130 92 14MB
English Pages 63 Year 2023
PARTISAN RADIO OPERATIONS
BILL STOKER
PARTISAN RADIO OPERATIONS
BILL STOKER
© 2023 The Partisan Radio Operations is a view of the forest and introduction to the trees of e ective communications.
ff
Bill Stoker www.YouTube.com/stokermatic www.stokermatic.com
TABLE OF CONTENTS
RADIO THEORY…………………………………………………………….…1 COMMUNICATIONS PLANNING……………………………………….…11 RADIO FREQUENCIES……………………………………………………..16 RADIO TTP’S…………………………………………………………………22 SECURE COMMUNICATIONS……………………………………………..31 ENCODED COMMUNICATIONS…………………………………………..35 P.A.C.E. PLAN………………………………………………………………..43 OPERATIONAL CONSIDERATIONS………………………………………47
PROLOGUE
fi
The criticality of command and control as a war ghting function cannot be overstated. Without the ability to communicate, you cannot conduct synchronized operations.
Chapter 1 RADIO THEORY ELECTROMAGNETIC RADIATION In radio, we are concerned with the electric and magnetic elds, and based on testing and observation, we can predict how these elds behave and the relationship between them. When an electric eld is changing, a magnetic eld is being created and when a magnetic eld is changing, an electric eld is being created.
The creation of radio waves requires a current whose frequency is at least 10,000 Hz (1 MHz). An oscillator is used for creating voltages that can be made to surge back and forth at a speci c frequency and when RF energy is applied to a conductor (or antenna), the antenna resonates (or vibrates). The antenna provides a means of radiating the electromagnetic waves into the air.
RADIO WAVES Radio wave movement can be best understood by thinking of a wave rippling in a pond of water. When you toss a rock, a disturbance is created sending ripples (waves) in equally spaced circles. Imagine there are leaves on the body of water. As the ripples pass through where the leaves are, they seem to bob up and down. The energy that was transferred from the rock hitting the surface of the water with a speci c
fi
fi
fi
fi
fi
fi
fi
fi
1
measurement has now been transmitted (propagated) to the leaves.
Radio waves are a combination of a magnetic eld at a right angle to an electric eld. Both oscillate at a speci c frequency and travel together in a direction perpendicular to both elds. One key feature is the orientation of the elds with the earth. This is called polarization. An antenna is vertically polarized if the electric eld is vertical to the earth’s surface or horizontally polarized if it’s horizontal to the earth’s surface.
The signal radiated from the antenna creates an electromagnetic disturbance (the rock hitting the surface of the water) that spreads through space. When these waves reach another antenna, some of their energy is transferred to the antenna (leaves on the water). The EM waves sets up a small current, which can then be ampli ed and reproduced as a radio signal by the receiver. The act of a radio wave traveling from one point to another is called propagation. When a radio wave is radiated from an antenna, it begins its path in a variety of directions (wave forms); however,
fi
fi
fi
fi
fi
fi
fi
2
the primary (or intended) path is determined by the propagating characteristics and the direction in which it is radiated.
There are di erent types of waves (transmission paths) - the ground wave, the sky wave, and the direct wave. Ground waves travel near the surface of the earth and are greatly a ected by the earth’s conductivity and obstructions (buildings, terrain features, etc); however, they are generally e ective for local communications. Sky waves are propagated at such an
angle, that they travel up through the atmosphere, striking the ionosphere, and then refracting back towards earth and are best suited for long range
ff
ff
ff
3
communications. Direct waves are quite literally from point to point or lineof-sight.
All radio waves emitted by an antenna have varying levels of each path (ground, sky, and direct); however, radio waves at di erent frequencies are a ected by the environment in di erent ways, and that is why speci c frequency waves are used for speci c applications - and why particular antennas are used for any given radio system.
The radio band consists of multiple frequencies ranging from Extremely Low Frequency (ELF) to Extremely High Frequency (EFH). The lower the frequency, the more e ective transmit distance but comes at a risk of lower data or transmission rates. Lower frequencies also have the ability to penetrate vegetation and water.
The most common bands for radio operations are High Frequency (HF), Very High Frequency (VHF), and Ultrahigh Frequency (UHF).
Operating on HF (outside of the Citizen Band) requires a license from the FCC. Operating on the VHF or UHF bands (outside of FRS or MURS bands) requires license from the FCC. All three bands may be operated from a static location, or on the move.
fi
ff
fi
ff
ff
ff
4
HF Range of 3 MHz-30 MHz). This part of the spectrum transmits best by ground wave (30-300 miles) and sky wave propagation (world-wide) depending on atmospheric conditions and frequency used. Two way voice and data is supported, and HF is widely used in tactical environments to supplement communications when LOS radio isn’t feasible. Sky wave propagation is vulnerable to intercept and is most susceptible to jamming.
HF radio waves can propagate along the surface of the ground as well as being over the horizon. They can also be re ected by the ionosphere and bounce between the ionosphere and the earth.
