Partisan Radio Operations

The criticality of command and control as a war fighting function cannot be overstated. Without the ability to communica

129 92 14MB

English Pages 63 Year 2023

Report DMCA / Copyright

DOWNLOAD PDF FILE

Table of contents :
RADIO THEORY…………………………………………………………….…1
COMMUNICATIONS PLANNING……………………………………….…11
RADIO FREQUENCIES……………………………………………………..16
RADIO TTP’S…………………………………………………………………22
SECURE COMMUNICATIONS……………………………………………..31
ENCODED COMMUNICATIONS…………………………………………..35
P.A.C.E. PLAN………………………………………………………………..43
OPERATIONAL CONSIDERATIONS………………………………………47
Recommend Papers

Partisan Radio Operations

  • 0 0 0
  • Like this paper and download? You can publish your own PDF file online for free in a few minutes! Sign Up
File loading please wait...
Citation preview

PARTISAN RADIO OPERATIONS

BILL STOKER

PARTISAN RADIO OPERATIONS





BILL STOKER

© 2023 The Partisan Radio Operations is a view of the forest and introduction to the trees of e ective communications.











ff

Bill Stoker www.YouTube.com/stokermatic www.stokermatic.com

TABLE OF CONTENTS



RADIO THEORY…………………………………………………………….…1 COMMUNICATIONS PLANNING……………………………………….…11 RADIO FREQUENCIES……………………………………………………..16 RADIO TTP’S…………………………………………………………………22 SECURE COMMUNICATIONS……………………………………………..31 ENCODED COMMUNICATIONS…………………………………………..35 P.A.C.E. PLAN………………………………………………………………..43 OPERATIONAL CONSIDERATIONS………………………………………47

PROLOGUE

fi



The criticality of command and control as a war ghting function cannot be overstated. Without the ability to communicate, you cannot conduct synchronized operations.

Chapter 1 RADIO THEORY ELECTROMAGNETIC RADIATION In radio, we are concerned with the electric and magnetic elds, and based on testing and observation, we can predict how these elds behave and the relationship between them. When an electric eld is changing, a magnetic eld is being created and when a magnetic eld is changing, an electric eld is being created.

The creation of radio waves requires a current whose frequency is at least 10,000 Hz (1 MHz). An oscillator is used for creating voltages that can be made to surge back and forth at a speci c frequency and when RF energy is applied to a conductor (or antenna), the antenna resonates (or vibrates). The antenna provides a means of radiating the electromagnetic waves into the air.

RADIO WAVES Radio wave movement can be best understood by thinking of a wave rippling in a pond of water. When you toss a rock, a disturbance is created sending ripples (waves) in equally spaced circles. Imagine there are leaves on the body of water. As the ripples pass through where the leaves are, they seem to bob up and down. The energy that was transferred from the rock hitting the surface of the water with a speci c

fi

fi

fi

fi

fi

fi





fi

fi

1

measurement has now been transmitted (propagated) to the leaves.

Radio waves are a combination of a magnetic eld at a right angle to an electric eld. Both oscillate at a speci c frequency and travel together in a direction perpendicular to both elds. One key feature is the orientation of the elds with the earth. This is called polarization. An antenna is vertically polarized if the electric eld is vertical to the earth’s surface or horizontally polarized if it’s horizontal to the earth’s surface.

The signal radiated from the antenna creates an electromagnetic disturbance (the rock hitting the surface of the water) that spreads through space. When these waves reach another antenna, some of their energy is transferred to the antenna (leaves on the water). The EM waves sets up a small current, which can then be ampli ed and reproduced as a radio signal by the receiver. The act of a radio wave traveling from one point to another is called propagation. When a radio wave is radiated from an antenna, it begins its path in a variety of directions (wave forms); however,

fi

fi

fi

fi

fi

fi

fi

2

the primary (or intended) path is determined by the propagating characteristics and the direction in which it is radiated.

There are di erent types of waves (transmission paths) - the ground wave, the sky wave, and the direct wave. Ground waves travel near the surface of the earth and are greatly a ected by the earth’s conductivity and obstructions (buildings, terrain features, etc); however, they are generally e ective for local communications. Sky waves are propagated at such an

angle, that they travel up through the atmosphere, striking the ionosphere, and then refracting back towards earth and are best suited for long range

ff

ff

ff

3

communications. Direct waves are quite literally from point to point or lineof-sight.


 All radio waves emitted by an antenna have varying levels of each path (ground, sky, and direct); however, radio waves at di erent frequencies are a ected by the environment in di erent ways, and that is why speci c frequency waves are used for speci c applications - and why particular antennas are used for any given radio system.

The radio band consists of multiple frequencies ranging from Extremely Low Frequency (ELF) to Extremely High Frequency (EFH). The lower the frequency, the more e ective transmit distance but comes at a risk of lower data or transmission rates. Lower frequencies also have the ability to penetrate vegetation and water.

The most common bands for radio operations are High Frequency (HF), Very High Frequency (VHF), and Ultrahigh Frequency (UHF).

