Create an account
The Purpose of a Red Cross Message
Family members can use to notify service members of an emergency or other important event; following the death or serious illness of a family member or other important events, such as the birth of a child.
- information/verification in a message assists the service member's CO in making a decision regarding emergency leave.
AUTOMATED DIGITAL NETWORKING SYSTEM
- connect Navy shipboard networks to other ship & shore networks for transferring Internet Protocol (IP) data of various classification levels
COMMON USER DIGITAL INFORMATION EXCHANGE SUBSYSTEM
- provides a 2400 baud full duplex interface, over a satellite link with mobile platforms, for the receipt & transmission of narrative message traffic between FMX & mobile platforms equipped with afloat automated systems.
VLF DIGITAL INFORMATION NETWORK
- Broadcast system provides a highly reliable and secure system for worldwide delivery of operational, tactical & administrative messages from the Fleet Submarine Broadcast System and Minimum Essential Emergency Communications Network.
NOVA (Automated Message Store & Forward)
UNIX based, base-level Mode 1 store & forward terminal to relay messages to other commands outside the immediate area of responsibility, services & agencies.
For message accountability purposes, the system assigns a unique Processing Sequence Number to each message received.
- Provides duplicate checking & FIFO by precedence processing.
INTEGRATED BROADCAST SYSTEM
- Integrated several existing intelligence & information dissemination systems into a single system of broadcasts that will allow for the receipt of data via a single receiver (the joint tactical terminal)
- Will disseminate threat avoidance, targeting, maneuvers, force protection, target tracking & target/situation awareness information & will be continuously refined by data from national, theater & tactical sensors
INTERNATIONAL MARITIME SATELLITE
- Multipurpose commmercial SATCOM system providing both simultaneous voice & IP data up to 128 Kpbs.
DEFENSE MESSAGING SYSTEM/ NAVY REGIONAL ENTERPRISE MESSAGE SYSTEM/ AUTOMATIC MESSAGE HANDLING SYSTEM
- DMS - employs the messaging & directory services using internationally recognized COTS-based X.400 and X.500 messaging & directory products
- NREMS - web-based messaging capability that allows users (with accounts) to send & receive DMS messages using a web browser or via SMTP
- AMHS - provides simplified message drafting, coordination & release of outgoing messages & a message internal distribution & delivery function for incoming messages; web-based interface to NREMS.
Extension of traditional telephony technologies with the added feature of being able to see the person/persons with whom one is talking.
DEFENSE CONNECT ONLINE
- Provides all of the benefits of the world's best of breed collaboration capabilities in Adobe Connect & an XMPP chat service to DoD.
1. Warning sent over the net to alert operators that hostile forces are attempting to intrude on the net by Imitative Communications Deceptions (ICD)
2. When an operator recognizes/suspects that net is being subject to ICD, they will:
- Announce GINGERBREAD on the net
- Give the call sign of the suspected deception station
- Authenticate the stations on the net
- Notify the radio supervisor & make an entry on the circuit log
- Notify the Communications Officer & request further instructions.
3. Secure voice nets are normally exempt from GINGERBREAD, however, GINGERBREAD may be used if necessary.
Discuss Types of Disclosures Afforded Protection by the EEFI List
ESSENTIAL ELEMENTS OF FRIENDLY INFORMATION
- Established to identify specific items of information which, if acquired by an adversary, would degrade the security of military operations, special projects, etc.
- As means to rapidly identify an EEFI violation on an uncovered radio telephone circuit, the BEADWINDOW code was developed to provide a means for immediate notification of insecure practices.
- The standardized EEFI listing and associated BEADWINDOW code is promulgated for Navy wide implementation and posted in clear sight of operators at all insecure voice positions for rapid reference.
Friendly or enemy position, movement or intended movement: positions; course; speed; altitude; or destination of any air, sea or ground element unit or force.
Friendly or enemy capabilities/limitations: force composition or identity; capabilities, limitations or significant casualties to special equipment, weapon systems, sensors, units or personnel; percentages of fuels or ammunition remaining.
