USNavy NTP4E
USNavy NTP4E
USNavy NTP4E
NAVAL COMMUNICATIONS
NTP 4(E)
18 JANUARY 2008
COMMANDER, NAVAL NETWORK WARFARE COMMAND
2465 GUADALCANAL RD
NORFOLK VA 23521-3228
GOVERNMENT
NTP 4(E)
DEPARTMENT OF THE NAVY
COMMliNDER, NAVAL NETWO!Ut WARFARE COMMAND
2465 GUADALCANAL RD
NORFOLK VA 2352~-3228
LETTER OF PROMULGATION
1. NTP 4(E), NAVAL COMMUNICATIONS, was developed under the
direction of the Cqmmander, Naval Network Warfare Command and is
promulgated for use by the u.s. Navy 1 Coast Guard and Marine
Corps.
2. NTP 4(E) is an unclassified, non-registered publication. N'TP
4(E) will remain a live document On NETWARCOM share point web
site
lj .l.S)..
"""-L.:..,~Jl
H. D. STARLING II
VADM, U.S. Navy
Commander, Naval
Warfare Command
~etwork
NTP 4(E)
RECORD OF CHANGES AND CORRECTIONS
Enter Change or Correction in Appropriate Column
Identification of Change or
Correction; Reg. No. (if any)
and date of same
Change
By whom entered
(Signature; rank, grade
or
rate; name of command)
Date Entered
Correction
ii
NTP 4(E)
TABLE OF CONTENTS
CHAPTER 1 COMMUNICATION ORGANIZATION & ADMINISTRATION
1.1
INTRODUCTION
1.2
1.2.1
1.4
1.4.1
1.4.2
1.4.3
1.4.4
1.4.5
ADMINISTRATION
Communications Equipment Population Summary (CEPS)
Material Support
Corrective Maintenance
Inventory Control
Communications publications
1.5
1.5.1
1.5.2
1.5.3
1.5.4
1.5.5
1.5.6
1.5.7
SAFETY
Safety precautions
Going aloft
Dangerous voltages and currents
Discharge and grounding circuits
Adjusting electronic transmitting equipment
Radio frequency radiation hazard
Disposal of radioactive electronic parts
1.6
1.6.1
1.6.2
1.6.3
1.6.4
NTP 4(E)
1.6.5
1.6.6
1.6.7
1.6.8
1.6.9
1.6.9.1
1.6.9.2
1.6.9.3
1.6.9.4
1.6.9.5
1.6.9.6
1.6.9.7
1.6.9.8
1.6.9.9
1.6.9.10
GENERAL
2.2
MESSAGING SYSTEMS
2.2.1
DMS Overview
2.2.1.1
Tactical Message Gateway (TMG)
2.2.1.2
Certification Authority Workstation (CAW)
2.2.1.3
Message Conversion System (MCS)
2.2.1.4
DMS and Tactical DMS Proxy Afloat System
2.2.1.5
Defense Message Dissemination System (DMDS)
2.2.1.6
Mail List Agent (MLA)
2.2.1.7
Directory System Agent (DSA)
2.2.1.8
Backbone Message Transfer Agent (BMTA)
2.2.1.9
Local Message Transfer Agent (LMTA)
2.2.1.10 High Assurance Guard (HAG)
2.2.1.11 Service Management System (SMS)
2.2.1.12 Groupware Server (GWS)
2.2.2
2.2.3
2.2.4
2.2.5
2.2.6
2.2.7
2.2.8
2.2.9
2.2.10
2.2.11
2.2.12
2.2.13
2.2.14
iv
NTP 4(E)
2.3
2.3.1
2.3.2
2.3.3
2.3.4
2.3.5
2.3.6
2.3.7
2.3.8
2.3.9
2.3.10
2.3.11
2.3.12
FLEET BROADCAST
GENERAL INFORMATION
Control of the Fleet Broadcasts
Communications Guard
Broadcast Identification
Frequencies
Circuit configuration
Cryptographic coverage
Broadcast message numbering
Broadcast message format
Broadcast recaps
Broadcast service messages
Broadcast off the air monitoring (OTAM)
2.4
2.4.1
2.4.2
2.4.3
2.4.4
TYPES OF BROADCASTS
Fleet Multichannel Broadcast System
World-wide TACAMO (WTAC)
USW Patrol (VP) broadcast
SCI Fleet broadcasts
2.5
2.5.1
2.5.2
2.5.3
2.5.4
2.5.5
2.5.6
2.5.7
2.6
2.6.1
2.6.2
2.6.3
2.6.4
2.6.5
2.6.6
2.6.7
2.6.8
2.6.9
2.6.9.1
2.6.9.2
IT-21
Integrated Shipboard Networking System (ISNS)
Navy Tactical Command Support System (NTCSS)
2.6.9.3
2.6.9.3.1
2.6.9.3.2
2.6.9.3.3
2.6.9.3.4
NTP 4(E)
2.6.9.3.5 Program Executive Office, Command, Control,
Communications, Computers and Intelligence (PEO C4I)
2.6.10
2.6.11
2.6.12
2.6.13
2.6.14
2.6.14.1
2.6.14.2
2.6.15
2.6.15.1
2.6.15.2
2.6.15.3
2.6.16
2.6.17
2.6.18
2.7
VOICE AND VIDEO SERVICES
2.7.1
Voice over IP (VoIP)
2.7.2
DoD Video Teleconferencing (VTC) Service
2.7.3
Defense Switched Network (DSN)
2.7.4
Defense Red Switched Network (DRSN)
2.7.5
Integrated Services Digital Network (ISDN)
2.7.6
Plain Old Telephone System (POTS)
2.7.7
Afloat Personnel Telecommunications Systems (APTS)
2.7.8
KY68 Digital Subscriber Voice Terminal (FDVT)
2.7.9
Video Information Exchange System (VIXS)
2.7.10
DISN Video Service Global (DVSG)
2.7.11
STU / STE (Secure telephone)
2.7.12
Advanced Narrowband Digital Voice Terminal (ANDVT)
2.7.13
Future Narrowband Data Terminal (FNBDT) standard
2.8
2.8.1
2.8.2
2.8.3
2.8.4
2.8.5
2.8.6
2.8.7
vi
NTP 4(E)
2.8.8
3.2
3.2.1
3.2.2
3.2.3
3.2.4
3.2.5
3.2.8
3.2.9
3.3
3.3.1
3.3.2
3.3.3
3.3.4
3.3.5
SERVICE ACTION
General
Operating Signals (OPSIG)
Prosigns and passwords
Tracer action
Message corrections and cancellations
3.2.6
3.2.7
3.4
MESSAGES REQUIRING SPECIAL HANDLING
3.4.1
General
3.4.2
Special Category (SPECAT) messages general
3.4.3
Special category (SPECAT) SIOP-ESI
3.4.4
Special Category (SPECAT) Exclusive For
3.4.5
Tight Control (TICON)
3.4.6
Emergency Action Messages (EAM)
3.4.7
White Pinnacle (EA CELL) message injects
3.4.8
Limited Distribution (LIMDIS)
3.4.9
American Red Cross (AMCROSS) messages
3.4.10
Top Secret
3.4.11
Personal For
3.5
3.5.1
3.5.2
3.5.3
3.5.4
3.5.5
3.5.6
3.5.7
3.5.8
MESSAGE FORMATS
General
Originating Station Routing Indicator (OSRI)
Station Serial Number (SSN)
Routing
ACP 128
Modified ACP 126
ACP 127
ACP 126
vii
NTP 4(E)
3.5.9
3.5.9.1
3.5.9.2
3.5.9.3
3.5.9.4
3.5.9.4.1
3.5.9.4.2
3.5.9.4.3
3.5.9.4.4
3.5.10
3.5.11
3.6
LOGS AND FILES
3.6.1
General
3.6.2
Master Station Log (MSL)
3.6.3
Central message log
3.6.4
Top Secret control log
3.6.5
Circuit logs
3.6.6
Broadcast circuit number log and record destruction
3.6.7
Message files
3.6.8
File maintenance
3.6.9
Embarked command files
3.6.10
Communications center master file
3.6.11
Crypto center file
3.6.12
Broadcast files
3.6.13
Records disposal
CHAPTER 4 COMMUNICATIONS SECURITY
4.1
4.2
4.3
4.4
4.5
4.6
4.7
4.8
General
COMSEC incident
COMSEC insecurity
Crypto markings
COMSEC material
Watch-to-Watch Inventory
Clearance requirements
Access to NATO information
4.9
4.9.1
Crypto access
Two Person Integrity (TPI)
4.10
4.11
4.12
4.13
4.14
4.15
4.16
4.17
4.18
NTP 4(E)
4.19
4.20
TEMPEST
EKMS training visits and inspections
INTRODUCTION
World coverage
Current regional area of responsibility capabilities
Problem areas
Unauthorized transmissions
Violation reports
Harmful interference Communications jamming,
imitative
Communications deception
5.1.7
Coast Guard HF ship/shore circuits
5.1.8
HF Internet Protocol (HF-IP)
5.1.9
Afloat Electromagnetic Spectrum Operations (AESOP)
5.1.10
Frequency management
5.1.11
Frequency restrictions and various theater of operation
5.2
5.2.1
5.2.2
5.2.3
5.2.4
5.2.5
5.2.6
5.2.7
5.2.7.1
5.2.7.2
5.2.7.3
5.2.7.4
5.2.7.5
5.2.7.6
5.2.8
5.2.9
5.2.10
5.2.11
5.2.12
5.2.13
5.2.14
5.3
5.3.1
5.3.2
5.3.3
5.3.4
5.3.5
5.3.6
5.3.7
SATELLITE COMMUNICATIONS
General
Ultra-high frequency (UHF) Satellite Communications
Super-high frequency (SHF) defense Satellite
Communications Systems (DSCS)
Commercial Wideband Satellite Communications Program
(CWSP)
Commercial Broadband Satellite Program (CBSP)
Wideband Gapfiller System (WGS)
Navy Extremely High Frequency (EHF) Satellite program
MILSTAR
Interim Polar System (IPS)
EHF Time Division Multiple Access (TDMA) Interface(TIP)
EHF Systems Services
Obtaining EHF Satellite Access
After Action Report (AAR)
Mobile subscriber service (Iridium)
INMARSAT High speed data
Global Broadcast System (GBS)
Television Direct to Sailor (TV-DTS)
DoD gateways
DoD Teleport
JMINI (Joint (UHF) MILSATCOM Network Integrated Control
System )) /DAMA SAC II
SUBMARINE COMMUNICATIONS
Broadcast Control Authority (BCA)
Base Consolidated Telecommunications Center (BCT)
Submarine broadcast system
VLF Digital Information Network (VERDIN) broadcast
VLF/LF SI VLF Secure, NATO VALLOR, SI VALLOR circuits
Information Screening and Delivery System (ISDS)
Warrior Pull
ix
NTP 4(E)
5.3.8
5.3.9
HF VALLOR circuit
IP Communications
General
Ship/Shore circuit modes of operation
Full period termination
Full period termination reports
Circuit activation
Maintaining a full period termination
Message continuity
Loss of termination (shore)
Termination shifts
Termination continuity
6.4
6.4.1
6.4.2
6.4.3
6.4.4
6.4.5
6.4.6
6.5
6.6
6.7
6.8
6.9
6.10
6.11
6.12
6.13
6.14
6.15
6.16
6.17
6.18
6.19
6.20
6.21
6.22
6.23
6.24
6.25
CENTRIXS Maritime
NETWARCOM C4 TYCOM
PRNOC CENTRIXS Services
x
NTP 4(E)
7.1.3
7.1.4
7.1.5
7.1.6
7.1.7
7.1.8
7.1.9
7.1.10
7.1.11
7.2
7.2.1
7.2.2
7.2.3
7.2.4
7.2.5
7.2.6
7.2.7
7.2.8
7.2.9
7.2.10
7.3
7.3.1
7.4
7.4.1
7.4.2
7.5
7.6
7.6.1
GIRFFIN
GRIFFIN Account Setup
7.7
7.8
7.9
7.10
8.2
8.3
8.4
xi
NTP 4(E)
CHAPTER 9 VOICE COMMUNICATIONS
9.1
9.2
9.3
9.4
9.5
9.6
General
Frequencies
Call Signs
Kick Procedures
Voice Logs
Secure Voice Communications
SHIPCOM (AT&T)
11.2
11.3
11.4
11.5
11.6
11.7
11.8
xii
NTP 4(E)
APPENDICES
APPENDIX A List of Acronyms and abbreviations
APPENDIX B COMSPOT reporting
APPENDIX C Content Indicator Codes (CICs) for use with Navy
Legacy messaging systems
APPENDIX D Communications Information Bulletins and Advisories
(CIB/CIA)
APPENDIX E Frequency emission, bands, and designators
APPENDIX F Military Affiliated Radio System (MARS)
APPENDIX G Visual Communications
APPENDIX H Communications instructions and procedures for Naval
activities communicating with US Flag merchant ships (MERSHIPS)
APPENDIX I Sample drill packages
- Standard PRE-EX C4I Drill (Sample) Package Alpha (UHF
SECURE/NON-SECURE
- Standard PRE-EX C4I Drill (Sample) Package Bravo (HF
SECURE/NON-SECURE
- Standard PRE-EX C4I Drill (Sample) Package Charlie (EHF
Performance and Circuit activation)
- Standard PRE-EX C4I Drill (Sample) Package Charlie one (EHF
Point-to-Point)
- Standard PRE-EX C4I Drill (Sample) Package Delta (Battle
Force E-mail Activation)
- Standard PRE-EX C4I Drill (Sample) Package Echo (Warfare
Commanders/Frequency shift and kicks)
- Standard PRE-EX C4I Drill (Sample) Package Echo one (Primary
guarded 24 Hour roll calls)
- Standard PRE-EX C4I Drill (Sample) Golf Package Foxtrot (ATO
and DIMS Transmission (various) paths )
- Standard PRE-EX C4I Drill (Sample) Package Golf (VTC
Activation)
- Standard PRE-EX C4I Drill (Sample) Package Hotel (HF TTY
Activation)
- Standard PRE-EX C4I Drill (Sample) Package India (OTAT/OTAR
Activation)
- Standard PRE-EX C4I Drill (Sample) Package Juliet (Restore
UHF DAMA)
- Standard PRE-EX C4I Drill (Sample) Package Kilo (Activate
and Initiate demand call Via KY-68)
- Standard PRE-EX C4I Drill (Sample) Package Lima
(CSG/ESG/Bandwidth Management)
xiii
NTP 4(E)
-
xiv
Mike (CENTRIXS
November
Oscar (River City)
Papa (INFOCON
Quebec (CND
Romeo
Sierra (GBS)
Tango (C4I
NTP 4(E)
LIST FIGURES
1-1
1-2
NNFE Organization
NNFE Functions
2-1
2-2
2-3
2-4
2-5
2-6
2-7
2-8
2-9
2-10
2-11
2-12
2-13
2-14
2-15
2-16
3-1
3-2
3-3
4-1
BEADWINDOW Codes
5-1
5-2
5-3
5-4
5-5
5-6
5-7
5-8
5-9
5-10
5-11
5-12
5-13
5-14
5-15
5-16
5-17
5-18
5-19
5-20
5-21
5-22
5-23
5-24
5-25
HFIP/SNR Architecture
UFO Satellite Constellations
CWSP Architecture
CWSP Satellite Coverage
WGS Coverage
Milstar EHF Constellations
UFO EHF Constellations
Approximate polar EHF Coverage (2 satellites)
Approximate EC Spot Beam Coverage
Iridium ground architecture
Iridium Space Segment
INMARSAT Constellations
Conceptual GBS Architecture
GBS Concept of Operations Overview
Sample/Generic UFO/G Beam Coverage
UFO GBS Payload Configuration
Example UFO/G Configuration A
GBS UFO/G Phase 2 Coverage w/ Sample Beam Locations
DoD Gateway Locations
STEP Site Locations
DoD Teleport Architecture
DAMA SAC & JMINI IOC Control System Architecture
LF/VLF Fixed Submarine Broadcast Architecture
Current Submarine IP Architecture
Future Submarine IP Architecture
xv
NTP 4(E)
6-1
6-2
DWTS
SINCGARS Concept of Operation
7-1
7-2
7-3
7-4
7-5
7-6
7-7
7-8
7-9
9-1
xvi
NTP 4(E)
LIST OF TABLES
1-1
2-1
TACTERM Equipment
5-1
5-2
5-3
5-4
UFO Capabilities
U.S. Navy EHF Terminals
Milstar I LDR Channel-to-Beam Assignments
Milstar II MDR Channel-to-Beam Assignments
6-1
7-1
7-2
xvii
NTP 4(E)
PREFACE
The focus of NTP-4 Echo (Naval Communications) is to provide a
basic manual addressing C4I concepts and capabilities in the U.S.
Navy. Due to increased proliferation of Information Technology
(IT) within DoN and the high demand for information dominance
within the battle space, the need for a primary source C4I
document has never been greater. To that end, Naval Network
Warfare Command initiated a major revision to this publication
reflecting the latest C4I equipment/systems in use today. This
document was developed through a collaborative effort with Fleet,
Numbered Fleet, Type Commanders, and other components of the
Naval Netwar Forcenet Enterprise (NNFE) and serves to meet the
following objectives:
1. Outline Navy communications shore/afloat organization.
2. Identify automated systems ashore and afloat to support
Navy messaging.
3. Provide guidance for message processing procedures.
4. Identify Communications Security (COMSEC) measures and
controls.
5. Identify satellite communications capabilities, systems,
and equipment.
6. Identify submarine communications capabilities, systems,
and equipment.
7. Outline Navy communications ship/shore circuit modes of
operation.
8. Identify Allied/coalition communications capabilities,
systems, and equipment.
9. Identify collaboration tools for use on Navy/Joint
enterprise networks.
10.Provide guidance for operating and defending afloat and
shore network communications systems (to include
Information Assurance Vulnerability Management (IAVM) and
computer incident reporting).
11.Provide guidance for Communications Spot (COMSPOT)
reporting.
12.Provide sample C4I drill packages (used in conjunction
with FXP-3).
To further this collaborative effort, NETWARCOM has made NTP 4
Echo available on the NETWARCOM Enterprise Workspace (NEWS)
SIPRNET website at:
xviii
NTP 4(E)
http://www.fleetforces.navy.smil.mil/netwarcom/n3ops/n35/ntp4ref/
default.axps. A blog has been set up on the right hand side of
this webpage to allow for continuous feedback from the Fleet on
recommended changes, additions and deletions. Comments will be
consolidated and adjudicated monthly before presentation to the
Primary Review Authority (PRA) for approval. NETWARCOM will then
announce approved changes via a Navy Telecommunications
Directive.
All users of Navy C4I equipment and systems are encouraged to
assist NETWARCOM in continuing to improve the value and relevance
of this publication.
xix
NTP 4(E)
CHAPTER 1
COMMUNICATIONS ORGANIZATION AND ADMINISTRATION
1.1
INTRODUCTION
1-1
NTP 4(E)
9. Conducting IO.
10. Conducting Space operations.
11. Performing duties as a Functional Component Commander
to USSTRATCOM for Space, IO and Network Operations
(NetOps).
1.2.1
NCTS Jacksonville, FL
NCTS Bahrain
NCTS Naples, IT
NCTS Sicily
Table 1-1
NCTAMS Operational Organization
1-2
NTP 4(E)
Each NCTAMS operates a Joint Fleet Telecommunications
Operations Center (JFTOC) which functions as the primary
control point for day-to-day operations within that
NAVCOMMAREA. Each JFTOC is assigned a 24-7 Watch Officer.
The responsibilities of the JFTOC Watch Officer are defined
in paragraph 1.3.3.
Each NCTAMS and NTCS operates a Technical Control Facility
(TCF) which contains the equipment necessary for ensuring
fast, reliable, and secure exchange of information and
typically includes distribution frames and associated
panels, jacks, and switches and monitoring, test,
conditioning, and order wire equipment. The TCF allows
telecommunications systems control personnel to exercise
operational control of communications paths and facilities,
make quality analyses of communications and communications
channels, monitor operations and maintenance functions,
recognize and correct deteriorating conditions, restore
disrupted communications, provide requested on-call
circuits, and take or direct such actions as may be required
and practical to provide effective telecommunications
services.
Tech Control also performs basic functions for receiver and
transmitter sites remotely. These include tuning, equipment
patching, quality monitoring of received or radiated
signals, switching or directional control of antennas,
primary ship shore circuit operations, and the submission of
required reports.
1.2.1.1
(NCTS)
1-3
NTP 4(E)
regional NIOCs, are located in TX, HI, GA, and MD. Each of
these four regional NIOCs incorporate a Fleet Information
Operations Center (FIOC). FIOCs function as virtual Direct
Support Elements (linguists, signals and nodal analysis) and
provide target development and technical support to the
fleet.
1.2.2
NTP 4(E)
1-5
NTP 4(E)
14. Conducts liaison and acts as the Technical Advisor with
the Navy training community regarding the EKMS Manager
Course of Instruction (COI) (V-4C-0013).
15. Is the Inventory Control Point (ICP) for COMSEC
equipment throughout DoN and manages cryptographic
equipment assets for DoN.
16. As the DoN Registration Authority, NCMS is responsible
For registering using activities/commands with Tiers 1
And 0 and for assigning EKMS IDs to them. NCMS is also
responsible for ordering initialization key for KPs and
for maintaining registration data on its
activities/commands.
17. FIREFLY POC (Point of Contact) for modern key
privileges.
1.2.5
1-6
NTP 4(E)
NNFE BOARD OF DIRECTORS (BOD)
CEO - COMNAVNETWARCOM
ADVISORS
PEO-SPACE SYS NAVSUP ONI ONR CNI SWE/NAVSEA NAE NAVAIR MCCDC USE NECC
GOVERN
COMMS
Readiness
Assessment
Policy
Action
NNFE
CDP
Modernization
Personnel & Training Standing Team
As Of 17 Oct 2007
Figure 1-1
NNFE Organization
1-7
NTP 4(E)
Figure 1-2
NNFE Functions
1.3
COMMUNICATIONS OFFICER
1-8
NTP 4(E)
embarked, the COMMO is operationally assigned to the
embarked staff to perform additional duties (ADDU).
OPNAVINST 3120.20 (Standard Organization and Regulations of
the U.S. Navy) contains additional COMMO duties.
1.3.2
NTP 4(E)
distribution and reporting functions. The Commanding
Officer (CO) is responsible for command administration of
allocated EKMS material. The CO must formally establish an
EKMS account and appoint, in writing, an EKMS Manager and at
least one alternate manager. The EKMS Manager is
responsible for receiving EKMS material from the
Communications Security Material Issuing Office (CMIO),
maintaining accountability of all CMS material allocated to
the command's EKMS account and reporting the status of the
account to NCMS. The effective edition of EKMS-1 (series)
contains specific EKMS Manager Qualifications and EKMS
safeguard requirements.
1.3.5
NTP 4(E)
(b)
(c)
(d)
(e)
(f)
(g)
NTP 4(E)
1.3.7
1-12
NTP 4(E)
6. Maintaining required logs and files;
7. Coordinating circuit problems with the technical
control supervisor;
8. Other duties as the CWO may assign.
1.3.9
SYSTEMS ADMINISTRATOR
1-13
NTP 4(E)
being the consultant for computer problems beyond the
knowledge of technical support staff.
1.3.11
1-14
NTP 4(E)
training starts in the schoolhouse and continues through the
Fleet Readiness Training Plan (FRTP) cycle (refer to
paragraph 1.6.9.3). A Training Officer is attached to each
unit and staff, research is handled by Systems Commands
(i.e., SPAWAR), discussions, trial and error will occur
without a KM assigned. However, the KM should monitor these
contributions and work closely with contributors to ensure
the strike group obtains maximum benefit from each.
1.3.12
1-15
NTP 4(E)
8. Workflow If documents need to pass from one person
to another, what are the rules for how their work
should flow?
9. Creation If more than one person is involved in
creating a document, how will they collaborate?
Effective collaboration requires six essential elements:
1. Roadmap for Evolution A clear plan must be developed
for the effective development and implementation of new
processes and an understanding of the organizations
affected by these changes.
2. Collaborating Communities Each role in the
collaboration process must be identified, defined and
understood.
3. Process Structure There must be a clear understanding
of exactly what points in our training process require
collaboration.
4. Clearly Defined Interfaces Specifics around the
collaboration itself. What is the purpose of each
point of contact? Who is interacting with whom? What
are the roles and responsibilities of each person or
organization involved?
5. Vehicles for Collaboration Standard means of
capturing and sending information must be identified
and used. What system (email, calendar, CaS, KWeb,
SIPRNET, NIPRNET, etc) will be used?
6. Enabling Technology The technical infrastructure
(applications, services, security, networks, etc.) must
be in place to ensure that the process and the
collaboration within the process can be executed
effectively.
1.3.13
1-16
NTP 4(E)
communications annexes to operational plans or orders, but a
command may establish standard communications plans or
procedures to significantly reduce the number, size or
complexity of the communications annexes to operational
orders.
When a staff embarks on a ship, the ship's communications
organization is usually transferred for temporary additional
duty (ADDU) to the embarked commander. The Staff COMMO then
works closely with the ship's COMMO in prescribing watches,
message handling procedures and other details to maintain
effective communications. The Staff COMMO is also
responsible for providing the Commanding Officer of the
flagship with appropriate communications services. The Staff
COMMO must exercise care to maintain the communications
organization and files of the flag ship intact so that if
the embarked staff moves, the ship's communications
organization can effectively resume operations.
The Staff COMMO may issue instructions to subordinate units
as authorized by the unit commander only, and in the
latter's name, e.g., communications procedures, setting or
securing of watches, frequency shifts or circuit discipline.
However, he/she cannot issue instructions directly to
personnel in other ships/units. Any such orders must be in
the name of the commander and through the chain of command
to the Commanding Officer of the ship/unit in question.
1.4 ADMINISTRATION
1.4.1 COMMUNICATIONS EQUIPMENT POPULATION SUMMARY (CEPS)
Communications Equipment Population Summary (CEPS) is a
complete list of communications equipment on board ship.
This summary reflects the ships communications capabilities
and limitations. CEPS are submitted two times each year,
after significant C4I upgrades and two months prior to an
extended deployment. Instructions for submitting CEPS are
outlined in GCIB 22 Kilo.
1.4.2 MATERIAL SUPPORT
Material support of the communications complex is the effort
directed toward maintaining facilities in peak operating and
physical condition. The three most important keys to
successful material support are system operation, preventive
maintenance, and casualty control. The success of these
efforts depends largely upon how well the operating and
maintenance personnel coordinate and carry out these
responsibilities.
The system approach to material support considers
1-17
NTP 4(E)
operational procedures and personnel turnover and provides
for continued training of new personnel to replace those who
leave. Without thorough operator training, the total system
cannot function effectively. An operator must demonstrate
the ability to align a system in accordance with specified
operating instructions before being considered qualified in
that system. Formal instruction and on-the-job training
must emphasize the following:
1. Detailed alignment procedures.
2. Quality control monitoring procedures.
3. Technical limitations of the system.
4. General care and cleanliness of the system components.
Planned Maintenance System (PMS) pertains to the planning,
scheduling, and managing resources (personnel, material and
time) to perform those actions which contribute to
uninterrupted functioning of equipment within its design
characteristics. The PMS system provides each command,
department, and supervisor with the means to plan, schedule,
and control maintenance with appropriate schedules. PMS
pertains to preventive maintenance rather than corrective
maintenance based upon the requirements contained in Ships
Systems Command Manuals, manufacturers' instruction books,
other associated publications, and Reliability Center
Maintenance (RCM) analyses.
1. The Department Head uses the Maintenance Material
Management (3-M) Manual OPNAVINST 4790.4 (series),
normally kept in the departmental office, to plan and
schedule maintenance. The 3-M Manual contains a short
description and frequency of equipment maintenance
requirements, a list of Navy-wide 3-M contacts, and a
summary of 3-M forms.
2. The Cycle Schedule displays preventive maintenance
requirements based on an overhaul cycle. Each work
center prepares a cycle schedule, which is used to make
out the quarterly schedules.
3. The Quarterly Schedule displays the current quarter's
maintenance schedule. The Cycle and Quarterly
Schedules are contained in a display holder known as
the "Maintenance Control Board", which is usually
located outside the department office. Maintenance
requirements on this board reflect the overall
preventive maintenance program for the department.
4. The Weekly Schedule is posted in each space with a copy
of the applicable portions of the PMS Manual. This
schedule contains all planned maintenance to be
1-18
NTP 4(E)
accomplished within the week for equipment in that
space. It assigns individual personnel to perform
specific maintenance on specific equipment on a
particular date. The Leading Petty Officer or 3-M
Supervisor for the department assigns the work and
records its completion on the schedule.
5. The Maintenance Requirement Card (MRC) defines the
planned maintenance assignments in sufficient detail to
enable personnel to perform the tasks without
difficulty. It lists the enlisted rate, time, tools,
parts, and materials required to perform the
maintenance. A complete deck of all MRC'S is kept in
the department office. If a card is lost, soiled, or
torn, it can easily be replaced by duplicating a copy
from the master deck. Some of the benefits realized
from PMS include increased reliability, increased
economy, convenient programming of work by advance
planning, and better records.
6. The Maintenance Data System (MDS) provides the Navy
with a system for recording the expenditure of
resources (personnel, material, and time) associated
with certain categories of maintenance actions. In
addition, it provides retrievable data concerning
common malfunctions, enabling designers to document and
issue field changes on present equipment, and to assist
in selecting and designing future equipment.
Casualty control is the process which assures that system
failures are reported, the casualty is restored, and the
system is operationally tested prior to being placed in
service. The casualty must be reported to the Commanding
Officer, the OOD and/or other appropriate personnel and must
include the exact extent of the casualty, the estimated time
of repair, and the circuits/capabilities affected by the
casualty. Reporting procedures are contained in NWP 1-03.1.
When afloat units experience communications casualties that
impact directly on the communications system's traffic
delivery requirements, i.e., broadcast and ship/shore
capabilities, the unit must inform the area NCTAMS of the
casualty via COMSPOT message (see Appendix B of this
publication).
1.4.3 CORRECTIVE MAINTENANCE
Corrective maintenance is often required to restore a piece
of equipment to an operational status after a breakdown, or
when the inspection cycle indicates a corrective action must
be performed to ensure reliability. Only trained,
technically competent personnel who have demonstrated the
ability to perform such functions should perform this
corrective maintenance.
1-19
NTP 4(E)
All corrective maintenance actions will be maintained in
divisional logs and used as a reference in subsequent
casualty reports (CASREP).
1.4.4 INVENTORY CONTROL
Procedures for inventory control are specified in NAVSUP P485, Afloat Supply Procedures, and NAVSUP P-1, Naval Supply
Systems Command Manual.
Prompt repair of inoperative or malfunctioning equipment is
dependent upon adequate spare parts support. To provide
each command with support for the installed equipment, an
allowance of repair parts is stocked as recommended by the
Coordinated Shipboard Allowance List (COSAL) or in the case
of shore activities the Coordinated Shore Based Allowance
List (COSBAL). These allowance lists are adjusted to a
prescribed range and depth of stocked parts based on the
usage rate obtained by correct failure reporting as
prescribed in the 3-M system. As new stock level
requirements are determined, the command allowance list is
updated.
An adequate supply of consumable items used in daily
operation such as paper, pencils, log and record forms,
printer ribbons/cartridges, and cleaning supplies must be
maintained to prevent interruption of telecommunications
facility operations.
1.4.5 COMMUNICATIONS PUBLICATIONS
NAVWARDEVCEN has converted all communications publications
from paper/microfiche/CD ROM to electronic copies available
on the World Wide Web (WWW). Cognizant authorities will
accomplish routine changes to communications publications by
issuing a complete new publication(s) via the World Wide
Web. Urgent changes will be promulgated via message
corrections. These corrections should be kept with the
publication until they are incorporated into the next issue.
Message corrections to publications are identified by a
numerical sequence consisting of a two number designation
separated by a slant sign. The first number indicates the
sequential number of the message correction to the original
or revised publication. The second number is the change
which will incorporate the material, e.g., MC 7/3 is the
seventh message correction and will be incorporated into the
publication by change number three.
The person designated to update a publication must take
extreme care to enter/file the message or printed change
correctly. For printed publications, NTTP 1-01 provides
general guidance but the following rules are also
1-20
NTP 4(E)
applicable:
1. Affixing a correction as a cutout is preferred to using
a flap. If there is no room for a cutout, the flap
will be attached to the binder side of the page.
2. All material superseded by a correction will be lined
out prior to inserting a cutout or flap. One diagonal
line through the superseded information with the
correcting individual initials is sufficient.
3. Lengthy penand-ink corrections should be typed and
pasted in publications as a cutout/flap.
4. Rather than use glue or gummed tape, rubber cement or
mucilage is preferred for entering corrections. This
allows easy removal of the cutout/flap if required by a
subsequent change. Also, gummed tape often causes pages
to stick together or results in torn pages when the
cutout or flap is removed.
5. After entry of a penand-ink, cutout or flap
correction, the source of the correction will be noted
in the margin adjacent to the entry (e.g., MC 7/2).
Complete information on the authority for the change
will be listed on the record of changes and corrections
page in the front of the publication.
