecure voice telephones. These provide
full duplex digital, 4-wire voice as well as a data port for interfacing
the AN/UXC-7 facsimile (informal record traffic). The TACCS computers
(for CSS STAMIS), the AN/UGC-144 (single subscriber terminal for
formal record traffic), the unit-level computers (for the unit-level
logistics STAMIS), and the ATCCS (for the CSSCS) will interface
through these terminals. Figure 4-8 portrays the assignment
of this equipment for the DISCOM HHC/MMC.
The MSE mobile subscriber
terminal is the AN/VRC-97 mobile subscriber radiotelephone terminal.
This MSRT consists of a very high frequency radio and a digital
secure voice terminal. This is a vehicle-mounted assembly.
The MSRT interfaces with the MSE system through a radio access
unit. The primary use of the MSRT is to provide mobile subscribers
access to the MSE area network. Figure 4-9 portrays a typical
MSRT interface into the area system. RAUs are deployed to maximize
area coverage and MSRT concentrations. MSRTs can also operate
in CPs to allow access to staff and functional personnel. Figure
4-8 represents assignment of MSRTs in the DISCOM, The MSRT user
will have a KY68 telephone connected to the radio mounted on his
vehicle. As long as the radio unit has line-of-sight contact with
the RAU, it has connection into the area system. The operational
planning range is 15 kilometers from any RAU.
The combat net radio structure
is designed around three separate radio systems; each has different
capabilities and transmission characteristics. The three systems
are --
- SCOTT.
- IHFR
-
SINCGARS
Current CNR equipment in the
DISCOM consists of the AN/GRC-106 and the AN/VRC-12 series radios. These will be replaced
by IHFR and SINCGARS series respectively. SINCGARS is a
new family of VHF-FM radios. These radios are designed for simple,
quick operation using a 16-element. keypad for push-button tuning.
They are capable of short-range or long-range operation for voice
or digital data communications. The planning range is 8 to 35
kilometers. They also operate in a jam-resistant, frequency- hopping
mode. This can be changed as needed. IHFR is a family of high
frequency radios. Radios include the AN/PRC-104 manpack radio and
the AN/GRC-193 the vehicular radio.
The DISCOM command/operations
net is the principal net operated by the DISCOM headquarters.
See Figure 4-10 . This net is a backup to MSE. It is
used to command and control elements of the DISCOM in the performance
of its logistics mission. The net control station is the S2/S3
section. Stations in this net monitor the division command/operations
net and the division intelligence net. This net is also used for
rear operations as required.
This net supports the technical
aspects of logistics support to the division. See Figure 4-11
. It maintains continual communications between components
of the DMMC for coordination of critical areas (Class I,
III, V and maintenance management). The net control station is
the DISCOM materiel management office.
These branches are subordinate
to the general supply section. However, they are also distinct
operating entities within the DMMC. The Class I supply branch
officer has a radio for Class I operations. The Class III and
water supply branch officer has a radio for Class III operations.
Each branch uses the mobile station in this net. This is done
to coordinate with other DISCOM elements on issue points, problems,
shortages, excesses, and requirements. Agents of these branches
are constantly traveling within the division and brigade areas
to ensure the smooth functioning of their respective supply operations.
The Class II-IV supply branch
technician does not have a radio assigned to the section. He has
access to the net by using radios assigned to other branches in
the DMMC. The layout of the DMMC will determine which branch radio
he will use.
The DAO uses the materiel management net to provide coordination and control necessary to monitor ammunition supply. The DAO uses a mobile station in this net to solve problems while on the move. The DAO must always be able to communicate with the DMMC chief. The DAO communicates with the G3 and the COSCOM MMC Class V section via the area communications system. He communicates with each support battalion via the materiel management net.
Within this net, the DAO has
a radio. The ammunition supply technician, the chief ammunition
NCO, and the ammunition inspection NCO share a radio. They normally
operate from the DMMC field location. The two radios are in separate
trucks. These radios provide a communication link with the division
and brigade ammunition NCOs located at the ATPs. The ATP NCOs
have a radio and can communicate with these two sources for their
information and guidance.
The materiel officer uses
his mobile station in this net to coordinate with the DMMC. This
allows for the quick resolution of materiel problems throughout
the division.
This net provides along-range
command and control link for the DISCOM. This is especially helpful
when the division is operating over extended distances. It also
provides a long-range link to the COSCOM elements as required.
The net control station for this net is the DISCOM support operations
branch (Figure 4-12).
The chief of the DMOC uses
this net to coordinate patient medical regulating, air/ground
evacuation, and emergency medical resupply. This coordination
is with the division medical companies and corps medical brigade
elements (Figure 4-13).