Operating on HF (outside of the Citizen Band) requires a license from the FCC. Operating on the VHF or UHF bands (outside of FRS or MURS bands) requires license from the FCC. All three bands may be operated from a static location, or on the move.

fi

ff

fi

ff

ff

ff

4

HF Range of 3 MHz-30 MHz). This part of the spectrum transmits best by ground wave (30-300 miles) and sky wave propagation (world-wide) depending on atmospheric conditions and frequency used. Two way voice and data is supported, and HF is widely used in tactical environments to supplement communications when LOS radio isn’t feasible. Sky wave propagation is vulnerable to intercept and is most susceptible to jamming.

HF radio waves can propagate along the surface of the ground as well as being over the horizon. They can also be re ected by the ionosphere and bounce between the ionosphere and the earth.

VHF Range of 30 MHz - 300 MHz. Government and local entities primarily use 150 MHz to 174 MHz for operations. VHF has the advantage of being able to pass through bushes and trees, and a disadvantage of not reliably passing through buildings making VHF better suited for non-urban settings. VHF signals propagate principally by line-of-sight (direct waves). VHF can handle voice and data.



fl

5

UHF Ranges between 300 MHz - 3,000 MHz. Government and local entities operate primarily between 400 MHz to 470 MHz for operations. UHF has the advantage of being able to transmit greater distances as well as “bouncing” o of buildings and objects, making UHF more e ective in urban areas. The primary propagation method includes tropospheric scatter, satellite, and line of sight.

ANTENNAS Antennas are transducers that convert voltage from the transmitter into a radio signal, as well as receive signals from the air and concert them into a voltage for recovery within the radio. They are a critical element for establishing and maintaining communications.

In general, a vertical antenna can receive horizontally polarized signals; however, the mismatch introduces some attenuation. When controlled precisely, the polarization can be used to multiplex two signals on the same frequency, and circular polarization can maximize reception.

The most popular antenna is a “dipole” which consists of two linear conductors end-to-end with a length of one half wavelength. The antenna and transmitter are connected, usually by coax or direct connection.

The dipole is oriented horizontally to the earth giving a horizontally polarized wave. Radiation isn’t uniform in all directions, but is shaped like a donut.



ff

ff

6

Antennas can boost signal strength just as e ectively as if the signal were ampli ed by electronic means. Rather than being “ampli ed”, antennas provide gain, and concentrating into a narrower beam, thereby making the antenna become more directional. One of the most functional directional antennas is the Yagi. Yagi antennas feature a dipole, a re ector, and directors that can product an e ective power gain of 10dB-20dB.

A transmission line connects the antenna to the radio. Whether it’s a short micro strip line with an antenna that connects directly to the radio or coax cable for longer distances. The transmission line impedance needs to match the antenna and radio impedances to ensure maximum power transfer. If impedances aren’t matched, there will be a high standing wave ratio (SWR) that produces losses. Use a SWR meter to provide optimal tuning.

The size of an antenna is directly related to the wavelength of the frequency to be received. The size of a 1/4 wave antenna is one quarter of the wavelength, and a 1/2 wave antenna is one half of the wavelength. A 200 MHz wave has a wavelength of 6 feet (2 meter) long, so a 1/2 wave antenna would be 3 feet (1 meter), and a 1/4 wave antenna about 18 inches (45 centimeters).

A VHF antenna that is 14-18 inches will work su ciently for a 1/4 wave antenna. A UHF 1/4 wave antenna should be between 3 to 6 inches. A 1/2 wavelength antenna will provide roughly 3 dB gain over a 1/4 wave;

ffi

ff

fl

fi

ff

fi

7

however, it is more important for the antenna to be placed in a suitable location (higher with clear line of sight).

“Rubber duck” antennas that come stock with typical hand-held radios give the appearance of being much shorter; however, these antennas don’t always contain a simple straight length of conductor, but have coils of wire inside. Therefore, the physical length doesn’t match the appeared length. While manufacturers design their antennas to be tuned for the bands utilized, upgrading a stock antenna can be one of the best upgrades you can make to these radios.

REPEATERS

Repeaters operate by receiving on one frequency and re-transmitting on another. Repeaters are used to cover greater distances when point-topoint operations are not possible. By placing repeaters along an intended path, you can get long-range transmission through a series of short line of sight hops and increase e ciency.

ffi

8

In order to properly connect with a repeater, you need to pay attention to the Frequency O set and Tone (FOT). To access a repeater, you must have its frequency entered into your radio and have its transmit o set set correctly as well as the right Continuous Tone Coded Squelch System turned on.


 Repeaters are referred to by their transmit frequency and this is the frequency that you enter (which is your receive frequency). Next, you need to make sure the proper transmit o set is programed into your transceiver. This is di erence in frequency between the repeaters transmit and receive frequency. Your radio will automatically shift between your frequency when you transmit - but only if you have the right o set programmed. The o set enables you to both transmit and receive a repeater using a “single channel”.

In most parts of the United States, the standard o set is 600 kHZ on the 2m band and 5 MHz on the 70cm band and can either be positive or negative in direction. This direction must also be set into your radio and is listed in the repeater directory. When you push your transmit button you will see the frequency change as the radio changes the frequency to the repeaters receive frequency.