6. A page check is required on all publications after
entering a page change and will be recorded on the
record of changes and corrections page in the front of
the publication. Residue from the page change will be
page checked prior to destruction.
When authorized by the foreword or letter of promulgation of
a publication, extracts may be made to disseminate
information. Extracts will be assigned a classification
based upon the highest classification assigned the articles
or paragraphs from which the information is taken. The
responsibility for controlling extracts from publications
rests with the command. The extract will be clearly marked
with its appropriate classification, and safeguarded locally
in the manner prescribed for its parent document.
When recommending changes to these publications, the letter
of promulgation provides relevant information. Proposed
changes to Navy Telecommunications Publications (NTP) may be
submitted via email to NNWC(underscore)POLICY@navy.mil or by
posting a comment in the blog on NNWC SNEWS website.
To provide positive control of communications publications,
a publication inventory sheet will be used. For 24 hour per
day telecommunications facilities where publications are
continually available for use, a watch-to-watch inventory
1-21
NTP 4(E)
will be used. At the change of each watch, the watch
supervisors will jointly conduct a sight inventory of every
publication. Some loose-leaf distributed publications
require a page check at each watch change in addition to the
sight inventory. These loose-leaf publications will be
specifically indicated on the watch-to-watch inventory
sheet. Signing of the watch-to-watch inventory sheet by the
relieving watch certifies that the publications were
sighted, the required page checks were conducted and that
the relieving watchstander is responsible for them. Any
discrepancies noted will be resolved prior to relieving the
watch. All signatures will be in ink. Watch-to-watch
inventories of communication publications may be destroyed
after 30 days provided they are no longer required by local
procedures. For situations where a 24 hour communications
watch is not kept, a daily inventory is required on those
days the publications are actually available for use, e.g.,
at a telecommunications facility open Monday through Friday
0800-2000.
Submit proposed changes to communications publications
through the normal chain of command to the cognizant
authority of the publication in question (found in the
letter of promulgation). The preface of NTTP 1-01 contains
information for submitting change recommendations to
tactical publications. Additionally, the current NTTP 1-01
contains information on the reviewing, updating,
distributing, and handling tactical warfare publications.
1.5
1.5.1
SAFETY
SAFETY PRECAUTIONS
GOING ALOFT
1-22
NTP 4(E)
permission to go aloft). The aloft sheet will be initialed
by all concerned to indicate knowledge of aloft/down status.
While in port, permission should also be obtained from
adjacent ships.
While aloft, all personnel are required to wear a safety
harness.
Personnel are not permitted to go aloft when any antenna in
the immediate vicinity is energized by a radio or radar
transmitter, unless it is determined in advance that no
danger exists. This includes the antennas of a ship moored
alongside or across the pier, or in some cases nearby shore
radio stations.
Warning signs and suitable guards must be provided to
prevent personnel from coming into contact with high
voltages. Equipment must be tagged conspicuously and not
energized while repair personnel are aloft. In addition to
the electrical hazards involved, precautions must be taken
to prevent the rotation/ radiation of radar sets that could
physically knock personnel from their working platform or
expose them to hazardous emissions. All radar cutout
switches should be turned on prior to getting on radar
platforms. Ship-wide announcements should be broadcast via
the 1-MC every 15 minutes by the OOD while personnel are
working aloft.
1.5.3
NTP 4(E)
personnel must tag the switch to prevent accidental
energizing of the equipment while repairs are in progress.
OPNAVINST 3120.32 (Standard Organization and Regulations of
the U.S. Navy) contains detailed TAG-OUT requirements and
procedures.
1.5.4
1-24
NTP 4(E)
1.5.6
1.6.1
GENERAL
TRAINING DOCUMENTS
1-25
NTP 4(E)
1. NAVEDTRA 10500, Catalog of Navy training courses
(CANTRAC), provides a consolidated list of formal
training locations and courses available. It also has
information on Navy enlisted codes (NEC) awarded to
trainees.
2. If formal training is not available, refer to NAVEDTRA
10061, the list of training manuals and correspondence
courses, for an alphabetical list of personnel
qualification standards (PQS) and computer-based
training (CBT) programs.
3. OPNAVINST 3500.34, Personnel Qualification Standards
program explains the requirement to locally develop PQS
and produce PQS-type manuals entitled "Job
Qualification Requirements (JQR)".
4. Additional sources of training material available for
use at individual commands include type commander
instructions; check off lists, training booklets and
technical manuals which provide detailed instructions
that can be adapted to local training programs.
Communications Information Bulletins (CIB), and
Communications Information Advisories (CIA) issued by
the area NCTAMS as well as Navy Telecommunications
Directives (NTD) issued by COMNAVNETWARCOM are also
good sources of information for training.
1.6.3 PERSONNEL TRAINING
Training is a major factor contributing to battle readiness.
The prime objective of training is to increase the ability
of personnel to operate and administer the facilities of the
command effectively under all conditions. Long range
training programs for communications personnel must contain
provisions for general training, including examination for
advancement in rating, qualification for assigned watches,
damage control, first aid, and fire fighting. An essential
portion of the training program should be the effective
cross-training of communications personnel within functional
areas, so that all Information Systems Technician will be
qualified to assume any of the duties in radio spaces. Each
command must pursue a vigorous training program consistent
with the required training as outlined in OPNAVINST 3120.32.
The Communications Officer, under the Commanding Officer, is
responsible for proper performance and training of personnel
in the communications department.
Informal quizzes that are normally oral should be given
frequently to ensure personnel are familiar with equipment
characteristics, total system operation, casualty control,
circuit procedures, etc. All communications personnel must
1-26
NTP 4(E)
have access to and read publications dealing with frequently
used procedures or equipment.
Drills are an important means of ensuring proficiency
especially in areas of contingency communications, equipment
or personnel casualty and emergency destruction. Drills must
emphasize response to emergencies or orders for destruction
by billet, rather than by name. The designation of primary
and alternate billets to carry out specific tasks allows for
the absence of a particular individual.
There is a natural tendency to keep people in jobs with
which they are familiar. This stems from a desire to
achieve and maintain a smoothly working unit, division or
team. Such action, however, limits the scope of knowledge
of the individual, does not make provision for casualty
replacement, and generally impedes advancement. To offset
this tendency, make a plan to rotate personnel to ensure
complete coverage of all jobs. Personnel should attain
thorough qualification before rotating from one job to the
next. Personnel who are best qualified to do the job should
provide initial instructions to trainees. Record the
completion of personnel qualification cards in individual
service records because they provide ready reference to the
status of an individual's qualifications.
The Command Readiness Training Team (CRTT), a component of
the Type Commander (TYCOM) Readiness Management System
(TRMS) is an essential element of training assessment and
evaluation within the command. The CRTT is an asset that can
be used to determine current training proficiencies and
levels of readiness through drills, critiques, and
documentation validation on a department, division or watch
section basis.
1.6.4
1-27
NTP 4(E)
They are particularly helpful prior to extended deployments
or within six months of assuming responsibility for an
account.
NCMS assist visits are not inspections. Inspections are
normally unannounced. There are 10 CMS A&A Teams (NCMS
Washington DC, NCTAMS LANT Norfolk VA, NAVCOMTELSTA San
Diego CA, NAVCOMTELSTA Jacksonville FL, Pearl Harbor HI,
COMSUBGRU 2 Groton CT, Camp Lejuene NC, NAVCOMTELSTA Puget
Sound WA, NAVCOMTELSTA Naples IT and NAVCOMTELSTA Far East
JA. Each CMS A&A Team is responsible for providing
COMSEC/EKMS training, Advice and Assistance (A&A) to all
numbered DoN EKMS accounts and local elements.
1.6.5
ESIT assists the embarking staffs (CSG, ESG, CVW, etc) and
ships/units in developing a migration plan to support the
pending embarkation. This includes addressing ISNS, NTCSS
and NMCI related issues.
Specifically the ESIT mission is:
1. Instructs ship and embarking staff personnel on proper
integration of Information Systems onto ISNS networks
to ensure expeditious shore to ship transition.
2. Provide onsite shipboard support during the actual
embarkation and provide follow-on support as required.
3. Provide onsite support during the re-integration of
deployed assets as required.
4. Analyze integration issues and provide guidance for
resolution in accordance with SPAWAR Configuration
management.
5. Develop, document and maintain procedures for
configuring the embarking forces equipment, software
and for configuring ships equipment to support the
embarkation process.
1-28
NTP 4(E)
ESIT responsibilities:
1. Provide a structured Internet Protocol (IP) address
scheme based on addresses issued to ship.
2. Assist with switch configuration to support embarking
staffs.
3. Assist with New Technology (NT) configuration of
workstations and servers to include network services
like Domain Name System (DNS), Windows Internet Name
Service (WINS), and email.
4. Establish NT domain trusts between ship and embarking
staff domains.
5. Provide an after action report on each assist visit for
ship and embarking staff personnel to use as a
reference for subsequent embarkations.
6. Assist with coordinating mail exchange (MX) record and
DNS record shifts at area NOCs.
7. Assist with submitting Naval Change Requests (NCR) and
Engineering Change Proposals (ECP) to provide solutions
for network infrastructure deficiencies and
discrepancies.
8. Assist with the release of Fleet Advisory Messages
(FAM) as they pertain to embarkations.
Units request ESIT support via naval message.
TO: COMSPAWARSYSCOM SAN DIEGO CA//PMW160//
SPAWARSYSCEN CHARLESTON SC//847/847NC//
INFO SHIP
EMBARKABLE STAFF/UNIT
RESPECTIVE FLTCDR
RESPECTIVE TYCOM
COMNAVNETWARCOM NORFOLK VA
BT
UNCLAS
MSGID/
SUBJ/EMBARKABLE STAFF INTEGRATION TEAM SUPPORT REQUEST//
RMKS/DESCRIBE NATURE OF VISIT, TO INCLUDE DATES AND
EMBARKABLE STAFF TO BE INTEGRATED.
BT
**Request should be submitted at earliest convenience, but
NLT 7 days prior to requested assist. This will ensure all
preliminary work required is completed and minimize
scheduling conflicts.
ESIT will respond to the support request via naval message,
1-29
NTP 4(E)
hours and dates of operation are outlined in the message.
ESIT performs pre-site survey of the units shore commands
and deployed destinations (buildings and ships) to ensure
proper hardware and software configuration and
functionality. Refer to the ESIT Support CONOPS for more
detailed outline of what ESIT can do.
1.6.7
TEAM OSCAR
1.6.8
1-30
NTP 4(E)
1.6.9.1 COMMAND ASSESSMENT OF READINESS AND TRAINING (CART)
To gain maximum benefit from limited training time and
resources, a ship must enter each training cycle with a
clear understanding of what specific training is required
and a detailed plan for accomplishing it. CART is a two-part
event intended to help the ship meet this objective.
1. During CART I, normally conducted during the first
half of Fleet Readiness Training Plan (FRTP), the
ship looks ahead with its strike group commander and
air wing and lays out a proposed schedule for major
events.
1.6.9.2
(NMET)
1-31
NTP 4(E)
1.6.9.3
The numbered fleets and leading TYCOMs developed the sixplus two CSG capabilities through the creation of the FRTP,
a 27-month cycle that replaces the old Inter-Deployment
Training Cycle (IDTC). The FRTP consists of four phases:
Maintenance, Unit Level Training, Integrated Training, and
Sustainment. The maintenance phase is followed by a period
of unit-level training to achieve a level of readiness for
the Carrier Strike Group to be considered Emergency Surge
Capable. The idea is to have the major prerequisites for a
surge deployment (manning, maintenance, and training)
completed so that additional tailored training can be
completed quickly if necessary to surge the CSG due to a
crisis or contingency operation. The Integrated phase of
training is tailored to individual ship and air wing
strengths and weaknesses and concludes after completion of
COMPTUEX (C2X) and air wing training at Naval Air Station
Fallon. At this point a CSG is considered Surge Ready,
meaning it could deploy on short notice if required. The
sustainment part of the FRTP consists of a variety of
training evolutions designed to maintain a CSGs readiness
until it actually deploys, and might include a Joint
Tactical Fleet Exercise (JTFEX). The FRTP is an adjustable
and scalable approach to training that ensures Naval
capabilities are aligned with mission essential tasks and
potential operational tasking. By the nature of their
location, Forward Deployed Naval Force (FDNF) units have
different training opportunities available to them as
compared to CONUS units. However, their Operating Tempo
(OPTEMPO) affords them the opportunity to maintain tactical
proficiency through dedicated training event and in
conjunction with regional and exercise commitments. This
results in a balanced training program between available
schoolhouse and on-the-job training.
1.6.9.4 JOINT TASK FORCE EXERCISE/EXPEDITIONARY STRIKE
GROUP EXERCISE (JTFEX / ESGEX)
Joint Task Force Exercise (JTFEX), is a requirement for
deployment readiness. JTFEX is an advanced scenario-based
Task Force exercise emphasizing command and control
relationships within the Joint/Coalition task force. JTFEX
is also comprised of mission-sets described in
CSFTL/CSFTPINST 3501.1 enclosure (1) and contained entirely
within the context of a 4-6 day battle problem scenario.
It is important to the United States Joint Forces and our
Coalition partners that we as a Navy become proficient in
the operation of equipment and systems that are not used in
every day information exchange.
1-32
NTP 4(E)
Expeditionary Strike Group Exercise (ESGEX) is a requirement
for amphibious deployment readiness. Marine Corps landings
and communications exercises are performed during ESGEX.
These scheduled at-sea tests and evaluations are designed to
assist USN/USMC operators and technicians in identifying
C4I/Combat system interoperability issues.
1.6.9.5
NTP 4(E)
1.6.9.7 FINAL INTEGRATION TESTING (FIT)
FIT is the at-sea event phase of the DGSIT process designed
to identify C4I/Combat systems interoperability and
integration issues at a CSG/ESG Force level. It is conducted
post-target configuration date (TCD) typically during
COMPUTEX/ESGEX. During FIT, the DGSIT Team (comprised mostly
of system knowledgeable Subject Matter Experts (SME))
conducts coordinated test events and individual system
evaluations during underway operations.
1.6.9.8
UNIT LEVEL TRAINING READINESS ASSESSMENTCERTIFICATION AND UNIT LEVEL TRAINING READINESS ASSESSMENTSUSTAINMENT (ULTRA-C / ULTRA-S)
Unit Level Training Readiness Assessment Certifications.
ULTRA-C is conducted by the ISIC, supported by ATG and
CLASSRON.
Approximately every two years, ships will undergo an ULTRA-C,
followed by an ULTRA-S every six months. The purpose of the
ULTRA is to validate the ships ability to self-assess and
train, and to certify the ships ability to perform required
missions to a set standard. Continuous training will permit
the Surface Force to maintain unit level training readiness
at higher levels throughout the training cycle.
1.6.9.9
1-34
NTP 4(E)
CHAPTER 2
AUTOMATED COMMUNICATIONS
AND
INFORMATION SYSTEMS
2.1
FLEET
BROADCAST
SHF
PCMT
CUDIXS
FMX/DUSC
MCS
NOVA
AMHS
DMS
TRANSITIONAL
HUB (DTH)
MMS
PCMT
SUBSCRIBERS
Figure 2-1
Message Traffic Process
2-1
NTP 4(E)
2.2
MESSAGING SYSTEMS
DMS OVERVIEW
2-2
NTP 4(E)
DMS network transport services are provided by the Defense
Information Systems Network (DISN) and secure dial-up
connections. DoN users receive DMS services or enabling
capabilities through the allocation of various levels of
messaging, directory and network management services, and DISN
network or dial-up connectivity.
2.2.1.1
2-3
NTP 4(E)
to the NOVA for delivery. If invalid PLAs are found by MCS, the
MCS will automatically generate a service message to the
originator. Each invalid PLA will receive a RI of RUBDPLA side
routed on the original message. The MCS provides a means of
inserting Routing Indicator(s) (RI'S) in an ACP128 formatted
message based on the PLAs contained in that message. Currently,
any U.S. General Service (GENSER) subscriber employing ACP128
format and sending narrative pattern traffic may, upon approval,
use the DMS-MCS for PLA-to-RI conversion. Both the Navy Regional
MCS and DMS-MCS are transitional systems to aid customers in the
migration from AUTODIN to DMS.
Even though these systems are
transitional, both are designed to remain viable until the phaseout of the AUTODIN system is completed.
2.2.1.4 DMS AND TACTICAL DMS PROXY AFLOAT SYSTEM
The Tactical Messaging DMS proxy system at TMG sites provides the
ability to interface and translate DMS messages to and from
tactical units, using approved DMS infrastructure components. The
NCTAMS sites have a direct interface to legacy systems and have
the Tactical Messaging DMS proxy capability which is supported by
the Integrated Shipboard Network System (ISNS) hardware with
software provided by the Common PC Operating System Environment
(COMPOSE).
2.2.1.5
2-4
NTP 4(E)
2.2.1.7
2-5
NTP 4(E)
4. Messages exchanged between the two messaging domains may
include file attachment(s) if the rules listed below are
followed:
a. Attachment types must be limited to specific file
extension types authorized by the organization as being
crucial to mission accomplishment.
b. All messages must be signed and encrypted with hardtoken Class IV Fortezza to provide authentication and
non-repudiation.
c. The DMS HAG must be capable of decrypting messages to
ensure attachments are of the appropriate types and to
perform a dirty word search.
d. The organization must define the HAG Access Control
List (ACL) to limit the users who can send attachments
from low to high.
The HAG also passes directory information between specific
directory servers in the two messaging domains. Unclassified
directory information for message recipients in both messaging
domains is accessible to users on the NIPRNET. Changes and
updates to the unclassified directory information are passed
through the HAG to the SIPRNET domain through a process known as
directory shadowing.
2.2.1.11
The GWS is a component that stores and forwards messages from the
DMS client to Primary Groupware Servers (PGWS) or Local Message
Transfer Agents (LMTA). The GWS, PGWS, and LMTA all serve as
store-and-forward message switching devices within the DMS
architecture. The GWS operates at the lowest level in the DMS
Message Transfer System (MTS). The GWS provides direct message
store-and-forward support to DMS clients. The PGWS and LMTA
2-6
NTP 4(E)
provide second echelon message store-and-forward support to local
or remote GWS'S. The GWS, PGWS, and LMTA components are
frequently co-located at sites with large concentrations of DMS
clients. Typically, these components will be centrally located
at Navy LNOSC'S. The USMC typically will deploy GWSS down to
the major command level. DMS clients must use dial-up
connections whenever DISN network connectivity is not available
and the GWS is remotely located.
Message Store (MS)
The MS serves as an intermediary between the DMS client and a
GWS. The MS resides on the GWS and serves as an electronic
mailbox for the DMS client. The MS or GWS mailbox accepts and
stores messages on behalf of the organization until recipients
download and delete the messages.
DMS Client or User Agent
The client, sometimes referred to as the User Agent (UA), is a
software application installed on a DMS-compliant hardware
platform. The DMS client enables the preparation, review,
release, submission, delivery, storage, archiving, display, and
printing of DMS messages. A single hardware platform and a
single DMS client application may support multiple users. The
DMS client also contains an Integrated Directory User Agent
(IDUA). The IDUA function allows the user to search the
directory for addressing information that can be added directly
to drafted messages or cached in the user's Personal Address Book
(PAB) for later use.
2.2.2
NTP 4(E)
will result in delayed action due to unnecessary human
intervention.
For COMSPOT reporting format and further guidance refer to
Appendix B.
2.2.3 AUTOMATED MESSAGE STORE AND FORWARD (NOVA)
NOVA is a UNIX based, base-level Mode 1 store and forward
terminal (Figure 2-2) dependent on the worldwide switching
functions of the DTH to relay messages to other commands outside
the immediate area of responsibility, services and agencies.
NOVA is a store and forward switching system that provides
automated readdressal and quote functions for authorized users.
For message accountability purposes, the system assigns a unique
Processing Sequence Number (PSN) to each message received. This
PSN provides a means of message recall and is used as part of an
automated readdressal or quote request. NOVA provides duplicate
checking and First-In First-Out (FIFO) by precedence processing.
Received messages are sorted by routing indicator and delivered
to the DTH and backside terminals, using Mode 1 protocol. NOVA
performs validation of format lines 2 through 4, 12a, 12b, 15 and
16 of ACP 128 messages. Messages found to be in error are
diverted to a Service Intercept Position (SIP) for manual
intervention. If the message cannot be corrected at the SIP the
message will be serviced by the NOVA operator. Installation of
the NOVA Virtual Circuit Protocol (VCP) brings a Local/Wide Area
Network interface into the NOVA application in addition to the
AUTODIN Mode One interface. Use of this interface reduces the
number of connections to the DTH.
2-8
NTP 4(E)
ACTIVE
PROCESSOR
STANDBY
PROCESSOR
COMPAC
PROLIA
NT
SERVER
COMPAC
PROIA
NT
SERVER
C
P
U
X-TERM
SYSCO
UPS
SYSCO
UPS
A/
B
INTERFACE
UNIT
SERVIC
AUX
AUX
SERVIC
Figure 2-2
Nova Configuration
2.2.4
GATEGUARD
NTP 4(E)
traffic of a classification level not exceeding that of the OAS
communications line is transferred. GateGuard is capable of
processing Unclassified to Top Secret SPECAT A type messages.
GateGuard can function as either a dedicated delivery device
(paper or diskette) or as a gateway. The GateGuard system is
composed of three elements: A Guard Device (for use on dedicated
links), an AUTODIN Gateway Terminal (AGT), and a Gateway
Communication Link to an arbitrary AIS. The AST communication
link uses Local Digital Message Exchange-Remote Information
Exchange Terminal (LDMX-RIXT) communication protocol. To the AST,
GateGuard appears to be an attached RIXT and is also capable of
providing a Mode I interface to suitably equipped hosts. The AGT
is designed for operation by an organization's administrative
personnel. The AGT can provide paper or diskette media for
message dissemination within the organization. GateGuard
exchanges data with the supporting AST using the communications
link or diskette media. Unless a DMS-approved automated message
release capability is available on the AIS, messages cross the
communication link from the GateGuard to the AIS in one
direction. The GateGuard performs the following functions:
1. Audit Trail.
2. User Identification.
3. Message Storage and Retrieval.
4. Format Checking.
5. Security Checking.
6. Precedence Notification.
7. Message Routing.
8. AST Mode I Interface.
If the communications link between GateGuard and the AST is not
contained entirely within controlled spaces, it must be covered
by approved communication security (COMSEC) equipment. The
circuit must be covered even if only UNCLASSIFIED messages are
exchanged. A KG-84 may be used to cover a circuit that will
carry messages of any classification. STU III may be used to
cover circuits that pass messages classified up to and including
TOP SECRET.
2.2.6 FLEET MESSAGE EXCHANGE (FMX)
Fleet Message Exchange (FMX) replaced the Naval Computer
Processing and Automatic Routing System (NAVCOMPARS). Whereas
NAVCOMPARS consisted of five, loosely joined sites using similar
2-10
NTP 4(E)
applications, FMX implemented a tightly integrated system of two
sites running identical, interacting applications and using a
worldwide tactical network to share data and resources. The FMX
application rides on a layer of trusted, advanced commercial offthe-shelf (COTS) software: two UNIX operating systems, a
Relational Database Management System (RDBMS), TCP/IP based LAN
software, and an X Windows Graphical User Interface (GUI). The
application operates on a platform of advanced computers
connected locally by an Ethernet LAN and worldwide by the Defense
Information Systems Network (DISN). Figure 2-3 depicts the inline system configuration.
Two operating sites have been established for FMX; one at NCTAMS
PAC Honolulu, HI and NCTAMS LANT Norfolk, VA. FMX consists of
three separate components. One of these is a new system that is
responsible for keying the fleet broadcast (BCST) and providing
the necessary functionality to support the fleet broadcast
requirements. This component is the Fleet Broadcast Keying
System (FBKS). To reduce development time and need for operator
interaction, FBKS was developed as a simple store and forward
system. It runs on the same hardware platform as DUSC. Although
FBKS and DUSC are functionally separate systems, they share the
same database and use the same message parsing and validation
software.
FBKS is connected on the backside of the NOVA system. In addition
to providing the interface to FBKS, NOVA system provides the
interface to the existing Common User Digital Information
Exchange System (CUDIXS) and provides routing and alternate
routing between circuits for FBKS and CUDIXS.
2.2.7
NTP 4(E)
NOVA
DTH
M MS PC MT
NOVA
PCMT
PCMT
FMX Host
MARCEMP
PCMT
FPT
OTO
PCMT
PSS
MDT
PCMT
CBIS
CUDIXS
A
Figure 2-3
FMX/DUSC configuration
2-12
FBKS/DUSC
NTP 4(E)
2.2.8
FLEET SIPRNET MESSAGING (FSM)
FSM is a point to point connection between the ship and the NOC.
CUDIXS has become incapable of meeting the Navys messaging
needs. The use of NAVMACS II systems with IP connectivity has
come to be the norm with reference to message traffic delivery.
All units with IP capability equal to, or greater than, INMARSAT
B HSD capabilities, are required to use FSM whenever possible.
The end result is faster, more reliable record message traffic
delivery to ships.
2.2.9 NEWSDEALER MSS and AMHS
NEWSDEALER Message Switching System, much like the NOVA system,
acts as the AUTODIN by-pass. NEWSDEALER MSS performs message
switching, message safe storage, and message origination,
creating a record communications infrastructure supporting the
entire Intelligence Community. Both Defense Special Security
Communications System (DSSCS) and General Service (GENSER)
messages are exchanged. This system provides record
communications for selected United States SIGINT System (USSS)
field sites. Fielded systems have the capability to communicate
with each other via the National Security Agencys wide area
network (NSANet). Message routed outside of the USSS community
are routed over the Defense Messaging Transition Hubs (DTH) or
one of the NEWSDEALER Bridge Sites connecting NSANet and the
Joint Worldwide Intelligence Communications System (JWICS).
Each NEWSDEALER is capable handling the ACP-128, DOI-103, DOI-103
Special format and Abbreviated Message Format (AMF). These
systems may interface with computers, Automatic Message Handling
System (AMHS), Message Correction System, Mode I and II circuits,
STUIII Dial-up, and Virtual Circuit Protocol (VCP).
NEWSDEALER AMHS has simplified the task of drafting ACP, DOI 103,
and DOI 103 Special formatted messages where as the actual
message format is transparent to the user. AMHS provides
simplified message drafting, coordination, and release of
outgoing messages and a message internal distribution and
delivery function for incoming messages.
A Virtual Circuit Protocol (VCP) has been defined to encapsulate
record messages and transmit them using TCP/IP. As an added
measure of security, a short header attached to the front of each
VCP message transmitted contains a transaction ID indicating that
it is a record message and the message size.
2.2.10 NAVAL MODULAR AUTOMATED COMMUNICATIONS SUBSYSTEM
(NAVMACS)
NAVMACS is designed to increase the speed, efficiency and
capacity of naval afloat and ashore communications operations.
2-13
NTP 4(E)
The NAVMACS modular concept allows the system to be configured
according to the particular afloat platforms' requirements.
Current versions of NAVMACS are:
1. NAVMACS (V)2 provides up to four channels of fleet broadcast
input; subscriber satellite interface to CUDIXS; and, the
capability for on-line messaging. The (V)2 installation
includes: computer (AN/UYK-20), teleprinter, printers,
magnetic tape unit, paper tape unit and computer/satellite
interface unit.
2. NAVMACS (V)3 offers more automated features for fleet users.
The V3 program provides four channels of fleet broadcast
input, four channels of Full Period Termination directly online with the system and a subscriber satellite interface to
CUDIXS. NAVMACS V3 will support 2.4kbps NON-DAMA or DAMA
operations via the CUDIXS link. The (V)3 installation
includes: two computers (AN/UYK-20), video display units,
printers, magnetic tape units, paper tape unit and
computer/satellite interface unit.
3. NAVMACS (V)5 enhances automated communications with the
addition of remote terminals for message input. The system
also provides a subscriber satellite interface to CUDIXS.
To allow drafters at remote locations as well as message
center personnel the opportunity to edit and retrieve
messages, storage is on disk in addition to magnetic tape.
The (V)5 suite includes: three computers (AN/UYK-20A or
AN/UYK-44), video display units, RD-433 disks, magnetic tape
units, paper tape units, computer/satellite interface unit
and printers.
(a) This system provides the operator with 24 flexiblepurpose serial input/output (i/o) channels which can be
configured as any of the following:
1.
4.
5.
6.
NTP 4(E)
equipped ships. The system also provides a subscriber satellite
interface to CUDIXS. To allow drafters at remote locations as
well as message center personnel the opportunity to edit and
retrieve messages, storage is on disk in addition to magnetic
tape. The (V)5A installation includes two AN/UYK-20A or AN/UYK44 computers; three AN/USQ-69 video display units in the main
communications space and up to eight more for remote message
input/output; two RD-433 disks, for program loading and short
term message storage; two AN/USH-26 cartridge magnetic tape units
(CMTUs) for backup program loading and long term message storage;
two RD-397/UG Paper tape units for message input/output; an ON143(V) interconnecting box for interface between the computer and
the satellite RF equipment; and three TT-624 high-speed printers
located in main communications. It provides the operator with 14
flexible-purpose serial input/output (i/o) channels which can be
configured as any of the following:
a. 75 baud circuits.
b. "Daisy-chained" remote displays and printers.
c. External systems, e.g., CVIC.
d. High or low speed tape readers.
e. High or low speed tape punch
f. Compatible remote systems, e.g., Naval Intelligence
Processing System (NIPS), Personal Computer Remote
System (PCRS)
5. NAVMACS II is a communications processor that provides
message services to end users as well as command, control, and
communications (C3) systems and will ultimately replace older
versions of NAVMACS. It can be configured as either an afloat
platform or as an ashore site. NAVMACS II replaces various
communications systems previously employed by the U.S. Navy and
all outdated versions of NAVMACS (V1 through V5/V5A). The
purpose of NAVMACS II is to receive process, store, distribute,
and transmit internal and external messages automatically.
NAVMACS II provides interfaces to multiple external systems of
the DMS, including land lines and radio frequency (RF) circuits.
It also provides interfaces to local systems within the NAVMACS
II network. NAVMACS II is supported by software that performs the
communications processing required by all connected systems,
including a user interface. It allows end users to perform a
variety of tasks, based on their security clearance level,
authorization, and need. Basic tasks include reading and sending
messages to other users on site. Advanced tasks include
configuring system databases and performing system administration
(Figure 2-4).
NAVMACS II is configurable on a site-by-site basis for the unique
requirements of its users. The system (designated AN/SYQ-7A(V))
2-15
NTP 4(E)
architecture is based on the Tactical Advanced Computer-3 (TAC3), a Hewlett-Packard 700 series computer. The minimum
requirement for NAVMACS II is one TAC-3 computer (with the UNIXbased HP-UX operating system) configured as a main
communications processor. The NAVMACS II main communications
processor handles the processing and storage of all incoming and
outgoing messages at a site, and is normally located in a sites
primary communications area. Another type of processor may also
be required in the main communications area to provide interfaces
to external communication systems. This processor is the NAVMACS
II Communications Controller (NCC). At sites with multiple users
requiring access to NAVMACS II, additional TAC-3 computers may be
configured as severs and clients on local area networks (LANs).
Personal computers (PCs) may also be configured as clients.
The AN/SYQ-7B(V) configuration developed for smaller ships
requiring less message throughput is similar to the above and
executes the same software. This configuration uses the HP715
workstation. Only one NCC is configured with the system and a
RAID disk subsystem is used instead of the second 1.2 Gb internal
hard disk and the 1.02 Gb removable disk. The monitors of the
HP715 are used instead of the X-Terminal. There is only one
classified server in this configuration.
2-16
NTP 4(E)
Figure 2-4
NAVMACS II Configuration
2.2.11
The two NCTAMS, NCTS GUAM, and NCTS Naples are equipped with
CUDIXS. Figure 2-5 provides CUDIXS capabilities. Each site has
at least three CUDIXS suites and the capability to operate two
full and one "mini" configuration simultaneously. CUDIXS
provides a 2400 baud full duplex interface, over a satellite link
with mobile platforms, for the receipt and transmission of
narrative message traffic between FMX and mobile platforms
equipped with afloat automated systems. CUDIXS consists of the
following hardware: computer (AN/UYK-20), video display unit,
printer replacement program (PRP) computer, and
computer/satellite interface unit. Up to sixty subscribers per
CUDIXS suite have the capability to both send and receive
narrative message traffic. Each subscriber can send and receive
2-17
NTP 4(E)
Operator-to-Operator (OTO) orderwire type messages in free form
and up to eighty characters in length.
MAN/
MACHINE
INTERFACE
SYSTEM
REPORT
GENERATOR
SHIP/SHORE
FOR UP TO 60
UNITS
STAND ALONE
CAPABILITY
CUDIXS
NCP
INTERFACE
MESSAGE
JOURNAL/
ACCOUNTING
LINK
INTERFACE
AUTOMATED
MESSAGE
CONTINUITY
CHECKS
Figure 2-5
CUDIXS Capabilities
2.2.12 SUBMARINE SATELLITE INFORMATION EXCHANGE SUBSYSTEM
(SSIXS)
The SSIXS provides the SSN/SSBN Commanding Officer with an
optional satellite path to complement existing VLF/LF/HF
broadcasts. When the position of the submarine permits
visibility of a satellite, and where the tactical situation
permits exposure of a submarine mast-mounted antenna, the subsystem provides rapid exchange of digital information between
SSN/SSBN submarines and shore stations. It also provides access
to the satellite path through a programmable mixture of query2-18
NTP 4(E)
response and broadcast without query so as to provide maximum
operational flexibility to the submarine commander. All
transmissions provide automatic, reliable, long range, and
cryptographically secure UHF communications between submarines
and shore stations and submarines themselves.