Friendly or enemy operations, intentions, progress or results: operational or logistic intentions; assault objectives; mission participants; flying programs; mission situation reports; results of friendly or enemy operations.
ELECTRONICS WARFARE 04
Friendly or enemy EW/EMCON intentions, progress or results: intention to employ EMC; results of friendly or enemy ECM objectives of ECM; resutls of friendly or enemy ECCM; results of ESM; present or intended EMCON policy; equipment affected EMCON policy.
Friendly or enemy key personnel: movement or identity of friendly or enemy flag officers; distinguished visitors; unit commanders; movements of key maintenance personnel indicating equipment limitations.
Friendly or enemy COMSEC breaches: linkage of codes or code words with plain language; compromise of changing frequencies/linkage with line numbers/circuit designators; linkage of changing call signs with previous call signs or units; compromise of encrypted/classified call signs; incorrect authentication procedure.
WRONG CIRCUIT 07
Inappropriate transmission: information requested, transmitted or about to be transmitted which should not be passed on the subject circuit because it either requires greater security protection or is not appropriate to the purpose for which the circuit is provided.
A real-time procedure which brings to the immediate attention of circuit operators the fact that an EEFI (Essential Elements of Friendly Information) disclosure has (or may have) occurred.
- The technique uses a code word & a number combination which is transmitted immediately by any net member to the unit disclosing the EEFI.
- At no time will the validity of the BEADWINDOW be discussed on the net.
- Proper response for a net member receiving a BEADWINDOW will be "ROGER OUT" using proper net call signs.
An OPSEC tool that limits communication
- Conditions provide procedures to control outgoing paths from ships & shore systems (e-mail, web browsing, POTS, cell phones) for the purpose of OPSEC & force protection.
Prior to commencing sensitive planning/operations that could be compromised by inadvertent communications/information release, River City condition should be considered with the following guidance.
- Implementation requires commands to develop a prioritized information systems users list that identifies users by their need to access systems to perform mission essential duties.
- List should not be solely based on rank/pay grade, but based on function & placed into an appropriate user group to support mission accomplishment
- Users who don't require access to systems to support mission planning/accomplishment should be grouped accordingly.
JSIR (JOINT SPECTRUM INTERFERENCE RESOLUTION)
Designed as a replacement for the Meaconing, Intrusion, Jamming, and Interference (MIJI) program, disestablished 30 June 1992.
The intentional transmission of signals designed to deceive users of navigational aids (tactical air navigation, GPS, non-directional beacon, instrument landing system, etc.)
Example: Attempting to draw aircraft across an international border by transmitting false VHF Omnidirectional Radio Range signals.
The intentional insertion of EM energy into transmission paths in any manner, with the objective of deceiving operators or causing confusion.
The deliberate radiation , re-radiation, or reflection of EM energy for the purpose of preventing or reducing an enemy's effective use of the EM spectrum & with the intent of degrading/neutralizing the enemy's combat capability.
Develop & maintain the JSIR database, interference resolution tools (e.g., SPECTRUM XXI), & direction finding & spectrum monitoring equipment.
- The JSC will maintain an automated databse of interference incidents, resolutions, & lessons learned from the historical interference reports addressed to the JSC.
- This database will provide status tracking, support trend analysis & facilitate interference analysis & will be accessible to DoD components.
PLA (PLAIN LANGUAGE ADDRESS)
The only designators authorized for use in Naval message addressing by Navy, Marine Corps & Coast Guard activities.
- Spelling and format accuracy when using a PLA in the action & information address format lines (format lines 7 and 8 respectively) is paramount.
- Non-conformance will result in message rejection & delay delivery of message traffic.
Designed to prevent using duplicate DTG's on messages from the same originator (DDHHMMZ MMM YY)
COORDINATED UNIVERSAL TIME
- Prevents confusion between the different zones & types of time.
- All time in UTC is suffixed with a Z for identification; referred to as "Zulu" time.