For most repeaters, you need to transmit a CTCSS tone to access it. CTCSS is a type of signaling encoding that only allows incoming tra c to be detected if a speci c tone is transmitted from the distant end. In this way, if a repeater was set to 447.725 MHz, only transmissions at the same frequency with the tone squelch would be received by the repeater for retransmission.

ff

ffi

ff

ff

ff

ff

fi

ff

ff

9

10

Chapter 2 COMMUNICATIONS PLANNING COMMUNICATION PRINCIPLES If you can’t talk, you can’t ght - but talking ain’t ghting

Do not violate radio silence

Don’t make unnecessary transmissions

Do not use more power than is needed to reach distant end

Do not transmit faster than can be received

Transmit messages IAW the PACE Plan

Preplan messages prior to transmitting

Maintain net discipline

Always listen before transmitting

Make transmissions as brief as possible

Never use actual names or locations

Use pro words to limit transmission

Use directional antennas to the fullest extent possible

Do not use same authentication twice

When in doubt, make the caller authenticate

Do not underestimate the adversary’s ability to monitor your transmissions

Know your equipment, have this SOP and user manuals available, and be alert!

Planning counters the adversary’s attempts to take advantage of the vulnerability’s of your communication systems. When planning, use

fi



fi



11

spectrum management tools to enable spectrum planning and re ne your requirements. Coordinate frequency use before activation of emitters. Consider stationary as well as mobile attempts that may be used to discern your systems and locations.

When planning, pay attention to your transmitter and receiver locations, antenna parameters, number of frequencies, nature of your operation, and physical e ects of terrain and weather.

Avoid establishing patterns in your system including locations, frequencies, and reporting windows. Provision a means of concealing your communications equipment by installing antennas as low as possible on the backside of terrain features, behind manmade obstacles, while still permitting e ective communications.

To protect your transmissions use the lowest power setting, select the proper antenna, select a site that masks transmitted signals, and use mobile and decoy antennas. Always preplan your messages, transmit quickly and use brevity codes. Proper procedures also include reducing individual distinguishing characteristics, operating on a random schedule, authentication, and using PROWORDS.

LOW POWER Power levels and antennas are closely related. The strength of the transmission by an antenna depends on the strength of the signal delivered by the transmitter. The stronger the signal, the farther it will travel. Plan your communication systems to allow all stations to communicate with each other. Careful consideration in planning the physical emplacement will allow operators to use low power and thereby decrease the range making it more di cult for the enemy to detect and intercept transmissions and reserves high power for jamming.

fi

ffi

ff

ff

12

RADIO OPERATOR PROCEDURES The operator is essential for successful communication. Ensuring transmissions are minimized and preplanned using appropriate PROWORDS prevents interception, interpretation, and disruption. Do not develop patterns through hourly checks or speci c comms windows, but rather use periodic reports and use alternative means of communication.

AUTHENTICATION Unsecure transmissions require authentication to minimize the threat to your communications. Authentication is required if the operator suspects the enemy is on the network, challenged by someone to authenticate or transmits orders that a dramatic change to mission.

ELECTROMAGNETIC JAMMING Jamming is the deliberate transmission of energy to prevent the e ective use of the radio spectrum. All that is required is for a transmitter tuned to the same frequency, with enough power to override signals. Jammers operate against receivers, not the transmitters. Obvious jamming is normally simple to discern when you experience random noise, stepped tones, sparks or bursts of digital noise, random pulses, or recorded sounds.

Jamming operations include a period of jamming followed by a period of listening. Regardless of your decision to continue to operate as normal, never discuss the impacts of the jamming attempts.

To overcome jamming attempts, increase the transmitter power output after jamming operations have begun; adjust or change your antenna to ensure optimal conditions - use a directional antenna, either reorient, change polarization, or install an antenna with a longer range; establish a

ff

fi

13

repeater station to increase the range and power between the stations; use alternate routes for your signal path; or change frequencies all together.

REPEATERS Though HF bands are excellent for long range communications, when working to maintain e ective and secure communications in a local area, VHF and UHF may be better suited. However, dependent on power output, antenna selection, and terrain features you may not get the desired or necessary range. Though handheld radios promote a long range, you can use a working estimate of 8 kilometers in a city (handheld to handheld).

A repeater receives and then retransmits it, usually with a higher power, from a preferred location, with a better antenna to provide a greater range. A repeater receives a signal on one frequency and then retransmits it on another. To use a repeater, con gure the the repeaters input frequency, repeater o set, whether it’s + or - and if there is a PL tone or CTSS.

Once properly con gured, you can key in your microphone to transmit. The downside to using a repeater is it by nature requires either a dual band radio (in order to send and receive transmissions), or two radios. Another potential hinderance is if you are using a repeater owned by someone else, as these are often open to anyone, and you cannot control who uses it or not.

fi

ff

fi

ff

14

15

CHAPTER 3 RADIO FREQUENCIES The radio spectrum ranges from 1 Hz to 3000 GHz. Electromagnetic waves in this frequency are called radio waves and are labeled literally by how tall that wave is. The range is broken down into 8 bands. Low frequencies display lower signal attenuation (reduction of force or amplitude) making them better for long-distance. They can be “bent” by the ionosphere for over the horizon communications.

Higher frequencies require shorter antennas for decent reception qualify. They have more energy than a lower frequency with the same amplitude. Higher frequencies have greater bandwidth for higher data rates and can easily penetrate the ionosphere.





16



UHF BAND

23 cm (1240 MHz) LICENSE REQUIRED This band is in the upper portion of the UHF (microwave) spectrum and outside of UHF/VHF contests there is almost NO activity on this band. In some locations, Amateur TV is operated in this range. Commercial equipment is rare. Some commercial drones also operate in this band.