SSIXS has the same equipment configuration as CUDIXS, except
SSIXS uses magnetic tape for message storage. Additionally, the
shipboard version of SSIXS has an ON-143(V)6 microprocessor for
interface via satellite with the shore SSIXS.
2.2.13
FLEET BROADCASTS
2.3.1
GENERAL INFORMATION
NTP 4(E)
2-20
NTP 4(E)
4. Voyage chartered ships not under the operational control of
the MSC, and cargo carrying ships at Berth (traffic rates).
With the advent of Automated Systems such as Fleet SIPRNET
Messaging (FSM), SHF Gateguard units do not routinely submit
COMSHIFTs when entering port. Units that do not resubmit
COMMSHIFTs and lose primary delivery paths are cautioned that if
primary path and secondary (ZOV path) are lost, Category I and II
messages can and will be sent to tertiary paths listed in the
latest COMMSHIFT on file at the Master Update Authority. For
those units listing Fleet Broadcast channel (usually common
channel) as an authorized ZOV route will have message traffic
transmitted to it. Subsequently for those units not guarding the
Fleet Broadcast while in port could possibly encounter numerous
non-deliveries since the Fleet Broadcast does not require
operator acknowledgement after the message is generated from the
Fleet Message Exchange System (FMX). It is highly recommended
that units that do not intend to monitor the Fleet Broadcast or
CUDIXS termination while inport, have those ZOV routes removed
from their COMSHIFT and replaced by a shore messaging system such
as dial-in Gateguard or over the counter service to area NCTAMS.
2.3.4
BROADCAST IDENTIFICATION
FREQUENCIES
CIRCUIT CONFIGURATION
NTP 4(E)
0691-LD-319-9600 respectively.
2.3.7
CRYPTOGRAPHIC COVERAGE
NTP 4(E)
#01013
NNNN
Each original broadcast transmission of a message, over either
the single or multi-channel broadcast will begin with the
Transmission Identification (TI) indicator and BCSN. The TI
indicator consists of the characters "VZCZC". The V's purpose is
to clear the circuit path of any extraneous characters and the
ZCZC is to signal the start of a message indicated by the
beginning of format line 2 of the message. Retransmissions will
commence with the operating signal ZFG repeated three times.
EXAMPLE
ZFG ZFG ZFG
VZCZCPMAA01014
O 220514Z FEB 00 PSN 000472H13 ZNZ1
FM USS SAN JOSE
TO USS CALIFORNIA
BT
TEXT
BT
#01014
NNNN
Before a message queues to a broadcast channel, FBKS validates
delivery requirements specified in format lines 2, 4, 7 and 8.
The system rejects misrouted messages to the DUSC for service
action.
To save transmission time FBKS edits each message. Because format
lines 2 and 4 are validated by Nova they are not transmitted.
Side routes on format lines 7 and 8 are also validated and
removed. Original page lines are removed and F/L 15 is replaced
with the BCSN.
Lengthy messages are paged into blocks of 50 lines. Each page
block will begin with a page number, BCSN, and the message
classification. This is done to enhance a message's readability
and ease of reproduction.
Nova assigns every message received an accountability number,
called a Processing Sequence Number (PSN). This 6-digit number is
included on F/L 5. It is followed by the site's letter
identifier and a checksum of the PSN. The first letter of the
BCSN and the F/L 5 site identifier will normally be the same. A
difference between the two indicates that the screen action
should be to the site identified on F/L 5.
Messages retransmitted over a single or multi-channel broadcast
in reply to a Broadcast Screen Request (BSR) will begin with the
operating signal ZDK repeated three times, followed by the TI
indicator and the BCSN. The remainder of the transmission is the
actual message beginning with F/L 5.
2-23
NTP 4(E)
EXAMPLE
ZDK ZDK ZDK
VZCZC PMAA00036
R 162038Z FEB 00 PSN 017677H28
FM COMSPAWARSYSCOM WASHINGTON DC//PMW151//
TO USS ENTERPRISE
BT
UNCLAS //N02300//
MSGID/GENADMIN/CSWSC//
SUBJ/BROADCAST MESSAGE FORMAT//
RMKS/THIS IS AN EXAMPLE OF BROADCAST
MESSAGE FORMAT//
BT
#00036
NNNN
2.3.10
BROADCAST RECAPS
NTP 4(E)
01014 0 220514Z USS SAN JOSE/USS CALIFORNIA/ZNZ
01015 P 201514Z COMNAVNETOPSCOM WASHINGTON DC/CTF FOUR TWO
01016 P 230005Z FLEWEACEN GUAM/ZPW 240001Z FEB00
01017 R 230105Z USS SAN FRANCISCO/COMTHIRDFLT/
01018 CANTRAN
PART 2
PMCC BCST
01013 01015 01016
USS CHOSIN
01014
CTF FOUR TWO
01017
BT
#01019
NNNN
2.3.11
NTP 4(E)
when submitting a BSR. Embarked commanders, squadrons,
detachments, etc., which share the host ship's or embarked
commander's RI will not be included.
If a Broadcast Screen Ship (BSS) is designated prior to an
exercise or operation, the BSS is responsible for gathering
missed message input for ships in company and submitting a
consolidated BSR.
The following format is currently used for submission of BSR'S.
Detailed information for drafting BSR'S is available in NTP 4
Supp-2.
Retransmissions in response to BSR'S are only provided to those
ships which are addressees (or have embarked commands) addressed
in the missing numbers (messages) requested. Retransmissions are
transmitted under the original broadcast numbers prefixed with a
ZDK pilot.
In the event of an FMX failure which causes the BKS functions to
be shifted, instructions will be provided to fleet units
concerning BSR submission procedures.
EXAMPLE
RTTUNJSR RUEOMID3463 1191000-UUUU--RHMCSUU.
ZNR UUUUU
R 281000Z APR 00 ZYB
FM USS JOHN C STENNIS
TO FMX PAC HONOLULU HI
BT
UNCLAS //N02790//
MSGID/BSR/STENNIS//
SCRN/USS JOHN C STENNIS /COMCARGRU THREE//
CHAN/PMAA/BSN:00012/BSN:00023/BSN:00050/BSN:00053//
CHAN/PMCC/BSN:00056/BSN:00087//
SCRN/ATKRON FIVE FOUR TWO//
CHAN/PMDD/BSN:00090/BSN:00092/BAND:00100-00103/BSN:00113//
SCRN/USS JOHN C STENNIS //
CHAN/PMCC/BSN:00075//
PERIOD/200001ZJAN2001/242359ZJAN2001//
BT
#3463
NNNN
Broadcast Screen Summary (BSS)
The FBKS in response to a BSR generates the Broadcast Screen
Summary (BSS). The BSR response will originate from the
servicing FMX site and will bear the appropriate PLA for the
site, i.e. FMX PAC HONOLULU HI. Examples of BSS responses are
listed below:
1. NO MESSAGES FOUND. (MASTER UPDATE AUTHORITY has screened
originator BSR and missing messages are of no concern to
2-26
NTP 4(E)
originator.)
2. FOL NRS CANTRAN.
3. FOL NRS ZFK 1/2.
4. FOL NRS ZDK AT TIMES INDICATED.
5. FOL NRS ZDK ASAP.
6. FOL NRS ZOV ASAP.
7. FOL NRS TO BE TRANS WITH NEW NRS.
8. FOL NRS TRANS AT TIMES INDICATED.
9. ERROR. (BSR contains error(s), Unable to process correct
and resubmit.)
Broadcast Screen Summary Reply Example
OTTUZYUW RHOENPM0099 0311030-UUUU--RHMCSUU.
ZNR UUUUU
O 311030Z JAN 00 ZYB
FM FMX PAC HONOLULU HI
TO USS NIMITZ
BT
UNCLAS
MSGID/GENADMIN/FMX PAC//
SUBJ/BROADCAST SCREEN SUMMARY//
REF/A/BSR/NIMITZ/311000ZJAN2001/-/NOTAL//
RMKS/
1. ATKRON FOUR TWO
A. NO MESSAGES FOUND.
2. USS NIMITZ
A. FOL NRS CANTRAN: PMAA00023.
B. FOL NRS ZFK 1/2 : NONE.
C. FOL NRS ZDK AT TIMES INDICATED: PMAA00012/0310930.
D. FOL NRS ZDK ASAP: PMAA00050, PMAA00053, PMCC00053, PMCC00087.
3.USS JOHN C STENNIS
A. FOL NRS ZOV/ASAP:PMCC00075
4. ERROR/USS NIMITZ/CHAN/PMDD/FIELD 5 INVALID, 99003 - UNABLE TO
PROCESS/CORRECT AND RESUBMIT//
BT
#0099
NNNN
Figure 3-3 is the check-off sheet used for keeping a record of
broadcast numbers received or transmitted. This form provides
for the number received, the classification of the message, and
also provides a record of destruction for classified traffic.
These forms may be reproduced locally. A similar form is
available through supply channels (Stock number 0196-LF-3018350).
2-27
NTP 4(E)
2.3.12
TYPES OF BROADCASTS
2.4.1
PAC
COMTHIRDFLT/COMSEVENTHFLT/
COMPACFLT
LMUL
LANT
COMSECONDFLT/COMUSFLTFORCOM
COMSIXTHFLT/COMUSNAVEUR
NTP 4(E)
Ultra High Frequency (UHF) ranges.
operating frequencies.
NTP 4(E)
2.5.1
NTP 4(E)
which RF link to use to reach the shore.
2.5.2
The ANCC and ATC are functionally identical except for size.
ANCC/ATC replaces manual patch and test facilities ashore with a
fully redundant computer-controlled switching and circuit
monitoring system. This system provides the ability to
reconfigure equipment interconnectivity and perform circuit
monitoring for out-of-tolerance conditions in advance of circuit
outages. At deployed locations, this system supplies 98 percent
of voice, video, and data connectivity. Failures result in major
C4I disruption of services to and from the operating forces in an
entire communications area.
2.5.5
NTP 4(E)
patch modules have a test breakout module for connecting
individual signals. Each patch module has line, equipment, and
monitor appearances. The common signal interface to a patch
module will be electronic industry association (EIA) standard RS232 for unbalanced and RS-530 for balanced. However, the
following common interfaces RS-232/-423/-422/-530 or MIL-STD-188114 can be accommodated. Up to eight RS-423/-422 37-pin
interfaces and twelve RS-232/-530 25-pin interfaces can be
selectively pinned out using the QCP, thus eliminating a need to
fabricate special cables when deployed. Interfaces from the
multi-circuit module may also be routed through the high-speed
COMSEC case for encryption/decryption. Two multi-circuit modules
are provided with each TCTC package.
All Transit Case Technical Control (TCTC) modules may be
interconnected using one-for-one standard DB 25- or 37-pin
connector cables available from most telecommunications
companies. Depending on the TCTC module, a number of female
connectors on a rear signal entrance panel (SEP) are available
for interfacing between modules. This allows interfacing with
equipment using one-for-one cables to facilitate rapid set-up and
interface. Connectors on the module SEPs are identified by the
signal interface convention to which they conform; i.e., RS232/423/422/530 and MIL-STD-188-114. To accommodate equipmentspecific pin-outs, signal conversions are accomplished in the
TCTC module using quick connect/disconnect panels, thus
eliminating the need to fabricate special cables when deployed.
CJCSM 6231.01B defines the joint communications network model
that the TCTC supports. A deployed JTF in a bare-base
environment provides the basis for this model. The model can be
changed to meet specific operational requirements. Internodal
communications provides connectivity among DISN, JTF
headquarters, and service component headquarters and their
forces, along with supporting elements such as the JSOTF and its
subordinate forces. The Air Force, Army, Navy, and Marines have
component headquarters and forces. This network links the
deployed locations by satellite and microwave troposcatter/line
of sight. This transmission media supports the extension of
common-user transports consisting of JWICS, NIPRNET, SIPRNET,
record communications (AUTODIN and DMS), VTC, and other specialpurpose circuits. The TCTC is capable of extending all of these
transports or communication services.
2.5.6
SA2112(V) (SAS)
NTP 4(E)
crypto equipment, centralized control and monitoring of the
system, and a built-in-test (BIT) capability.
2.5.7
TIMEPLEX LINK 2+
DISN TRANSPORT
SERVICES
NTP 4(E)
DISN transport services are available to all Department of
Defense (DoD) agencies and military services, as well as other
federal government agencies. Services can be ordered through the
telecommunications control officer (TCO), who will validate
requirements and verify funding authorization.
DoD Teleport System
The Defense Information Systems Agency (DISA) is implementing the
Department of Defense (DoD) Teleport System. The system will
integrate, manage, and control a variety of communications
interfaces between the Defense Information System Network (DISN)
terrestrial and tactical satellite communications (SATCOM) assets
at a single point of presence.
The system is a telecommunications collection and distribution
point, providing deployed warfighters with multiband, multimedia,
and worldwide reach-back capabilities to DISN that far exceed
current capabilities. Teleport is an extension of the
Standardized Tactical Entry Point (STEP) program, which currently
provides reach-back for deployed warfighters via the Defense
Satellite Communications System (DSCS) X-band satellites.
This new system provides additional connectivity via multiple
military and commercial SATCOM systems, and it provides a
seamless interface into the DISN. The system provides inter- and
intra-theater communications through a variety of SATCOM choices
and increased DISN access capabilities.
The system will be implemented in three phases:
1. Generation One - Currently being implemented. Generation
One (FY02-08) architecture adds capabilities to a subset of
existing STEP sites. It will provide satellite connectivity for
deployed tactical communications systems operating in X-band
(DSCS and follow-on X-band satellites), commercial C- and Kubands, Ultra High Frequency (UHF), Extremely High Frequency (EHF)
SATCOM and initial Ka-band capabilities.
2. Generation Two - This generation (FY 06-08) consists of
implementing additional Ka-band terminals and a NETCENTRIC
capability. The Ka-band terminals will provide interfaces to the
Wideband Global System (WGS) program, which will provide Ka-band
and X-band coverage with throughput far exceeding the current
DSCS satellite constellation.
3. Generation Three - This Generation is currently undefined
and funding has not been identified. A capabilities development
document is in development and a funding approach will be sought
by the Joint Capabilities Board. For more information Email:
dodteleport@disa.mil.
2-34
NTP 4(E)
GIG Enterprise Services
The Defense Information Systems Agency's (DISA) Global
Information Grid Enterprise Services Engineering (GE) directorate
plans, engineers, acquires and integrates joint, interoperable,
secure global net-centric solutions satisfying the needs of the
warfighter and develops and maintains a first-class engineering
workforce to support the needs of DISA's programs. GE's core
competencies include disciplined IT end-to-end systems
engineering, security expertise for the Global Information Grid,
leveraging commercial-off-the shelf products and services to
solve joint and coalition needs and provide value added,
trustworthy global net-centric solutions. Contact: GES Project
Office at ges@disa.mil.
Global Combat Support System (GCSS)
Combatant Commanders/ Joint Task Force (CC/JTF)
GCSS (CC/JTF) is an initiative that provides end-to-end
visibility of retail and unit level Combat Support (CS)
capability up through National Strategic Level, facilitating
information interoperability across and between CS and Command
and Control functions. In conjunction with other Global
Information Grid elements including Global Command and Control
System-Joint, Defense Information Systems Network, Defense
Message System, Computing Services, and Combatant
Commands/Services/Agencies information architectures, GCSS
(CC/JTF) will provide the information technology capabilities
required to move and sustain joint forces throughout the spectrum
of military operations.
GCSS (CC/JTF) supports the Combatant Commanders and their
assigned Joint Task Forces by providing access to comprehensive
logistics information from authoritative data sources. This
access provides the warfighter with a single, end-to-end
capability to manage and monitor units, personnel and equipment
through all stages of the mobilization process. By providing
access to high-level integrated information, GCSS (CC/JTF)
enhances the ability of Combatant Command and JTF Commanders to
make timely, informed decisions based on the near real-time or
predicted status of his resources.
Mission
Provide end-to-end information interoperability across combat
support and command and control functions to support the
Combatant Command & Joint Task Force Commanders.
GCSS (CC/JTF) Warfighting Capabilities
1. Provides dynamic access to command & control, intelligence,
and logistics data via a single gateway.
2-35
NTP 4(E)
2. Provides browser-based, PKI-enabled capabilities on the
SIPRNet and CAC-enabled capabilities on the NIPRNet.
3. Provides joint logistics applications via a single sign on.
4. Single, Mobility System, Global Transportation, Network,
Intelligent Rail/Road Information Server, Asset Visibility,
In-transit Visibility, Integrated Data Environment.
5. Consuming web services from NGAs mapping capability (Adopt
before you buy, Buy before you Create).
6. Provides access to NCES E-Collab from GCSS (CC/JTF).
7. Provides permission-based, knowledge management system (KMS)
for file-sharing within and across combatant commands.
8. Provides ability for end-users to run reports and export to
other formats, e.g., briefing, spreadsheet, .pdf.
9. Provides a Watch Board to monitor critical items.
10. Provides a modular, net-centric, service oriented
environment for agile, flexible, rapid development and
delivery of critical capability.
11. Provides a Civil Engineers Modeling tool: Joint
Engineering Planning and Execution System (JEPES).
2.6.3
NTP 4(E)
OpenNet Plus or used by employees to carry out Department
business transactions. Bureau/post must terminate all
unauthorized use of ODI LANs no later than 90 days after
OpenNet Plus is implemented at the bureau/post.
4. The Department realizes that there may be exceptions to the
requirement for accessing the Internet via the OpenNet.
Posts and bureaus may request a waiver to this policy. The
IT Change Control Board (CCB) will review such requests on a
case-by-case basis.
REQUESTING A WAIVER TO THE INTERNET CONNECTION POLICY
A Bureau/post requesting authorized continued use of a Dedicated
Internet Network (DIN) connection must submit the DIN access
waiver request. All DIN solutions must comply with the
Departments standards and FAM guidance. Provide the
following information when submitting the waiver request:
1. Post or bureau name.
2. Post or bureau point of contact, e-mail address, and
telephone number.
3. Location serviced by DIN.
4. Type of Internet access service (DSL, dial-up, other).
5. Configuration details (number of connections, users,
rooms to be served).
6. Purpose of the service.
7. Reason requirement cannot be satisfied through OpenNet
Plus (for example: Protocol is not available through
OpenNet Pluswebsite not accessible).
8. What post/bureau is doing to reduce risks (i.e. firewalls,
virus protection).
9. Projected costs.
10. Timeframe of exception.
Submit DIN Access Waiver Requests by e-mail to IT CCB
Management or by telegram or memorandum to the IT CCB Change
Manager, IRM/OPS/ENM/NLM/ECM. The IT CCB Change Manager will
conduct an abbreviated review with relevant IT CCB primary review
authorities and will ensure the request appears on the next IT
CCB meeting agenda for consideration and decision.
If a request for a waiver is denied, the bureau/post may send an
appeal to the Chief Information Officer for final decision. If a
bureau/posts network is connected to the Internet outside of
OpenNet Plus and without the signed DIN waiver, the bureau/post
is in conflict with security guidelines. If unauthorized Internet
connections are detected, the responsible office will be
instructed to disconnect them.
2-37
NTP 4(E)
2.6.4
NTP 4(E)
DISN facility. These scheduled interruptions are generally known
in advance and every effort must be initiated to provide
continuity of service to the users during the scheduled
interruptions. The DISA CONUS ASI Manager is the approval
authority for routine service interruption requests on DISN
stations, nodes, links, trunks, and circuits. The DISA CONUS
Commander is the sole authority for approving/canceling ASIs with
the CONUS Theatre. Cancellations and rescheduling will be
accomplished by the DISA CONUS ASI Manager in conjunction with
the guidance provided by the DISA CONUS Commander in coordination
with the Global NetOps Center (GNC).
Types of ASIs:
Emergency Service Interruption (Real time operational impact
only): Service interruptions to correct hazardous or degraded
conditions where loss of life/property could occur through lack
of immediate action. No prior coordination or user release is
required (reference DISA Circular 310-70-1, c7.3.4.7). The
facilities involved must notify users when time permits and
report the circumstances to the NOC Controller or SCO/Watch
Officer as soon as possible. These situations must also be
reported to the appropriate DISA and O&M elements as time
permits.
Urgent Service Interruptions:
Service interruptions that do not qualify as an emergency but are
requested inside the 21-day prior notice period. A justification
to waive the 21-day prior notice requirement must accompany the
initial request. The DISA CONUS ASI Manager will stringently
review the request and justification. The only exception to the
21-day notice policy is for the P4035 Optical contractor.
NOTE: Lack of coordination or resources is not a valid
justification. It is important to note that urgent requests that
do not have a valid 21-day justification will be handled as
routine requests. The Commander, DISA CONUS has sole authority
to approve urgent ASIs once customer concurrence is received.
Routine Request:
A service interruption in which the request is received no later
than 21 days prior to the requested scheduled interruption. The
requesting O&M elements must notify the DISA CONUS ASI manager no
later than 21 days in advance of the requirement and request
tentative approval. The only exception to the 21-day notice
policy is for the P4035 Optical contractor. Facilities must
submit times/dates avoiding peak traffic hours (1100z - 1800z)
during the weekday. However, if a CONUS ASI will affect a real
time mission in another AOR, the ASI will be scheduled to
accommodate that mission.
Upon completion of the ASI, the appropriate maintenance activity
will notify the NOC Controller or SCO/Watch Officer. The GNSC
SCO will provide verbal notification to the GNC SCO of the ASI
status.
2-39
NTP 4(E)
Extension of an Ongoing Approved ASI - The GNC has sole authority
to approve/disapprove ASI extensions for inter-theater systems
supporting Europe, Pacific, and CENTCOM arenas. The GNSC SCO has
authority to approve/disapprove extensions on the recommendation
of the NOC Controller or SCO/Watch Officer of up to 1 hour to
complete ongoing scheduled ASIs within CONUS. The GNSC SCO will
notify the GNC SCO that an extension was granted. Extensions
beyond 1 hour require DISA CONUS Commander approval and will be
coordinated with the GNC SCO after mission impact has been
jointly assessed by the GNSC and GNC SCO.
If an ASI has to be cancelled, the Node Site Coordinator or NOC
Controller or SCO/Watch Officer will notify the DISA CONUS ASI
Manager immediately or the GNSC SCO (after hours). The ASI
Manager will notify the users by sending a cancellation message
and the reason for cancellation to the field. If the cancellation
comes immediately prior to the maintenance, then telephonic
notification between the applicable NOC and users is authorized.
An official cancellation/reschedule message will be sent as soon
as possible.
2.6.8
NTP 4(E)
OC-1 = 51.85 Mbps
OC-3 = 155.52 Mbps
OC-12 = 622.08 Mbps
OC-24 = 1.244 Gbps
OC-48 = 2.488 Gbps
OC-192 = 9.952 Gbps
OC-255 = 13.21 Gbps
2.6.9
IT-21
2-41
NTP 4(E)
(ATM/GigE/Fast Ethernet)
Services
Services Internal
Internal to
to the
the System
System
E-Mail
E-Mail
Web
Web Browsing
Browsing
Network
NetworkManagement
Management
Account
Account Management
Management
Directory
Directory Services
Services
Print
Print Services
Services
File
File Transfer
Transfer
File
File Compression
Compression
Chat
Chat
Office
Office Automation
Automation
Security
Security
Video
Video TELCON
TELCON
LAN
Drops
GCCS-M
Unix
Server,
Etc
Backbone
BackboneSwitch
Switch
Edge Switch
ADNS
INE
Enclave
Router
Dual Homed
Backbone
Switch(es) w/UPS
Expanded Edge
Switch
(concentrators)
Router
To RF Off Ship
Inline Network
Encryptor (INE)
ISNS
Server
Racks
Figure 2-6
ISNS Architecture
2.6.9.2
NAVAL TACTICAL COMMAND SUPPORT SYSTEM (NTCSS)
NTCSS goal is to provide tactical automated support for
maintenance, supply, financial, material and personnel
administrative matters. Using IT-21, the Navy-Marine Corps
Intranet (NMCI) communication links, and COTS software, NTCSS
hopes to achieve bi-directional database replications.
Replicating administrative information will reduce the
warfighters workload.
2.6.9.3
FLEET NETWORK OPERATIONS CENTERS (FLTNOC)
Naval shore communications has evolved from a series of isolated
shore based radio stations to a highly sophisticated
communications infrastructure. The requirement to support
2-42
NTP 4(E)
integrated voice, video, and data has increased the complexity of
a typical communications shore station. Consequently, The Naval
Computer and Telecommunications Area Master Stations (NCTAMS)
were developed to provide operational direction and management
oversight to all subordinate telecommunications system users.
The IT-21 FLTNOCs provide a number of critical Internet Protocol
(IP) services to the Fleet (both deployed and pier side) and act
as regional gateways to the Defense Information Systems Network
(DISN) IP networks in each of their respective Areas of
Responsibility (AOR). This is accomplished through the use of a
flexible network architecture that can meet unique needs of the
different regional forces. The FLTNOCs were originally
established as independent data communication systems that only
serviced units within specific coverage areas.
The nomenclature for FLTNOCs is AN/FSQ-206. The Navy currently
has four sites designated as IT-21 FLTNOCs: European Central
Region Network Operations Center (ECRNOC) NCTS Naples Italy,
Indian Ocean Region Network Operations Center (IORNOC) NCTS
Bahrain, Pacific Region Network Operations Center (PRNOC) NCTAMS
PAC and Unified Atlantic Region (UARNOC) NCTAMS LANT. The four
IT-21 FLTNOCs are geographically dispersed around the world to
service deployed users, provide the entry points for Navy
Tactical Satellite Systems and also operate and maintain one or
more Defense Satellite Communications Systems (DSCS) terminals.
Each IT-21 FLTNOC is typically responsible for providing services
to Fleet users located in their corresponding AOR. Current
technology provides the ability for a unit to be terminated via
satellite RF and terrestrial paths at almost any FLTNOC,
regardless of geographical location. FLTNOCs are designed to
provide IP services to Fleet IT-21/Integrated Shipboard Network
System (ISNS) and deployed ground forces. All are capable of
flexibly providing IP services based on units satellite RF
capabilities including multiple simultaneous RF paths using
Automated Digital Network System (ADNS), Automated Digital
Multiplexing System (ADMS) or legacy.
The current IT-21 FLTNOC network architecture operates as
individual ingress and egress points for Forward Deployed Naval
Forces (FDNF) within their specific AOR to provide connectivity
to the DISN. Connectivity to the IT-21 FLTNOC from the FDNF
afloat platforms is primarily done via the ADNS, which uses
available satellite communications systems to enable ship-toshore data connectivity. Exceptions to this configuration exist,
dependant upon the individual mission of the FDNF unit or IT-21
FLTNOC, and are handled on a case-by-case basis. Each IT-21
FLTNOC provides local back-up and restore services via the
Network Attached Storage (NAS) and the Out of Band Network, but
does not provide for off-site backup and restore services. Figure
2-7 provides a list of baseline equipment for the IT-21 FLTNOC
per enclave.
2-43
NTP 4(E)
NOC Equipment
Description/Use
Connection point for each NOC to the
DISN network.
Premise Router
Outer Security
Screening Router (OSSR)
Firewalls
Inner Security
Screening router (ISSR)
Service Switch
Virus Scanners
DNSMail Servers
Fleet Router
Tunnel Router
Network Encryption
System (NES)
Inline Network
Encryptor (INE)
Tactical Local Area
Network Encryptor
(TACLANE)
Encryption devices.
Dial-in switch
Management Switch
2-44
NTP 4(E)
Figure 2-8 depicts a simplified topology of the current IT-21
FLTNOC architecture and displays only the core equipment for a
single enclave (from the Premise Router to the Fleet Router). For
the sake of brevity, server subsystems are indicated as Service
Suites and do not display the correct number of servers. For
example, each IT-21 FLTNOC has at least five DNS Mail servers but
is displayed as a single Mail/DNS Suite. Other suites that make
up the IT-21 FLTNOC are the Firewall, Virtual Private Network
(VPN), Intrusion Detection, Virus Scan, and Web Cache suites. The
Premise Router is the ingress and egress Point of Presence (POP)
for the IT-21 FLTNOC to the DISN and is considered an untrusted
interface. The Fleet Router is the ingress and degree POP to the
ADNS network, and is considered a trusted network. This trusted
network is the user side of the network system. Also note the
External DNS Suite in the below diagram. Fleet NOCs use a feature
called Split Horizon DNS. This is used to provide different DNS
query answers to requests initiated outside the enclave. If the
DNS zone is active internally (inside a FLTNOC enclave), the
DNS/Mail Suite provides the actual answers to a DNS query that
can associate an IP address to a ship if the query is initiated
from inside the enclave. To minimize configuration changes when
ships traverse from one AIR to another, the IT-21 FLTNOCs utilize
secondary IP addresses called Virtual IPs (VIP), which are
duplicated between each IT-21 FLTNOC. Using VIP addresses helps
to simplify configuration management and obviates configuration
changes to the ship networks or servers for INCHOP/OUTCHOP. VIPs
are used for DNS forwarding, Simple Mail transfer Protocol (SMTP)
relay and Network Time Protocol (NTP).
All unclassified voice and IP data traversing the classified
enclave for ship and shore commands is encrypted using a NES
4001A, INE KG-235 or a TACLANE KG-175.
2-45
NTP 4(E)
Figure 2-8
IT-21 FLTNOC Architecture
2.6.9.3.1
INCHOP/OUTCHOP
2-46
NTP 4(E)
changes through the entire INCHOP/OUTCHOP process are
accomplished by using either the NOC management web interface of
the DNSMail servers command line. The Fleet unit(s) IP addresses
are then added to the trusted networks table on the Navy
Firewall Security System (NFSS). The Fleet unit(s) homeport IT-21
FLTNOC, which is authoritative for their DNS zone resolution,
will be notified by the gaining IT-21 FLTNOC to direct the Fleet
unit(s) external Mail Exchanger (MX) record to the gaining IT-21
FLTNOC. After the gaining IT-21 FLTNOC has verified IP
connectivity for the fleet unit(s), their losing IT-21 FLTNOC is
notified to deactivate the Fleet units DNS zone(s) on their
DNSMail servers. Service verification is accomplished by a test
email from the IT-21 FLTNOCs domain to the Fleet unit(s) domain
(i.e., a successful email transfer between ior.navy.mil and
Washington.navy.mil). The only exceptions are for embarked units
that must have a CHOP in and out of the Navy IT-21 FLTNOCs (e.g.
Marine Expeditionary Units (MEUs) that move from Navy and Marine
NOCs)). Additionally, the gaining IT-21 FLTNOC is also
responsible for ensuring the units IP address Classes InterDomain Routing (CIDR) block is being advertised via the IT-21
FLTNOC connection to DISN.
2.6.9.3.2
Each
NTP 4(E)
configuration changes and maintenance of the system are
also performed.
2. Tier Two System Administrators are responsible for the
providing the highest state of operational readiness and
availability of the IT-21 FLTNOC to the Fleet.
3. Tier Three - Provided by the Fleet Systems Engineering
Team (FSET) engineers which provide specialized system
technical support, engineering assistance, and on site
training for all NCTAMS/NCTS personnel.
4. Tier Four - SPAWARSYSCEN Charleston acts as the primary
engineering activity for IT-21 FLTNOC development and
provides In-Service Engineering Activity (ISEA) support
for the FSETs, NCTAMS, NCTS and other Fleet services. The
ISEA also provides logistics for equipment replacement,
testing, and training, and as well as hardware and
software upgrades for all IT-21 FLTNOCs. The ISEA
contacts and interfaces with commercial off-the-shelf
(COTS) and government off-the-shelf (GOTS) vendors as
necessary for technical support.
2.6.9.3.4
(NAVRNOSC)
The ultimate goal is to migrate from the current four Fleet NOCs
concept into expanded roles within NAVRNOSCs. ECRNOC and IORNOC
will eventually be collapsed and UARNOC and PRNOC will remain
essential elements within RNOSC East and RNOSC West respectively.
While they will continue to support the service provider
functions of the NCTAMS in addition to managing their portion of
the Navy Enterprise Network (NEN), they will also provide virtual
views of the enterprise at the strategic, operational and
tactical levels. The NAVRNOSCs serve as the technical arm for
the Navy in aggregating the elements of Network Operations
(NetOps) including Enterprise Management (EM), Network Defense
(ND), and Content Management (CM), which supplements Situational
Awareness (SA) and Command and Control (C2), employed to operate
and defend their portions of the NEN. The NAVRNOSC provides
network and system status, performance and ND events from
outlaying CONUS and OCONUS elements including the OCONUS Navy
Enterprise Network (ONE-NET), IT-21, Network Operations Centers
and other systems.
The NAVRNOSC will monitor and control faults, configuration
accounting, performance and security of the NEN elements for
which they have operational responsibility. The NAVRNOSC will
coordinate closely with, and provide users and higher echelons
with network status reports and access to real-time data.