- The term Coordinated Universal Time & abbreviation UTC, by international agreement, have replaced the older term Greenwich Mean Time & the older abbreviation GMT which is no longer recommended in technical contexts.
Navy F/L Message Component
Security warning, security classification code, transmission release code (TRC), special handling designator(s) (SHD) transmission instructions (ZNR UUUUU)
Navy F/L Message Component
Precedence, originator's date-time-group, message instructions
R 181230Z JUL 07
Navy F/L Message Component
End-of-message (EOM) validation consisting of number sign (#) & 4-digit station serial number (SSN) (#1234)
Define the following message precedence:
Flash (As fast as possible with an objective of less than 10 minutes)
- A multi-step process of developing & implementing voice & data communications in support of unit & fleet missions.
- Derived from OPTASK COMMS
TELECOMMUNICATIONS SERVICE ORDER
The authorization from Headquarters, DISA, a DISA area, or DISA-DSC to start, change, or discontinue circuits or trunks & to effect administrative changes.
TELECOMMUNICATIONS SERVICE REQUESTS
A valid, approved, & funded telecommunications requirement submitted to DISA/DISA activities to establish service.
- may not be issued except by a specifically authorized TCO.
- EXAMPLE: Fleet units submit TSR's to request/fund POTS service to their unit.
Communications Spot (COMSPOT)
Reports will be submitted by all ships & shore facilities at any time communication outages/degradations are encountered.
- Submit to servicing NCTAMS & communications station respectively, info to the appropriate numbered fleet commander & ISIC.
- Timely submissions of COMSPOT reports are required within 30 minutes of outage
- Updates provided every hour or upon significant change in status.
- If systems can not be restored within 48 hours, submission of CASREP will be sent in accordance with Joint Force Maintenance Manual.
Communications Service Advisory
Reports will be submitted by shore facilities at any time communication outages/degradations are encountered
- Advisory sent out anytime more than one unit has experienced an outage on a particular communications system.
Electronic Key Management System (EKMS)
EKMS-1B prescribes the minimum policies for issuing, accounting, handling, safeguarding, and disposing of COMSEC (Communications Security) material.
- also prescribes policies pertaining to the application of cryptographic and physical security measures involving COMSEC material & facilities.
OVER-THE-AIR TRANSFER (OTAT)
Net Control Stations (NCSs), Circuit Control Offices, and Operational Commaders are authorized to transmit key, which is obtained through normal channels or is locally generated, over-the-air interconnecting stations or supporting units
- Note: Only established secure circuits that employ crypto systems designated for OTAT may be used. The Key Encryption Key (KEK) must be equal to/higher in classification that the Traffic Encryption Key (TEK)
Over-the-Air Rekeying (OTAR)
NCSs and Circuit Control Officers are authorized to conduct OTAR with key that is obtained through normal channels or is locally generated, and rekey reomote circuits under their control that employ crypto systems designated for OTAR
The code name given to the investigation, study & control of compromising emanations from telecommunications & automated information processing systems
- Used to analyze & measure unwanted signal leakage do to equipment radiation.
In control of all electromagnetic & acoustic radiations, including communications, radar, EW & sonar.
- During its imposition, no electronic emitting devices within designated bands, including personal communications devices, will be operated unless absolutely essential to the mission.
- The OTC/his designated subordinate commander is responsible for imposing EMCON.
Please allow access to your computer’s microphone to use Voice Recording.
Having trouble? Click here for help.
We can’t access your microphone!
Click the icon above to update your browser permissions and try again
Reload the page to try again!Reload
Press Cmd-0 to reset your zoom
Press Ctrl-0 to reset your zoom
It looks like your browser might be zoomed in or out. Your browser needs to be zoomed to a normal size to record audio.
Please upgrade Flash or install Chrome
to use Voice Recording.
For more help, see our troubleshooting page.
Your microphone is muted
For help fixing this issue, see this FAQ.
Star this term
You can study starred terms together