radio Flashcards
why do we authenticate
distinguish genuine and fraudulent transmissions consec aid to stop infriltration
to stop deception by enemy’s
advantages
no physical connections
quick set up
mobile
users unlimited
signals carry over enemy territory
direction finding
two types of radio station
control
substation
radio net types
simple net
combined net
rebroadcast net
tactical intranet
tactical internet
eternal triangle
sender
receiver
monitor
transec is broken down into 3 key areas
interception
analysis
deception
offering a message
when you know the recieveing station is busy
when communications are difficult
as a warning for an important or complicated message
repetition say again …
say again
all after
all before
word after
word before
from to
grid
time
direction
callsign
disadvantages
false transmissions
interception of signals
direction finding
number of frequencies limited
jamming
atmospheric conditions
when to authenticate
when a station suspects the enemy is attempting to intrude on the net
challenged by another station
unexpected or irrational orders are transmitted
when to authenticate
when a station suspects the enemy is attempting to intrude on the net
challenged by another station
unexpected or irrational orders are transmitted
electronic warfare
attack
defense
survalienace
ew measures
counter measures
protective measures
support measures
ecm
jamming
neutralization
deception
types of transmissions / calls
collective
all stations
multiple
exempt
limited
single