VHF Range of 30 MHz - 300 MHz. Government and local entities primarily use 150 MHz to 174 MHz for operations. VHF has the advantage of being able to pass through bushes and trees, and a disadvantage of not reliably passing through buildings making VHF better suited for non-urban settings. VHF signals propagate principally by line-of-sight (direct waves). VHF can handle voice and data.
fl
5
UHF Ranges between 300 MHz - 3,000 MHz. Government and local entities operate primarily between 400 MHz to 470 MHz for operations. UHF has the advantage of being able to transmit greater distances as well as “bouncing” o of buildings and objects, making UHF more e ective in urban areas. The primary propagation method includes tropospheric scatter, satellite, and line of sight.
ANTENNAS Antennas are transducers that convert voltage from the transmitter into a radio signal, as well as receive signals from the air and concert them into a voltage for recovery within the radio. They are a critical element for establishing and maintaining communications.
In general, a vertical antenna can receive horizontally polarized signals; however, the mismatch introduces some attenuation. When controlled precisely, the polarization can be used to multiplex two signals on the same frequency, and circular polarization can maximize reception.
The most popular antenna is a “dipole” which consists of two linear conductors end-to-end with a length of one half wavelength. The antenna and transmitter are connected, usually by coax or direct connection.
The dipole is oriented horizontally to the earth giving a horizontally polarized wave. Radiation isn’t uniform in all directions, but is shaped like a donut.
ff
ff
6
Antennas can boost signal strength just as e ectively as if the signal were ampli ed by electronic means. Rather than being “ampli ed”, antennas provide gain, and concentrating into a narrower beam, thereby making the antenna become more directional. One of the most functional directional antennas is the Yagi. Yagi antennas feature a dipole, a re ector, and directors that can product an e ective power gain of 10dB-20dB.
A transmission line connects the antenna to the radio. Whether it’s a short micro strip line with an antenna that connects directly to the radio or coax cable for longer distances. The transmission line impedance needs to match the antenna and radio impedances to ensure maximum power transfer. If impedances aren’t matched, there will be a high standing wave ratio (SWR) that produces losses. Use a SWR meter to provide optimal tuning.
The size of an antenna is directly related to the wavelength of the frequency to be received. The size of a 1/4 wave antenna is one quarter of the wavelength, and a 1/2 wave antenna is one half of the wavelength. A 200 MHz wave has a wavelength of 6 feet (2 meter) long, so a 1/2 wave antenna would be 3 feet (1 meter), and a 1/4 wave antenna about 18 inches (45 centimeters).
A VHF antenna that is 14-18 inches will work su ciently for a 1/4 wave antenna. A UHF 1/4 wave antenna should be between 3 to 6 inches. A 1/2 wavelength antenna will provide roughly 3 dB gain over a 1/4 wave;
ffi
ff
fl
fi
ff
fi
7
however, it is more important for the antenna to be placed in a suitable location (higher with clear line of sight).
“Rubber duck” antennas that come stock with typical hand-held radios give the appearance of being much shorter; however, these antennas don’t always contain a simple straight length of conductor, but have coils of wire inside. Therefore, the physical length doesn’t match the appeared length. While manufacturers design their antennas to be tuned for the bands utilized, upgrading a stock antenna can be one of the best upgrades you can make to these radios.
REPEATERS
Repeaters operate by receiving on one frequency and re-transmitting on another. Repeaters are used to cover greater distances when point-topoint operations are not possible. By placing repeaters along an intended path, you can get long-range transmission through a series of short line of sight hops and increase e ciency.
ffi
8
In order to properly connect with a repeater, you need to pay attention to the Frequency O set and Tone (FOT). To access a repeater, you must have its frequency entered into your radio and have its transmit o set set correctly as well as the right Continuous Tone Coded Squelch System turned on.
Repeaters are referred to by their transmit frequency and this is the frequency that you enter (which is your receive frequency). Next, you need to make sure the proper transmit o set is programed into your transceiver. This is di erence in frequency between the repeaters transmit and receive frequency. Your radio will automatically shift between your frequency when you transmit - but only if you have the right o set programmed. The o set enables you to both transmit and receive a repeater using a “single channel”.
In most parts of the United States, the standard o set is 600 kHZ on the 2m band and 5 MHz on the 70cm band and can either be positive or negative in direction. This direction must also be set into your radio and is listed in the repeater directory. When you push your transmit button you will see the frequency change as the radio changes the frequency to the repeaters receive frequency.
For most repeaters, you need to transmit a CTCSS tone to access it. CTCSS is a type of signaling encoding that only allows incoming tra c to be detected if a speci c tone is transmitted from the distant end. In this way, if a repeater was set to 447.725 MHz, only transmissions at the same frequency with the tone squelch would be received by the repeater for retransmission.
ff
ffi
ff
ff
ff
ff
fi
ff
ff
9
10
Chapter 2 COMMUNICATIONS PLANNING COMMUNICATION PRINCIPLES If you can’t talk, you can’t ght - but talking ain’t ghting
Do not violate radio silence
Don’t make unnecessary transmissions
Do not use more power than is needed to reach distant end
Do not transmit faster than can be received
Transmit messages IAW the PACE Plan
Preplan messages prior to transmitting
Maintain net discipline
Always listen before transmitting
Make transmissions as brief as possible
Never use actual names or locations
Use pro words to limit transmission
Use directional antennas to the fullest extent possible
Do not use same authentication twice
When in doubt, make the caller authenticate
Do not underestimate the adversary’s ability to monitor your transmissions
Know your equipment, have this SOP and user manuals available, and be alert!