Very few repeaters in the US. And it’s worth nothing that SAR (syntheticaperture radar) is operated in this band.

33 cm (902 MHZ) LICENSE REQUIRED Few options exist for the 33 cm band - and it is highly underutilized. The 902MHZ-928 MHZ range is allocated as secondary for radio operators, and you may nd interference from Amateur Television and cordless phones (if anyone still uses them).

fi

17

FAMILY RADIO SERVICE (FRS) (462 MHz) NO LICENSE REQUIRED Most common use of FRS is walkie-talkie styled radios for short-distance, 2 way voice communications. 22 preset channels with a max power output of 2 W or .5 W

Channels are shared with GMRS

All kids walkie talkies use FRS

FRS has ability to provide “Privacy Codes” which are a code set that will not enable a receiving radio to not un-mute its speaker unless the code was sent with a transmission. The code is basically a sub-audible tone in some radios or a digital packet that is sent preceding the senders message. It’s not a “secure” method of transmission, but does provide a small degree of privacy.

GENERAL MOBILE RADIO SERVICE (GMRS) (462-476 MHz) LICENSE IS REQUIRED 30 GMRS channels exist and you can utilize repeaters. Voice and data can be transmitted. One license enables an entire family to utilize the band. Repeaters are easily utilized in this band.

Max power 2-5 Watts

70 cm (420 MHz) LICENSE IS REQUIRED This it the most popular frequency band used by licensed operators. Hundreds of inexpensive radios and a large amount of repeaters are available throughout the United States. Most handheld “HAM” Radios that operate on UFH do so on the 70 cm band. There are a ton of 70 cm repeaters.

18

VHF BAND 1.25 Meters (222 MHz) LICENSE REQUIRED Commercial options exist for the 1.25M radios, and “Tri-Band” HAM radios will be able to operate in this range. There isn’t a whole lot of tra c on this band.

MULTI-USE RADIO SERVICE (MURS) NO LICENSE REQUIRED 5 Preset channels

Limited to 2 watts transmitter power output giving an estimated range of 1 mile. Typically not used in “toys” decreasing band usage and is designated for personal use.

2 METERS (144 MHz) LICENSE REQUIRED By far the most tra c sent on HAM radios is in the VHF using the 2 Meter Band. Nearly all hand-held radios do so and the majority of local First Responders use a portion of the 2 Meter band as well. There are a ton of repeaters for 2M. You can nd or modify 2M radios for SSB to obscure communications.

4 Meters Not used in the US - but allocated for use in other countries. Radios are easily available online.

6 Meters (50 MHz) Lowest portion of the VHF spectrum. Due to proximity to HF, it has good characteristics and is seen a “magic band” but can be unpredictable. This

ffi

fi

ffi

19

is the lowest band that a Technician can legally operate on (Not including CB). There are limited 6 Meter Repeaters.

HF BAND CITIZEN BAND RADIO SERVICE NO LICENSE 40 preset channels

Not near as popular as it was decades ago, and there are many restrictions to what you can do to your radio. You can’t raise power output of transmitter nor attach a power ampli er. Max wattage is 4 watts for mobile radios. But there is good news. CB’s can be equipped operate in Single Side Band (SSB) and broadcast at 12 watts. Using SSB changes the modulation of the transmission. Both sending and distant end radios must be equipped with SSB to communicate.

All other lower bands (HF, MF, and LF) require licenses above Technician; however, the next level (General) may operate on all of them. These portion of the spectrum is outstanding for long-range communications, and the most popular is the 20 Meter and 40 Meter Bands. Just like CB, you may also utilize SSB.

Digital Modes including PSK and FT8 (among others) are provide an additional mode including Digital Radioteletype (RTTY), Voice Over IP (VOIP), TCP/IP packet radio, and others. The bene t to digital ham includes stronger signals, better adaptability to changing weather, and increased reliability, plus the advantage that they are less popular, resulting in increased privacy on the same band.

fi

fi

20

21

CHAPTER 4 RADIO TACTICS, TECHNIQUES, AND PROCEDURES Use the phonetic alphabet to identify letters, or spell a word or group of letters. The underlined portion of the spoken word is the emphasized letter or syllable:

LETTER

PHONETIC

A B C D E F G H I J K L M N O P Q R

ALFA BRAVO CHARLIE DELTA ECHO FOXTROT GOLF HOTEL INDIA JULIETT KILO LIMA MIKE NOVEMBER OSCAR PAPA QUEBEC ROMEO



SPOKEN AS

AL-FAH

BRAH-VOH

CHAR-LEE

DELL-TAH

ECK-OH

FOKS-TROT

GOLF

HOH-TELL

IN-DEE-AH

JEW-LEE-ETT

KEY-LOH

LEE-MAH

MIKE

NO-VEM-BER

OSS-CAH

PAH-PAH

KEH-BECK

ROW-ME-OH





22

S T U



SIERRA TANGO UNIFORM







V W X Y Z



VICTOR WHISKEY X-RAY YANKEE ZULU





FIGURE

SPOKEN AS

0 1 2 3 4 5 6 7 8 9

ZE-ROH WUN TOO TREE FOW-ER FIFE

SIX

SEV-UN

AIT

NINE-ER







SEE-AIR-RAH

TANG-GO

YOU-NEE-





FORM or

OO-NEE-FORM

VIK-TAH

WISS-KEY

ECKS-RAY

YANG-KEY

ZOO-LOO









DATE TIME GROUP Always send date time groups (DTGs) digit by digit preceded by the pro word TIME:

081400Z JUN 12 TIME: ZE-ROH, AIT, WON, FOW-ER, ZE-ROH, ZE-ROH, ZOO-LOO, JUNE WUN, TOO

23

TIME ZONE DESIGNATIONS

As needed to ensure clarity, messages containing a combination of letters and numbers in the text use two di erent pro words. If the letter/number combination starts with a number, use the pro word FIGURES:

12A9B



Spoken as: FIGURES - WUN TOO, AL-FAH, NIN-ER,

BRAH-VOH

If the combination begins with a letter, use the pro word I SPELL

TS67R



Spoken as: I SPELL - TANG-GO, SEE-AIR-RAH, SIX,

SEV-UN, ROW-ME-OH

Use abbreviations when conditions are satisfactory, and when you are certain the distant end will understand. Speak common abbreviations as in

ff

24

normal speech (ETA as “ETA) and if the transmission is weak, spell out phonetically to ensure they are understood.

HOW TO CALL AND REPLY Step 1: Check the transmitter settings to verify proper frequencies are set

Step 2: Listen to ensure no other transmissions are in progress

Step 3: Speak clearly with the microphone 2 inches from your mouth

Step 4: Transmit call sign when conditions are favorable

Step 5: If you’ve tried three times to attempt a contact, transmit the pro word NOTHING HEARD. Continue to contact at reasonable intervals.

Step 6: Send transmissions only as fast as the distant end can copy the message. Un-key the microphone at regular intervals and end every transmission with one of the following PROWORDs:

OVER: Recipient response required

OUT: No response required

BREAK: You have additional transmissions to send

WAIT / STAND BY: Use for pauses that require a few seconds

Use the following PROWORDS to communicate the signal strength and reliability of transmissions:

Signal Strength Loud (strong signal)





Good (su cient signal)



Weak (can hear with di culty)



Fading (signal alternates)

















ffi

ffi

25

Readability Clear (excellent quality)

Readable (good quality)

Distorted (trouble copying message)

Intermittent (signal alternates)

Unreadable (transmission cannot be understood

At times, the control station may need to impose or life radio silence. Use secure means when possible.

Imposing silence: All stations (repeat three times). This is (call sign). Silence 148.6 mHz (repeat three times). I say again, all stations (repeat three times). This is (call sign). Silence 148.6 mHz (repeat three times). OUT.

Lifting silence: All stations (three times). This is (call sign). Silence Lifted 148.6 mHz (three times). OUT.

AUTHORIZED PROCEDURE WORDS (PROWORDS) ACKNOWLEDGE





Instructs distant end to acknowledge the message

ALL AFTER The portion of the message to which I refer is all that follows (word/ number).

26

ALL BEFORE The portion of the message to which I refer is all that precedes (word/ number).

AUTHENTICATE The station called is to reply to the challenge that follows.

AUTHENTICATION IS (

…)

The message’s transmission authentication is (…).

BREAK Indicates the separation of text from other portions of the message.

CALL SIGN The group that follows is a call sign.

CORRECT You are correct.

What you have transmitted is correct.

CORRECTION An error was made in this transmission. Transmission will continue with the last word correctly transmitted.

An error was made in this transmission (or message indicated). The correct version is (...).

DISREGARD THIS TRANSMISSION - OUT This transmission is in error, disregard it.

EXECUTE 27

Carry out the intention of the message or signal to which this applies.

I AUTHENTICATE The group that follows is the reply to your authenticate challenge.

I READ BACK The following is my response to your instructions to read back.

I SAY AGAIN Use to repeat all or a portion of a transmission.

I SPELL Precedes a word spelled phonetically.

I VERIFY I verify and repeat the following at your request. (Note: Use only in response to VERIFY.)

MESSAGE The following message requires recording. (Note: Do not use this PROWORD on nets used primarily for conveying messages, but when passing messages on tactical or reporting nets.)

MORE TO FOLLOW The transmitting station has additional tra c for the receiving station.

NEGATIVE No.

ffi

28

OUT Use to end a transmission when no reply is required or expected.

OVER Use to end a transmission when a response is required.

PRIORITY PRIORITY message precedence.

READ BACK Repeat this entire transmission exactly as received.

ROGER I have satisfactorily received your last transmission.

SAY AGAIN Repeat all of your transmission.

WILCO I have received your signal, understand it, and will comply.

29

30

CHAPTER 5 SECURE COMMUNICATIONS SECURITY THROUGH OBSCURITY: Secure RF Principles

USE LOWEST POWER TO GET THE JOB DONE if you’re trying to talk to someone in your neighborhood, 1 or 2 watts is ne. A few miles - 5 watts. Throughout the county, 25. To the moon, 1,000. there are a ton of variables, but the key point is if you’re only trying to talk to someone a few miles away, you don’t want to be transmitting using 25 watts - you’re literally asking others to listen in. KEEP TRANSMISSION BRIEF (Band scopes or spectrum analyzers can pick up quick, but average operator won’t). Use texting, or packet radio.