Additionally, the NAVRNOSC will maintain records pertaining to
customer information, local tier control center and site
coordinator contact information, network resources, faults and
2-48
NTP 4(E)
outages. NAVRNOSC operators will have the capability to remotely
manage and control lower echelon systems through the Enterprise
Network Management System (ENMS). ENMS has a suite of EM, ND, CM,
C2 and SA tools that can be leveraged to provide a common
NAVRNOSC operational picture to the Navy Global Network
Operations and Security Center (NAVGNOSC).
2.6.9.3.5
PROGRAM EXECUTIVE OFFICE, COMMAND, CONTROL,
COMMUNICATIONS, COMPUTERS AND INTELLIGENCE (PEO C4I)
INTELLIGENCE (PEO C4I)
PEO C4I is the program manager for the NOC system and as such is
responsible for its life cycle management. As the acquisition
agent, PEO C4I is accountable for cost, schedule, and
performance. Two program offices within PEO C4I have
responsibility for different subsystems. PMW 160 has program
management responsibility for the Information Assurance (IA)
product suite and PMW 790 has responsibility for the rest of the
equipment. Once deployed and fielded, the architecture is
supported and maintained with NCTAMS/NCTS personnel. SPAWARSYSCEN
Charleston provides technical oversight and engineering support
as directed by the PMWs.
2.6.10
NIPRNET
SIPRNET
Fleet NOC/USN ships
Internet (via NIPRNET)
Ships via piers
Legacy USN networks (Non-NMCI standard).
End-user services:
1. Standard office suites
2-49
NTP 4(E)
2. Web hosting and browsing
3. E-mail.
Key concepts that contribute to the full operational capabilities
of NMCI include:
1. Standardizing DON (Navy and Marine Corps) polices,
architectures, and products.
2. Providing basic protection across the DON via the Regional
Network Operations Centers (RNOCs) to include piers, bases,
commands, posts, and stations.
3. Maximizing use of commercial off-the-shelf (COTS) internet
technology security components (i.e., firewalls, intrusion
detection, virtual private network (VPN), virus scanning,
etc.).
4. Hardening infrastructure and diverse connections (i.e.,
protect against denial of service and/or respond to existing
vulnerabilities).
NMCI physical infrastructure consists of numerous LANs connected
by base area networks (BANs) for each base or region. Base and
regional server and data farms with associated support staffs
provide data services. The BANs are connected by two separate
WANs to form the Navy enterprise network. Network management and
monitoring is provided by four NOCs located at Norfolk, VA; San
Diego, CA; Pearl Harbor, HI, and Quantico, VA.
NMCI is designed to provide end-to-end communications within the
Navy, seamlessly integrating with afloat naval forces.
2.6.11
2-50
NTP 4(E)
after the NMCI design in order to insure compatibility and
connects to NMCI and afloat networks via the DISN.
In addition to shore networks, ONE-Net has installed network
connectivity at CONUS and OCONUS piers at Pearl Harbor, Japan,
and Guam. There are validated additional requirements for OCONUS
pier side connectivity at Italy, Spain, and Greece.
Operation of ONE-Nets is envisioned to be taken over by NMCI;
however, host-nation agreement (HNA) and status-of-forces
agreement (SOFA) issues need to be resolved beforehand. Therefore,
the Navy Network OCONUS will continue to operate as a GovernmentOwned/Government-Operated (GOGO) network until transition to a
Contractor-Owned/Contractor-Operated (COCO) environment occurs
under NMCI.
2.6.12
(CANES)
BACKGROUND:
Over the last two decades, the explosion of networking capability
has created unintended consequences aboard afloat platforms. For
each type of network requirement the navy identified (e.g.,
tactical, administrative, classified, coalition, etc.), a
separate, distinct network was developed and installed. As a
result, the navys program office for Networks, Information
Assurance and Enterprise Services manages a portfolio of
multiple, unique networks with various classification levels,
operating systems, and protocols. These individual networks are
difficult to certify and defend from attacks; they bring their
own racks and servers; and they are unable to share server and
storage resources. As a result, the space, weight and power
required have reached capacity on many platforms.
In order to address these challenges, the program office
developed a phased plan to migrate its primary network programs
into a single overarching program called Consolidated Afloat
Networks and Enterprise Services (CANES). CANES will have at its
roots primarily the Integrated Shipboard Network System (ISNS),
but will also incorporate the capabilities of other networks such
as Combined Enterprise Regional Information Exchange System
(CENTRIXS); the Sensitive Compartmented Intelligence Local Area
Network (SCI-LAN); and the Submarine LAN.
The basic concept of CANES is to take hardware requirements and
create a single consolidated computing environment using standard
network infrastructure and a common rack architecture. Enterprise
services will support hosting of both warfighting and
administrative application programs. This evolution requires
detailed technical exchanges between the programs engineers and
a significant amount of resource reprogramming.
CANES is a CNO-directed approach to reduce infrastructure and
2-51
NTP 4(E)
provide increased capability across the afloat enclaves. It
provides technical and programmatic realignment of afloat
infrastructure and services, utilizing Open Architectures. CANES
will replace ISNS.
CAPABILITIES:
1. Voice Services
a. IP Telephony
b. Mobile and Stationary
c. Secure and Un-Secure
2. Video Services
a. Video Teleconferencing
b. Video/Graphics Distribution
3. Data Services
a. Network Support
b. Information Management
c. Core Infrastructure Services
d. Network Access (IPv4/IPv6 Capable)
e. Information Delivery
4. Systems Management
a. Performance, Availability, & Service Level Mgmt
b. Fault, Problem, Incident, & Service Desk Mgmt
c. Configuration, Change, & Release Mgmt
d. Security Mgmt, IA, CND
e. Capacity Mgmt
2-52
NTP 4(E)
CENTRIXS-M
Medicine
METOC
Distance Support /
SEA WARRIOR
CANES
Logistics
GCCS-I 3
ISNS
SIPRNET
JWICS
implementation of CANES
Today
2 Years
5 Years
Hardware Racks
25 to 65 Racks
20 to 58 Racks*
11 to 27 Racks*
SYS ADMIN
12 to 36 Sailors
9 to 24 Sailors*
4 to 15 Sailors*
Figure 2-9
CANES CCE infrastructure
2.6.13
2-53
NTP 4(E)
2.6.14
2-54
NTP 4(E)
NCTS NAPLES
Figure 2-10
High Speed Global Ring Architecture
2-55
NTP 4(E)
25
LAND
HSGR (E)
/08
2/445
25
> 45
150 >>/08
2/6
&
20
RAM
150
STJ
15
0
BAH
15 1/30
0 > /0
>> 8
45
LAGO
CHS
5
45
M51
75
150
MARTLESHAM
NWS
NAPLES
BURUM
ROB
NH95
LAUREN
25
15
0
25
HOLMDEL
SV
TB
0
15
SD
45
TELEPORT (E)
MADLEY
4x
1.5
2
62
15
0
45
45
HSGR (F)
8
3/0
1/2150
3x 1.5
WAH
15
0
45
AUK
NABLC
PAC
15
0&
1.5
6x
EXISTING (E)
EXISTING (E)
TBD
7&8
BUCK
FUTURE (F)
PC
Figure 2-11
High Speed Global Ring mesh topology
2.6.14.1
HSGR ADVANTAGES
2-56
NTP 4(E)
2-57
NTP 4(E)
1. Service On Data (SOD) is a Marconi product that was
implemented to provide management capabilities for the HSGR
core ATM switches.
2. Lucent AQueView is a Simple Network Management Protocol
(SNMP) based software suite that provides management
capabilities for the Lucent PSAX edge ATM switches.
3. Solarwinds software package to analyze bandwidth throughput.
2.6.15
2-58
NTP 4(E)
Figure 2-12
High Speed Global Ring to FLTNOC entry points
The upshot of implementing N2N is FLTNOC interconnectivity and
restoral capability should a FLTNOC lose connectivity on their
DISN path. If a FLTNOC is unable to utilize their DISN
connection, their outbound network traffic will automatically be
diverted across the HSGR to another FLTNOC to utilize their DISN
path.
The establishment of N2N allows the following capabilities that
were previously unavailable:
1. Transform four independently operated FLTNOCs into a single
unified IT-21 FLTNOC Enterprise, providing transparent
redundant services and security to the Fleet.
2-59
NTP 4(E)
2. Provides the infrastructure to deploy Enterprise
collaboration tools and applications that were previously
blocked by the Fleet Boundary 1 firewall.
3. Enhanced security by keeping Fleet traffic on Navy
controlled networks.
4. Enhanced security by providing an Enterprise wide view of
security management and monitoring devices.
5. Improved ability to withstand denial-of-service attacks.
6. Enhanced network monitoring by providing an Enterprise view
of all IT-21 FLTNOC circuits, servers, and equipment.
7. Improve configuration management by providing the
infrastructure for a central repository for system
configurations (server/router/switch configurations).
8. Eventually, with the exception of embarked units (e.g. CVW
or CCSG), the need for IT-21 FLTNOC system configuration
changes when ships move between AORs will be eliminated.
9. Provide continuity of service for the Fleet in the event of
IT-21 FLTNOC outages.
2.6.15.1
N2N SECURITY
2-60
NTP 4(E)
they are a PR IT-21 FLTNOC ship and will continue to receive all
IP services via the PR IT-21 FLTNOC. The failover process is
transparent to the Fleet customers and no intervention is
required by the users.
Figure 2-13 shows an example of a DISN failure at UARNOC.
Figure 2-13
DISN failure at UARNOC
2-61
NTP 4(E)
2.6.16
CLASSIFIED TRUSTED NETWORK PROTECTION POLICY (CTNPP)
/ UNCLASSIFIED TRUSTED NETWORK PROTECTION POLICY (UTNPP)
The Navy Classified Trusted Network Protection Policy (CTNPP) and
the Unclassified Trusted Network Protection Policy (UTNPP)
provide Navy enclave protection to reflect a defense-in-depth
measure and the minimum standards for interconnection between
Navy trusted networks (networks which comply with UTNPP/CTNPP)
and untrusted networks. NTD 09-07 refers.
2.6.17
IP VERSION (IPV6)
NTP 4(E)
individually or in concert with other data to construct relevant
tactical pictures, using maps, charts, map overlays, topography,
oceanographic, meteorological, imagery, and all-source
intelligence information all coordinated into what is known as a
CTP that can be shared. Supplied with this information, Navy
commanders can review and evaluate the general tactical situation,
determine and plan actions and operations, direct forces,
synchronize tactical operations, and integrate force maneuver
with firepower. The system operates in a variety of environments
and supports joint, coalition, and allied forces.
The GCCS-M architecture is composed of three variants: GCCS-M
afloat, GCCS-M ashore, and GCCS-M tactical/mobile that includes
TSCs, mobile operations control center (MOCC), and Joint Mobile
Ashore Support Terminal (JMAST).
2.7
NTP 4(E)
gateway), a performance enhancing proxy (PEP) element, and a High
Assurance Internet Protocol Encryption (HAIPE). HAIPE devices
provide traffic separation and COMSEC functionality.
The convergence router will bring together NIPRNET, SIPRNET, and
DSN VoIP traffic into a packet stream. The aggregate of the
convergence router can be sent to either to the Multiplex
Integration and Digital Communications Satellite Subsystem
Automation System (MIDAS) or the IP SATCOM Modem. MIDAS will then
transmit the Convergence Router traffic to the STEP/Teleport
Systems transmission security (TRANSEC) element. From the
TRANSEC element, the MIDAS connects to the FDMA modem for
transmission via satellite. The IP SATCOM Modem will support IP
over Transponded SATCOM as well. The TRANSEC solution for IP
SATCOM Modem employment is still not defined. The deployed
warfighters suite of equipment will reverse the convergence
process, using similar equipment, by means of interoperable
routing protocols and encryption keys for TRANSEC and
communications security (COMSEC). The Encryption Element provides
the TRANSEC and COMSEC required by the Gateway Systems. All
satellite transmissions require TRANSEC in accordance with CJCSI
6510.01D, Information Assurance (IA) and Computer Network Defense
(CND). COMSEC will be applied to all tactical circuits requiring
COMSEC. The DoD Gateway System does not support unencrypted data
above the Secret level; for example, JWICS and DRSN data passes
through the systems encrypted. The interconnection element
provides the electrical and physical interface between most
elements of the DoD Gateway. It supports connectivity to either
serial interface from the convergence router to the encryption
element for TRANSEC or Ethernet connection into a IP SATCOM
Modem. The modem element provides both FDMA modems and IP SATCOM
Modems (TDMA) interfacing with the DoD Gateway terminal equipment
for transmission over the satellite to the warfighter. The modems
provide the needed modulation and demodulation for the SATCOM
link. The VoIP gateway will be used to interface with the DSN and
to convert legacy DSN voice to VoIP. The VoIP traffic will be
sent to the convergence router to be merged with the NIPRNET and
SIPRNET traffic.
B1190The VoIP gateway shall support IPv4.
B1200The VoIP gateway shall support IPv6 or have a migration
plan to implement IPv6 in future releases.
B1210The VoIP gateway shall support QoS and CoS. All DoD
Gateways will adhere to defined DISN CORE CoS and QoS
standards and policies.
B1220If no DoD policy with respect to QoS and CoS has been
established, the VoIP gateway QoS and CoS shall comply with
tactical user configurations.
2.7.2 DOD VIDEO TELECONFERENCING SERVICE (VTC)
VTC is an extension of traditional telephony technologies with
the added feature of being able to see the person or persons with
2-64
NTP 4(E)
whom one is talking. Another way to consider VTC technology is an
extension or combination of television, which provides the audio
and video communication aspect, and telephony or
telecommunications which provides the addressable, bi-directional
connectivity. The results of which are a bi-directional, closed
circuit, dial-able, TV system. The television portion of the
technology uses video display screens (televisions/video
monitors/projectors), video cameras, microphones, and speakers at
each location connected to a Coder-Decoder (CODEC). The CODEC is
the interface between the analog voice/video devices in the
system and the addressable connectivity or transmission portion
of the system. The CODEC converts the analog signals to digital
format that is compatible with the transmission media. The CODEC
also interfaces and converts presentation and whiteboard
information. The combined digital signal is then transmitted to
the remote location via a telecommunications network which is
either TDM or IP based. Quality VTC communications requires much
higher bandwidth than voice or traditional data communications.
The actual bandwidth required is dependent upon the CODEC and
compression algorithm used. The typical minimum bandwidth
requires is 128Kbps with 384Kbps being typical and required for
quality video. Some CODECs require as much as 2Mbps in support of
high definition video.
The telecommunications network used for VTC connectivity is a
traditional circuit switched telephony network such as the
Defense Switched Network (DSN) and/or Public Switched Telephone
Network (PSTN). The DSN is the preferred network for DoD VTC
connectivity. Both of these networks are based in TDM
technologies and typically provide Integrated Services Digital
Network (ISDN) lines for access to the network. Both Basic Rate
interface (BRI) and Primary Rate interface (PRI) ISDN lines are
used. Addressability is handled as with any other telephone
instrument, the address is the phone number associated with the
line from the circuit switch to the instrument.
2.7.3
2-65
NTP 4(E)
2.7.4
NTP 4(E)
known as the APTS system. With a fully complemented CV/CVN,
costs per minute have driven down phone call charges into the
$1.00 per minute range. A commercial smart debit card now
provides telephone services for personnel on most ships equipped
with the APTS Sailor Phones".
2.7.8
2-67
NTP 4(E)
VIXS hubs are located at:
1.
2.
3.
4.
NTP 4(E)
DISN VS supports Top Secret bridging requirements, providing VTC
services to all U.S. Forces deployed worldwide. Additionally,
through a processing procedure DISN VS supports Allied
conferencing up to and including Top Secret. Existing DISN VS
capabilities include global connectivity, multiple levels of
security, reservation scheduling, directory assistance, multipoint conferencing, speed matching, access via STEP, and 24/7
help desk accessibility. Use of DISN VS is available through
either dedicated service or dial-up (switched) service.
2.7.11
Figure 2-14
SECURE VOICE EQUIPMENT
2-69
NTP 4(E)
1. The STU-III/Low Cost Terminal (LCT) was designed for use in
the office environment among a broad spectrum of military,
civil, government, and selected private sector users. It is
compatible with standard modular or multi-line (key system)
connectors and operates full-duplex over a single telephone
circuit.
2. The STU-III/Cellular Telephone is interoperable with all
other versions of the STU-III Family. It combines cellular
mobile radiotelephone technology with advanced secure
voice/data communications. The unit includes a message
center that is integrated with the standard cellular
handset; it can be conveniently mounted inside a vehicle and
provides all STU-III functions, including
authentication/classification display.
3. The STU-III/Allied (A) is a specialized version of the STUIII/LCT that is compatible with the STU-II. It retains all
basic STU-III functions and capabilities and incorporates
STU-II BELLFIELD Key Distribution Center (KDC), STU-II net,
and STU-II multipoint modes of operation.
4. The STU-III/Remote Control Interface (RCU) provides RED
enclave subscribers with STU-III compatible secure
communications in a rack-mounted remotely controlled line
encrypting unit. When used in conjunction with a RED switch
or conferencing director, the STU-III/R allows STU-III users
to confer with multiple STU-III users or others who have
secure functions. It is capable of encrypting/decrypting
voice or data over two-wire or four-wire telephone systems
and incorporating a 2.4Kbps BLACK digital (external modem)
interface.
5. The Multi-Media Terminal (MMT) 1500 is a diversified STU-III
capable of clear or secure voice and data communications
over both analog and digital mediums. The MMT interfaces to
the commercial telephone system via a standard RJ-11
telephone jack and to digital systems through a Black
Digital Interface (BDI). The BDI port will support both
half-and full-duplex communications, precedence dialing,
black digital network signaling, and multiple satellite
hops. When unattended the MMT can automatically answer an
inbound call without operator intervention and establish a
secure link with any user on a preprogrammed Access Control
List (ACL).
6. The Inter Working Function (IWF) is the shore gateway device
that provides the digital to analog conversion between the
MMT and the analog STU-III. The IWF supports half and full
duplex voice and data communications with rates of 2.4, 4.8,
and 9.6Kbps. The IWF improves secure voice and data
synchronization over multiple satellite hops with
programmable extended time-outs and pre-staging of STU-III
call information. The IWF supports all necessary networksignaling functions to enable call setup and status messages
including canned voice messaging to the analog user.
2-70
NTP 4(E)
7. The STU-III Secure Data Device (SDD) is designed with the
same capabilities as other members of the STU-III family
including Secure Access Control System (SACS), remote
authentication (RA), remote control, auto-answer secure
data, and capable of operating in both attended and
unattended environments. The SDD provides protection for
facsimiles, e-mail, and computer communications.
8. The Motorola CipherTAC 2000 (CTAC), (see figure 2-15) STUIII family compatible secure voice communications via
cellular phone. CTAC without an inserted CipherTAC 2000
security module is unclassified and functions as a nonsecure commercial off the shelf (COTS) telephone product.
The CTAC CiphterTAC security module is certified for all
levels of classified discussions up to and including SECRET
in an adequate operating/security environment.
Figure 2-15
The Secure Terminal Equipment (STE)
The Secure Terminal Equipment (STE)/Office is the evolutionary
successor to the STU-III. The STE program will improve shore
secure voice communications as well as shipboard communications
by changing out the analog STU-III products with digital-based
STE products. The STE cryptographic engine is on a removable
Fortezza Plus KRYPTON Personal Computer Memory Card
International Association (PCMCIA) Card, which is provided
separately. The STE Data Terminal provides a reliable, secure,
high rate digital data modem for applications where only data
transfer (FAX, PC files, Video Teleconferencing, etc.) is
required. All STE products will be STU-III secure mode compatible
with the following enhanced capabilities:
1. Voice-recognition quality secure voice communication.
2. High-speed secure data transfers (up to 38.4Kbps for
asynchronous or 128Kbps for synchronous).
STE terminal products can use Integrated Services Digital Network
(ISDN), analog PSTN, TRI-TAC, or direct connection to Radio
Frequency (RF) assets via RS-530A/232E ports. Maximum STE
performance may be attained only by those commands employing ISDN
service with two Bearer Channels (2B+D ISDN Service). When
connected to a PSTN (Analog Telephone) service, the STE/Office
units will only support current STU-III voice and data
capabilities.
A tactical version, STE/Tactical is a replacement for MMT 1500
2-71
NTP 4(E)
with a Digital Non-secure Voice Terminal (DNVT) adapter. Though
not a direct replacement for the KY-68, the STE/Tactical can
serve as a DNVT replacement with secure voice communication
capabilities in STU-III modes over TRI-TAC/Mobile Subscriber
Equipment (MSE). STE/Tactical is not secure mode compatible with
the Digital Secure Voice Terminal DSVT KY-68.
A STE Direct Dial capability comprised of the STE/C2 Tactical
terminal and/or associated STE/Interworking Function(s) will
improve on the existing Navy "Direct Dial" secure voice ship to
shore dial-up operations. STE Direct Dial improves secure mode
connectivity, provides operational flexibility support for both
plain text and cipher text voice modes, and provides a
standardized secure ship digital telephone system solution and
Joint CINC interoperability with forces at sea and ashore.
Individual STE Product Capabilities:
1. STE/Office provides enhanced STE capabilities over digital
ISDN and STU-III over analog PSTN.
2. STE/Data provides STE and STU-III data capabilities only.
3. STE/Tactical with Wedge supports STU-III Black Digital
Interface (BDI) over TRI-TAC/MSE or RF asset.
4. STE Direct Dial:
a. STE/C2 Tactical with Wedge supports STU-III BDI over
ISDN or RF asset.
b. STE/IWF provides interface with PSTN (Analog) and ISDN
(Digital).
STE products without an inserted Fortezza Plus KRYPTON Card are
unclassified and function as non-secure COTS telephone products.
The Fortezza Plus KRYPTON Card is currently designated as an
Accounting Legend Code 1 (ALC-1) item by the NSA. Even though
STEs are unclassified items, they should still be treated as
high-value Government property (e.g., such as an office
computer). Certification of STE will provide security for all
levels of traffic, up to and including TOP SECRET Special
Compartmented Information (TS-SCI). When a Fortezza Plus KRYPTON
Card is inserted into a STE, secure storage must be provided to
the extent required by SECNAV M5510.36 (series) for the maximum
classification level of the key used. Fortezza Plus KRYPTON
Card is considered classified to the maximum level of key
classification until it is associated with a STE terminal. Once
associated with a STE terminal, the card is considered
unclassified when not inserted in the associated STE terminal.
2-72
NTP 4(E)
2.7.12
2-73
NTP 4(E)
Milstar mode requirements, push-to-talk (PTT) inhibit,
and a bridge for signal fades.
The latest DOD LPC-10 algorithm (V58) has been enhanced to
provide high-quality secure narrowband voice for military
handsets and to maintain that quality and intelligibility in
noisy acoustical environments.
AIRTERM: NSA is developing AIRTERM. Although originally designed
for airborne applications, the Navy has also identified submarine,
shipboard, Marine Corps communication vans, and landing craft air
cushion (LCAC) requirements. AIRTERM incorporates MINTERM and
VINSON operational modes. It is a wideband/narrowband terminal
that interoperates with the TACTERM, MINTERM, VINSON, and Single
Channel Ground and Airborne Radio System (SINCGARS). The AIRTERM
is a lightweight, self-contained secure voice and data terminal
that provides secure half-duplex voice, digital data, analog data,
and remote-keying capabilities for transmission over radio
circuits or wire line media. AIRTERM accepts classified analog
voice information and uses advanced speech processing algorithms:
LPC-10 at 2.4Kbps in narrowband voice modes and continuously
variable slope delta (CVSD) modulation at 12Kbps and 16Kbps in
wideband voice modes. The AIRTERM provides the same connectors,
with similar functional pin outs, as the VINSON for the wideband
operational modes. The AIRTERM is also available with a remote
control unit (RCU), Z-AVH, which is functionally equivalent to
the Main Terminal Unit (MTU) with regard to external controls.
Characteristics:
Equipment
Height
(in)
Width
(in)
Depth
(in)
Weight
(lb)
CV-3591
7.63
4.91
13.30
21.80
KYV-5
6.25
4.88
3.00
3.60
Z-ANG (SRCU)
2.25
5.72
4.13
3.30
Z-ANH (SRCU)
6.20
6.91
2.97
3.30
KY-99A
3.00
5.50
6.73
4.50
KY-100
4.96
5.73
5.14
5.70
Z-AVH
2.61
5.73
3.14
1.80
Table 2-1
TACTERM EQUIPMENT
2-74
NTP 4(E)
Supports the following Data Rates:
Narrowband (3kHz) 300 bps, 600 bps, 1200 bps, and 2400 bps in
the HF mode
2400 bps digital secure voice in the HF mode
2400 bps digital voice and data in the LOS mode
MINTERM
Supports the following Data Rates:
Narrowband (3 kHz) 300, 600, 1200, 2400 bps in HF or BLACK
digital mode (BDM)
2400 bps in LOS mode
Wideband (25 kHz) 12 and 16 kbps in the VHF/UHF/SATCOM mode
AIRTERM
Supports the following Data Rates:
Narrowband (3 kHz) 300, 600, 1200, 2400 bps in HF or BDM
2400 bps in LOS mode
2400 bps digital secure data in the LOS mode
Wideband (25 kHz) 12 and 16 kbps voice or data in the
baseband/diphase (BB/DP) mode
2.7.13
2-75
NTP 4(E)
2.8
NTP 4(E)
services that give ready access to imagery and intelligence
directly from the operational display. GCCS-I3 gives tactical
operators and intelligence analysts direct access to the
nationally produced modernized integrated database (MIDB) for
order of battle (OOB) data, weapons systems characteristics and
performance information, and national imagery. GCCS-I3 also gives
those users the capability to integrate locally collected
tactical imagery, live video stream, and other intelligence with
national and theater-produced intelligence. This intelligence can
be plotted directly on operational/tactical displays alongside
continuously updating operational and operational-intelligence
information, providing tactical operators and intelligence
analysts vastly improved knowledge of the tactical battlespace.
The all-source fusion capabilities of GCCS-I3 provide decision
makers with a composite picture of the battlespace augmented with
SCI-level intelligence, bringing together NRT track, OOB, maps
and imagery, military overlays, and other forms of specialized
intelligence data to produce a CIP. When combined with other
enabling technologies, such as database replication and guards,
GCCS-I3 supplies geographically focused, OPINTEL to the GCCS-M
CTP battlespace view, aiding decision support and improved SA for
the intelligence and operations elements of the commanders
staff.
Included in the GCCS-I3 suite are the following applications:
1. Joint threat analysis tools/ground template toolkit
(JTAT/GTT) generates terrain suitability and other tactical
decision aids based on military aspects of terrain and
contributes to intelligence preparation of the battlespace
(IPB) analysis. It supports the joint force and component
commanders campaign/mission planning and decision making by
identifying, assessing, and estimating the adversarys
battlespace center of gravity, critical vulnerabilities,
capabilities, limitations, and intentions, most likely COA,
and COA most dangerous to friendly forces.
2. Joint targeting toolbox (JTT) provides a common
standardized, scalable, and DII-COE compliant set of
targeting tools to manage and/or produce targets, target
data, and target-derived products and services in response
to customer requirements in a manner consistent with
targeting mission objectives and warfighter requirements.
3. Improved many-on-many (IMOM) models electronic combat
scenarios and can provide threat evaluation. It is a 2-D
graphics oriented user-interactive program which aids in
mission planning and IPB analysis. IMOM visually displays
the complex interaction of multiple ground-based radar
systems being acted upon by multiple airborne ECM aircraft.
IMOM models the detection capabilities of radar effects, the
effects of stand-off jamming platforms, and the effects of
self-protection jamming platforms. The model adds the
effects of terrain masking and ECM on any OOB, exploits the
results to perform a variety of analyses, and provides hard
copy post processing in a variety of formats.
2-77
NTP 4(E)
E-mail/chatter
Word processing/message generator
Imagery manipulation
Communications interfaces/map graphics
Briefing tools/utilities, and
Desktop video/voice
2-78
NTP 4(E)
2.8 4 TACTICAL EXPLOITATION SYSTEM NAVY
Tactical exploitation systemNavy (TES-N) is the Navy shipboard
implementation of the Army tactical exploitation system (TES-A).
TES-N is presently installed only on PAC Fleet CVNs. It is an
integrated, scalable, multi-intelligence system specifically
designed for rapid correlation of national and theater ISR
information to support network-centric operations. TES-N provides
the warfighting commander with access to NRT, multi-source, and
continuously updated day/night battle space ISR information. TESN supports strike operations using numerous ISR collection
planning, data correlation, geo-location, data dissemination, and
storage functions.
It is interoperable with other service derivatives of the TES
system: TES-A, the Marine Corps tactical exploitation group
(TEG), and the Air Forces ISR manager.
2.8 5 INTEGRATED BROADCAST SYSTEM
IBS has integrated several existing intelligence and information
dissemination systems into a single system of broadcasts that
will allow for the receipt of data via a single receiver (the
joint tactical terminal). IBS will disseminate threat avoidance,
targeting, maneuvers, force protection, target tracking, and
target/situation awareness information, and will be continuously
refined by data from national, theater, and tactical sensors. The
reported information will contain unique references (e.g., report
or track/event number) to allow IBS producers and users to
correlate IBS products. IBS will allow the tactical user to
construct successively detailed intelligence pictures of the
battlespace. IBS will interface with Tactical Data Links (TDLs)
such as Link 16 and joint variable message formats (VMFs)
networks to ensure a seamless flow of intelligence information
onto those networks.
The IBS architecture will be theater-based dissemination with
global connectivity through terrestrial and high capacity
communications paths. IBS will take advantage of the
communications paths users already have by implementing an
information management scheme integrated with other DOD
information management systems (e.g., GBS information
dissemination manager).
The effective dissemination of NRT intelligence data requires
secure, worldwide data communications with prioritized use of
available bandwidth between producers and users at all echelons
of command. The existing components of the IBS are:
1. Simplex (IBS-S) formerly known as the TRAP data
dissemination system (TDDS).
2-79
NTP 4(E)
2. Interactive (IBS-I) formerly known as the tactical
information broadcast service (TIBS).
3. Network (IBS-N) formerly known as the NRT dissemination
(NRTD) system.
4. LOS (IBS-LOS) formerly known as the Tactical
Reconnaissance Intelligence eXchange System (TRIXS).
Additionally, TADIXS-B is currently part of the overall IBS
network but will not migrate into the final IBS architecture. The
legacy intelligence dissemination systems were developed to
support the operational requirements of specific groups of users.
They each provide a portion of the total operational requirements
necessary for an effective intelligence data dissemination
architecture that supports the warfighter. IBS will migrate
(combine) these legacy systems into a new system that has
theater-focused dissemination architecture, with global
connectivity, and uses a common information transfer language
(standardized message formats). For the USN, the strategy for the
implementation of IBS will be known as the Maritime Integrated
Broadcast System (MIBS).
2.8.6 RADIANT MERCURY
Radiant Mercury is a hardware and software application that
automatically sanitizes and downgrades formatted data from SCI to
GENSER. It is also used to sanitize data from U.S.-Only to
Releasable for sharing with allied and coalition partners.
It only sanitizes formatted (OTG family, USMTF family, tabular,
TDMIF, NITF, etc.) data. Message transliteration provides
interoperability with other systems by allowing one format to
come in and multiple different formats with the same data to go
out (see Figure 2-16). The headers of NITF imagery files are
formatted extensively, and Radiant Mercury is able to perform all
of its capabilities on the header. Radiant Mercury cannot examine
the image itself, so classified objects in the image pixels will
pass through a Radiant Mercury screening untouched.
Radiant Mercury capabilities include:
1. Automating sanitization and guarding from higher to lower
classifications
2. Downgrading to lower classification levels
3. Providing message format transliteration
4. Facilitating releasability to allies
5. Providing communications port guard (low to high)
6. Providing mechanism for data field integrity
7. Providing mechanism for selected data field checking
8. Providing a complete audit record
9. Supporting post event reconstruction
2-80
NTP 4(E)
10. Providing dirty word searches on full text or specific fields.
Figure 2-16
Radiant Mercury
2.8.7 SENSITIVE COMPARTMENTED INFORMATION NETWORKS
SCI networks (formerly SCI ADNS) provide multimedia delivery of
tactical, administrative and intelligence information to ships at
sea and provide ships access to shore cryptologic and
intelligence resources. SCI networks are based on the integration
of COTS/GOTS protocols, processors, and routers and provide
network services such as secure e-mail, chat, websites, and file
transfer.
The implementation of SCI networks will enable existing
communications/network programs to migrate away from stove piped
IXS protocols with their associated communications paths toward a
single network with voice, video, and data transmission based on
the TCP/IP protocol.
2-81
NTP 4(E)
Depending on individual ship configuration, SCI networks use DSCS
SHF, CWSP, UHF DAMA, EHF LDR/MDR, and Inmarsat-B HSD RF satellite
connectivity through a single ADNS point of entry. Since the ADNS
network operates at the GENSER SECRET level, SCI data is in-line
encrypted to allow transport over the ADNS backbone using
Motorola network encryption system (NES) devices. NES is capable
of providing data confidentiality and integrity and peer
identification and authentication, as well as
mandatory/discretionary access control services. IP tunneling via
the SIPRNET is used by SCI networks to reduce stovepipe
connectivity, simplifies NES and network administration, and
provides for secure alternate routing via standard ADNS
connectivity.