Planning counters the adversary’s attempts to take advantage of the vulnerability’s of your communication systems. When planning, use
fi
fi
11
spectrum management tools to enable spectrum planning and re ne your requirements. Coordinate frequency use before activation of emitters. Consider stationary as well as mobile attempts that may be used to discern your systems and locations.
When planning, pay attention to your transmitter and receiver locations, antenna parameters, number of frequencies, nature of your operation, and physical e ects of terrain and weather.
Avoid establishing patterns in your system including locations, frequencies, and reporting windows. Provision a means of concealing your communications equipment by installing antennas as low as possible on the backside of terrain features, behind manmade obstacles, while still permitting e ective communications.
To protect your transmissions use the lowest power setting, select the proper antenna, select a site that masks transmitted signals, and use mobile and decoy antennas. Always preplan your messages, transmit quickly and use brevity codes. Proper procedures also include reducing individual distinguishing characteristics, operating on a random schedule, authentication, and using PROWORDS.
LOW POWER Power levels and antennas are closely related. The strength of the transmission by an antenna depends on the strength of the signal delivered by the transmitter. The stronger the signal, the farther it will travel. Plan your communication systems to allow all stations to communicate with each other. Careful consideration in planning the physical emplacement will allow operators to use low power and thereby decrease the range making it more di cult for the enemy to detect and intercept transmissions and reserves high power for jamming.
fi
ffi
ff
ff
12
RADIO OPERATOR PROCEDURES The operator is essential for successful communication. Ensuring transmissions are minimized and preplanned using appropriate PROWORDS prevents interception, interpretation, and disruption. Do not develop patterns through hourly checks or speci c comms windows, but rather use periodic reports and use alternative means of communication.
AUTHENTICATION Unsecure transmissions require authentication to minimize the threat to your communications. Authentication is required if the operator suspects the enemy is on the network, challenged by someone to authenticate or transmits orders that a dramatic change to mission.
ELECTROMAGNETIC JAMMING Jamming is the deliberate transmission of energy to prevent the e ective use of the radio spectrum. All that is required is for a transmitter tuned to the same frequency, with enough power to override signals. Jammers operate against receivers, not the transmitters. Obvious jamming is normally simple to discern when you experience random noise, stepped tones, sparks or bursts of digital noise, random pulses, or recorded sounds.
Jamming operations include a period of jamming followed by a period of listening. Regardless of your decision to continue to operate as normal, never discuss the impacts of the jamming attempts.
To overcome jamming attempts, increase the transmitter power output after jamming operations have begun; adjust or change your antenna to ensure optimal conditions - use a directional antenna, either reorient, change polarization, or install an antenna with a longer range; establish a
ff
fi
13
repeater station to increase the range and power between the stations; use alternate routes for your signal path; or change frequencies all together.
REPEATERS Though HF bands are excellent for long range communications, when working to maintain e ective and secure communications in a local area, VHF and UHF may be better suited. However, dependent on power output, antenna selection, and terrain features you may not get the desired or necessary range. Though handheld radios promote a long range, you can use a working estimate of 8 kilometers in a city (handheld to handheld).
A repeater receives and then retransmits it, usually with a higher power, from a preferred location, with a better antenna to provide a greater range. A repeater receives a signal on one frequency and then retransmits it on another. To use a repeater, con gure the the repeaters input frequency, repeater o set, whether it’s + or - and if there is a PL tone or CTSS.
Once properly con gured, you can key in your microphone to transmit. The downside to using a repeater is it by nature requires either a dual band radio (in order to send and receive transmissions), or two radios. Another potential hinderance is if you are using a repeater owned by someone else, as these are often open to anyone, and you cannot control who uses it or not.
fi
ff
fi
ff
14
15
CHAPTER 3 RADIO FREQUENCIES The radio spectrum ranges from 1 Hz to 3000 GHz. Electromagnetic waves in this frequency are called radio waves and are labeled literally by how tall that wave is. The range is broken down into 8 bands. Low frequencies display lower signal attenuation (reduction of force or amplitude) making them better for long-distance. They can be “bent” by the ionosphere for over the horizon communications.
Higher frequencies require shorter antennas for decent reception qualify. They have more energy than a lower frequency with the same amplitude. Higher frequencies have greater bandwidth for higher data rates and can easily penetrate the ionosphere.
16
UHF BAND
23 cm (1240 MHz) LICENSE REQUIRED This band is in the upper portion of the UHF (microwave) spectrum and outside of UHF/VHF contests there is almost NO activity on this band. In some locations, Amateur TV is operated in this range. Commercial equipment is rare. Some commercial drones also operate in this band.
Very few repeaters in the US. And it’s worth nothing that SAR (syntheticaperture radar) is operated in this band.