COMSEC consists of measures
taken by a unit to prevent unauthorized persons from gaining information
of value from communications. It includes crypto-security, physical
security, transmission security, and emission security.
Supervisors must prescribe
policies and procedures for safeguarding COMSEC materiel during
tactical operations. They must also provide instructions for implementing
emergency procedures during operations. The responsibility for
safeguarding classified COMSEC information rests not only with
the commander but with every individual in the command. This especially
applies to those people who handle, store, use, or have knowledge
of subject information.
The sensitivity of COMSEC
information dictates that it be available only to those personnel
who have a need to know. A person's office, position, or security
clearance does not automatically entitle him access to COMSEC
information. However, all personnel who require access to classified
COMSEC information must have the appropriate security clearance.
COMSEC materiel must be requested
in advance. The COMSEC custodian must be informed at least 24
hours prior to the requested pickup time. Users are issued COMSEC
materiel on a SF153 (Hand Receipt).
Hand-receipt holders/users physically verify the serial numbers and quantity of COMSEC materiel they are receiving against the hand receipt. This is done prior to signing for the materiel and ensures there are no discrepancies. These hand-receipt holders cannot and will not subhand-receipt COMSEC materiel they have on hand receipt without prior approval of the COMSEC custodian.
The prompt reporting of physical
and cryptographic security violations and compromises is essential
to the maintenance of adequate communications security. A compromise
results from any occurrence that enables unauthorized persons
to derive useful information from encrypted communications.
A compromise may result from
either of two types of insecurities. Physical insecurities occur
when classified information is lost or possibly ex- posed to an
unauthorized person. This includes information subject to compromise
through personnel insecurities. Personnel insecurities include
detection, unauthorized absence, deliberate or inadvertent disclosure
to an unauthorized person, and the removal of recognition. a security
clearance for cause.
Any known or suspected compromise
or other security violation must be reported immediately to the
commander, COMSEC custodian, or supervisor. He will in turn determine
the necessary actions to be taken.
Destroy all superseded COMSEC
materiel beyond recognition.
OPSEC deals with protecting
friendly military operations and activities by identifying the
EEFI and providing appropriate protection to those EEFI. It aids
in keeping the enemy from learning how, when, where, and why US
forces do something. A basic OPSEC program would consist of four
phases.
Initially, the commander identifies
what operations, activities, and projects must not be compromised
to ensure accomplishment of his overall mission. These identified
areas are translated into the command's security objectives. The
CSO are usually stated broad terms (for example, "prevent
technology transfer of the...technology"; "achieve surprise
fielding of the ...weapon systems"; or "prevent disclosure
of the unit's readiness and deployment posture"). CSO properly
stated indicate "what we are doing and why we are doing it."
The CSO are used as a basis
to develop EEFI. EEFI are specific, critical, and sensitive items
of information that individually or collectively need protecting.
Protection will preclude the compromise of the CSO. Information
such as specific dates, times, locations, intentions, and capabilities
may need to be protected.
EEFI can include both classified
and sensitive unclassified information. Sensitive, unclassified
information is information which could give an insight into an
area of classified information or divulge CSO. A combination of
more than one piece of sensitive, unclassified information may
contain sufficient detail to warrant classification. Disclosure
of this sensitive, unclassified information could have negative
results on future operations, activities, or projects.
The threat is determined by
evaluating the capabilities of foreign intelligence services to
collect EEFI. The threat profile should evaluate foreign intelligence
awareness, their motivation, and their capability to collect information.
The profile should also give you what the probability will be
of your operation, activity, or project being targeted. Collection
of intelligence information by foreign intelligence service is
accomplished by a variety of means. The following disciplines
normally will be included in a multisource intelligence threat:
-
HUMINT is intelligence obtained
by using people to gather various items of information. HUMINTcollection involves both overt and clandestine operations. Examples
of overt operations would include information obtained from public
records and unclassified publications and newspapers. Clandestine
operations include people eavesdropping on conversations and conducting
surveillance or special operations.
-
SIGINT is intelligence obtained
by intercepting electronic signals. This information is obtained
by intercepting telecommunications signals, such as telephone
or radio conversations (normally referred to as COMINT). Information
also is obtained by intercepting electromagnetic nondata-related
radiations, such as radar signals (normally referred to as ELINT).
Signal security is an overall term for the security measures taken
to deny collection of information from COMINT and ELINT operations.
-
IMINT is intelligence obtained
through the use of photographic, infrared, or radar imagery equipment.