DON’T USE MILITARY JARGON

CHANGE FREQ’S OFTEN & USE MULTIPLE BANDS - You TX in 2m Distant ends TX in 6m. It takes multiple radios to do this; however, the odds of someone tuning into both is extremely rare.

Which band should you use and why? In general - you have the option of using UHF - and within UFH you have 3 primary bands as well as FRS and GMRS. The 70 cm band is the most popular, but there are a ton of repeaters. FRS is what your typical walkie talkie

fi





31

uses and doesn’t require a license. E cient for short range, but unsecure. GMRS requires a license, but you can also set up repeaters. Then you have VHF, and within you also have 3 primary bands as well as MURS - which is very similar to FRS. In VHF, the 2 meter band is VERY popular, and most of your local EMS, rst responders, and schools will be found here or back down in the 440.

Then you have HF, MF, and LF - and the most popular is the 20 meter. You can check out what’s popular in your area, and maybe opt to use bands that nobody is using - like 10 meter in the HF or 222 in VHF, or 23 cm in UHF. Of course, there are other options, but you can also consider the next tip

USE SINGLE SIDE BAND or DIGITAL COMMS - analog won’t hear anything other than noise. Using these methods cuts out everyone who isn’t operating in the same mode or with the same type of radio drastically decreasing the chances of someone listening to your communications.

USE DIRECTIONAL ANTENNAS AND TERRAIN to your advantage to decrease the possibility of your comms bleeding into areas where you don’t want them to. DON’T TRANSMIT FROM A ‘BASE STATION’ - If your location is static, then even if someone can’t decode your transmission, they can easily deduce your location. There is security in mobility.

USE REPEATERS - Combine using the lowest frequency you can, as well as a directional antenna and emplace a repeater -

fi

ffi

32

DON’T USE PRIVACY CODES- they are as private as having passionate sex in a cheap hotel with cardboard walls after hanging up a “Do Not Disturb” sign - the maid may not knock, but she can damn sure hear what’s happening in the room.

USE ROLLING CODE or VOICE SCRAMBLERS - they are incredibly secure as the transmitted signal and frequency are inverted. Without the right chip added in or wit

Anything more, and you’re getting into areas that are 100% illegal - if you have to manually load an encryption key, you can be sure of it. If you’re using commercial o the shelf equipment, you’re probably safe.

While straight up encryption is illegal, simple coding technically isn’t. I can’t tell you where the line is between simple and complex coding resides; however, if the answer to the code is in the public domain you’re

Use Single Side Band - for 2m and 7cm to obscure comms.

ff

33

34

CHAPTER 6 ENCODED COMMUNICATIONS Every community needs an e ective, reliable, and secure method of communicating. With a little time and e ort an easy to use Standard Operating Procedure can be established to provide how and when information is exchanged.

The need to establish a comms plan comes before you need it, so the time is now to develop your plan.

The following section outlines a simple but e ective way to create security in your communications. This enables you to message on any network or frequency (ranging from email, voice or data messenger service, satellite, or RF) whether it is secured or unsecured and ensure the Team can communicate e ectively and securely.

You generate a Master Key Pad and distribute laminated copies to everyone in your group, community, and family that you need to maintain communications with. The hardware for transmission (Ham, Email, CB, Text, etc) doesn’t matter so long as the Master Key Pad remains secure. If compromised, simply generate a new one and re-distribute it to the Team. And if you are connected to groups working adjacent to you that you want to communicate with, you can create an separate external key pad for your transmissions with them while maintaining the security of your internal communications plan

ff



ff

ff



ff

35

Master Key Pad 0

1

2

3

4

5

6

7

8

9

0

9

8

7

6

5

4

3

2

1

0

1

HQ

Road

Building

Highway

Bridge

Trail

River

Hill

Valley

Ridge

2

Vehicle

Route

SP/RP

Comms / Freq

Time

Point

Primary

Alternate

Grid

Person

3

Convoy

Patrol

Recon

Report

SP/RP

Caution

Green

Amber

Red

Black

4

Up/North

Right/East

Down/ South

Left/West

Day

Night

Unknown

Known

Pick Up

Drop O

5

Safe / Secure

SHTF

Rally

Avoid

Meet

Get

Distance

Objective

Friendly

Enemy

6

12 Gauge

30-30

9mm

45acp

223

Magazine

Case

Supplies

Food

Water

7

Box

Pounds

Pallet

Ton

Foot/Feet

Quart

Gallons

Meters

Kilometers

Mile

8

A

C

D

E

F

I

FRS/ GMRS

CB

Ham

L/Local

9

M

N

O

R

S

T

LP/OP

SOP

UHF/VHF

Z/Zulu

The message: I need you to conduct a recon of small village near Nisqually River in the vicinity of 312 034 to determine feasibility for future HQ. Check routes and con rm buildings are abandoned. There may be enemy personnel in the AO, use caution and avoid contact. Enroute comm plan: CB 1 SSB, VHF 4. Mission comm plan: UFH 3; VHF 7. Report ndings and assessment NLT 1700 on the April 3.