33 cm (902 MHZ) LICENSE REQUIRED Few options exist for the 33 cm band - and it is highly underutilized. The 902MHZ-928 MHZ range is allocated as secondary for radio operators, and you may nd interference from Amateur Television and cordless phones (if anyone still uses them).
fi
17
FAMILY RADIO SERVICE (FRS) (462 MHz) NO LICENSE REQUIRED Most common use of FRS is walkie-talkie styled radios for short-distance, 2 way voice communications. 22 preset channels with a max power output of 2 W or .5 W
Channels are shared with GMRS
All kids walkie talkies use FRS
FRS has ability to provide “Privacy Codes” which are a code set that will not enable a receiving radio to not un-mute its speaker unless the code was sent with a transmission. The code is basically a sub-audible tone in some radios or a digital packet that is sent preceding the senders message. It’s not a “secure” method of transmission, but does provide a small degree of privacy.
GENERAL MOBILE RADIO SERVICE (GMRS) (462-476 MHz) LICENSE IS REQUIRED 30 GMRS channels exist and you can utilize repeaters. Voice and data can be transmitted. One license enables an entire family to utilize the band. Repeaters are easily utilized in this band.
Max power 2-5 Watts
70 cm (420 MHz) LICENSE IS REQUIRED This it the most popular frequency band used by licensed operators. Hundreds of inexpensive radios and a large amount of repeaters are available throughout the United States. Most handheld “HAM” Radios that operate on UFH do so on the 70 cm band. There are a ton of 70 cm repeaters.
18
VHF BAND 1.25 Meters (222 MHz) LICENSE REQUIRED Commercial options exist for the 1.25M radios, and “Tri-Band” HAM radios will be able to operate in this range. There isn’t a whole lot of tra c on this band.
MULTI-USE RADIO SERVICE (MURS) NO LICENSE REQUIRED 5 Preset channels
Limited to 2 watts transmitter power output giving an estimated range of 1 mile. Typically not used in “toys” decreasing band usage and is designated for personal use.
2 METERS (144 MHz) LICENSE REQUIRED By far the most tra c sent on HAM radios is in the VHF using the 2 Meter Band. Nearly all hand-held radios do so and the majority of local First Responders use a portion of the 2 Meter band as well. There are a ton of repeaters for 2M. You can nd or modify 2M radios for SSB to obscure communications.
4 Meters Not used in the US - but allocated for use in other countries. Radios are easily available online.
6 Meters (50 MHz) Lowest portion of the VHF spectrum. Due to proximity to HF, it has good characteristics and is seen a “magic band” but can be unpredictable. This
ffi
fi
ffi
19
is the lowest band that a Technician can legally operate on (Not including CB). There are limited 6 Meter Repeaters.
HF BAND CITIZEN BAND RADIO SERVICE NO LICENSE 40 preset channels
Not near as popular as it was decades ago, and there are many restrictions to what you can do to your radio. You can’t raise power output of transmitter nor attach a power ampli er. Max wattage is 4 watts for mobile radios. But there is good news. CB’s can be equipped operate in Single Side Band (SSB) and broadcast at 12 watts. Using SSB changes the modulation of the transmission. Both sending and distant end radios must be equipped with SSB to communicate.
All other lower bands (HF, MF, and LF) require licenses above Technician; however, the next level (General) may operate on all of them. These portion of the spectrum is outstanding for long-range communications, and the most popular is the 20 Meter and 40 Meter Bands. Just like CB, you may also utilize SSB.
Digital Modes including PSK and FT8 (among others) are provide an additional mode including Digital Radioteletype (RTTY), Voice Over IP (VOIP), TCP/IP packet radio, and others. The bene t to digital ham includes stronger signals, better adaptability to changing weather, and increased reliability, plus the advantage that they are less popular, resulting in increased privacy on the same band.
fi
fi
20
21
CHAPTER 4 RADIO TACTICS, TECHNIQUES, AND PROCEDURES Use the phonetic alphabet to identify letters, or spell a word or group of letters. The underlined portion of the spoken word is the emphasized letter or syllable:
LETTER
PHONETIC
A B C D E F G H I J K L M N O P Q R
ALFA BRAVO CHARLIE DELTA ECHO FOXTROT GOLF HOTEL INDIA JULIETT KILO LIMA MIKE NOVEMBER OSCAR PAPA QUEBEC ROMEO
SPOKEN AS
AL-FAH
BRAH-VOH
CHAR-LEE
DELL-TAH
ECK-OH
FOKS-TROT
GOLF
HOH-TELL
IN-DEE-AH
JEW-LEE-ETT
KEY-LOH
LEE-MAH
MIKE
NO-VEM-BER
OSS-CAH
PAH-PAH
KEH-BECK
ROW-ME-OH
22
S T U
SIERRA TANGO UNIFORM
V W X Y Z
VICTOR WHISKEY X-RAY YANKEE ZULU
FIGURE
SPOKEN AS
0 1 2 3 4 5 6 7 8 9
ZE-ROH WUN TOO TREE FOW-ER FIFE
SIX
SEV-UN
AIT
NINE-ER
SEE-AIR-RAH
TANG-GO
YOU-NEE-
FORM or
OO-NEE-FORM
VIK-TAH
WISS-KEY
ECKS-RAY
YANG-KEY
ZOO-LOO
DATE TIME GROUP Always send date time groups (DTGs) digit by digit preceded by the pro word TIME:
081400Z JUN 12 TIME: ZE-ROH, AIT, WON, FOW-ER, ZE-ROH, ZE-ROH, ZOO-LOO, JUNE WUN, TOO
23
TIME ZONE DESIGNATIONS
As needed to ensure clarity, messages containing a combination of letters and numbers in the text use two di erent pro words. If the letter/number combination starts with a number, use the pro word FIGURES:
12A9B
Spoken as: FIGURES - WUN TOO, AL-FAH, NIN-ER,
BRAH-VOH
If the combination begins with a letter, use the pro word I SPELL
TS67R
Spoken as: I SPELL - TANG-GO, SEE-AIR-RAH, SIX,
SEV-UN, ROW-ME-OH
Use abbreviations when conditions are satisfactory, and when you are certain the distant end will understand. Speak common abbreviations as in
ff
24
normal speech (ETA as “ETA) and if the transmission is weak, spell out phonetically to ensure they are understood.