Compartmented traffic, other than SI, is routed by SCI-ADNS to
BORDERGUARD equipment and a separate computer workstation in SSES
for use by appropriately cleared personnel.
2.8.8
2-82
NTP 4(E)
CHAPTER 3
MESSAGE PROCESSING PROCEDURES
3.1
3.1.1
PRECEDENCE
3-1
NTP 4(E)
will be processed ahead of all other traffic. The
prosign Y is designated for use on these messages to
indicate Flash preemption capability. Only the National
Command Authority (NCA) and certain designated commanders
of unified and specified commands are authorized to use
this precedence.
3.1.4
INTERNAL DISTRIBUTION
3-2
NTP 4(E)
including the delivery of messages to a Quartermaster onboard
ship for transmission. The focal point in processing outgoing
messages is the main telecommunications facility which maintains
the status of the message, and selects and directs the
transmission medium for the message.
There are three types of Naval messages:
1. Operational messages directing or affecting the actual use
of forces, ships, troops, and aircraft whether real or
simulated; Those disseminating weather or other vital
reports affecting the safety of life, ships, or forces;
Those dealing with high command or nuclear strike
coordination, tactical communications, combat intelligence,
enemy reports, or information having a vital bearing on
disposition, movement or employment of forces; Those which
control communications, cryptography, deception and
countermeasures, hydrographic and oceanographic information,
and combat logistics matters.
2. Exercise messages are those relating to exercises conducted
for fleet training and readiness, but are handled the same
way as operational traffic. Messages are identified by
"EXERCISE (name)" following message classification in the
text. Text which reads "EMERGENCY STOP EXERCISE" and is
sent via classified message and/or other authenticated means
signals immediate termination of the exercise. Upon
receipt, cease exercise conditions, cease relay of exercise
messages and maintain present circuits until further notice.
Code words may be used. The exercise directorate may direct
resumption of the exercise by classified and/or other
authenticated means.
3. Administrative messages are those covering matters which are
neither operational nor exercise. The highest precedence
may be assigned is Priority, except those messages reporting
death, serious illness or injury which may be assigned
IMMEDIATE precedence. The capacity of most afloat commands
to receive the aggregate of operational and administrative
traffic is limited. Therefore, administrative messages which
include afloat commands shall be kept to a minimum.
3.2.2
NTP 4(E)
within their organizations via official correspondence, i.e.,
letters or notices.
A number of automated systems, such as the GCCS, Tactical Support
Center (TSC) and other remote afloat and ashore terminals, are
capable of automatically generating and releasing messages. Such
messages can either be interfaced directly to a communications
central processor such as a Nova for onward transmission or
entered directly into communications channels. In such cases,
the control of release authority is an administrative function of
the command controlling the message traffic at the generating
computer and there is no requirement for personnel at the
servicing telecommunications facility to validate release or
authorization.
Special situations the releasing authority must consider are as
follows:
1. Minimize criteria is the originators responsibility. See NTP
3 for complete instructions on Minimize. Naval messages
originated in or destined for an area under minimize will
contain as the last line of text the statement "Released By
name and rank/grade". PROFORMA messages which provide data
that will be electronically entered into an automated
database do not require a "Released by" line at the end of
the message text.
2. Commands served by a telecommunications facility with PCMT
or GateGuard must incorporate procedures for assigning
message date-time-groups (DTGs). This procedure should be
designed to prevent using duplicate DTGS on messages from
the same originator.
3.2.3 MESSAGE COMPLETENESS AND ACCURACY
The responsibility for message correctness (proper use of dual
precedence, construction of references, correct PLA'S, addition
of special handling designators) rests with the originator.
Messages containing errors are returned to the originator for
correction, with the following exceptions:
1. For shore commands the servicing telecommunications facility
will correct messages of IMMEDIATE and higher precedence.
2. For fleet/mobile commands the servicing telecommunications
facility will correct all messages.
The only authorized source for U.S. activity short titles and
geographical locations is in the Distributed Plain Language
Address Verification System (DPVS). DPVS is a Navy developed
system which allows electronic dissemination of, and electronic
access to, PLA information. DPVS is intended for use by message
drafters and is not solely a telecommunications facility tool.
3-4
NTP 4(E)
NATO/Allied message addresses are located in the ACP 117 series
of publications. If the telecommunications facility does not
hold these documents, the correct PLA(s) should be requested from
the serving telecommunications facility.
If a PLA is not in DPVS, the first step in verifying validity of
the PLA is to check with the intended recipient. If the
recipient verifies that the PLA is valid, consult ACP 117 and
apply side routing. In all other cases, outgoing messages shall
contain routing indicator "RHMCSUU".
Drafters are accountable for incorrect PLAs and shall ensure
local procedures are established to reduce transmission of
incorrect PLAs. Telecommunications facilities will assist by
assisting originators in procuring approved message preparation
software.
Assigning local internal distribution for outgoing messages is
the responsibility of the drafter. Message copies/diskettes will
reflect this information per NTP 3.
3.2.4 CIRCUIT SELECTION AND DELIVERY
Communications personnel need current information on active
circuits so they may make an informed decision on which circuit
should be used to transmit individual messages. Status boards
must be maintained to display, at a minimum, a listing of
stations on each circuit, and the condition of each circuit and
station.
For high precedence/operational messages, the most expeditious
route for delivery to action addressees, consistent with circuit
classification, must be the foremost consideration in circuit
selection. Any method or circuit will be used to expedite
delivery of FLASH messages to all addressees within security
constraints. To direct further processing, mark the specific
means and circuit for transmission on the message draft and place
in proper format for transmission, converting numerals and
symbols to words as required by the selected method of
transmission.
Forces afloat, at or near advance bases or staging points, should
use fixed circuits for traffic to rear areas rather than
ship/shore circuits. If not at anchor in the harbor, such
traffic may be delivered to shore stations via low power local
ship/shore or harbor nets. When in port, traffic should be
delivered via FSM, CUDIXS or Gateguard.
3-5
NTP 4(E)
3.2.5 TRANSMISSION OF CLASSIFIED MESSAGES UNDER EMERGENCY
CONDITIONS
When the Commanding Officer determines emergency action is
mandatory to affect delivery, messages of any classification may
be transmitted via the lowest level cryptographically secured
circuit. Additionally, under emergency conditions, information of
any classification except TOP SECRET may be transmitted over any
circuit using procedures in ACP 121 and ACP 128. In such cases,
the originating command shall include the following handling
instruction after the classification: CLEAR TRANSEC OVERRIDE
AUTH. Compromises or suspected compromises resulting from
exercise of this authority shall be reported in accordance with
SECNAV M-5510.36.
3.2.6 MESSAGE CANCELLATION
When an outgoing message contains enough erroneous information
that the originator must cancel it, a new message must be
generated that, at a minimum, bears the same addressees, SSIC,
and subject line as the original message. The cancellation text
will reference the original datetime-group. Service messages
will never be used for message cancellation. The cancellation of
messages is a drafter/releaser responsibility.
MESSAGE CANCELLATION EXAMPLE
ORIGINAL MESSAGE
O 011757Z JAN 07
FM COMNAVNETWARCOM NORFOLK VA//N31/00/N3/N32//
TO AIG ONE THREE SEVEN SIX ZERO
INFO USS DWIGHT D EISENHOWER
BT
C O N F I D E N T I A L //N02300//
MSGID/GENADMIN/COMNAVNETWARCOM//
SUBJ/MSG EXAMPLE (U)//
RMKS/THIS MSG IS CLASSIFIED FOR DEMONSTRATION PURPOSES ONLY.//
DECL/X1//
BT
CANCELLATION MESSAGE
O 021427Z JAN 07
FM COMNAVNETWARCOM NORFOLK VA//N31/00/N3/N32//
TO AIG ONE THREE SEVEN SIX ZERO
USS DWIGHT D EISENHOWER
BT
UNCLAS //N02300//
MSGID/GENADMIN/COMNAVNETWARCOM //
SUBJ/MSG EXAMPLE//
3-6
NTP 4(E)
REF/A/GENADMIN/COMNAVNETWARCOM/011757ZJAN00//
RMKS/CANCEL REF A//
BT
3.2.7 TRANSMISSION OF U.S. CLASSIFIED TRAFFIC TO ALLIED NATIONS
U.S. classified traffic specifically addressed to a friendly
foreign nation or international pact organization and containing
proper releasing per ACP 121 US SUPP-1, and OPNAVINST C5510.101
series, Security Manual for NATO, may be transmitted via the
communications network for the foreign addressee provided the
circuit is cleared for that particular message classification.
3.2.8 TRANSMISSION RELEASE CODE (TRC)
Transmission release code (TRC) facilitates automatic transfer of
message traffic into Allied telecommunications networks. The TRC
indicates to transfer stations that a message has been authorized
for transmission to non-U.S. destinations or through non-U.S.
circuits. TRC'S are not used on messages between U.S. activities
transmitted entirely via U.S. telecommunications networks.
The TRC (not used in modified ACP 126 procedures) is a two-letter
element located in ACP 128 format lines (F/L) two and four in
conjunction with the security redundancy characters. Derivation
of a TRC is based upon the second letter of the routing indicator
of the foreign destinations. TRC assignments are as follows:
COUNTRY
DESIGNATOR
Australia
British Commonwealth
(less Canada, Australia,
New Zealand)
Canada
United States
New Zealand
NTP 4(E)
message requires more than two TRCs, it must be transmitted
twice; once with the first two TRC'S assigned, and a second time
with the third and fourth assigned TRC'S. When using two TRCs,
they must be in alphabetical order (i.e., AB, BC, CX, etc).
EXAMPLE:
CONFIDENTIAL MESSAGE TO AUSTRALIA AND A NATO COUNTRY
F/L 2 PTTCZYUW RUFLABC0136 2131253-CCAX--RAXXX RXXXX.
F/L 4 ZNY CCCAX
SECRET MESSAGE TO CANADA
F/L 2 PTTSZYUW RUFLABC0136 2131253-SSCC--RCXXX.
F/L 4 ZNY SSSCC
3.2.9
3-8
NTP 4(E)
3.3
SERVICE ACTION
3.3.1 GENERAL
Service messages are short, concise messages between
communication personnel. Such messages have the force of
official communications and will be accorded prompt attention.
Request for information will be kept to a minimum consistent with
reliable communications to avoid overloading circuits and to
protect security.
Communications officers may delegate release authority for
service messages down to the communications watch supervisor. If
action cannot be completed within reasonable time, the station
originating the service will be so notified. Prosigns and
operating signals will be used to the maximum extent to obtain
and provide corrections or repetitions. Service messages are
normally assigned a precedence the same as the message being
serviced. Communication officers and communication watch
officers are authorized to apply the NATO markings to service
messages to NATO commands or activities when they are authorized
NATO commands.
Service messages are addressed by the telecommunications facility
to the serving Nova. If this site is unable to answer the
request, it will service the originating station routing
indicator (OSRI) of the message involved. All services will be
retained until required action is complete. Information obtained
via service action will be appended to the applicable message
file copy of the serviced message. This may be done by attaching
copies of the service(s) to the file copy or marking the date
time-group or OSRI SSN TOF of the service(s) on the file copy.
The service message will also be filed separately as an incoming
message.
Service messages will not be used to cancel official messages.
3.3.2
NTP 4(E)
the phonetic equivalent.
Meanings for "Q" and "Z" signals may be amplified or completed
with the addition of appropriate call signs, datetime-groups,
etc. Plain language is prohibited except when no other method is
available to complete the meaning.
When desired, an OPSIG may be given an interrogative sense by
inserting the prosign INT before the appropriate "Q" or "Z"
signal.
3.3.3
Prosigns listed in ACPS 124, 126 and 127 are one or more
letters, characters or combinations thereof. They are used to
convey certain frequently used orders, instructions, requests or
information relating to communications in a condensed standard
form. Prowords are the spoken equivalents of prosigns for use in
radiotelephone procedures.
Under no circumstances will operating personnel substitute
prosigns or prowords for the textual component of a message
received for transmission without the consent of the originator.
3.3.4
TRACER ACTION
NTP 4(E)
ORIGINAL MESSAGE
PTTCZYUW RULSWCA1234 0311315-CCCC--RHMCSUU.
ZNY CCCCC
P 311300Z JAN 07 ZYB
FM COMNAVNETWARCOM NORFOLK VA//N31/N3//
TO AIG ONE THREE SEVEN SIX ZERO
BT
C O N F I D E N T I A L //N02300//
MSGID/GENADMIN/COMNAVNETWARCOM//
SUBJ/SERVICE PROCEDURES (U)//
RMKS/1. (C) THIS MSG IS CLASSIFIED FOR OPERATIONAL
PURPOSES ONLY.
DECL/X1//
BT
#1234
CORRECTION SERVICE MESSAGE
PTTUZYVW RULSWCA1235 0311405-UUUU--RHMCSUU.
ZNR UUUUU
P 311405Z JAN 07 ZYB
FM COMNAVNETWARCOM NORFOLK VA
TO AIG ONE THREE SEVEN SIX ZERO
BT
UNCLAS SVC //N00000//
C COMNAVNETWARCOM NORFOLK VA 311300Z JAN 07
LINE 1 CHANGE WA FOR TO READ TRAINING.
BT
#1235
When a message is garbled or incomplete, send a request for a
retransmission (INT ZDK) using a service message as listed in the
service section of ACP 128.
If it is imperative that a message, such as one with high
precedence, be forwarded without correction, the operating signal
ZDG (accuracy of following message doubtful) will be included.
When a corrected copy of such a message is required, only the
operating signal ZEL (meaning: this message is a correction) will
be used for follow-up transmissions.
3.4
3.4.1
NTP 4(E)
3.4.2
Special Category (SPECAT) Single Integrated Operational Plan Extremely Sensitive Information (SIOP-ESI) messages require
stringent controls over reproduction, dissemination,
transmission, access and accountability and is not permitted on
3-12
NTP 4(E)
Genser networks only networks certified SCI. SIOP-ESI messages
shall be classified TOP SECRET only and must contain the SPECAT
caveat. Commands that are required to process SIOP-ESI messages
must certify that the provisions of OPNAVINST S5511.35, Policy
for Safeguarding SIOP, have been met.
SIOP-ESI messages will be logged and disseminated to the
subscriber's SIOP Control Officer only. These messages will be
placed in a SIOP-ESI file with fillers in appropriate files. The
SIOP control officer will regulate further distribution and
account for these messages per OPNAVINST S5511.35.
Clearance and Access. Only those communications personnel
involved in the actual processing of SIOP-ESI messages should be
processed for clearance or granted access to SIOP-ESI. The number
of personnel requiring SIOP-ESI clearance and access is a command
decision commensurate with actual processing, training, and
replacement requirements. All personnel working in or having
access to areas where SIOP-ESI material is processed need not
have SIOP-ESI clearance. However, control procedures must be
established to ensure against exposure of the material. Should
inadvertent disclosure of SIOP-ESI information to non-authorized
personnel occur, debriefing is required, in accordance with
guidance contained in OPNAVINST S5511.35. Procedures for
requesting clearance for and granting access to SIOP-ESI
information are specified in OPNAVINST S5511.35 series.
3.4.4
The SPECAT EXCLUSIVE FOR (SEF) message was established for those
rare classified matters requiring the highest degree of privacy
between individuals as opposed to command or offices. Within the
Navy, SEF is reserved for use by Flag and General Officers, or
officers in command status. SEF messages are not intended for
use in operational matters, but rather, for transmission of
certain high level policy or politically sensitive matters
limited to the eyes of the named recipient only. Initial
distribution is limited to the person whose name, title, or
designation appears on the message. These messages are logged in
accordance with the classification, but are maintained in the
cryptocenter file with fillers in appropriate files.
SEF will not be used for matters which require extensive staff
support for either the originator or the recipient. SEF will not
be used in reply to a SEF message unless the contents of the
reply so dictate. SEF messages will normally not be cited as
references and SEF messages shall not be readdressed.
3.4.5
3-13
NTP 4(E)
3.4.6
3-14
NTP 4(E)
3.4.8
TOP SECRET
NTP 4(E)
their initials on the broadcast monitor roll and next to the
appropriate broadcast serial numbers on the check-off sheet.
Check-off sheets and file fillers are exempted from the
regulation requiring that certificates of destruction be retained
for two years and will instead be destroyed with the broadcast
files.
TOP SECRET message traffic handled by communications stations
(for relay or broadcast delivery only) need not be controlled and
accounted for as described in DODINST 5200.1 series and SECNAV
M-5510.36 providing all copies, less monitor roll, are destroyed
immediately after having served their purpose. Monitor rolls
will be marked TOP SECRET and afforded TOP SECRET security and
storage. After retention for the mandatory period, they will be
destroyed per SECNAV M-5510.36.
The responsibilities of a naval communications facility for over
the-counter delivery of TOP SECRET traffic are as follows:
1. Upon receipt of a TOP SECRET message addressed to a
customer, the telecommunications facility will log the
message in accordance with paragraph 3.6.4.
2. The telecommunications facility will notify the customer of
receipt of the TOP SECRET message. The message will be
delivered only to a courier specifically authorized in
writing by his/her command for receipt of TOP SECRET
traffic. The courier must present a valid
military/government identification card for communications
personnel to verify against the guard command's TOP SECRET
courier list.
3. TOP SECRET, Special Category (SPECAT), and Tight Control
(TICON) messages are authorized for diskette or paper copy
delivery. The customer's designated command courier will be
provided the message(s) on a separate diskette(s) or in a
separate folder (if delivery is accomplished by paper copy)
with a disclosure sheet filled out per SECNAV M-5510.36.
3.4.11
PERSONAL FOR
3-16
NTP 4(E)
commensurate with the classification of the particular message.
Do not use any special procedure to account for, log, or destroy
PERSONAL FOR messages, i.e., attach a disclosure sheet, etc.,
except as specifically required by the classification applied to
the individual message. Transmit PERSONAL FOR messages per the
classification of the message.
3.5 MESSAGE FORMATS
3.5.1 GENERAL
Messages transiting the Defense Information Infrastructure (DIS),
of which the Naval Computer and Telecommunications System (NCTS)
is an integral part, vary in format. Depending upon the present
level of processing and ultimate destination of the message, the
format will be ACP 126, modified ACP 126, ACP 128 or ACP 127.
Message preparation procedures are found in NTP 3.
The major differences between these formats appear in the first
three format lines (F/L) of the message heading. All four
formats are similar with only minor variations from F/L 4 through
F/L 16.
3.5.2
NTP 4(E)
(1) OFFICIAL COMMAND/ACTIVITY NAME BY LONG TITLE TO
INCLUDE GEOGRAPHIC LOCATION IF APPLICABLE.
(2) DATE-TIME-GROUP (DTG) FOR FRI ACTIVATION.
(3) DTG FOR DEACTIVATION OF TEMPORARY FRI.
(4) REASON FOR FRI ESTABLISHMENT.
(5) POINT OF CONTACT (POC) WITH PHONE NUMBER/E-MAIL
ADDRESS.
(2) Once the PLA is approved and FRI assigned, fleet/mobile
units must submit an ESTABLISHMENT COMMSHIFT to promulgate the
new PLA. (Refer to NTP 4 Supp-2)
(3) It is the responsibility of the requesting unit to
disestablish both temporary and permanent PLA's and corresponding
FRI'S by submitting DISESTABLISHMENT COMMSHIFT'S. (Refer to NTP
4 Supp-2)
3.5.3 STATION SERIAL NUMBER (SSN)
The originating station serial number (SSN), located in fields
17-20 of F/L 2 and also in F/L 15, will consist of four digits
(0001-9999) and will be assigned sequentially. In combination
with the OSRI, the SSN provides positive identification for each
transmission. SSN "0000" will be used only in quality control
test messages as stated in Paragraph 341, ACP 128. Duplicate
SSN's will not be assigned within any five-day period.
3.5.4 ROUTING
Generally, US Navy mobile units are not required to maintain ACP
117 and its supplements. Activities route regular traffic to MCS
using routing indicator "RHMCSUU". Service action messages are
sent to the PLA DUSC LANT, DUSC PAC, DUSC EURCENT.
COMMON MESSAGE FORMAT LINES (F/L)
F/L
4
Message Components
11
Prosign BT
12
3-18
NTP 4(E)
13
a. Security classification
b. Special handling designations, e.g., SPECAT, US-UK
EYES ONLY, etc.
c. Releasability statement
d. Special delivery instructions, e.g., PERSONAL FOR
e. Standard subject identifier codes (SSIC), subject
indicator code (SIC), delivery distribution indicator
(DDI)
f. Exercise name
g. Subject line (SUBJ)
h. References
i. Thought or idea
NOTE: Items a., g., and i. are mandatory in narrative
messages, remainder as needed.
Prosign BT
14
Confirmation
15
16
Figure 3-1.
3.5.5
ACP 128
3-19
NTP 4(E)
11BT
12 UNCLAS (TEXT)
13 BT
15 #1234
16 (2CR) (8LF) NNNN (12LTRS)
ABBREVIATED PLAINDRESS
2 PTTCZHSW RUCLDBA0123 1081400-CCCC--RUHHLFA..
4 ZNY CCCCC
11 BT
12 C O N F I D E N T I A L (TEXT)
13 BT
15 #0123
16 (2CR 8LF) NNNN
CODRESS
2 RTTUZHSW RUEOLGA0025 1081400-UUUU--RUCIABA.
4 ZNR UUUUU
5 R 181320Z APR 07
10 GR55
11 BT
12 XXXXX XXXXX XXXXX XXXXX (TEXT)
13 BT
15 #0025
16 (2CR 8LF) NNNN
3.5.6
F/L
1
MESSAGE COMPONENT
Use ACP 128 preamble (VZCZC), circuit identification,
channel sequence number.
Same as in ACP 128 except use the world-wide MCS routing
indicator RHMCSUU.
In this format, transmission release codes (TRCs) are
assigned by MCS Special Handling Designators (SHD) are
the responsibility of the drafter.
MESSAGE
VZCZCABC123
3-20
NTP 4(E)
2
4
5
6
7
8
11
12
13
15
16
3.5.7
MESSAGE COMPONENT
Transmission identification, including Start of Message"
function.
Repeated precedence, routing indicators of stations
responsible for delivery or refile.
MESSAGE
VZCZCHYA076
RR RHDLCNE RBDWC
DE RULSWCA5678 0031235
ZNY CCCBB
R 031234Z JAN 00
FM COMNAVNETWARCOM NORFOLK VA//
TO RHDLCNE/COMUSNAVEUR LONDON UK RBDWC/MODUK
INFO RHBAIKE/USS DWIGHT D EISENHOWER
BT
12
C O N F I D E N T I A L //N02300//
MSGID/GENADMIN/COMNAVNETWARCOM//
SUBJ/SAMPLE MESSAGE//
RMKS/THIS, AN EXAMPLE OF A ACP 128 PLAINDRESS
MESSAGE(CONVERTED TO ACP (127), IS CLASSIFIED
3-21
NTP 4(E)
13
15
16
MESSAGE COMPONENT
Station called who is responsible for delivery.
Station making transmission, station serial number.
Use of prosigns "K" or "AR" as EOM function.
13
16
MESSAGE
NUSA
DE NIKE 4321
ZNR UUUUU
R 041235Z JAN 00
FM USS DWIGHT D EISENHOWER
TO USS ENTERPRISE
BT
UNCLAS //NO2300//
MSGID/GENADMIN/USS EISENHOWER//
SUBJ/SAMPLE MESSAGE//
RMKS/THIS ILLUSTRATES ACP 126
FORMAT FOR POINT-TO-POINT TRAFFIC.//
BT
K
NTP 4(E)
Defense Special Security Communications System (DSSCS) is the
organization through which the Director, DIA, and the Military
Department Intelligence Chiefs accomplish their responsibilities
for the security, use, and the dissemination of Special
Intelligence, to include both physical and electrical means.
Officers assigned to the System are referred to as Special
Security Officers (SSOs). The local senior SSO is that officer
specifically designated by the Director, DIA, or the appropriate
Military Department Intelligence Chief for the implementation of
Communications Intelligence (COMINT) security and administrative
instructions.
The system refers to the world-wide special purpose
communications system for the processing and exchange of
formatted signal and critical intelligence messages and other
sensitive or privacy information referred to as Special
Compartmented Information (SCI). The DSSCS community is also
served by DMS, AUTODIN, Defense Message Dissemination System
(DMDS), and Automated Digital Networking System (ADNS) plus
community unique systems, such as NEWSDEALER. SCI is exchanged
by the use of a unique message format. Defense Special Security
Communications System (DSSCS) Operating Instruction 103 (DOI 103)
provides the operating procedures and practices applicable to
Special Security, Signal Intelligence (SIGINT), and other
sensitive communications facilities processing Special
Compartment Information (SCI) messages.
The primary difference between GENSER and DSSCS message formats
are:
1. Different routing indicator structure.
2. The use of message format line four alpha (4a.)
3. Different Transmission Control Code (TCC) format and
selection.
For the purposes of this document, a brief description is
provided; however, full explanations are contained in DOI-103.
3.5.9.1 DSSCS PLAIN LANGUAGE ADDRESSES AND ROUTING
INDICATORS
GENSER Routing Indicators begin with the letter R and are seven
characters in length. DSSCS routing indicators begin with the
letter Y and are normally six characters in length.
Composition
DSSCS routing indicators are assigned by the Director, National
Security Agency from a block allocated by the Director, Defense
Information Systems Agency. Assignment of a DSSCS routing
indicator is based on the type of activity and on the provision
the activity has a certified Plain Language Address (PLA) listed
in the USSID 309, USSID 505, or the DIA Compartmented Address
Book
3-23
NTP 4(E)
3-24
NTP 4(E)
Addressing Limitations
A multiple address message is limited to a maximum of 500
PLAs/routing indicators and a maximum of 15 collective
addresses/routing indicators.
3.5.9.2 LEGACY ADDRESS DIRECTORY SERVICE (LADS)
Legacy Address Directory Service (LADS) is a system designed to
provide centralized dissemination of DSSCS routing information
contained in DOI-101 (DSSCS Address Group DAGs), DOI-102 (DSSCS
PLAs), and GENSER routing information provided by DISA.
The LADS query tool is a JWICS based, web application that allows
queries against the database from any web browser. Up-to-date
routing information is readily available to the SCI community.
DSSCS Message Format
DSSCS message format consist of three parts: The HEADING, format
lines 1 through 11; the TEXT, format lines 12, 12A and 12B; and
the ENDING format lines 15A and 16. The order or relative
position of the elements within each line may not be altered;
however format lines 7, 8, 10, and 15 may be omitted, singly or
collectively, if not needed for a particular message. All other
format lines are required on messages except service messages, as
explained in chapter 5 of the DOI-103.
DSSCS Message Schematic
Explaination of each line of a DSSCS format message is as
follows:
Line 1 Contains the Start of Message (SOM) indicator, Channel
Designation and Sequence Number (CDSN).
Line 2 Contains the following information in character position
as indicated:
(a) Position 1 The precedence prosign of the message.
(b) Position 2 and 3 Language Media and Format (LMF).
(c) Position 4 Security The Special Intelligence
community prosign is M.
(d) Position 5 through 8 Content Indicator
Code/Communications Action Identifier Consists of four
alphabetical characters or three alphabetical characters and 1
numerical indicator character.
(e) Position 9 Separator A space will be placed in this
position.
(f) Position 10 through 15 Originator The routing
indicator of the originating station will be placed in these
positions.
(g) Position 16 through Separator A space will be placed
in this position.
(h) Position 17 through 20 Station Serial Number
Consists of four numeric characters.
(i) Position 21 through Separator A space will be placed
in this position.
3-25
NTP 4(E)
(j) Position 22 through 24 Date The ordinal date on
which the message was received from an originator by the
communications center for transmission.
(k) Position 25 through 28 File Time The time (GMT) the
message was received from an originator by the communications
center for transmission.
(l) Position 29 Security Sentinel A hyphen (-) is used
to indicate that the security and transmission control code.
(m) Position 30 Security The Special Intelligence
community prosign is M.
(n) Position 31 through 33 Transmission control code (TCC)
The TCC NSH indicates No Special Handling. Other trigraphs
are assigned to denote special handling requirements (reference
DOI-103 paragraph 308).
(o) Position 34 and 35 Start of Routing Two consecutive
hyphens preceding the first routing indicator.
(p) Position 36 through as required Routing Addressees
routing indicators are listed immediately following the start of
routing signal. A maximum of 4 routing indicators will be on the
first line of format line 2, with a maximum of 9 routing
indicators on each successive line are required. A maximum of
500 routing indicators can be listed in a single transmission.
Routing indicators are separated by a space and are not required
to be in alphabetical order.
(q) Position 37 End-of-routing A period (.) inserted in
the position immediately following the last addressees routing
indicator.
Line 3 Not used in DOI-103 format
Line 4 Security warning operating signal ZNY followed by the
Special Intelligence community prosign MM and the appropriate
TCC.
Line 4A Director Line Elements necessary to accomplish
switching of message traffic at communications centers equipped
with an automated message distribution. The elements are:
(a) Switching function ZKZK (followed by a space)
(b) Repeated precedence prosign (followed by a space).
(c) First DDI and succeeding DDIs (if required) followed by
a space.
(d) Switching function DE
Line 5 Precedence Prosign, date-time-group followed by the
abbreviated month and year, and message instructions in the form
of operating signals. The operating signal ZYH will appear in
this line on all CRITICs and messages assigned FLASH or IMMEDIATE
precedence.
Line 6 Prosign FM and the Plain Language Address (PLA) of the
originator.
Line 7 Prosign TO and the designation of the action
addressee(s) in the form of the assigned station designator,
3-26
NTP 4(E)
administrative title, or address group(s).
suffix routing indicators when applicable.
Also contains C
1 - ZCZCHAC157
2 - RTTMZYUW YEKSHA 0103 1232037-MNSH--YEKAAH YEKDQH.
4 - ZNY MMNSH
4A - ZKZK RR SOA DE
5 - R 031950Z MAY 07
6 - FM CNO
7 - TO DIRNSA
8 - INFOR JCS
11 - ZEM
12 - C L A S S I F I C A T I O N
12A - QQQQ
12B - TEXT
15 - C: (CORRECTION IF NEEDED)
16 - #0103
Line 16 - NNNN
3-27
NTP 4(E)
3.5.9.3 CLASSIFICATION OF MESSAGES (TRANSMISSION CONTROL
CODES)
The primary classification of each message is contained in
message format line twelve, beginning with the basic
classification, followed by caveats, codewords, and/or special
handling instructions.
Transmission Control Codes (TCC) are a three letter code which is
placed in both format lines two and four, and are derived
directly from the classification, codewords, and special handling
instructions contained in format line twelve. The TCC is used
primarily by automated systems to prevent transmission of
messages via circuits that have not been authorized to process
that information. Where multiple special handling caveats are
included in a single message, the most restrictive TCC will be
assigned.
For additional information regarding TCCs, refer to DOI-103
paragraph 308 or DOI-102 section 2.
3.5.9.4 CRITIC
Pursuant to the provisions of Section 102 of the National
Security Act of 1947 and Executive Order 12333, the Director of
Central Intelligence (DCI) issued DCID 6/2 (P), now DCID 7/4,
which established policy and procedures for the handling of
critical information. The reporting of critical information is
made in short, specially formatted messages, called CRITICs.
CRITICs contain all essential facts about an event or situation
and may be issued by any U.S. Government official. CRITICs are
transmitted by the fastest means available. Messages carrying
the CRITIC designator are handled in accordance with the
instructions contained in USSID CR1501 and are transmitted in a
manner to ensure deliver within 10 minutes to appropriate
National Foreign Intelligence Board member organizations, the
Army, Navy, Air Force, Marine, Major Commands, and such other
recipients as designated. The original CRITIC is addressed only
to DIRNSA, but will be automatically forwarded to a list of
designated initial recipients. Additional information for CRITIC
transmission, format, and handling are contained in USSID CR1501,
DOI-103, and NSA Supplement to DCID 7/4 (CRITIC HANDBOOK).
3.5.9.4.1
TRANSMISSION
NTP 4(E)
2. OPSCOMM IAW USSD-508
3. U.S. Government owned or leased and operated communications
systems equipped for on-line cryptographic operations.
4. Facsimile compatible with RICOH 3312 utilizing STU III.
5. Telephonic communications via NSTS or STU III.
6. Commercial carrier to the nearest point of entry into a U.S.
Government owned or leased network.
7. Any other transmission means available, providing necessary
security requirements are met.
3.5.9.4.2
NTP 4(E)
classification and special handling instructions from remainder
of text.
Line 12B Text as expressed by the originator.
Line 15A End-of-message (EOM) validation number 9999 preceded
by a number symbol.