Satellites, aircraft, and land or sea based vehicles/vessels can
house imagery equipment. IMINT also can be provided by human sources
who employ imagery equipment.
The unit OPSEC officer works
with the CI section to develop a unit profile. With a profile,
the OPSEC officer can determine what information a foreign intelligence
service might collect. This profile allows a unit to see itself
as the enemy would see it. A profile consists of patterns and
signatures, Patterns are stereotyped actions which so habitually
occur in a given set of circumstances that they cue an observer
(foreign intelligence service). So habitual are these actions,
that the observer is able to determine the type operation/activity/project,
its capabilities, or its intent. Signatures provide the identification
of the operation/activity/project. Signatures result from unique
visual (imagery), electromagnetic, olfactory, or sonic displays.
A unit profile is developed by a team. The team should observe
every facet of the operation to identify patterns and signatures.
The team members should be knowledgeable in specific aspects of
the operation/activity/project. Separate profiles should be developed
for the following areas: operations/maneuvers, communications/electronics,
intelligence, logistics, and administration/support.
Once the threat is identified
and a profile developed, a risk assessment is prepared. The assessment
centers on the operation/activity/project's vulnerability to collection.
All EEFI must be considered in this assessment. The assessment
considers numerous factors. Examples of some factors are the project
sensitivity, or the known, or suspected collection priority by
foreign intelligence service. The operating environment, the proximity
to inter-national borders, and security programs are some additional
factors. Security education as well as physical and natural barriers
are also factors to be considered. An assessment of where, how,
and why an operation/activity/project is vulnerable naturally
leads to recommendations on how to reduce these vulnerabilities.
A countermeasure is any action
taken to eliminate or reduce a vulnerability to collection. When
recommending countermeasures, planners should consider on-the-spot
corrections which effectively minimize or neutralize identified
vulnerabilities. Low cost/no cost solutions must be sought and
emphasized. Such recommendations may be of a temporary or permanent
nature. Temporary recommendations to neutralize a vulnerability
usually relate to an event. When the event takes place, further
action is no longer required. Where extensive corrections must
be taken or high costs are involved, recommendations should be
prioritized to permit an incremental approach for adoption that
is phased over a period of time. A commander's decision on what
countermeasures to implement relate directly to risk versus cost
benefit.
Principal components of any
OPSEC program include physical security, information security,
signal security, security education, and at times, deception operations.
Physical security measures
may include a badge and pass system, security guards, and perimeter
fencing. Such measures should be included, as appropriate, when
you develop your OPSEC program. A good reference for physical
security is FM 19-30.
Information security is also
of vital importance to the OPSEC program. Security procedures,
such as using only approved storage containers, double-checking
offices prior to departure, and ensuring the "need-to-know,"
are measures that can be taken to protect classified and sensitive,
unclassified information. AR 380-5 contains important provisions
dealing with information security.
SIGSEC includes all measures
taken to deny collection of information from both COMINT and ELINT
operations. Something as simple as not discussing classified or
sensitive, unclassified information over the telephone can greatly
assist in maintaining the security of an operation, installation,
or activity.
Security education consists
of initial security orientations, refresher briefings, foreign
travel briefings, and debriefings. The focus of the training and
education program is to highlight to all personnel, the threat
that exists to classified and sensitive, unclassified information.
The program also provides measures to be taken to reduce that
threat to the lowest practical level. One objective of any security
education program is to convince the individual that this is information
he needs to learn. Without an awareness of the need for security
on the part of all personnel, other security measures, such as
fences, guards, and alarms, are reduced in effectiveness.
Automated systems are vulnerable
to destruction, physical security of hardware devices but security
of sabotage, and compromise. Security includes not only programs
and procedures. Detailed guidance on automated systems security
is provided in AR 380-380. The following physical and security
practices must be established for use of TACCS or other microcomputers
-
-
Locate the computer within
an enclosure that provides controlled access.
-
Secure all electrical facilities
that support the system.
-
Store magnetic media storage
containers at least 20 inches from an exterior wall. (This helps
provide protection against the potential effects of magnetic fields
or radiation.)
-
Restrict physical access to
magnetic diskettes.
-
Require that authorized operators
have at least an interim confidential security clearance.
-
Restrict access to the computer
site by the use of classified passwords.
-
Rotate unique operator passwords
every 30 days or less.
-
Control all log-ons and file
access by unique operator passwords.
-
Monitor device usage.
-
Restrict the access of visitors.
-
Monitor report distribution
plans.
-
Reduce the number of copies
of each report.
-
Destroy all printouts of reports
and lists as new ones are printed.
NEWSLETTER
|
Join the GlobalSecurity.org mailing list |
|
|