HOW TO CALL AND REPLY Step 1: Check the transmitter settings to verify proper frequencies are set
Step 2: Listen to ensure no other transmissions are in progress
Step 3: Speak clearly with the microphone 2 inches from your mouth
Step 4: Transmit call sign when conditions are favorable
Step 5: If you’ve tried three times to attempt a contact, transmit the pro word NOTHING HEARD. Continue to contact at reasonable intervals.
Step 6: Send transmissions only as fast as the distant end can copy the message. Un-key the microphone at regular intervals and end every transmission with one of the following PROWORDs:
OVER: Recipient response required
OUT: No response required
BREAK: You have additional transmissions to send
WAIT / STAND BY: Use for pauses that require a few seconds
Use the following PROWORDS to communicate the signal strength and reliability of transmissions:
Signal Strength Loud (strong signal)
Good (su cient signal)
Weak (can hear with di culty)
Fading (signal alternates)
ffi
ffi
25
Readability Clear (excellent quality)
Readable (good quality)
Distorted (trouble copying message)
Intermittent (signal alternates)
Unreadable (transmission cannot be understood
At times, the control station may need to impose or life radio silence. Use secure means when possible.
Imposing silence: All stations (repeat three times). This is (call sign). Silence 148.6 mHz (repeat three times). I say again, all stations (repeat three times). This is (call sign). Silence 148.6 mHz (repeat three times). OUT.
Lifting silence: All stations (three times). This is (call sign). Silence Lifted 148.6 mHz (three times). OUT.
AUTHORIZED PROCEDURE WORDS (PROWORDS) ACKNOWLEDGE
Instructs distant end to acknowledge the message
ALL AFTER The portion of the message to which I refer is all that follows (word/ number).
26
ALL BEFORE The portion of the message to which I refer is all that precedes (word/ number).
AUTHENTICATE The station called is to reply to the challenge that follows.
AUTHENTICATION IS (
…)
The message’s transmission authentication is (…).
BREAK Indicates the separation of text from other portions of the message.
CALL SIGN The group that follows is a call sign.
CORRECT You are correct.
What you have transmitted is correct.
CORRECTION An error was made in this transmission. Transmission will continue with the last word correctly transmitted.
An error was made in this transmission (or message indicated). The correct version is (...).
DISREGARD THIS TRANSMISSION - OUT This transmission is in error, disregard it.
EXECUTE 27
Carry out the intention of the message or signal to which this applies.
I AUTHENTICATE The group that follows is the reply to your authenticate challenge.
I READ BACK The following is my response to your instructions to read back.
I SAY AGAIN Use to repeat all or a portion of a transmission.
I SPELL Precedes a word spelled phonetically.
I VERIFY I verify and repeat the following at your request. (Note: Use only in response to VERIFY.)
MESSAGE The following message requires recording. (Note: Do not use this PROWORD on nets used primarily for conveying messages, but when passing messages on tactical or reporting nets.)
MORE TO FOLLOW The transmitting station has additional tra c for the receiving station.
NEGATIVE No.
ffi
28
OUT Use to end a transmission when no reply is required or expected.
OVER Use to end a transmission when a response is required.
PRIORITY PRIORITY message precedence.
READ BACK Repeat this entire transmission exactly as received.
ROGER I have satisfactorily received your last transmission.
SAY AGAIN Repeat all of your transmission.
WILCO I have received your signal, understand it, and will comply.
29
30
CHAPTER 5 SECURE COMMUNICATIONS SECURITY THROUGH OBSCURITY: Secure RF Principles
USE LOWEST POWER TO GET THE JOB DONE if you’re trying to talk to someone in your neighborhood, 1 or 2 watts is ne. A few miles - 5 watts. Throughout the county, 25. To the moon, 1,000. there are a ton of variables, but the key point is if you’re only trying to talk to someone a few miles away, you don’t want to be transmitting using 25 watts - you’re literally asking others to listen in. KEEP TRANSMISSION BRIEF (Band scopes or spectrum analyzers can pick up quick, but average operator won’t). Use texting, or packet radio.
DON’T USE MILITARY JARGON
CHANGE FREQ’S OFTEN & USE MULTIPLE BANDS - You TX in 2m Distant ends TX in 6m. It takes multiple radios to do this; however, the odds of someone tuning into both is extremely rare.