Could be coded as follows: 82 92 92 84 32 12 94 91 83 10 93 16 28 06 08 07 09 06 04 82 83 95 83 93 90 85 91 83 84 95 93 83 10 32 21 80 91 82 81 92 91 84 85 93 90 12 94 80 93 83 39 35 59 85 91 80 92 53

fi

fi

f

36

30 81 92 90 90 87 08 94 94 05 57 98 06 98 02 33 91 89 95 09 06 08 02 09 09 89

The receivers message would read: Do Recon Of BuildingS Near River Grid 312034 Determine Ftre HQ Recon Routes And Con rm BuildingS Are Black Caution Enemy In AO Avoid Contact Comm CB 1 SS UFH/VHF 4 Objective UHF/VHF 3 UHF/VFH 7 Report NL/LocalT 03 1700 L/Local

This Master Pad can be further coded in any number of ways. You can send a fake Key Code number but always use the Master Pad as is, you could simply have an Even and Odd day Key Pad, or you could establish a code for how it’s arranged. For example, in the above Master Pad, the Key would be 00. Whereas Key 58 would instruct the distant end that 8 becomes the rst column, therefore the rst few rows would look like:

KEY58 8

9

0

1

2

3

4

5

6

7

0

1

0

9

8

7

6

5

4

3

2

1

Valley

Ridge

HQ

Road

Building

Highway

Bridge

Trail

River

Hill

2

Trade

Person

Vehicle

Route

SP/RP

Freq

Time

Point

Primary

Alternate

3

Red

Black

Convoy

Patrol

Recon

Report

SP/RP

Caution

Green

Red

4

Pick Up

Drop O

Up/North

Right/East

Down/ South

Left/West

Day

Night

Unknown

Known

fi

fi

fi

f

37

Or you could break create a main pad arranged into four quads and then four smaller key pads and assign each a color:

KEY PAD QUADRANTS 0 0 1 2 3

1

2

3

4

5

6

7

1

2

3

4

8

9

4 5 6 7 8 9

38

Then, use a simple code to tell the distant end how to order the Pad on their end to decode the message. For example KEY R1 G2 A3 B4 would look like this:

R1 G2 A3 B4

0

0

1

2

3

4

5

9

8

7

6

5

HQ

Road

Building

Highway

Bridge

Vehicle

Route

SP/RP

Comms / Freq

Time

1 2 3

Convoy

Patrol

Recon

Report

SP/RP

Up/North

Right/East

Down/South

Left/West

Day

4 5

Safe / Secure

SHTF

Rally

Avoid

Meet

6

12 Gauge

30-30

9mm

45acp

223

Box

Pounds

Pallet

Ton

Foot/Feet

A

C

D

E

F

M

N

O

R

S

7 8 9

6

7

8

9

4

3

2

1

0

Trail

River

Hill

Valley

Ridge

Point

Primary

Alternate

Trade

Person

Caution

Green

Amber

Red

Black

Night

Unknown

Known

Pick Up

Drop O

Get

Distance

Rest in Place

Objective

Destroy

Magazine

Case

Supplies

Food

Water

Quart

Gallons

Meters

Kilometers

Mile

I

FRS/GMRS

CB

Ham

L/Local

T

LP/OP

SOP

Enemy

Z/Zulu

f

39

BUT you can send the code in any order - for example B1 A2 G3 R4 is the same as Key

A2 R4 B1 G3 or Key R3 B1 G3 A2

B1 A2 G3 R4 0

1

2

3

4

5

6

7

8

9

Safe / Secure

SHTF

Rally

Avoid

Meet

12 Gauge

30-30

9mm

45acp

223

Box

Pounds

Pallet

Ton

Foot/Feet

A

C

D

E

F

M

N

O

R

S

0

Get

Distance

Rest in Place

Objective

Destroy

1

Magazine

Case

Supplies

Food

Water

2

Quart

Gallons

Meters

Kilometers

Mile

3

I

FRS/GMRS

CB

Ham

L/Local

4

T

LP/OP

SOP

Enemy

Z/Zulu

5

4

3

2

1

0

9

8

7

6

5

6

Trail

River

Hill

Valley

Ridge

HQ

Road

Building

Highway

Bridge

Point

Primary

Alternate

Trade

Person

Vehicle

Route

SP/RP

Comms / Freq

Time

Caution

Green

Amber

Red

Black

Convoy

Patrol

Recon

Report

SP/RP

Night

Unknown

Known

Pick Up

Drop O

Up/North

Right/East

Down/South

Left/West

Day

7 8 9

What’s more is that you can send the Key with all four, or just three because if I send Key A2 G3 B1 the distant end can easily deduce that R is going in the fourth quadrant.

NOTE: anything beyond 2 matrix’s will most likely require the use of a computer aided program (ranging from a simple spreadsheet to a more complicated and dedicated application to code/decode).

It’s recommended to generate a Key Pad for internal communications and another one for external communications. If there is a community group or

f

40

organization that operates adjacently to you, simply provide them a copy of a Key Pad for use between both entities to ensure secure comms but ensure you have one for internal messaging to maintain security.

If for any reason your experience a breech in security, a simply Key Pad like this can easily be regenerated into a new one.

41

42

CHAPTER 7 PACE PLAN Primary, Alternate, Contingency, and Emergency (PACE) is a method to build a communications plan that requires four means of communication between the Team setting a precedent from most preferred to least.

Ideally, each method is a complete separate path or protocol (internet, radio waves, satellite services, radio wire, messenger) rather than using dependent means (HF, UHF, VHF, CB).

Utilize as many forms of communication as possible and do not rely on a single channel (i.e. email, Facebook Messenger, Signal, etc are ALL cellular based, and if the network goes down, so does your communications plan).