Line 16 EOM function
The following examples illustrate the proper sequence of elements
in message preparation:
Line
Line
Line
Line
Line
Line
Line
Line
Line
Line
Line
Line
1 - ZCZCLAA016
2 - WW YEKAAH
3 - DE YDHSLA #9999 011120
4 - ZNY MMQAD
4A - ZKZK WW ZZZ DE
5 - W 022229Z JAN 07 ZYH
6 - FM USN-24
7 - TO DIRNSA
11 - ZEM
12 - C L A S S I F I C A T I O N CRITIC 1-2007
12A - QQQQ (OPTIONAL)
12B - TEXT
DRV FM: DIRNSAM 123-2, DTD 24 FEB 1998
DECL ON: X1, X3, X5, X6, X7, X8
Line 15 - #9999
Line 16 -
NNNN
3.5.9.4.3
3-30
NTP 4(E)
3.5.9.4.4 CRITIC HANDLING PROCEDURE RELAY STATIONS
Each DSSCS Communications Center originating or relaying a CRITIC
message will submit a report containing handling data incident to
the message. This includes retransmissions as a result of ZES-2
actions, ZFG, and retransmissions due to non-receipt of QSL for
the previous transmission. All communications centers are
expected to provide accurate timing devices and maintain records
which will reflect the exact handling times to the nearest second
for CRITIC messages.
The CRITIC Handling Report will be filed two hours at routine
precedence after transmission of a CRITIC message. For 24-hour
stations, if more than one CRITIC message is transmitted during a
single radio day, the report maybe filed, at the end of that
radio-day, to include each transmission of a CRITIC message.
The handling report will contain:
1. Message identification data (Originator and date-time-group)
2. All originators will indicate the time (to the nearest
second) the operator began processing the CRITIC. Stations
using automated systems, which assign the file time, are to
report the time (to the nearest second) the message
processing began, not the file time.
3. Routing indicator of the station to which the CRITIC was
directly transmitted to and the time (to the nearest second)
the message was completely transmitted.
4. Explanation for any delay exceeding three minutes
encountered while handling the message, or any change in the
date-time-group or file time.
The following is an example of a CRITIC handling report:
ZCZCLAA039
RTTMZYVW YDHLSA 0144 022349-MNSH--YEKAAH YEKVDH.
ZNY MMNSH
ZKZK RR XOA DE
R 010344Z JAN 2007
FM USN-24
TO DIRNSA//K04/X231//
INFO NNWC IOD MD//FN3//
ZEM
C L A S S I F I C A T I O N
QQQQ
SUBJ: CRITIC HANDLING REPORT FOR 01 JAN 07 RCS NSA-972
1. USN-24 010045Z JAN 07
2. 0010045:45
3. YDHA 0046:55Z
4. N/A
DRV: FM DIRNSAM 123-2, DTD 24 FEB 1998
DECL ON: X1, X3, X5, X6, X7, X8
#0101
3-31
NTP 4(E)
NNNN
3.4.10
Also known as Message Editor provides the user with the ability
to generate, edit, validate, address and save messages. The most
often-used message types are USMTF, which is character based and
Variable Message Format (VMF), which is binary.
3.5.11
3.6.1 GENERAL
This section addresses the task of logging and file maintenance
in an automated environment. Ashore and afloat automated systems
have been developed which format and route messages and
automatically accomplish the task of message logging, storage and
retrieval. The requirement to maintain these logs and files are
applicable in all automated telecommunications facility, although
the media that records the information will be different.
The records and reports described herein are those necessary for
effective communications and for monitoring and analyzing
specific phases of communications. Requirements for additional
logs, files, and reports must be carefully weighed. It cannot be
emphasized too strongly that records, for their own sake, dilute
unnecessarily the communications capability of the command and
are detrimental to otherwise efficient communications.
Erasures to logs are not allowed. If corrections are made, the
incorrect entry will be crossed out with one line so that the
original entry is legible. The operator's initials will be
affixed beside the correction or in the right hand margin.
Whenever an operator works on a circuit, that person's name will
appear printed or typed in the appropriate log. The operator is
also required to sign the log upon relief or when the circuit is
secured.
3-32
NTP 4(E)
3.6.2
CIRCUIT LOGS
NTP 4(E)
in Figure 4-2, and is available through normal supply
channels. Although OPNAV FORM 2110-15 is primarily designed for
circuit receive side, only a pen-and-ink change is necessary to
use it as a transmission log.
3-34
NTP 4(E)
Figure 3-3
BCST Circuit Number Log
3.6.7
MESSAGE FILES
NTP 4(E)
retrieval for viewing, readdressing, forwarding or printing,
copies of all messages originated by, addressed to or relayed by
a communication center. These message files are maintained on
whatever media the automated system is designed to support, hard
drive, diskette, or CD. The purpose of these files is to provide
a repository for information that is required for both
communications management and service. In addition to messages,
the files also contain information relative to the processing of
the message by the communications center.
3.6.8
FILE MAINTENANCE
BROADCAST FILE
NTP 4(E)
delivery of traffic was affected through the guard arrangements.
3.6.13
RECORDS DISPOSAL
3-37
NTP 4(E)
3-38
NTP 4(E)
CHAPTER 4
COMMUNICATIONS SECURITY
`
4.1 GENERAL
COMMUNICATIONS SECURITY (COMSEC) is the measure and controls
taken to deny unauthorized person(s) information derived from
telecommunications and ensure the authenticity of such
telecommunications.
Communications Security includes the following:
1. Crypto Security. A component of COMSEC that results from
the provision of technically sound cryptographic system(s)
and their proper use.
2. Physical Security. Physical measures designed to safeguard
COMSEC material or information from being accessed or
intercepted by unauthorized person(s).
3. Transmission Security. A component of COMSEC that results
from the applications of measures designed to protect
transmissions from interception and exploitation by means
other than crypto analysis.
4. Emission Security. Protection resulting from all measures
taken to deny unauthorized persons information of value
which might be derived from the interception and analysis of
compromising emanations cryptographic equipment, Automated
Information Systems (AIS), and telecommunications systems.
4.2 COMSEC INCIDENT
Any uninvestigated or unevaluated occurrence that has the
potential to jeopardize the security of COMSEC material or the
secure transmission of classified or sensitive government
information; or any investigated or evaluated occurrence that has
been determined as not jeopardizing the security of COMSEC
material or the secure transmission of classified or sensitive
government information.
4.3 COMSEC INSECURITY
A COMSEC insecurity is an incident that has been investigated,
evaluated, and determined to have jeopardized the security of
COMSEC material or the secure transmission of classified or
sensitive information.
4-1
NTP 4(E)
4.4 CRYPTO MARKINGS
A marking or designator identifying COMSEC keying material used
to secure or authenticate telecommunications carrying classified
or sensitive U.S. government or U.S. government derived
information.
Note: When written in all upper case letters, CRYPTO has the
meaning as stated above. When written in lower case as a prefix,
crypto and crypt are abbreviations for cryptographic.
4.5 COMSEC MATERIAL
COMSEC material consists of aids and hardware which secure
telecommunications or ensure the authenticity of such
communications. COMSEC material includes, but is not limited to
the following: COMSEC key, equipment, ancillary devices,
documents, firmware or software that embodies or describes
cryptographic logic and other items that perform COMSEC
functions. COMSEC material is divided into the following three
categories:
1. Keying Material. A type of COMSEC aid that provides the
means to encode or decode manual or auto-manual
cryptosystems. Keying material includes paper, electronic,
and non-paper items. Keying material may or may not be
marked or designated "CRYPTO".
2. COMSEC equipment. Equipment designed to provide security to
telecommunications by converting information to a form
unintelligible to an unauthorized interceptor and by
reconverting such information to its original form for
authorized recipients.
3. COMSEC related information. Includes policy, procedural,
and general doctrinal publications, equipment maintenance
manuals and operating instructions, call signs, frequency
systems, and miscellaneous material not listed above.
4.6 WATCH-TO-WATCH INVENTORY
Each watch supervisor is responsible for all COMSEC material,
held by the watch section. Prior to assuming the watch the
supervisor must ensure all accountable items listed on a watchto-watch inventory are sighted. At a minimum, the watch
supervisor will account for:
1. All COMSEC material, including equipment not permanently
installed, which will be listed by short title, edition, and
serial number. If the inventory contains effective edition
4-2
NTP 4(E)
information of COMSEC keying material, classify the
inventory at least CONFIDENTIAL. As new material is received
by the watch section, add it to the inventory. When
material is destroyed or returned to the EKMS Manager
deletes it from the inventory using proper line out
procedures per EKMS 1 (series).
2. List permanently installed COMSEC equipment and secondary
variables by short title and account for by quantity.
Otherwise, list each piece as a separate line item on the
inventory and account for by serial number.
3. List COMSEC accountable publications by short title and
serial number.
In conjunction with each inventory, page checks will be done on
all unsealed keying material, except key tapes packaged in
canisters, using local destruction records or other sources of
disposition documentation. Additionally, those loose-leaf
publications which require page checks at the change of watch
will be specifically indicated on the watchto-watch inventory.
To provide positive control of communication accountable items,
each watch will jointly conduct the inventory. The signing of
the watch-to-watch inventory by the relieving watch certifies
that all items were sighted, the required page checks were
conducted, and that the relieving supervisor is responsible for
them. The off-going watch will resolve any discrepancies noted
prior to being relieved and, if the discrepancy involves EKMS
material, the EKMS Manager or Alternate will be notified
immediately.
The watch supervisor and another appointed individual will
conduct the watch-to-watch inventory. If any COMSEC material is
on the inventory, the persons conducting the inventory must be
qualified EKMS users per EKMS 1 (series). The inventory will
contain the date, specific watch, e.g., 0700-1500, and signature
or initials of the individuals conducting the inventory. Start a
new inventory on the first day of each month and retain spent
inventories at least 30 days for accounting and management
purposes.
4.7
CLEARANCE REQUIREMENTS
4-3
NTP 4(E)
the material concerned.
4.8 ACCESS TO NATO INFORMATION
Provided they hold a national clearance greater than or equal to
the comparable NATO classification, U.S. personnel may be granted
access to NATO SECRET and NATO CONFIDENTIAL material and must be
briefed per OPNAVINST C5510.101. The following information is
extracted from this instruction:
1. The phrase "NATO" signifies that a document is the property
of NATO and must not be passed outside of the NATO
organization;
2. All NATO information that is TOP SECRET bears the
designation "COSMIC". For all other classifications, the
phrase "NATO" will be applied to all copies of SECRET,
CONFIDENTIAL, RESTRICTED, and UNCLASSIFIED documents
prepared for circulation within the North Atlantic Treaty
Organization. Under no circumstances should "NATO" be
applied to U.S. documents;
3. The provisions of the Espionage Laws, Title 18, U.S. Code,
Section 793, 794, and 798 are applicable to all classified
NATO information;
4. All classified NATO information will be handled, stored, and
accounted for per OPNAVINST C5510.101.
4.9 CRYPTO ACCESS
Resident aliens who are U.S. Government civilian, military, or
contractor personnel that have been lawfully admitted into the
U.S. and have been granted a final clearance based on a
background investigation may be granted access to COMSEC material
classified no higher than CONFIDENTIAL.
Foreign nationals will NOT be granted access to or provided
information about COMSEC keying material without written
permission from the material's controlling authority. Access to
other COMSEC material must be approved by the National Security
Agency.
Further access information for security guard(s), industrial
personnel, and contractor personnel is detailed in EKMS 1
(series).
4.9.1 TWO PERSON INTEGRITY (TPI)
TPI requires the participation of two people to provide a means
4-4
NTP 4(E)
of restricting access to sensitive material. When dealing with
CRYPTO it requires at least two people, with authorized access to
keying material. They must be in constant view of each other and
the COMSEC material requiring TPI whenever the material is
accessed and handled. Each person must be capable of detecting
incorrect or unauthorized security procedures with respect to the
task being performed.
To support TPI, specifically designed storage with two approved
combination locks, each with a different combination with no one
person authorized access to both combinations is to be employed.
TPI locks must be General Service Administration (GSA) approved.
TPI is required in the following circumstances:
1.
2.
3.
4.
5.
6.
7.
NTP 4(E)
responsibility for supervising the use of crypto material
authorized for operational use in aircraft. The authorizing
command; however, will ensure proper crypto security, training
and authorization of cognizant crew personnel as cryptographers
prior to commencement of flight(s) which involve classified
communications. Exceptions to the above rules follow:
1. Chief petty officers or petty officers in charge of small
ships/craft or activities will be responsible for classified
communications.
2. Operation of authentication systems, "couple codes," numeral
and operational codes, and use of recognition signal
extracts do not require continuous supervision by
commissioned officers.
3. Under provisions of the Geneva Convention (1923), no member
of the Medical, Dental, Medical Service, Nurse, Chaplain, or
Hospital Corps will be assigned duties involving message
processing in classified communications spaces. For small
activities where the only commissioned officers attached are
members of these service corps, the supervision of
classified communications will be the responsibility of the
chief petty officer or petty officer assigned to
communications duties.
The following personnel not regularly assigned duty in classified
communication spaces may be authorized access by the Commanding
Officer/Officer in Charge without escort:
1. Command cryptographic maintenance personnel who may be
admitted to spaces where crypto aids are stowed or are in
use in the performance of their duties.
2. Cryptographic Repair Facility (CRF) personnel presenting
appropriate credentials may be granted access, as
applicable.
3. Special agents of the Naval Intelligence Command, conducting
technical countermeasures surveys, are considered to have a
legitimate need-to-know and may be granted access under
normal operating conditions when security clearances and
access authorizations are properly certified. Access to
classified keying material and messages will be kept to a
minimum consistent with the efficient conduct of the survey.
Discussion about or access to classified information, crypto
material and cryptographic operations will be limited to the
extent consistent with the individual's need-to-know.
For maintenance or repair of spaces and non-cryptographic
equipment, persons may be granted access to classified
communication spaces provided they are sanctioned by the Officerin-Charge and also escorted by authorized personnel. Escorts
will ensure that these persons do not see any classified material
4-6
NTP 4(E)
or cryptographic material/operations.
4.11
SAFE COMBINATIONS
4-7
NTP 4(E)
container which shows the location of the container plus the
name, home address and home phone number of each individual
authorized to hold its combination.
4.13
CLASSIFIED STORAGE
BEADWINDOW
EEFI
POSITION
01
CAPABILITIES
02
4-8
NTP 4(E)
OPERATIONS
03
ELECTRONIC
WARFARE
04
Friendly
results:
friendly
friendly
intended
policy.
PERSONNEL
05
COMSEC
06
WRONG
CIRCUIT
07
Inappropriate transmission:
information requested,
transmitted or about to be transmitted which should
not be passed on the subject circuit because it
either requires greater security protection or is
not appropriate to the purpose for which the circuit
is provided.
08
09
10
11-29
30-49
50-69
Figure 4-1
Beadwindow codes
4-9
NTP 4(E)
4.15
EMERGENCY DESTRUCTION
4-10
NTP 4(E)
supervisor or other person in charge of emergency destruction can
hand out cards to several persons who work simultaneously. The
cards should emphasize designating personnel responsible for the
destruction, what must be destroyed and what method is employed.
Check and update cards often to reflect any changes. Additional
information for developing emergency destruction plans is found
in EKMS 1 (series) and SECNAV M-5510.36. EKMS visit teams will
critique and answer questions about command emergency destruction
plans during the EKMS assist visits.
Most commands use the newer generation of crypto equipment that
are keyed/re-keyed electronically or by key tape. This equipment
is normally unclassified unless keyed and are easy to "zeroize",
making it feasible to include relatively large quantities of
equipment on a single emergency destruction card. Consult EKMS 1
(series) for detailed instructions on emergency destruction
planning.
4.17
ELECTRONIC SPILLAGES
NTP 4(E)
information to ensure program effectiveness. OPSEC professionals
modified and improved techniques based on experience gained with
many different organizations and in areas far a field from
military combat operations. Today, OPSEC is as equally
applicable to an administrative or research and development
activity as it is to a combat operation. If OPSEC is not
integrated into sensitive and classified activities, chances are
that our adversaries will acquire significant information about
our capabilities and limitations.
4.19
TEMPEST
4-12
NTP 4(E)
CHAPTER 5
SHIP / SHORE AND SHIP / SHIP COMMUNICATIONS
5.1 INTRODUCTION
To effectively execute their mission, ships require extensive
coordination with higher echelon commanders, other ships within
the Strike Group, shore commands providing technological and
material support, and participating Joint and Coalition forces.
To maximize the probability for mission success, a myriad of
systems and circuits exist to ensure all mission participants
have the ability to plan, coordinate and collaborate throughout
the world. These C4I systems and circuits include SATCOM, Lineof-Sight UHF, VHF, HF, LF and VLF capabilities. They include
voice, data and video communications both internal and external
to the Strike Group. To facilitate world-wide access to these
capabilities, Navy shore communications facilities have been
segregated into specific AORs with the ability to crosscommunicate.
5.1.1
WORLD COVERAGE
NTP 4(E)
shipboard equipment knowledge and troubleshooting procedures.
Navy communications personnel must review DISA directives, CIBs
and procedures for SHF termination support to ensure proper
configuration and testing requirements of termination path is met
for timely and successful activation SHF transport services.
Shipboard communications personnel must keep JFTOC informed of
all efforts via COMSPOT reporting to ensure NCTAMS situational
awareness and involvement in providing assistance to resolve SHF
termination issues. SHF termination problems or casualties
experienced must be documented in navy After Action Reports (AAR)
and submitted via the C4I Access Request System (CARS).
Current CWSP architecture and infrastructure may be found on the
NETWARCOM GLOBAL C4 READINESS website under the SATCOM CWSP link
at the following URL: http://c4spawar-chas.navy.smil.mil/global.
The Global Broadcast System (GBS) primary injection point (PIP)
and satellite broadcast management (SBM) center is located at
NCTAMS PAC located in Wahiawa, HI and provides access to the UFO8 satellite, which is equipped with five (four active, one spare)
GBS transponders of 23.5 Mbps each, for a total of 94 Mbps per
satellite. Data is transmitted to users from the satellite via
three steerable spot beam antennas. Two of these cover an area of
500 nautical miles (nm) radius and support a nominal data rate of
23.5 Mbps. The third downlink is a wide spot beam that covers an
area of about 2,000 nm radius and supports a data range of 12
23.5 Mbps.
Inmarsat-B HSD service in the PAC AOR is provided by three
satellites, the 109E (Indian Ocean region (IOR)), 142W (Pacific
Ocean region (POR)), and the 143.5E (IOR) satellites. Ships
operating from 20 east to the continental United States (CONUS)
operate through the 142W (POR)/143.5E (IOR) satellite with
commercial SATCOM land Earth station (LES) at Auckland, NZ, and
are also terminated at NCTAMS PAC. Inmarsat connectivity is
constrained at three levels: NCTAMS termination equipment,
terrestrial connectivity limitations, and available satellite
channels. The existing infrastructure at NCTAMS PAC can
accommodate a maximum of 70 Inmarsat-B HSD terminations (54
voice/data and 16 data-only terminations). The LES is, by
contract, capable of landing 50 legacy 64 kbps channels. The
existing terrestrial connectivity infrastructure (three T-1s) (T1
= 1.544 Mbps data throughput) is capable of supporting up to 72
legacy 64 kbps Inmarsat-B HSD terminations from the LES at
Auckland, NZ, supporting the 109E (IOR) with 24 leases, 142W (POR)
with 30 leases, and 143.5E (IOR) with 8 leases of satellite
service. NCTAMS PAC has a theoretical channel capability of up to
66 channels. However, the USN is not the only customer competing
for the assets, and therefore not all 66 may be available.
LANT AOR: Geographically extends from the east coast of the
United States to approximately 5 west longitude where the United
States Navy Europe (NAVEUR) Command AOR begins. Commander, Fleet
Forces Command (COMFLTFORCOM) policy is that any Navy vessel
5-2
NTP 4(E)
operating in the LANT AOR will terminate communications at NCTAMS
LANT located in Norfolk, VA.
SHF DSCS SATCOM can be terminated at three locations in the
Atlantic Region: NAVSATOCMFAC Northwest, Ft Belvoir and Ft
Detrick. These three Teleport/STEP sites can support fourty-two
(42) Navy missions simultaneously. The Regional Satellite Support
Center (RSSC) will determine where each ship will be terminated
by the resources at the Teleport/STEP sites and projected
location and movement of the ship(s) with the region.
Current CWSP architecture and infrastructure may be found on the
NETWARCOM GLOBAL C4 READINESS website under the SATCOM CWSP link
at the following URL: http://c4spawar-chas.navy.smil.mil/global.
Inmarsat-B HSD service in the LANT AOR is provided by the 98W
(AOR-W) with 30 leases on the satellite. The AOR-W satellites
footprint covers from 179 west, in the Pacific, eastward to 20
west in the Atlantic. It is anticipated that service via the AORW satellite will be used by the Atlantic Fleet only. Channels are
supported by the commercial SATCOM LES at Laurentides, Canada,
and terminated at NCTAMS LANT Norfolk, VA. Inmarsat connectivity
is constrained at three levels: NCTAMS termination equipment,
terrestrial connectivity limitations, and available satellite
channels. NCTAMS LANT is outfitted with termination equipment to
support 48 channels. The LES is, by contract, capable of landing
50 legacy 64 kbps channels. Current terrestrial connectivity (two
T-1s) can support up to 48 legacy 64 kbps Inmarsat-B HSD
terminations. NCTAMS LANT has a theoretical channel capability of
up to 48 channels. However, the USN is not the only customer
competing for the assets, and therefore not all 48 may be
available. In all cases, the aggregate of the satellite links are
backhauled over terrestrial links (commercial or Defense
Information Systems Network (DISN)) to NCTAMS LANT for
distribution to individual users or product sources. Obtaining
terrestrial connectivity from the various SATCOM Earth terminals
to NCTAMS LANT is low risk as the terrestrial connectivity is
shore-based and within CONUS.
NAVEUR AOR: The NAVEUR AOR reaches from approximately 5 west to
35 east latitude. Commander, United States Naval Forces, Europe
(COMUSNAVEUR) policy is that any Navy vessel operating in the
NAVEUR AOR will terminate communications at NCTS NAPLES, ITALY.
SHF DSCS SATCOM can be terminated at two locations in the NAVEUR
region: NAVSATCOMMFAC Lago di Patria and Landstuhl GE. These two
Teleports can support up to forty (40) Navy missions
simultaneously. The RSSC will determine where each ship will be
terminated by the resources at the Teleports and projected
location and movement of the ship(s) within the region.
Current CWSP architecture and infrastructure may be found on the
NETWARCOM GLOBAL C4 READINESS website under the SATCOM CWSP link
at the following URL: http://c4spawar-chas.navy.smil.mil/global.
5-3
NTP 4(E)
5-4
NTP 4(E)
Inmarsat-B HSD service in the NAVCENT AOR is available from two
satellites, the 25E with 33 leases (AOR-E) and 109E (IOR) with 24
leases on the satellites. The AOR-E satellite footprint covers
from 60 west, in the Atlantic, eastward to 100 east in the
South China Sea; the IOR satellite footprint covers from 30 east,
in the eastern Mediterranean Sea, eastward to 107 west in the
Pacific. AOR-E channels are supported by the Goonhilly, UK, LES
and terminated at NCTS Bahrain. IOR channels are supported by the
Auckland, NZ, LES and are terminated at NCTS Bahrain. Typically,
Inmarsat-B HSD-equipped ships physically located in the Persian
Gulf are terminated at Goonhilly, UK, and routed to Bahrain.
Naval units in the IOR and not physically located in the Persian
Gulf will normally be terminated with the Inmarsat LES located in
Auckland, NZ. These terminations are forwarded to NCTAMS PAC
Wahiawa, HI, for distribution to users and product sources.
Inmarsat connectivity is constrained at three levels: NCTAMS
termination equipment, terrestrial connectivity limitations, and
available satellite channels. Two satellites, 109E and 25E
support the NAVCENT AOR. As those satellites also have
responsibilities to cover other AORs (25E in the Mediterranean
and 109E in the IO) inter-fleet coordination may be required to
meet the fleets Inmarsat requirements. Current capacity is up to
48 channels via the 25E satellite, shared with Sixth Fleet
requirements in the Mediterranean, and up to 66 channels via the
109E satellite, shared with Seventh Fleet requirements in the IO.
The NAVCENT Inmarsat shore architecture provides a single T-1
between NCTS NAPLES, ITALY and the Indian Ocean region network
operations center (IORNOC) in Bahrain to backhaul Inmarsat data.
5.1.3
PROBLEM AREAS
UNAUTHORIZED TRANSMISSIONS
5-5
NTP 4(E)
teletypewriter circuits. The Federal Communication Act of 1934
addresses this violation and is quoted in part:
"Whoever utters any obscene, indecent or profane
language by means of radio communications shall be fined not more
than $10,000 or imprisoned not more than two years, or both."
No person shall knowingly or willfully originate, accept,
transmit, deliver, or cause to be delivered a spurious message or
one falsely purporting to have been received by naval
communications. Also, the use of profanity and obscenity in radio
transmissions is prohibited and violators are subject to charges
under the UCMJ. This is essential both to circuit discipline and
compliance to Federal law.
As unauthorized and obscene transmissions are not usually
accompanied by call sign identification or personal identifying
information, extra effort must be exerted to identify the
offending station. To accomplish this, the use of tape
recorders, accurate log keeping, notes on offending operator
characteristics, exact frequency measurements and directional
finders (DF) bearings will help in proper identification.
Monitoring will be performed per applicable OPNAV and SECNAV
instructions.
Whether or not positive identification can be made, all incidents
involving unauthorized transmissions, as noted above, shall be
reported by the receiving or monitoring command to the
appropriate Fleet Commander, with information copies to
COMNAVNETWARCOM. All identifying information shall be enclosed
with the report.
5.1.5
VIOLATION REPORTS
Both afloat units and shore stations are to bring deviations from
prescribed procedures to the attention of violators via record
message traffic. In the event of continuous flagrant violations,
a speed letter report will be submitted to the FLTCOMs, with
copies to COMNAVNETWARCOM, the type commander, and the offending
afloat unit/communications station. The report will include a
description of the violation, publication reference and date/time
of violation.
5.1.6 HARMFUL INTERFERENCE COMMUNICATIONS JAMMING, IMITATIVE
COMMUNICATIONS DECEPTION
Harmful interference is defined in the ACP 121-series. The
saturated frequency spectrum, caused by the increasing worldwide
use of radio communications by governments and commercial
concerns, has created a situation wherein interference can be
expected and often must be tolerated. Thus, stations
5-6
NTP 4(E)
experiencing interference should initially consider such
disruption of communications to be interference rather than
jamming and take appropriate action per ACP 121-series. Reports
of US interference to the communications facilities of other
nations should be handled expeditiously.
Communications jamming is the deliberate radiation, re-radiation,
or reflection of electromagnetic signals with the object of
impairing or denying the use of communications circuits by the
enemy. This is accomplished by the transmission of
electromagnetic signals to enemy receivers. In jamming
operations, the signals produced are intended to obliterate or
obscure the signals the enemy is attempting to receive. Signals
whose modulation characteristics or manner of keying is clearly
for the purpose of obstructing a radio channel should be assumed
to be jamming. Jamming signals will usually be changed in
frequency to follow changes in frequency on the circuit
experiencing the jamming.
Some common forms of communications jamming are:
1. Several carriers adjusted to the victim frequency. Each
carrier amplitude modulated by a nonsinusoidal frequency.
2. Simulated traffic handling on the victim frequency.
3. Random noise amplitude modulated carriers.
4. Random noise frequency modulated carriers.
5. Continuous wave carrier, (keyed or steady).
6. Several audio tones used in rapid sequence to amplitude
modulate a carrier (bagpipe).
Measures to counter and minimize the effect of jamming shall be
employed in the order listed:
1. Prepare instructions and procedures to be followed
(including alternate routing of traffic) on circuits most
susceptible to jamming.
2. Request sending stations to continue live traffic on jammed
circuits to create the impression that jamming is
ineffective.
3. Check tuning of receiver. Request the sending station to
check tuning of transmitter on the jammed circuit. Various
receivers differ both in the degree of selectivity afforded
for close discrimination between signals whose frequencies
are very near to each other and in the circuitry used to
reject or limit unwanted signals. Therefore, maximum
5-7
NTP 4(E)
advantage should be taken of all receiving facilities
available for selection of those best suited for operation
under the type of jamming being experienced.
4. Ensure correct bearings and maximum efficiency of
directional antennas, for both receiving and transmitting,
when available. It is probable that the true bearings of
desired and jamming signals will differ considerably.
Advantage should be taken of the radiation patterns of the
various installed antennas for selection of the antenna most
favorable to reception of the desired signal and to
transmitting the strongest signal in the desired direction.
Most antennas have some directional effects, even when
intended to be omni-directional.
5. Use panoramic adapters, if available. The visual display of
the frequency spectrum in which jamming is being experienced
makes available the means for precisely monitoring changes
in tuning and in selecting clear channels, and aids in
submitting the required report of jamming.
6. Request sending station to increase power. This request
shall be classified, unless an alternate radio net is
available, in which case an unclassified request may be made
if the tactical situation dictates.
7. Request sending station to shift frequency. Consult
propagation publications to determine if there is a better
frequency available for transmission path involved. The
request for a frequency shift shall be classified unless an
alternate radio net is available, in which case an
unclassified request may be made if the tactical situation
dictates. Live traffic, operator's normal signals, and so
forth, must continue on jammed circuits if a frequency shift
is made.
8. Divert low-precedence traffic from radio channels to mail or
courier.
9. Anticipate further shifts in frequency. The new primary
frequency must be supported by having its secondary placed
in a standby condition.
Imitative communications deception is the introduction of
fraudulent transmissions, in imitation of authentic
transmissions, into enemy communications systems for the purpose
of confusing or deceiving. (see ACP 122 (series) for descriptive
data and defensive measures concerning imitative communications
deception.)
Incidents of harmful interference, communications jamming and
imitative communications deception will be reported per OPNAVINST
C3430.18.
5-8
NTP 4(E)
5.1.7 COAST GUARD HF SHIP / SHORE CIRCUITS
Coast Guard Ship/Shore circuits are available for use by U.S.
Navy Vessels during times when satisfactory communications cannot
be maintained with their servicing NAVCOMTELSTA and High
precedence traffic needs to be delivered. Coast Guard COMMSTAs
have access to AUTODIN for further delivery of traffic to message
addressees.
Coast Guard COMMSTAs with HF Ship/Shore circuits compatible with
U.S. Navy HF systems can be contacted on SSB Voice for initial
circuit coordination. Calling and working for Ship-Shore-Ship
communications will be in the duplex frequency mode. Frequencies
shown below are window frequencies.
Current HF on call services for CG Communications Area Master
Stations (CAMS) and COMMSTA Kodiak Alaska:
HF On Call Services at CAMSLANT (NMN):
Air to Ground - 5696khz, 8983khz, 11202khz (On request), and
15088khz
COTHEN - CG Scan list
Secure Air to Ground and/or Secure Vox: Contact CAMSLANT via
above freqs to coordinate
GMDSS (associated DSC) vox freqs - 2182khz, 4125khz, 6215khz,
8291khz, 12290khz (1100Z- 2300Z), and 16420khz (on request)
Autositor - CAMSLANT/Boston/New Orleans/Miami Xmit freqs
4210.3
6314.3
8426.3
12590.8
16817.8
22387.8
CAMSLANT/Boston/New Orleans/Miami RCV freqs
4172.3
6262.8
8386.3
12488.3
16694.8
22295.8
HF On Call Services at COMMSTA Kodiak (NOJ):
2182 kH
International Distress/Initial Contact Frequency
silent periods enforced.
5-9
NTP 4(E)
2670 kHz
4125 kHz
6215 kHz
Distress/Initial contact
6501 kHz
5696 kHz
8983 kHz
no
6315.8
8417.8
4211.8
24HR
DAY
NIGHT
Receive
SITOR 1
SITOR 2
SITOR 3
6264.3
8377.8
4173.8
Receive
2187.5
4207.5
6312.0
8414.5
12577.0
16804.5
CH 2. 4730.0
CH3. 6709.0
CH 4. 9034.0
CH 5. 11196.0
CH 6. 13221.0
CH 7. 15082.0
CH 8. 17988.0
CH 9. 20135.6
CH 10. 23072.6
5-10
NTP 4(E)
5-11
NTP 4(E)
7. SINGLE-SIDEBAND-SUPPRESSED-CARRIER-FREQUENCY. The carrier
is virtually suppressed and not intended to be used for
demodulation. This frequency is sometimes referred to as
the reference frequency. In U.S. Navy Single-SidebandTransmitters the carrier frequency, depending on the
transmitter type, may be either offset from the assigned
frequency or set on the assigned frequency.
8. In order to provide operational flexibility, a number of
frequencies will normally be provided by the NCTAMS in
conjunction with the FLTCOMs and numbered fleet commanders
for pool use where required. Frequencies cleared for SSB
only (2K80J3E or 3K00J3E/3K00J7B), will indicate the
suppressed carrier frequency in parenthesis following the
assigned frequency. Frequencies cleared for 300HF1B, as a
general rule, will have a suppressed carrier frequency
displaced 2 kHz below the assigned frequencies. In any
case, instruction books for the particular equipment should
be consulted to confirm the location of the suppressed
carrier frequency.
Characteristics for FSK operation of the following radio sets are
provided for your information. However, instruction manuals for
specific equipment can be expected to be more thorough and
current:
1. AN/URT-23/24. Emits the space and mark signal, plus 425 Hz
and minus 425 Hz, centered on the dial frequency.
2. AN/TRC-75. Emits the space and mark signal, plus 425 Hz and
minus 425 Hz, centered 2000 Hz into the upper sideband.