Which band should you use and why? In general - you have the option of using UHF - and within UFH you have 3 primary bands as well as FRS and GMRS. The 70 cm band is the most popular, but there are a ton of repeaters. FRS is what your typical walkie talkie
fi
31
uses and doesn’t require a license. E cient for short range, but unsecure. GMRS requires a license, but you can also set up repeaters. Then you have VHF, and within you also have 3 primary bands as well as MURS - which is very similar to FRS. In VHF, the 2 meter band is VERY popular, and most of your local EMS, rst responders, and schools will be found here or back down in the 440.
Then you have HF, MF, and LF - and the most popular is the 20 meter. You can check out what’s popular in your area, and maybe opt to use bands that nobody is using - like 10 meter in the HF or 222 in VHF, or 23 cm in UHF. Of course, there are other options, but you can also consider the next tip
USE SINGLE SIDE BAND or DIGITAL COMMS - analog won’t hear anything other than noise. Using these methods cuts out everyone who isn’t operating in the same mode or with the same type of radio drastically decreasing the chances of someone listening to your communications.
USE DIRECTIONAL ANTENNAS AND TERRAIN to your advantage to decrease the possibility of your comms bleeding into areas where you don’t want them to. DON’T TRANSMIT FROM A ‘BASE STATION’ - If your location is static, then even if someone can’t decode your transmission, they can easily deduce your location. There is security in mobility.
USE REPEATERS - Combine using the lowest frequency you can, as well as a directional antenna and emplace a repeater -
fi
ffi
32
DON’T USE PRIVACY CODES- they are as private as having passionate sex in a cheap hotel with cardboard walls after hanging up a “Do Not Disturb” sign - the maid may not knock, but she can damn sure hear what’s happening in the room.
USE ROLLING CODE or VOICE SCRAMBLERS - they are incredibly secure as the transmitted signal and frequency are inverted. Without the right chip added in or wit
Anything more, and you’re getting into areas that are 100% illegal - if you have to manually load an encryption key, you can be sure of it. If you’re using commercial o the shelf equipment, you’re probably safe.
While straight up encryption is illegal, simple coding technically isn’t. I can’t tell you where the line is between simple and complex coding resides; however, if the answer to the code is in the public domain you’re
Use Single Side Band - for 2m and 7cm to obscure comms.
ff
33
34
CHAPTER 6 ENCODED COMMUNICATIONS Every community needs an e ective, reliable, and secure method of communicating. With a little time and e ort an easy to use Standard Operating Procedure can be established to provide how and when information is exchanged.
The need to establish a comms plan comes before you need it, so the time is now to develop your plan.
The following section outlines a simple but e ective way to create security in your communications. This enables you to message on any network or frequency (ranging from email, voice or data messenger service, satellite, or RF) whether it is secured or unsecured and ensure the Team can communicate e ectively and securely.
You generate a Master Key Pad and distribute laminated copies to everyone in your group, community, and family that you need to maintain communications with. The hardware for transmission (Ham, Email, CB, Text, etc) doesn’t matter so long as the Master Key Pad remains secure. If compromised, simply generate a new one and re-distribute it to the Team. And if you are connected to groups working adjacent to you that you want to communicate with, you can create an separate external key pad for your transmissions with them while maintaining the security of your internal communications plan
ff
ff
ff
ff
35
Master Key Pad 0
1
2
3
4
5
6
7
8
9
0
9
8
7
6
5
4
3
2
1
0
1
HQ
Road
Building
Highway
Bridge
Trail
River
Hill
Valley
Ridge
2
Vehicle
Route
SP/RP
Comms / Freq
Time
Point
Primary
Alternate
Grid
Person
3
Convoy
Patrol
Recon
Report
SP/RP
Caution
Green
Amber
Red
Black
4
Up/North
Right/East
Down/ South
Left/West
Day
Night
Unknown
Known
Pick Up
Drop O
5
Safe / Secure
SHTF
Rally
Avoid
Meet
Get
Distance
Objective
Friendly
Enemy
6
12 Gauge
30-30
9mm
45acp
223
Magazine
Case
Supplies
Food
Water
7
Box
Pounds
Pallet
Ton
Foot/Feet
Quart
Gallons
Meters
Kilometers
Mile
8
A
C
D
E
F
I
FRS/ GMRS
CB
Ham
L/Local
9
M
N
O
R
S
T
LP/OP
SOP
UHF/VHF
Z/Zulu
The message: I need you to conduct a recon of small village near Nisqually River in the vicinity of 312 034 to determine feasibility for future HQ. Check routes and con rm buildings are abandoned. There may be enemy personnel in the AO, use caution and avoid contact. Enroute comm plan: CB 1 SSB, VHF 4. Mission comm plan: UFH 3; VHF 7. Report ndings and assessment NLT 1700 on the April 3.