While a PACE plan designates the preferred order, each method of contact is permissible, and must be monitored during all phases of the operation.

There may be a need for multiple PACE plans - for example, a standing plan for daily operations, one for communicating with external organizations or teams, and those build for a speci c task.

Understand the sensitivity of the messages being sent and the importance of when it is received and the security of each channel. If a message can

fi





43

wait, and security dictates it, it’s more than acceptable to utilize the “Emergency” channel.

For daily operations the use of email, messenger applications, and voice communications are most common but understand the risk each of these presents. Be aware of the protocols used for security by each provider when utilizing such methods.

There is a general need for multiple internal PACE plans regardless of mission set including at the halt, on the move and operational meetings.

AT THE HALT The command net will be operated at all times and used for any unit to transmit to the TOC. Frequency’s listed are what the Command Net uses and distant ends should adjust accordingly.

INTERNAL NET EFFECTIVE PRIMARY

0001-0930 0930-1500 1501-2359

ALT: CONTINGENCY: EMERGENCY:



RX FREQ TX FREQ

VHF MURS UHF

GMRS HF

FRS



Signal

Phone (NOT text)

Runner

*Satellite channels are an excellent addition

44

PACE PLAN ON THE MOVE PRIMARY ALTERNATE CONTINGENCY EMERGENCY



VHF UHF

CB SSB

Phone



OPERATIONAL MEETINGS & UPDATES PRIMARY ALTERNATE CONTINGENCY EMERGENCY



In Person Signal App

Proton Email

Phone



45

46

CHAPTER 8 OPERATIONAL CONSIDERATIONS AUTHENTICATION CODES A signi cant challenge for the security of the communication system is the compromise of the net by an unauthorized user. Radios can be cloned or discovered by scanning. Emails can be hacked, phones can be stolen, and a team member could be forced to communicate with threat from an adversary.

Authentication provides a mechanism that requires both ends to prove that they are genuine before transmitting. Veri cation is done using a code. While this can be done digitally, manual methods are just as e ective.

CALENDAR DAYS: 1-7

14 / Nights

8-14

76 / Tears

15-21

88 / Commie

22-28

94 / Grinding

29-31

45 / Craft

Example for 4 July: HQ: “Spartan 7, authenticate 14”

Spartan 7: “Authentication is Nights”

Now each element can communicate knowing that both have not been compromised. This does NOT prove that the net hasn’t been

ff

fi





fi

47

compromised, only that that the transmitter can be trusted as being a team member who is not in distress.

CHALLENGE AND PASSWORDS Always use in a sentence. Change for every mission:

Challenge: Red

Password: Dawn

Example:

“Red is my favorite color”

“Did you see the sky at dawn”

In the event of an emergency, members use a running password which requires no challenge and does not need to be used in a sentence.

Running Password: PBR

VISUAL COMMUNICATIONS Available to all units including smoke, ags, lights, panels, and hand-andarm signals.

HAND AND ARM SIGNALS: Hand and arm signals are an e cient means of communications that are clear, accurate, and secure for ground forces.

They provide the advantage of maintaining noise discipline; however, the message must be seen to be understood. Therefore they are only e ective when interval between individuals is set properly and they lose their e ectiveness with an increase in interval, in heavy vegetation, and in hours of limited visibility.

ff

fl

ffi

ff

48

Many common hand and arm signals are pictured below - however, as with all forms of communication they must be practiced and rehearsed in order to be e ective.

RANGE:



CEASE FIRE:

ASSEMBLE:

SHIFT:

FREEZE:

HASTY AMBUSH

WEDGE:

DOWN

ENROUTE RALLY

STOP:

DOUBLE TIME

OBJECTIVE RALLY

ff

49

In the event you become isolated and all other forms of communication are either unavailable the following may be used to alert a search and rescue crew. Consider the permissiveness of the environment and the distant end you are communicating with. Suitable items are mirrors, torch, are, camera ash, strobes, and whistle in addition to ground to air signals using panels, survival blankets, rocks, or re.

Smoke from a re is by far the most e ective. Prepare three signal res. Consider resources you may have including vehicle fuel, fuel tabs, or other items on your packing list to assist in starting the re. Set each re 15 meters apart, start one, and then once lit and established use fuel from the rst re to light the second in order to preserve your tinder and re making kit. The use of thermal imaging has become more popular so keep the res going constantly. Do not wait until you hear aircraft, but light immediately in order for the signal to be in place when the aircraft is overhead. Once you hear a plane or helicopter, add green vegetation to your re to enhance the smoke produced. Damp grasses and pine produce white smoke which can be seen better at night. Dense black smoke can be made from car ties, foam padding from seats, and other items made from polytene or plastic. Ensure the area is clear to prevent the re from spreading and causing a hazard to your survival.

fi

fi

fi

fi

fi

fi

fi

fi

ff

fi

fl

50

fi

fl

fi

ISOLATED PERSONS COMMUNICATIONS

SIGNAL MIRROR



51

MORSE CODE CHART

52

GROUND TO AIR SIGNALS:

53



54

SEMIPHORES:

55

56



About the Author

Raised in the mountains of New Mexico, Stoker has over 20 years of military operational experience, and keeps his ask lled with the tears of a commie.

fi

fl

57