5.1.8 HF INTERNET PROTOCOL/SUBNET RELAY (HFIP/SNR)
The Navy Tactical Network program of record is an Increment II
evolution of a very successful POR called HF Data Systems or
HFDS. HFDS offered Allied/Coalition digital communications over
HF in the form of Battle Force E-Mail or BFEM. A lowest-commondenominator system BFEM was intended to facilitate primarily
ship-to-ship communications over an Extended Line of Sight radio
environment with point to point links carrying e-mail (SMTP)
traffic to and from US Navy ships into NATO communications
environments. Its Operational Requirements Document called for an
incremental increase i n both platform interoperability (beyond
just ships) and IP-enabled connectivity. Research investments by
ONR and the program office results in a synergism of technologies
across several RF pathways and IT interfaces to result in an
extended range data communications system called HFIP/SNR.
The HFIP/SNR technology promulgates usefulness that is at once
common and unique to each naval platform user (land, sea,
surface, undersea and aerodyne). Common usefulness of this system
5-12
NTP 4(E)
centers around a self-forming, self-repairing network capability
with a highly secure digital communication range of 20-700
nautical miles, thereby eliminating the need for voice
transmissions and satellite reach back; which can be timeconsuming and susceptible to error. The HFIP Gateway system also
takes advantage of radios already in place in aircraft, ships,
shore stations and submarines, providing a means of relatively
low-cost integration of IP information to the navys Global
Information Grid information environments (US Only and
Allied/Coalition).
The currently fielded Navy Tactical Network or NTN is a network
of many HFIP/SNR communication systems. On each platform the
HFIP/SNR system is allocated to service either US only
communications (SECRET) or Allied/Coalition (NATO SECRET). The
HFIP/SNR systems are designed to allow platform to route IP data
(chat, email, file transfers) over available High Frequency (HF)
and Ultra-High Frequency (UHF) mediums to their respective
aircraft, submarine, ship and shore ground counterpart sites in
Token Ring (via HFIP) or TDMA (via SNR) networking topology. The
HFIP H=Gateway also acts as a relay point to allow one HF
connected node to relay IP traffic between two nodes that are not
within HF communications distances.
The composition of each system varies based on their legacy
HF/UHF radios and LAN infrastructure. Basically though each
platform will have a Controller that performs the HF-UHF medium
to IP data exchange, network access control, and packet directing
duties through the use of functionally limited LINUX-based
software; which operates on a standard Pentium II (or higher)
Personal Computer (PC) with at least 256Mb of RAM, two Ethernet
ports, and one Peripheral Component Interconnect (PCI) slot.
Additionally, each Controller (one for HFIP and one for SNR
functions) contains a synchronous board that provides control
signals required to initiate modem and crypto synchronization
preambles necessary to key the RF equipment. Both systems use a
dedicated MIL-STD-188 based RF modem. A NIST certified Intrusion
Protection/Intrusion Prevention Firewall is mounted between the
platforms LAN components and these HFIP/SNR devices and a NSA
Type I encryption device is mounted between the HFIP/SNR devices
and the platforms designated RF transmitter and receiver radio
equipment. Figure 5-1 depicts a typical HFIP/SNR System
Architecture concept.
5-13
NTP 4(E)
Figure 5-1
HFIP/SNR Architecture
5.1.9 AFLOAT ELECTROMAGNETIC SPECTRUM OPERATIONS PROGRAM (AESOP)
Electromagnetic Spectrum Operations Program (AESOP) is a computer
program designed to automate frequency planning for radar and
weapons systems as well as the process of generating
communications plans. The Strike Group staff or designated
frequency coordinator uses the radar planning component of AESOP
to select frequencies and separation distances for the groups
ships to ensure that the radars operate with a minimum of
electromagnetic interference (EMI).
The communications planning component provides the communications
planner with an automated method of drafting the OPTASK COMMS
message. The OPTASK COMMS message is the means used by which the
5-14
NTP 4(E)
United States Navy and Allied Navies distribute afloat
communications plans.
To support Communication Planning in developing a Communications
Plan, the AESOP database also contains:
Platforms
Communications Equipment
Line Numbers
Emission Designators
Guard Keys
Keying Material (KEYMAT)
5-15
NTP 4(E)
10.
Establish Frequency Guard Bands for frequencies that
are not available.
11. Import Standard Frequency Action Format files from a
standard frequency management database, such as FRRS.
12. Develop Aircraft Channelization Plans and DAMA
Channelization Plans.
13. Generate and Transmit the OPTASK COMMS.
14. Publish the AESOP Spectrum Report for use by the IWC.
5.1.10 FREQUENCY MANAGEMENT
The Navy uses an area frequency management concept where the US
and Possessions (US&P) is divided into areas for which the
responsibility has been designated to Navy Area Frequency
Coordinators or Commands.
One aspect of frequency management that is common to all DoD
organizations is that the commander of an installation is
responsible for management of the spectrum on the installation.
Many organizations are involved in Navy spectrum management to
ensure mission success. As mentioned earlier, the Navy assigns
coordinators, who operate on a regional and local basis and
resolve frequency management and coordination issues within their
respective geographic regions. Some of the coordinators are:
NMCSO
NMCSO
NMCSO
NMCSO
NMCSO
NMCSO
NMCSO
NMCSO
LANT Norfolk
EUR Naples
CENT Bahrain
PAC Honolulu
NORTH WEST Puget Sound
SOUTH WEST San Diego
Guam
FE Yokosuka
5-16
NTP 4(E)
maintain and promulgate Navy-Wide OPTASK COMMS. Numbered Fleets
will require that forces operate C-E equipment within the
parameters of the applicable frequency assignments.
Responsibility for managing Navy frequency use in foreign
countries may rest with either the Senior Naval Force Commander
or the Joint Forces Commander. Fleet forces can submit frequency
request to the Numbered Fleet Commander in cases where additional
frequencies are required. Numbered Fleet spectrum managers will
promulgate specific instructions and procedures about how to
obtain and use radio frequencies. Conservative use of the radio
frequency spectrum is strongly encouraged to minimize the risks
associated with interference, hostile jamming and intrusion.
5.1.11 FREQUENCY RESTRICTIONS AND VARIOUS THEATER OF OPERATIONS
Because the radio frequency spectrum is a limited natural
resource, all radio frequency usage is restricted or regulated in
some way. Responsibility for establishing base frequency
restrictions rests with the base commanding officer. Base
frequency managers will promulgate restrictions on a regular
basis. Responsibility for establishing fleet frequency
restrictions rests with the numbered fleet commander, who will
develop, maintain and promulgate radio frequency restrictions, to
include host nation restrictions where applicable, with the goal
of reducing the likelihood of radio frequency interference.
5.2
SATELLITE COMMUNICATIONS
5.2.1 GENERAL
In today's automated telecommunications environment, the primary
means of Ship/Shore Communications is via satellite. Shore and
shipboard satellite subsystems are in a continuing state of
evolutionary development. CIB/CIA'S are apt to provide the best
current information on the latest procedures for communicating in
this dynamic environment. Current Satellite Communications
(SATCOM) information is available using links from the
NAVNETWARCOM C4I status page on the SIPRNET
(http://sgeminii.spawarchas.navy.smil.mil/C4I_GlobalStatus/GlobalStatus.aspx) Follow
the links from the various spectrums to find information on
current status, satellite assignments, user handbooks and other
information.
5.2.2
5-17
NTP 4(E)
multiple subsystem terminals. UHF military satellite
communications (MILSATCOM) systems provide capacity on demand for
transport services that support a wide variety of applications
including SECVOX, messaging, facsimile, secondary image transfer,
packetized data service, and e-mail used during normal and
contingency or crisis operations.
The UHF follow-on satellite system (UFO) is the predominant UHF
system in use today. There are eight UFO satellites, each with 39
UHF channels per satellite: twenty-seven 25-kHz channels, twentyone 5-kHz channels (Note: UFO-11 is equipped with four additional
5-kHz channels for a total of twenty-five 5-kHz channels), and
one jam-resistant EHF uplink 25-kHz UHF downlink channel
supporting either the fleet broadcast or the Integrated Broadcast
System-Simplex (IBS-S). Seven UFOs are also EHF-capable; two UFOs
are equipped with Ka-band GBS packages.
The UHF Constellation also includes 2 Fleet Satellite
Communications (FSC) satellites. The first FLTSAT was launched in
1978 and the last in 1989. Of the original satellites, only FSC7 and FSC-8 remained operational and are past their end-of-life.
FLTSAT are considered as complementary element of the UHF
MILSATCOM space segment.
The satellites have four types of UHF
communications channels for a total of 23 channels. There is a
single broadcast channel (Ch 1), nine 25-kHz fleet relay channels
(Ch 2-10), 12 Air Force 5-kHz channels (Ch 11-22) and one
wideband, 500-kHz channel (Ch 23). All channels are UHF uplink
and downlink.
Tactical circuits that are supported by UHF SATCOM include halfduplex voice (2.4 kbps) and data (2.49.6 kbps), point-tomultipoint broadcast (one way) data (2.49.6 kbps), and various
intelligence and special user circuits.
Two NCTAMS and two NCTS are primarily responsible for Naval UHF
SATCOM:
NCTAMS LANT, Norfolk VA
NCTS Naples, Italy
NCTAMS PAC, Wahiawa HI
NCTS Guam, Finegayan Guam
USJFCOM UHF SAR procedures are available at the Global SATCOM
Support Center SIPRNET web page. The current URL is
http://strat.afspc.af.smil.mil/GSSC/default.aspx:
The UHF satellite constellation and capabilities are depicted in
Figure 5-2 and Table 5-1.
5-18
NTP 4(E)
UNCLASSIFIED FOR OFFICIAL USE ONLY
30
30
60
90
East
180
SATELLITE
90
West
LOC
SATELLITE
90
East
LOC
UFO-6
105W
UFO--7
22.5W
FSC-7
100E
UFO-2
29E
FSC-8
15.5W
177W
UFO-8
172E
UFO-10 / UFO-11
72E
UFO-4
100W
UFO-5
180
Figure 5-2
UHF Satellite Constellation
Satellites
UFO-2
UFO-4, 5,
6
UFO-7
Channels
5-kHz 25-kHz
21
17
21
17
21
17
UFO-8, 10
21
17
UFO-11
25
19
Table 5-1:
Capabilities
UHF
UHF, EHF (E) Subsystem (11
Channels)
UHF, Enhanced EHF (EE) Subsystem
(22 Channels)
UHF, Enhanced EHF, Global Broadcast
System (GBS)
UHF, EE, GBS
UFO Capabilities
5-19
NTP 4(E)
5.2.3 SUPER-HIGH FREQUENCY (SHF) DEFENSE SATELLITE
COMMUNICATIONS SYSTEM (DSCS)
SHF DSCS provides tactical commanders and warfighters seamless
and robust access to the DII/DISN for improved C4ISR support as
well as enhanced communications interoperability with other U.S.
forces operating in a Joint tactical environment.
The SHF SATCOM terminal AN/WSC-6(V)5/7/9 is designed for use on a
variety of fleet platforms and provides single or dual channel
access to the DSCS and WGS. Single channel access supports plain
old telephone system (POTS) and DISN access. The single channel
system aboard ship utilizes a dual or single antenna system to
provide a clear view of the satellite.
SHF SATCOM interface to shipboard systems is accomplished through
the use of various multiplexers and the ADNS. This same
infrastructure is provided ashore for interfacing the shore
network.
Obtaining SHF Satellite access.
Processes and Satellite Access Request (SAR) formats are
available at the Global SATCOM Support Center (GSSC) and Regional
SATCOM Support Center (RSSC) SIPRNET web sites.
GSSC: http://strat.afspc.af.smil.mil/GSSC/default.aspx
RSSC CONUS:
http://strat.afspc.af.smil.mil/GSSC/CONUS/default.aspx
RSSC PAC :
http://strat.afspc.af.smil.mil/GSSC/PAC/default.aspx
RSSC EUR :
http://strat.afspc.af.smil.mil/GSSC/EUR/default.aspx
5-20
NTP 4(E)
5.2.4
Figure 5-3
CWSP Architecture
5-21
NTP 4(E)
Figure 5-4
CWSP Satellite Coverage
5.2.5
CBSP and the Navy Multi-band Terminal (NMT) are the two high data
throughput Navy SATCOM programs for wideband SATCOM in the
future.
CBSP was approved in March 2007 as a Rapid Deployment Capability
(RDC) program. It replaces the Commercial Wideband Satellite
Program (CWSP) and International Maritime Satellite (INMARSAT)
High Speed Data (HSD) program FY07 to FY13.
The current CBSP requirements includes195 terminals, 118 of which
are funded FY08 through FY13. The remaining 77 terminals and any
additional requirements (e.g., Command ships, Hospital ships,
Submarine Tenders, and Military Sealift Command (MSC) ships,
etc.) will be addressed in POM-10 budget process.
The threshold for Unprotected Wideband SATCOM (SHF, EHF, and
Commercial) space segment in the Fleet includes:
1. Small ships: 0.881 Mbps
5-22
NTP 4(E)
2. Unit level ships:
3. Force level ships:
3.6 Mbps
21.4 Mbps
5-23
NTP 4(E)
satellite will provide services to 70 north latitude. X-band
services will augment services provided by DSCS III satellites.
The Ka-band services will augment broadcast service provided by
GBS payloads on UFO satellites and also support two-way network
services besides broadcast. Additionally, WGS satellites will
support services that require cross-banded connectivity: X-band
uplinks to Ka-band downlinks and Ka-band uplinks to X-band
downlinks. All WGS satellite configurations will be of a
functionally identical design within each orbital position. A
total of 6 WGS satellites are planned for launch with WGS-1
already on-orbit in testing (Dec 07) and the launch of the final
WGS Satellite (WGS-6) planned for late 2012.
WGS-1
WGS-5
WGS-4
175
135
150 E
WGS-6
104
60 E
12 W
WGS-
WGS-3
Figure 5-5
WGS Coverage
The WGS satellites will support a variety of network topologies
that include broadcast, hub-spoke, netted, and point-to-point
connectivity. Limited protection against jamming or interference
will, in general, only be possible for those communications
networks that employ modems with modulation schemes capable of
providing protection against jamming. In certain situations, gain
discrimination that may be inherent in the design and emplacement
5-24
NTP 4(E)
of the WGS satellite antenna patterns may also provide some
measure of protection against jamming and interference sources
located at various distances from friendly forces.
The WGS satellites will support Ka-band terminals located in
several narrow coverage areas and in at least one expanded narrow
coverage area. The WGS satellites will provide two-way and
broadcast services within narrow coverage areas to deployed
tactical forces in theater as well as to fixed gateways,
broadcast injection sites, satellite control sites, and out-oftheater tactical users such as air bases and Naval Strike Groups.
The expanded narrow coverage area is several times larger than
the narrow coverage area.
5.2.7 EXTREMELY HIGH FREQUENCY (EHF) SATELLITE COMMUNICATIONS
(SATCOM)
EHF SATCOM provides Joint interoperable Low Data Rate (LDR) and
Medium Data Rate (MDR) Low Probability of Intercept (LPI) / Low
Probability of Detection (LPD) and anti-jam communications
capability for naval warfighters in submarines, ships, and shore
commands.
EHF has a very short wavelength and signals can be affected by
rain. EHF SATCOM is generally operated as:
1. Simplex
2. Half Duplex
3. Full Duplex
Simplex is defined as a communications link that operates in one
direction only. AM/FM radio, as well as Fleet Broadcast, and
Global Broadcast System (GBS) are examples of Simplex
communications.
Half Duplex means that the exchange of information can occur in
either direction, however, only one can transmit at a time. The
best example of Half Duplex communications is on a radio
telephone (RT). One station will transmit a message and end the
transmission with a proword of Over or Out, thus notifying other
stations that it is OK to transmit.
Full Duplex indicates that communications can occur in both
directions, simultaneously between two stations. A standard
telephone is an example of Full Duplex communications links.
The effective Concept of Operations (CONOPS) for Naval
Communications via the Extremely High Frequency (EHF) Military
Satellite Communications (MILSATCOM) System provides amplifying
and up-to-date information on the Navys use of EHF
communications systems and services.
5-25
NTP 4(E)
The Navy EHF SATCOM Program (NESP) AN/USC-38 Variant (V) terminal
is the Navys segment of the Joint Military Strategic and
Tactical Relay (MILSTAR) program. It provides Navy units with
networked, point-to-point or broadcast connectivity through:
1. Three UHF Follow-on (UFO)/ E (EHF) satellites (UFO/E 4, 5
and 6).
2. Four UFO/EHF Enhanced (EE) satellites (UFO/EE 7, 8, 10 and
11).
3. Three Interim Polar Satellites (IPS).
4. Two Milstar Block I LDR satellites (FLT 1 and 2).
5. Three Milstar Block II MDR satellites (FLT 4, 5 and 6).
Future improvements include Advanced EHF (AEHF) system capable of
75 bits per second (bps) to 8.2 mega bits per second (Mbps) data
rates with a total satellite capacity of 400 Mbps, submarine
report-back encryption, automated satellite handover, and
Enhanced Polar System (EPS).
EHF Capability Requirements:
1. Must provide CORE and HARD CORE communications.
2. Must be Anti-Jam.
3. Must be LPI/LPD (available for use during Emission Control
(EMCON).
4. Nuclear event detectable and survivable.
5. LDR (75 2400 bps).
6. MDR (4.8 bps 1.544 Mbps).
7. Capable of netted, broadcast and point-to-point
communications (voice, data, TTY and facsimile).
8. Joint interoperable.
Space Segment:
There are presently 14 geosynchronous satellites worldwide that
support the EHF SATCOM system. In addition to the five Milstar
satellites there are seven UFOs (UFO 4, 5, 6, 7, 8, 10 and 11)
and two IPS. The third IPS will launch in the near future in
support of Polar EHF communication requirements. These
satellites have Satellite Resource Controller (SRC) computers
onboard that dynamically process the uplink signals from all
terminals communicating and produce downlink signals for each
beam so every terminal receives the appropriate communication
5-26
NTP 4(E)
service. The SRC also furnishes downlink synchronization signals
for use by terminals to acquire, logon and track the satellite in
time and space.
Milstar System Description:
Milstar is a military satellite communications system that
provides the Department of Defense and military in the field with
reliable, secure, LPI/LPD, anti-jam, and survivable
communications between fixed-site, mobile, and portable
terminals. Functionally, Milstar consists of three segments: the
Space Segment, Mission Control Segment (MCS), and the Terminal
Segment.
Milstar Blocks I and II provide world-wide connectivity from 65
degrees South latitude to 65 degrees North latitude using
crosslinking capabilities and a variety of antennas and coverage
patterns with data rates from 75 bps to 1.544 Mbps.
5.2.7.1
MILSTAR
The Air Force is designated the System Manager for Milstar and
has designated Air Force Space Command (AFSPC) as the Milstar
Satellite System Expert (SSE). As SSE, AFSPC controls operations
and communications payload management, supports the Milstar
program with manpower,
equipment, training,
and facilities from
th
th
Space, Air Force 50 Space Wing and the 4 Satellite Operations
Squadron (4SOPS). Facilities include the Milstar Satellite
Operations Center (MSOC), the Constellation Control Station
(CCSs), the Satellite Operations Center (SOC), and the Milstar
Support Facility (MSF).
Together, these Milstar managers are responsible for providing
survivable, enduring, minimum essential command and control
communications through all levels of conflict for the President
of the United States, Secretary of Defense, and warfighting
Combatant Commanders (COCOMs) worldwide. MSOC is the Controlling
Authority for Milstar Transmission Security (TRANSEC) keys.
The Terminal Segment
The AN/USC-38 Variant (V) series LDR/MDR is the Navys EHF
terminal under the Navy EHF Satellite Program (NESP) Program of
Record (POR). It is packaged into three equipment groups:
1. High Powered Amplifiers (HPA)
2. Communications Equipment Group (CEG)
3. Antenna Pedestal Group (APG)
Table 5.2 lists all the AN/USC-38 configurations utilized by the
U.S. Navy.
5-27
NTP 4(E)
Nomenclature
AN/USC-38(V)1
AN/USC-38(V)2
AN/USC-38(V)3
AN/USC-38(V)4
Antenna Size
5.5 inch
34.5 inch
6 ft
34.5 inch
AN/USC-38(V)5
54 inch
AN/USC-38(V)6
6 ft
AN/USC-38(V)7
10 ft
AN/USC-38(V)8
AN/USC-38(V)9
5.5 inch
54 inch
AN/USC-38(V)10
AN/USC-38(V)11
10 ft
5.5 inch and 16.25
inch
16.25 inch
16.25 inch
AN/USC-38(V)12
AN/USC-38(V)13
Abbreviated Name
Sub LDR
Ship LDR
Shore LDR
Ship LDR/MDR
Appliqu
Ship
LDR/MDR Appliqu
Shore
LDR/MDR Appliqu
Shore
LDR/MDR Appliqu
Sub HDR Appliqu
Ship MDR Follow-on
Terminal (FOT)
Shore MDR FOT
SUB HDR FOT
SUB HDR FOT
SUB HDR FOT
1
6
1
2
5-28
NTP 4(E)
coverage over the FOV of the satellite, but on a time/location
shared basis.
Milstar LDR spot beams are similar to others discussed, except
they are narrower. Spot beams A and B are 1 wide (350 nm at
nadir) and spot beam C is 1.7 wide (600 nm at nadir).
Milstar I satellites have 144 EHF LDR channels available for user
communications services. These channels are distributed among
the antennas to promote maximum resource efficiency. Table 5.3
depicts Milstar I LDR channel to beam assignments.
BEAM
Earth
Coverage
Spot A
COMM CHNLS
32 channels
Spot B
16 channels
Spot C
32 channels
Downlink
Agile
0 channels
16 channels
BEAM
High Hop Rate
Agile
Low Hop Rate
Agile
Reportback
Agile
Acquisition
Agile
CINC Agile
COMM CHNLS
4 channels
4 channels
36 channels
0 channels
4 channels
Table 5-3
Milstar I LDR Channel-to-Beam Assignments
Milstar Block II (LDR/MDR):
FLT 4, 5 and 6 satellites have all the same LDR and crosslinking
features of Block I satellites with an additional MDR payload
added to support higher data rate communications. Since Block II
satellites have the same LDR payload as Block I satellites, beam
coverage options are identical for Milstar II LDR payloads.
The MDR payload has a separate set of eight antennas dedicated to
that payload. These antennas are all 1 wide (350 nm at nadir)
and capable of simultaneous transmit and receive operation. Two
of the eight beams are designated Nulling spot beams (NSBs), and
have higher Effective Isotropic Radiated Power (EIRP), therefore
provide better downlink margins. NSBs have the capability to
detect uplink jammers and will automatically produce nulling
patterns within the area of coverage in order to defeat jamming
signals. The nulling action effectively creates a hole in the
coverage pattern so that energy coming from a terrestrial jammer
cannot reach the uplink channel on the payload.
The other six antennas are designated Distributed User Coverage
Antennas (DUCAs) and have a 2 downlink beam coverage area
approximately 800 miles in diameter. DUCAs have no nulling
capability.
5-29
NTP 4(E)
When used individually, the area supported by a NSB or DUCA is
referred to as a Medium Service Area (MSA). The coverage of two
NSBs or DUCAs can be combined to form a Wide Service Area (WSA).
Full Service Area (FSA) coverage, normally provided by an EC beam,
is not available on the EHF MDR payload. Users may, however, log
onto the satellites EHF LDR payload via any of its beams and
request MDR spot beam repositioning in order to log onto and
communicate via the MDR payload.
Milstar II satellites each provide 32 MDR channels distributed
among eight MDR antennas. Table 5.4 shows the default channelto-beam configuration for MDR payloads.
Channel Group A
Beam
Channels
DUCA A1
4
DUCA A2
1
DUCA A3
1
NSB A
10
Channel Group B
Beam
Channels
DUCA B1
4
DUCA B2
1
DUCA B3
1
NSB B
10
Table 5-4
Milstar II MDR Channel-to-Beam Assignments
EHF MDR protocol supports up to a T-1 data rate (1.544 Mbps).
Throughput being a function of gain calculations (primarily
determined by antenna dimensions) means not all terminals will be
capable of utilizing MDRs maximum potential. What MDR lacks in
signal robustness (compared to EHF LDR), it more than makes up
for in data rates: 4.8, 9.6, 16, 19.2, 32, 64, 128, 256, 512,
1024, and 1544 kbps, with up to 128+ kbps for protected systems.
EHF MDR broadcast service does not include the ability to cross
band the fleet broadcast to UHF. Three MILSTAR II satellites
(Flights 4, 5, and 6) provide the space segment MDR capability.
The current connectivity for large and small deck ships is based
on a hub-spoke ADNS architecture, with the hub being at the NOC
and the spokes being individual 128 kbps circuits to MDR-equipped
platforms. The hub consists of an ADNS router with 12 high-speed
serial ports. Although the router supports 12 ports, only enough
cryptographic assets are installed to support 10 circuits.
The ADNS connectivity via EHF MDR is installed at four shore
sites:
1.
2.
3.
4.
NCTAMS
NCTAMS
NCTAMS
NCTAMS
LANT
PAC
EURCENT
Bahrain.
The remaining MDR capacity is used for ship-ship links (e.g., VTC)
or Strike Group voice networks (e.g., advanced narrowband digital
voice terminal (ANDVT)). EHF MDR is available to all naval
command ships including CTF command ships (LCCs and AGFs), SG
5-30
NTP 4(E)
command ships (CVs and CVNs), and ESG command ships (LHD, LHA,
and soon LPD 17), as well as all TOMAHAWK platforms (DDG and CG).
UNCLASSIFIED FOR OFFICIAL USE ONLY
30
30
60
90
East
180
90
West
0
SATELLITE
90
East
SATELLITE
LOC
MILSTAR 1
39W
MILSTAR 5
30E
MILSTAR 2
150W
MILSTAR 6
90W
MILSTAR 4
152E
180
LOC
Figure 5-6
MILSTAR EHF Constellation
UFO/E and UFO/EE:
UFO/E and UFO/EE payloads provide one EC and one spot beam
antenna, each capable of simultaneous transmission and
reception. The EC beam is fixed and useable over the satellites
FOV of the earth, subject to degraded performance at the beams
edge. The spot beam is 5 wide (approx. 1700 nm at nadir) and is
steerable over the satellites FOV of the earth.
UFO/E and EE throughput is limited to LDR. The UFO E and EE
payloads differ slightly in their respective capacities. UFO/E
payloads 4-6 have 11 EHF LDR channels available for
communications; seven assigned to the spot beam and four to the
5-31
NTP 4(E)
EC beam. This channel configuration cannot be changed nor
switched between beams. UFO/EE payloads each have 20 EHF LDR
channels available for user communications; sixteen in one group
and four in another. These channel groups can be switched
between the spot and EC beams in order to meet requirements.
That is, 16 channels may be assigned to the spot beam and 4
channels assigned to the EC beam or vice versa. Additional
information on UFO/E and UFO/EE operations and communications can
be found in the current CONOPS.
UNCLASSIFIED FOR OFFICIAL USE ONLY
30
30
60
90
East
SATELLITE
180
90
West
90
East
LOC
SATELLITE
LOC
UFO-4
177W
UFO-7
22.5W
UFO-5
100W
UFO-8
172E
UFO-6
105W
UFO-10 / UFO-11
180
72E
Figure 5-7
UFO EHF Constellation
5.2.7.2 INTERIM POLAR SYSTEM (IPS):
Mobile forces which deploy to the northern latitudes require
SATCOM connectivity for command and control among the deployed
forces and connectivity with the headquarters elements located in
the mid-latitude regions.
5-32
NTP 4(E)
The Polar EHF system provides EHF communications supporting
mission essential command and control requirements above 65
north latitude. As with other MILSATCOM systems, the Polar EHF
system includes the space segment, terminal segment, and control
segment.
Space Segment:
The polar orbiting satellites and associated EHF communications
payloads comprise the space segment for the Polar EHF system.
Polar satellites are provided and maintained by a (classified)
Host agency of the Federal Government. Each of these satellites
circles the earth in an inclined Highly Elliptical Orbit (HEO),
commonly referred to as the Molniya orbit.
Orbital Considerations:
The Molniya orbit is not typical of other EHF satellites which
are in geosynchronous orbits over the equator. Geosynchronous
satellites have the advantage of being synchronized with the
earths rotation so that they appear as fixed objects in the sky
to earth terminals. Therefore, precise terminal tracking is not
usually an issue with geosynchronous satellites. A Molniya orbit
is quite different, requiring very precise tracking as the
satellite rises and sets over the horizon. It is an egg-shaped
orbit inclined approximately 63.4 to the equator with a high
apogee over the northern hemisphere and a low perigee over the
southern hemisphere. Basic characteristics of the Molniya orbit
are illustrated in Figure 3-1. Molniya, which means "lightning"
in Russian, was the name of the first Russian communications
satellites to use it. In this type of orbit, the satellite makes
one revolution around the Earth approximately every 12 hours,
providing two periods of usable
apogee
coverage per day. The satellite
swings low and fast over the
southern hemisphere and then
slows as it rises toward its
apogee in the northern hemisphere,
making it appear to "hover" in
approx. 24,400 miles
the sky over northern territories
for long periods of time. This
characteristic, in particular,
makes the Molniya orbit well
suited for communications
services in the high-latitude
63.4 deg.
areas.
equator
Polar coverage is defined as the
geographic region of the earth
perigee approx. 350 miles
above 65 north latitude. Some
locations below 65 will have
access to Polar EHF payloads for
short periods, depending on the specific orbits chosen by the
Host satellite provider.
5-33
NTP 4(E)
Figure 5-8 shows approximate coverage for the two-satellite
constellation. Actual orbital parameters of the host satellites
may move this coverage pattern to the left or right.
90 N
60 N
30 N
30 S
13-15 hrs.
15-24 hrs.
0-15 hrs.
60 S
90 S
180
150 W
120 W
90 W
60 W
30 W
30 E
60 E
90 E
120 E
150 E
180
Figure 5-8
Approximate Polar EHF Coverage (Two Satellites)
Two Satellite Beams. Two steerable satellite beams are available
to support EHF user communications: An 18 steerable earth
coverage (EC) beam and a 5 steerable spot beam. The motors used
for pointing each beam will be deactivated at the end of each
seven-hour operations period. When the payload is reactivated at
the beginning of the next operations period, both beams will
automatically point to their last commanded position. Figure 5-9
depicts the approximate coverage provided by both beams at
satellite apogee (both Atlantic and Pacific apogees shown).
EC Beam. The 18 EC beam covers an area approximately 10,000
miles across. Unlike the EC beams on the equatorial EHF
payloads, the EC beam on the Interim Polar system is gimbaled so
that it can be steered to a point on the earths surface by the
payloads T&C terminal. As the satellite travels throughout its
orbit, the EC beam remains pointed at its designated latitude and
5-34
NTP 4(E)
longitude. Terminals within the ECs 10.6 center will have
better link margins (both uplink and downlink) than if they were
operating on the edge of the beam.
Spot Beam. The 5 spot beam covers an area approximately 1,800
miles in diameter and can be repositioned to any point in the
field of view on the earths surface by the user designated as
the spot beam controller. As each satellite moves through its
orbit, the spot beam will remain pointed at its assigned
location. The spot beam provides increased signal gain for both
transmit and receive of approximately 6 - 10 dB over that of the
EC. Terminals operating in the 3.2 center of the spot beam will
receive improved link margins on both the uplink and the downlink
with reference to edge of beam operations.
60
-90
Spot Beam
(pointed at 0 deg E/W, 70 deg N)
5 degree edge
3.2 degree center
60
-90
30
30
-60
-60
0
-30
-30
Figure 5-9
Approximate EC and Spot Beam Coverage
IPS provides one EC and one 5 degree spot beam, each capable of
simultaneous transmission and reception. Additional information
on IPS EHF operations and communications services can be found in
the current IPS CONOPS.
5.2.7.3 EHF TIME DIVISION MULTIPLE ACCESS (TDMA) INTERFACE (TIP)
Navy TIP is a second-generation controller which offers users a
dynamic networking capability over the protected EHF medium. TIP
offers protected internet protocol (IP) networking support to the
strike groups and ships that do not have IP connectivity via
other SATCOM systems. Operating as an ETHERNET bridge, TIP
extends IP Ethernet among TIP sites over EHF Medium Data Rate
(MDR), Half-duplex, netted services forming a virtual Local Area
Network (LAN).
5-35
NTP 4(E)
EHF resources are limited, thus TIP networks make efficient use
of these resources. Bandwidth is shared dynamically among all
strike group platforms in a netted environment under shared
beams. Networks consist of a configuration of subnets and
supernets which provide ship-to-ship and ship-to-shore
communications thereby giving ships access to shore-based
servers.
Each Fleet Commander directs TIP operations within their Area of
Responsibility by promulgation of TIP Concept of Operations
and/or a Standard Operating Procedure. Specific TIP network
configurations are outlined in the Fleet Commanders current or
effective EHF Service Plan.
TIP operations for ships and navy shore commands which involve
Department of Defense (DOD) teleport sites will be covered by
separate instructions.
5.2.7.4
EHF SYSTEMS/SERVICES
The below systems are used by the Navy and interfaces with the
EHF architecture. Specific and detailed information on these
systems can be found in the Extremely High Frequency (EHF) Low
Data Rate (LDR) and Medium Data Rate (MDR) System Users Handbook,
at the Naval Network Warfare Commands website,
(http://sgeminii.spawarchas.navy.smil.mil/C4I_GlobalStatus/GlobalStatus.aspx).