Could be coded as follows: 82 92 92 84 32 12 94 91 83 10 93 16 28 06 08 07 09 06 04 82 83 95 83 93 90 85 91 83 84 95 93 83 10 32 21 80 91 82 81 92 91 84 85 93 90 12 94 80 93 83 39 35 59 85 91 80 92 53
fi
fi
f
36
30 81 92 90 90 87 08 94 94 05 57 98 06 98 02 33 91 89 95 09 06 08 02 09 09 89
The receivers message would read: Do Recon Of BuildingS Near River Grid 312034 Determine Ftre HQ Recon Routes And Con rm BuildingS Are Black Caution Enemy In AO Avoid Contact Comm CB 1 SS UFH/VHF 4 Objective UHF/VHF 3 UHF/VFH 7 Report NL/LocalT 03 1700 L/Local
This Master Pad can be further coded in any number of ways. You can send a fake Key Code number but always use the Master Pad as is, you could simply have an Even and Odd day Key Pad, or you could establish a code for how it’s arranged. For example, in the above Master Pad, the Key would be 00. Whereas Key 58 would instruct the distant end that 8 becomes the rst column, therefore the rst few rows would look like:
KEY58 8
9
0
1
2
3
4
5
6
7
0
1
0
9
8
7
6
5
4
3
2
1
Valley
Ridge
HQ
Road
Building
Highway
Bridge
Trail
River
Hill
2
Trade
Person
Vehicle
Route
SP/RP
Freq
Time
Point
Primary
Alternate
3
Red
Black
Convoy
Patrol
Recon
Report
SP/RP
Caution
Green
Red
4
Pick Up
Drop O
Up/North
Right/East
Down/ South
Left/West
Day
Night
Unknown
Known
fi
fi
fi
f
37
Or you could break create a main pad arranged into four quads and then four smaller key pads and assign each a color:
KEY PAD QUADRANTS 0 0 1 2 3
1
2
3
4
5
6
7
1
2
3
4
8
9
4 5 6 7 8 9
38
Then, use a simple code to tell the distant end how to order the Pad on their end to decode the message. For example KEY R1 G2 A3 B4 would look like this:
R1 G2 A3 B4
0
0
1
2
3
4
5
9
8
7
6
5
HQ
Road
Building
Highway
Bridge
Vehicle
Route
SP/RP
Comms / Freq
Time
1 2 3
Convoy
Patrol
Recon
Report
SP/RP
Up/North
Right/East
Down/South
Left/West
Day
4 5
Safe / Secure
SHTF
Rally
Avoid
Meet
6
12 Gauge
30-30
9mm
45acp
223
Box
Pounds
Pallet
Ton
Foot/Feet
A
C
D
E
F
M
N
O
R
S
7 8 9
6
7
8
9
4
3
2
1
0
Trail
River
Hill
Valley
Ridge
Point
Primary
Alternate
Trade
Person
Caution
Green
Amber
Red
Black
Night
Unknown
Known
Pick Up
Drop O
Get
Distance
Rest in Place
Objective
Destroy
Magazine
Case
Supplies
Food
Water
Quart
Gallons
Meters
Kilometers
Mile
I
FRS/GMRS
CB
Ham
L/Local
T
LP/OP
SOP
Enemy
Z/Zulu
f
39
BUT you can send the code in any order - for example B1 A2 G3 R4 is the same as Key
A2 R4 B1 G3 or Key R3 B1 G3 A2
B1 A2 G3 R4 0
1
2
3
4
5
6
7
8
9
Safe / Secure
SHTF
Rally
Avoid
Meet
12 Gauge
30-30
9mm
45acp
223
Box
Pounds
Pallet
Ton
Foot/Feet
A
C
D
E
F
M
N
O
R
S
0
Get
Distance
Rest in Place
Objective
Destroy
1
Magazine
Case
Supplies
Food
Water
2
Quart
Gallons
Meters
Kilometers
Mile
3
I
FRS/GMRS
CB
Ham
L/Local
4
T
LP/OP
SOP
Enemy
Z/Zulu
5
4
3
2
1
0
9
8
7
6
5
6
Trail
River
Hill
Valley
Ridge
HQ
Road
Building
Highway
Bridge
Point
Primary
Alternate
Trade
Person
Vehicle
Route
SP/RP
Comms / Freq
Time
Caution
Green
Amber
Red
Black
Convoy
Patrol
Recon
Report
SP/RP
Night
Unknown
Known
Pick Up
Drop O
Up/North
Right/East
Down/South
Left/West
Day
7 8 9
What’s more is that you can send the Key with all four, or just three because if I send Key A2 G3 B1 the distant end can easily deduce that R is going in the fourth quadrant.
NOTE: anything beyond 2 matrix’s will most likely require the use of a computer aided program (ranging from a simple spreadsheet to a more complicated and dedicated application to code/decode).
It’s recommended to generate a Key Pad for internal communications and another one for external communications. If there is a community group or
f
40
organization that operates adjacently to you, simply provide them a copy of a Key Pad for use between both entities to ensure secure comms but ensure you have one for internal messaging to maintain security.
If for any reason your experience a breech in security, a simply Key Pad like this can easily be regenerated into a new one.
41
42
CHAPTER 7 PACE PLAN Primary, Alternate, Contingency, and Emergency (PACE) is a method to build a communications plan that requires four means of communication between the Team setting a precedent from most preferred to least.
Ideally, each method is a complete separate path or protocol (internet, radio waves, satellite services, radio wire, messenger) rather than using dependent means (HF, UHF, VHF, CB).
Utilize as many forms of communication as possible and do not rely on a single channel (i.e. email, Facebook Messenger, Signal, etc are ALL cellular based, and if the network goes down, so does your communications plan).
While a PACE plan designates the preferred order, each method of contact is permissible, and must be monitored during all phases of the operation.
There may be a need for multiple PACE plans - for example, a standing plan for daily operations, one for communicating with external organizations or teams, and those build for a speci c task.
Understand the sensitivity of the messages being sent and the importance of when it is received and the security of each channel. If a message can
fi
43
wait, and security dictates it, it’s more than acceptable to utilize the “Emergency” channel.
For daily operations the use of email, messenger applications, and voice communications are most common but understand the risk each of these presents. Be aware of the protocols used for security by each provider when utilizing such methods.
There is a general need for multiple internal PACE plans regardless of mission set including at the halt, on the move and operational meetings.
AT THE HALT The command net will be operated at all times and used for any unit to transmit to the TOC. Frequency’s listed are what the Command Net uses and distant ends should adjust accordingly.
INTERNAL NET EFFECTIVE PRIMARY
0001-0930 0930-1500 1501-2359
ALT: CONTINGENCY: EMERGENCY:
RX FREQ TX FREQ
VHF MURS UHF
GMRS HF
FRS
Signal
Phone (NOT text)
Runner
*Satellite channels are an excellent addition
44
PACE PLAN ON THE MOVE PRIMARY ALTERNATE CONTINGENCY EMERGENCY
VHF UHF
CB SSB
Phone
OPERATIONAL MEETINGS & UPDATES PRIMARY ALTERNATE CONTINGENCY EMERGENCY
In Person Signal App
Proton Email
Phone
45
46
CHAPTER 8 OPERATIONAL CONSIDERATIONS AUTHENTICATION CODES A signi cant challenge for the security of the communication system is the compromise of the net by an unauthorized user. Radios can be cloned or discovered by scanning. Emails can be hacked, phones can be stolen, and a team member could be forced to communicate with threat from an adversary.
Authentication provides a mechanism that requires both ends to prove that they are genuine before transmitting. Veri cation is done using a code. While this can be done digitally, manual methods are just as e ective.
CALENDAR DAYS: 1-7
14 / Nights
8-14
76 / Tears
15-21
88 / Commie
22-28
94 / Grinding
29-31
45 / Craft
Example for 4 July: HQ: “Spartan 7, authenticate 14”
Spartan 7: “Authentication is Nights”
Now each element can communicate knowing that both have not been compromised. This does NOT prove that the net hasn’t been
ff
fi
fi
47
compromised, only that that the transmitter can be trusted as being a team member who is not in distress.
CHALLENGE AND PASSWORDS Always use in a sentence. Change for every mission:
Challenge: Red
Password: Dawn
Example:
“Red is my favorite color”
“Did you see the sky at dawn”
In the event of an emergency, members use a running password which requires no challenge and does not need to be used in a sentence.
Running Password: PBR
VISUAL COMMUNICATIONS Available to all units including smoke, ags, lights, panels, and hand-andarm signals.
HAND AND ARM SIGNALS: Hand and arm signals are an e cient means of communications that are clear, accurate, and secure for ground forces.
They provide the advantage of maintaining noise discipline; however, the message must be seen to be understood. Therefore they are only e ective when interval between individuals is set properly and they lose their e ectiveness with an increase in interval, in heavy vegetation, and in hours of limited visibility.
ff
fl
ffi
ff
48
Many common hand and arm signals are pictured below - however, as with all forms of communication they must be practiced and rehearsed in order to be e ective.
RANGE:
CEASE FIRE:
ASSEMBLE:
SHIFT:
FREEZE:
HASTY AMBUSH
WEDGE:
DOWN
ENROUTE RALLY
STOP:
DOUBLE TIME
OBJECTIVE RALLY
ff
49
In the event you become isolated and all other forms of communication are either unavailable the following may be used to alert a search and rescue crew. Consider the permissiveness of the environment and the distant end you are communicating with. Suitable items are mirrors, torch, are, camera ash, strobes, and whistle in addition to ground to air signals using panels, survival blankets, rocks, or re.
Smoke from a re is by far the most e ective. Prepare three signal res. Consider resources you may have including vehicle fuel, fuel tabs, or other items on your packing list to assist in starting the re. Set each re 15 meters apart, start one, and then once lit and established use fuel from the rst re to light the second in order to preserve your tinder and re making kit. The use of thermal imaging has become more popular so keep the res going constantly. Do not wait until you hear aircraft, but light immediately in order for the signal to be in place when the aircraft is overhead. Once you hear a plane or helicopter, add green vegetation to your re to enhance the smoke produced. Damp grasses and pine produce white smoke which can be seen better at night. Dense black smoke can be made from car ties, foam padding from seats, and other items made from polytene or plastic. Ensure the area is clear to prevent the re from spreading and causing a hazard to your survival.
fi
fi
fi
fi
fi
fi
fi
fi
ff
fi
fl
50
fi
fl
fi
ISOLATED PERSONS COMMUNICATIONS
SIGNAL MIRROR
51
MORSE CODE CHART
52
GROUND TO AIR SIGNALS:
53
54
SEMIPHORES:
55
56
About the Author
Raised in the mountains of New Mexico, Stoker has over 20 years of military operational experience, and keeps his ask lled with the tears of a commie.
fi
fl
57