5.2.7.5
NTP 4(E)
communications planner will submit an AAR upon completion of an
EHF mission. The AAR will be transmitted via official message
traffic. An example of an AAR can be found on the numbered fleet
CAS sites.
USJFCOM has a web page for information regarding EHF satellite
communications at www.jfcom.smil.mil/satcomops.
5.2.8
5-37
NTP 4(E)
gateways that interconnect the Iridium satellite network with the
various terrestrial Public (and private) Switched Telephone
Networks (PSTN) and cellular telephone systems throughout the
world.
DISA has contracted with Motorola to provide EMSS services to DoD
and other federal agencies. Provisioning EMSS equipment and
services will be accomplished through DODs process for procuring
telecommunications services and is managed by the Defense
Information Technology Contracting Organization (DITCO). The
requester is responsible for completing the approval actions as
specified in the Service/agency EMSS approval procedures. Iridium
provides:
1. One full duplex channel capability for small platforms,
subs, mobile, littoral, or shore/beach units secure or
unsecure voice.
2. Unsecure data/Internet up to 10 kbps.
3. True global coverage (90 N to 90 S).
4. Small battery-operated handheld terminals and shoeboxsized shipboard terminals.
5. 8-inch omni-directional antenna.
6. L-band.
7. Secure capable system.
8. NSA certified type 1 crypto module.
9. Data capable 2.4 Kbps ISP dial-up or up to 10 kbps direct
Internet connection.
Figure 5-10
Iridium Space Segment
5-38
NTP 4(E)
Figure 5-11
Iridium ground architecture
5.2.9 INMARSAT HIGH SPEED DATA
The Inmarsat HSD system continues to be a critical communications
path for SIPRNET, NIPRNET, and telephone ship-to-shore access for
all Navy ships less the CV/CVN/LHA/LHD/AGF and LCC classes. This
multipurpose SATCOM system provides both simultaneous voice and
IP data up to 128 Kbps. By providing access to the DoD
unclassified and classified IP networks, all ships of a Strike
Group become participants in a WAN that enables real-time
collaborative planning and significantly improved unit SA and
group C2. In addition, it supports quality of life communications
supporting voice and e-mail exchange between Sailors at sea and
friends and family ashore.
The Inmarsat program augments MILSATCOM systems to provide added
capacity for fleet voice and data services. The program provides
for leases of commercial Inmarsat satellite channels and
procurement and fielding of Inmarsat terminals and ancillary
equipment to enhance the leased service. In addition, the program
accommodates the lease of necessary terrestrial connectivity
between Navy hubs (NCTAMS, NCTS San Diego, NCTS Bahrain) and the
commercial Stratos Mobile Networksowned Earth terminals in
Canada, the Netherlands, and New Zealand.
The Inmarsat terminals operate in the UHF L-band via the
geostationary Inmarsat satellite constellation, enabling pointto-point voice, facsimile, and data. The Inmarsat-B terminal is
5-39
NTP 4(E)
based on digital technology and provides digital voice at 16
Kbps, data and facsimile up to 9.6 kbps. The Navys primary fleet
implementation of Inmarsat utilizes a built-in digital modem with
capability up to 128 Kbps.
As part of IT-21 requirements, Inmarsat-B HSD multiplexers
(AN/FCC-100(V)9s) have been procured and installed in conjunction
with leasing dedicated full-time 128kbps channels. Multiplexers
and other equipment have also been installed at the Navy hubs to
support Inmarsat HSD. The multiplexers are reconfigurable and
support variable voice/data rates up to 128 Kbps aggregate,
including voice (nominally 3 official lines and one for
unofficial Navy Exchange Command (NEXCOM)supported afloat
personal telephone service (APTS), and a data link for NIPRNET,
SIPRNET, and JWICS at a nominal data rate of 32 Kbps). A summary
of Inmarsat capabilities include:
1. Worldwide coverage (as shown in Figure 5-12)
2. Narrowband point-to-point voice, fax, and data
3. Inmarsat-B HSD single system = 64 Kbps; enhanced system =
128 Kbps
4. SIPRNET, NIPRNET, and JWICS 32 Kbps
5. Voice channels (dial tones are at San Diego, Norfolk, and
Hawaii)
6. Three official lines: 9.6 Kbps STU III, 9.6 Kbps, and 4.8
Kbps
7. NEXCOM APTS: 4.8 Kbps
Note: The Enhanced systems are capable of full 128 Kbps
operation or drop down to 64 Kbps.
Procedures for requesting INMARSAT access can be found in GCIB
9A, located on each of the NCTAMS SIPRNET web sites.
5-40
NTP 4(E)
30
30
60
90
East
SATELLITE
ATLANTIC AOR-E
180
LOC
25E
90
West
CAPACITY
SATELLITE
17 LEASES
PACIFIC AOR
142W
19 LEASES
ATLANTIC AOR
98W
19 LEASES
90
East
180
LOC
CAPACITY
109E
*6 LEASES
JAPAN AOR
143E
6 LEASES
*67 Worldwide Lease Channels 01 Jan 31 Dec 07 (including 1 FMS channel on 109E)
Figure 5-12
INMARSAT Constellation
5.2.10
5-41
NTP 4(E)
Mobile force elements, free from restrictive large fixed
terminals, can receive information formerly available only to
command centers. Current GBS technology can support data rates
between 1.544 Mbps and 45 Msbps (Mega-symbols per second)
depending on satellite capability, but can transmit at lower data
rates to support disadvantaged users or to compensate for
environmental conditions. Each satellite that supports GBS will
be serviced by an SBM and PIP or a TIP. GBS relies on DISN
transport capabilities to relay information from national and
theater information sources to the SBM for broadcast injection
via a PIP. In order to access WGS satellites, the plan is for
GBS SBMs to integrate with the DOD Gateways. The Gateway will
provide digital video broadcast (standard) technology via the
current force Digital Video Broadcasting over Satellite (DVB-S)
IP MODEM and the Joint IP MODEM hub supporting deployed users
with GBS RSs and transmit-receive VSAT suites. This integration
will provide complementary access to tailored information content
via UFO/G, WGS, and commercial augmentation satellites. Since
GBS enables the storage, retrieval, and dissemination of large
information files that could quickly exceed the capability of
most mobile users, the tailoring of the Smart Push and User
Pull dissemination architecture for GBS is a significant
challenge. This capability is being addressed through several
initiatives such as the Information Dissemination Program within
the DoD Net Centric Enterprise Services (NCES) Program.
A fundamental feature of GBS is the BMS. The BMS retrieves,
accepts, coordinates, and (if required) packages information such
as general broadcast products, Smart Push products, and User
Pull products. The required information is gathered from both
national and theater sources for broadcast based on the direction
and priorities identified by their respective COCOMs and their
functional users. The BMS also performs any additional functions
necessary to support the efficient use of GBS. These functions
include, but are not limited to managing space segment coverage
and capacity sharing, providing interface protocols and standards
designed to allow information providers to submit information in
a form acceptable by the GBS broadcasts, and coordinating with
the COCOM TIM cells to apply COCOMs priorities.
Figure 5-13 illustrates a conceptual GBS architecture. The major
operational elements of the GBS architecture are: users,
information providers, TIMs, SBMs, PIPs, TIPs, RSs, and
satellites. Conceptually, the architecture is the same using
UFO/G satellites, WGS satellites, or commercial augmentation
satellites.
5-42
NTP 4(E)
Figure 5-13
Conceptual GBS Architecture
The Pacific GBS SIPRNET site (https://info.gbspacom.navy.smil.mil/) provides guidance and information for users
in the PACOM region.
The Atlantic GBS SIPRNET site (http://207.85.158.53/ip_rbm.htm)
provides guidance and information for users in the Atlantic
Region.
The GBS system is broken down into three physical entities:
Transmit Suites (TS), Receive Suites (RS), and Satellites. The TS
includes a Satellite Broadcast Manager (SBM) and an Injection
Terminal. The Fixed Transmit Suite is an SBM and one or more
Primary Injection Points (PIP)s (either collocated or remote),
and may include an Extremely High Frequency (EHF) Follow-onTerminal (FOT). The Theater Injection Point (TIP) includes a
Transportable Theater Injection (TTI) and a Theater Satellite
Broadcast Manager (TSBM). An RS includes a Receive Terminal (RT)
5-43
NTP 4(E)
(any type) and a Receive Broadcast Manager (RBM). These physical
entities are comprised of the following three functional segments:
The Broadcast Management Segment, the Terminal Segment, and the
Space Segment.
The Broadcast Management Segment consists of the following
elements: SBM, Theater Satellite Broadcast Manager (TSBM), and
the RBM. The Terminal Segment consists of the following
elements: PIP, the TTI, the Fixed Ground Receive Terminal (FGRT),
the Transportable Ground Receive Terminal (TGRT), the Shipboard
Receive Terminal (SRT), the Sub Surface Receive Terminal (SSRT),
the Airborne Receive Terminal (ART), and the Manpack Receive
Terminal (MRT). The Space Segment consists of the following
elements: four UHF Follow On (UFO) transponders per UFO/GBS
satellite (UFO 8, & 10), leased commercial transponders and four
equivalent GBS "transponders" on the three Wideband Gapfiller
satellites. The SBM/TSBM function will build the broadcast data
streams, manage the information flow to the appropriate injection
point(s) and modulate the uplink carrier for transmission to the
satellite(s). Together the SBM/TSBM and PIP/TTI make up a TS/TIP.
The RBM functions are to accept and demodulate the downlink
signal from the Receive Terminal and support the dissemination of
information to the end users. Together the RBM and RT make up an
RS. The transmit segment of the GBS system includes both fixed
and transportable uplinks. The fixed version of this segment PIP
provides the collection of data from the DISN, scheduling of the
broadcasts, and transmitting of the broadcasts to the space
segment. The transportable version of the transmit segment
(transportable injection point) will provide theater commanders
the capability to transmit theater information directly to
forward users or rear areas to augment the information in the PIP
broadcast. The transmit segment will be fitted with equipment to
support multiple frequency bands allowing operation with both
military and commercial satellites.
GBS supports the National Military Strategy (NMS), including
operations with Allies or Coalition forces. In support of NMS, o
using UFO/G and WGS satellites, GBS provides coverage between 65
North latitude to 65o South latitude. GBS is not designated as a
protected system (per Advanced MILSATCOM Capstone Requirements
Document [CRD] dated April 1998). If the users require protected
or anti-jam communications, then they should seek other media
methods and should only use GBS as a secondary delivery means.
GBS provides broadcast services to selected echelons through a
layered or scaleable architecture. This architecture compensates
for differences in security classification levels, classes of
users, and the ways in which users receive information products.
Depending on the needs, RS equipment supports a variety of user
configurations ranging from stand-alone operations to network
integration. Figure 5-14, provides the high-level operational
concept for GBS. The numbers in the diagram indicate activities
required between various elements that make up the GBS system.
5-44
NTP 4(E)
Figure 5-14
GBS Concept of Operations Overview
TIMs determine and prioritize candidate broadcast content and
coordinate with information providers.
Each TIM documents its information requirements and priorities in
databases managed by the BMS, represented here by the SBM. This
deliberate planning process identifies all Smart Push products,
authorizes User Pull criteria, and is the basis for beam
planning.
Information intended for broadcast is transferred to content
storing at the SBM where information is broadcast based upon
priorities and beam coverage.
The SBM builds unique broadcast streams for current satellite
coverage areas and delivers broadcast streams directly to a PIP.
PIP converts one or more broadcast streams into separate RF
broadcast injection signals to the satellites that are supporting
5-45
NTP 4(E)
GBS operations.
The satellite receives and amplifies the uplink signal and
retransmits to a designated downlink coverage area for one or
multiple users.
Each RS processes the satellites downlink. RF signal and the
RBM determine which information products are for its assigned or
supported users and separate the information products into
different security enclaves and media types.
RSs deliver the broadcast information through various physically
separated security enclaves to attached LANs, where the
information is made useful by end-user applications.
Users must use existing connectivity capabilities in order to
identify specific ad-hoc information needs for inclusion in the
broadcast as User Pull. These requests may go either directly
to information providers for direct satisfaction or to the TIM
for approval and then to the SBM for GBS-managed inclusion.
User Pull responses are either single user or COI broadcasts to
multiple users.
Alternatively, specially equipped RSs lacking other means for
User Pull connectivity may use a satellite return channel to
initiate User Pull requests.
When a TIP is deployed, some coordination is required between the
TIP and the SBM, such as transponder allocation times and beam
locations. Otherwise, TIP operations are autonomous and
independent of the SBM.
The TIP accepts information content from theater information
sources when it is operationally more effective or efficient for
direct broadcast rather than back-hauling from a SBM.
The TIP uses a Transportable Satellite Broadcast Manager (TSBM)
to manage generation of broadcast streams. The current TIP
implementation uses a Phoenix SATCOM terminal, previously
recognized as the Tactical Theater Injector (TTI), to inject and
convert the broadcast stream for RF transmission to corresponding
space segment resources (transponders).
The SBM determines how best to execute TIM dissemination
priorities and changes in the space segment coverage areas; the
SBM directs automated beam movement commands and restores
broadcast service after the new coverage is achieved. There are
two SBM capabilities that support these functions. The first is
direct command execution capability through SBM -dedicated
5-46
NTP 4(E)
extremely high frequency (EHF) terminals for Telemetry, Tracking,
and Commanding (TT&C) with the UFO/G payloads. The second is a
direct path to the Gapfiller Satellite Configuration Control
Element (GSCCE) located in Wideband SATCOM Operations Centers
(WSOCs) through the Objective Defense Satellite Communications
System (DSCS) Operations Control System Network (ODOCSnet) for
managing WGS space segment resources and coverage areas that have
been dedicated to GBS SBM management. The SBM will not have
direct command execution capability of WGS for shared WGS space
segment resources. Additionally, the current plan is to use the
Common Network Planning Software (CNPS) for WGS GBS planning and
resource allocation.
Specially equipped RSs may extend GBS delivery services across
wireless networks to user LANs.
The GBS IP architecture uses various types of implemented
broadcast services. These services provide the user with
different methods to receive products over GBS. The different
services are implemented through a spiral development approach
with additional capabilities added during each spiral. The five
most common types of services are: (1) Streaming Packet (with or
without source encryption); (2) IP-to-IP Video; (3) Immediate
File Delivery (IFD) (with or without metadata); (4) Mirrored
Services (SBM mirrored, source mirrored, or web mirrored); and(5)
Power Publisher;
1. Streaming Packet. IP packet streams are source encrypted
through the SBM. These packets require no visibility and no
intervention by the SBM. There are two options for this service:
Streaming Packet and Source Encrypted.
a. The Streaming Packet option allows any IP stream to be
sent to GBS users; this includes files, video,
multicast, and pre-encrypted streams.
b. The Source Encrypted option allows additional
classification levels to be supported using sourcehosted cryptographic devices. Except under special
circumstances, source encrypted information providers
are expected to use interoperable cryptographic devices
with that of the GBS RSs. The broadcast of
compartmented or above US SECRET releasable information
may use Keying Material (KEYMAT) management and
information-source encryption to restrict access.
Compartmented information providers (including Top
Secret [TS] Collateral, TS/Sensitive Compartmented
Information (SCI), and Coalition or Allied and non-DoD
releasable information) intending to use GBS must
manage content, priorities, and provide source
encryption of their information external to GBS
broadcast centers. These information providers shall
also use GBS prescribed and interoperable encryption
5-47
NTP 4(E)
and communications protocol standards which are
integrated with and tunneled through the broadcast.
2. IP-to-IP Video. In this service, multicast video streams are
received by the SBM and may be transcoded (converted to a lower
data rate) before being broadcasted over the GBS system. This
process also allows for broadcasting video with forward error
correction (FEC). The FEC supports recovery of lost streaming
packets at the RBM.
3. Immediate File Delivery. IFD allows the creation of unique
folders at the SBM associated with a COI. When products are
delivered to the folder these data files are queued up for
broadcast using a stored and forward methodology based on
available or planned spot beam coverage. Files are pushed from
the source over the DISN to the SBM or over tactical
communications to the TSBM. The files within the folder are then
queued and broadcasted based on their relative content priority
and available satellite resources. If the user is not within
satellite coverage when the product is delivered to the SBM and
the product is retained for future broadcast when the user is
under coverage. IFD programs can be paused during transmission
if another product (IFD or other delivery service) with a higher
mission precedence or content priority is activated. Upon the
completion of the transmission of the prioritized product, the
IFD resumes transmission until finished. IFD folders have a
product time-to-live, when exceeded the content is considered
stale and will not be broadcasted.
The IFD with metadata is an enhanced IFD service that allows
information providers or broadcast managers to monitor or
manipulate the progress of products in their assigned IFD
folders queue. Inquiries and commands permit estimating when a
product will be broadcast, changing the content priority ordering
of products in the queue, removing products from the queue,
pausing the queue, determining which users have satellite
coverage, and determining when a specific product was broadcast,
but does not report if actually received.
4. Mirrored Services. This service gives information providers
the capability to perform information push of their products to a
folder at the SBM or TSBM. SBM mirrored services provide the
means for the SBM folder's contents to mirror the contents of the
information source's folder files. As files are added or
modified in the mirrored folder at the SBM, the file is
immediately queued for broadcast. Before being broadcasted, the
individual files are packaged together rather than sent as a
large number of individual files. The entire folder is
rebroadcast when the full-stale-after time has expired as
recorded for each RBM. This full rebroadcast ensures automatic
cleanup of the mirror folder for each RBM and allows the RBM to
eliminate deleted files or correct otherwise unknown damaged
mirror content. All files are rebroadcast after each beam dwell.
If a file is deleted at the SBM, the file is also deleted at the
5-48
NTP 4(E)
RBM. Each individual RBM is tracked for differences in their
mirror based on available satellite coverage during packaging and
broadcast opportunities. The objective is for the SBMs folder
structure and content to be mirrored in the RBM's folder.
Source mirrored services are similar to mirrored services except
the source mirrored service allows the source to identify a
directory folder located on a source machine as the home of the
program content instead of a directory located at an SBM.
However, only full-stale-after broadcasts are accomplished;
individual RBMs are not tracked for differences in their mirror,
and incremental mirror updates are not supported. When the
full-stale-after clock expires the entire content of the mirror
source is brought to and held at the SBM for packaging and
broadcast as assigned user RBMs obtain satellite coverage.
Web mirrored services provide the means for website data to be
collected by the SBM who creates an internally linked web package
according to the crawl configuration parameters set up for the
program. The crawled files are made available to the end user
through a web browser interface. The crawl is a fully automated,
multi-threaded, file-retrieving web spider. Tools assist in
setting up the crawl configuration parameters by interactively
downloading a website, creating a mirror of the download,
searching the site for files of a certain type, and then
downloading a list of selected files and their Uniform Resource
Locator (URL). Once packaged for broadcast, the product is
queued and paused until designated RBMs, which receive the web
package, are available under satellite coverage. After each
full-stale-after has expired, a refresh occurs for the web
crawl, package, and queue for broadcast.
5. Power Publisher. This is a Transmission Control Protocol
(TCP) tunnel channel that provides greater control of source
content broadcasts. Registered products at the SBM or TSBM set
start and stop times and guarantee minimum bandwidth usage of the
channel. The information provider can send IP streams and files.
The data packets are passed directly onto the broadcast to
associate RBMs with satellite coverage, thus avoiding the latency
associated with saving files to an IFD folder. Unlike IFD, this
service does not use store-and-forward. Products are FEC encoded
at the source. Separate Power Publisher services must be
registered for each information provider on each transponder
used. The product performing this function must be certified in
accordance with National Security Telecommunications and
Information Systems Security Policy (NSTISSP) No. 11 and other
applicable IA policies.
Injection points uplink the broadcast stream to the satellite and
must be located within the satellites FOV. GBS allows for two
types of injection points: primary and theater. PIPs will be
tied to their respective SBM through appropriately sized
communications connectivity. This communications connectivity
5-49
NTP 4(E)
should meet the anticipated throughput requirements of the GBS
Phase 2 space segment (i.e., up to 4 transponders times 29.5 Mbps
[24 Mbps] per transponder for UFO/G and 4 regional broadcasts
times 45 Megasymbols per second [Msps] plus at least 2 theater
broadcasts [for TIP broadcast support] times 20 Msps per WGS
satellite). The PIP is the preferred method of injecting
broadcast streams. Theater-produced information should be
transmitted by available means to the SBM for broadcast via the
PIP, whenever possible. This creates a virtual injection from
theater.
The WGS system will enhance the overall GBS capacity and
coverage. For initial operations on WGS satellites, the SBM will
integrate with the WGS system by treating each WGS satellite
payload as if it were another UFO/G package in planning the
broadcasts. WGS satellite capacity will be shared among two-way
and broadcast users based on the validated requirements of the
supported COCOM/Service/Agency (CC/S/A).
Using the UFO/G satellites, two distinctive broadcast patterns
will provide coverage for a specific AOR. A broad area coverage
beam covers a large portion (approximately 2000 nautical miles
[nm]) of the AOR. A spot beam (also referred to as the Narrow
Beam [NB]) covers a smaller, more concentrated area
(approximately 500 nm). Figure 5-15 is a scaled depiction of
these coverage patterns.
Figure 5-15
Sample/Generic UFO/G Beam Coverage
UFO/G satellites have a GBS payload consisting of four
transponders, two uplink antennas (one fixed, pointed at the PIP,
and one steerable), and three steerable downlink antennas (two
5-50
NTP 4(E)
spot and one broad area coverage). Each transponder can be
connected to either uplink antenna (one at a time). For
downlinking, two transponders are connected to one spot beam
antenna. The third transponder is connected to the second spot
beam antenna. The fourth transponder can be switched between the
second spot beam antenna and the broad area coverage beam
antenna. Figure 5-16 illustrates this configuration.
Transponders
A
Spot
Fixed Uplink
Antenna
16-inch dish
Antenna
Switch
Steerable Uplink
Antenna
B
Spot
16-inch dish
Figure 5-16
UFO GBS Payload Configuration
Under COCOM direction and SBM control, downlink antennas on UFO/G
can be moved (pointed) to deliver the broadcast stream to
dispersed users across the satellites FOV. Antenna pointing may
take up to 10 minutes to complete. Several arrangements of
uplinks and downlinks are possible based on the needs of the
Warfighter. The following paragraphs are a few illustrations of
GBS support on UFO/G satellites:
The PIP injects a broadcast into the fixed uplink antenna for
three of the four transponders (three at 29.5 Mbps [24 Mbps]).
On the satellite, two transponders operating at 29.5 Mbps (24
Mbps) (one to each spot antenna) broadcast through separate 500
nm spot beams. A third transponder, also operating at 29.5 Mbps
(24 Mbps) and switched to the broad area coverage antenna,
broadcasts through a 2000 nm broad area coverage beam. The TIP
injects a 29.5 Mbps (24 Mbps) broadcast into the steerable uplink
antenna. On the satellite, a fourth transponder connected to
(and sharing) the first spot beam antenna broadcasts through a
29.5 Mbps (24 Mbps) spot beam. With this payload configuration,
the 500 nm spot beam with transponders injected by both the PIP
and TIP would point toward the same location and forces in that
location could receive both broadcasts. See Figure 5-17
5-51
NTP 4(E)
Figure 5-17
Example UFO/G Configuration A
Figure 5-18 shows the nominal locations of UFO 8 and 10 with
their FOVs at 10o elevation. It also provides sample spot beam
coverage locations and shows the locations of the SBMs at the
various Naval Computer and Telecommunications Area Master Station
(NCTAMS) sites.
Coverage for CONUS and LANT will be provided by commercial
augmentation satellites until WGS coverage is available. WGS
satellites, when launched, will augment this coverage area.
5-52
NTP 4(E)
Figure 5-18
GBS UFO/G Phase 2 Coverage with Sample Beam Locations
5.2.11 TELEVISION DIRECT TO SAILOR (TV-DTS)
Television direct-to-sailors (TV-DTS) bring enhanced SA and
quality-of-life programming to Sailors and Marines at sea. The
TV-DTS program provides capability for a continuous worldwide
Armed Forces Radio and Television Service (AFRTS) television,
audio, and data broadcast to Navy forces. TV-DTS is a Navy-funded
initiative and provides major networks such as CNN and ESPN
broadcast via C-band with nearly worldwide coverage television
and radio programming obtained by, and generated from, the AFRTS
broadcast center. The installed system includes:
1. Video Channel One
2. Video Channel Two
Programming
3. Video Channel Three
Programming
4. Four radio channels
5-53
NTP 4(E)
5. Data Channel 24-hour news feed: Early Bird, NAVNEWS, Stars
and Stripes, Times Fax.
TV-DTS uses C-band commercially leased frequencies to broadcast a
3.6 Mbps signal to shipboard terminals with a 1.2 meter receiveonly antenna. Shipboard terminals also have a Ku capability to
receive satellite television broadcasts directly from commercial
providers such as Direct TV, Dish Network, etc. AFRTS programming
originates from facilities at March AFB, CA, and is relayed to
uplink facilities located in CONUS east and west coast, and
Europe.
5.2.12 DoD Gateways
DoD Gateways are a collection of STEP and DoD Teleport facilities
providing worldwide ground entry interface to space segment
resources. The DoD Teleport program capitalizes on the current
STEP sites to meet the warfighters needs by providing a robust
system with gateway access to SATCOM resources and Global
Information Grid/Defense Information Systems Network (GIG/DISN)
services. Joint and service-level operational users rely on both
military and commercial SATCOM systems to support their
operational Command, Control, Communications, Computers and
Intelligence (C4I) requirements. Gateway sites established by the
DoD Teleport program enhance access to military and commercial
SATCOM resources, improve interoperability of Joint
communications systems, and support seamless accessibility to the
GIG by the JTF, Joint deployed headquarters, and deployed forces.
The DoD Gateway utilizes the STEP System and DoD Teleport
capability enhancements to provide additional SATCOM systems
coverage and robust GIG/DISN services. Accesses to DISN services
are via multi-media Radio Frequency (RF) connections. This multimedia RF includes existing SATCOM systems (i.e., Super High
Frequency (SHF) (DSCS X-band), UHF, and EHF), future Ka, as well
as commercial SHF Wideband systems in the C and Ku bands. The
Gateway consists of the Service Delivery Node (SDN) providing
connections to the Defense Switched Network (DSN), DISN Video
Services (DVS), Defense Red Switched Network (DRSN), and the
Joint Worldwide Intelligence Communications System (JWICS).
Unclassified but Sensitive Internet Protocol Router Network
(NIPRNET) and Secret Internet Protocol Router Network (SIPRNET)
services are provided via the ITSDN.
5-54
NTP 4(E)
Figure 5-19
DoD Gateway Locations
The STEP concept was developed to provide all tactical
warfighters Joint operability and seamless integration to
strategic NCA and in-theater C4I access and services. The
establishment of the STEP program provides a standard set of prepositioned C4I services at pivotal ground-entry stations (i.e.,
gateways) worldwide, as well as interoperability and
standardization between the Services.
STEP sites, in addition to providing access to DISN C4I services,
also provide Tri-Service Tactical Communications (TRI-TAC) switch
interfaces for GMF and Joint Maritime terminal users and Joint
Maritime User (JMU) access through the Automated Digital
Multiplexing System (ADMS) to Navy C4I communications ashore. The
equipment at the DSCS gateway includes the tactical baseband
equipment necessary to interface the DSCS Earth terminal to the
DISN. That portion of the STEP program initiative to provide JMU
access through STEP sites to Joint Voice and Data Networks
(JVDN) services, joint force interfaces, and/or Navy ADMS is
commonly referred to as N-STEP. JVDN services include Defense
Switched Network (DSN) and Defense Red Switch Network (DRSN) for
voice; Nonsecure Internet Protocol Router Network (NIPRNET);
Secret Internet Protocol Router Network (SIPRNET); JWICS for
special intelligence (SI) data and video applications; and VTC
for common-user video.
5-55
NTP 4(E)
There are 15 STEP sites that provide worldwide coverage; of those
15, 10 sites are designated as N-STEP. There are at least three
STEP sites, including one dual STEP site, located within each of
the five DSCS satellite coverage areas. However, only four of the
five DSCS satellite coverage areas are supported by three or more
N-STEP sites (two in WPAC). Each N-STEP has, in addition to the
normal STEP configuration of equipment, a complement of modems
(ComQuest CQM-248A/SLM-3650), second level multiplexers (AN/FCC100), TRANSEC (KG-194), and ADMS network multiplexer (TIMEPLEX
Link/2+) equipment to support the N-STEP mission. Although a
standard set of JVDN and interoperability services are provided,
STEP/N-STEP sites may be configured differently. A single STEP
site supports an Earth terminal that views one DSCS satellite; a
dual STEP site supports two Earth terminals at one site, each
viewing a different DSCS satellite. Figure 5-20 shows the STEP
site locations.
Figure 5-20
STEP site locations
5.2.13 DoD TELEPORT
The Defense Information Systems Agency (DISA) is implementing the
Department of Defense (DoD) Teleport System. The system will
integrate, manage, and control a variety of communications
interfaces between the Defense Information System Network (DISN)
5-56
NTP 4(E)
terrestrial and tactical satellite communications (SATCOM) assets
at a single point of presence.
The system is a telecommunications collection and distribution
point, providing deployed warfighters with multi-band, multimedia,
and worldwide reach-back capabilities to DISN that far exceed
current capabilities. Teleport is an extension of the
Standardized Tactical Entry Point (STEP) program, which currently
provides reach-back for deployed warfighters via the Defense
Satellite Communications System (DSCS) X-band satellites. This
new system provides additional connectivity via multiple military
and commercial SATCOM systems, and it provides a seamless
interface into DISN. The system provides inter- and intra-theater
communications through a variety of SATCOM choices and increased
DISN access capabilities. Figure 5-21 depicts a notional DoD
Teleport Architecture.
Figure 5-21
DoD TELEPORT Architecture
5.2.14 JMINI (Joint (UHF) MILSATCOM Network Integrated Control
System)) / DAMA SAC II
Both the DAMA SAC and the JMINI IOC Control Systems (see Figure
5-22) enables communications between and among all UHF MILSATCOM
users regardless of service or agency affiliation or user
terminal equipment. Both systems provide centralized control and
management of voice and data communications operating over 25Khz
UHF channels. The JMINI IOC system also provides this same
capability over 5-Khz channels. Both systems respond to requests
from users, pre-assigned network requirements, and operator
5-57
NTP 4(E)
commands to allocate access to available time slots on DAMA
channels. Both systems allow for pre-planned and dynamically
allocated UHF SATCOM assets to JCS-validated users of UHF SATCOM
to support a variety of assigned tasks including theater
communications, command and control, tactical communications,
mobility and common user communications.
JMINI FOC (fielding began FY07) provides the following:
1. Centralized DAMA control of all available 25-Khz channels
as either control or slave channels (and) 5-Khz channels
as slave channels.
2. Provides DASA access capability.
3. Interface to new 4 channel DMR radios (up to 7 per
footprint).
4. Centralized control of up to 28 home channels (25-Khz
DAMA).
5. System redundancy for loss of radio, controller or
channel.
6. Automated activation/deactivation of individual networks.
7. Demand assignment (ad hoc): 2 party, conference and
network requests.
8. Interfaces to Network Management System (NMS) providing
connectivity and remote monitoring between control sites,
channel allocation and assignment managers via SIPRNET.
JMINI IOC will be retained to provide 5-Khz DAMA control.
DAMA SAC / TD-1271s / WSC 5 will be removed.
GCIB 25 provides a DAMA SAC and JMINI overview.
5-58
NTP 4(E)
Information in control
Information in control
system databases is
system databases is
exchanged via WAN
exchanged via WAN
(NIPRNET)
(NIPRNET)
NCTAMS
LANT
NCTS
GUAM
NCTS
EURCENT
NCTAMS
PAC
PAC
Control Sites
JMINI
DAMA SAC
CONUS
LANT
IO
PAC
JMINI users
DAMA SAC users
users on JMINI-controlled home channels
cannot communicate with users on SACcontrolled home channels
18
Figure 5-22
DAMA SAC & JMINI IOC Control System Architecture
5.3
SUBMARINE COMMUNICATIONS
5.3.1
5-59
NTP 4(E)
NTP 4(E)
start of each broadcast schedule, a list of all messages on the
schedule (called a ZBO) is transmitted. The ZBO includes the
BCSN, message precedence, transmission number, addressees,
approximate transmission time using 50 baud, and a list of
previously transmitted messages (ZRR). Each submarine is required
to account for every BCSN on its assigned broadcast by copying
all messages addressed to them or determining that a BCSN is of
no interest because it is not addressed to them. If a message is
missed, the submarine must contact the BCA to request a
retransmission, or reprotect for the message.
Message traffic profiled to the Active folder will run on the
Submarine IP ISDS broadcast based on the assigned broadcast and
duration designated in the ships SUBNOTE or Weekly OPSKED. The
duration of a submarine broadcast schedule is 2 hours. The exact
number of schedules depends on current operations and can vary
from 4 schedules (8 hours) to as many as 12 schedules (24 hours).
Generally a message will be broadcast for 6 schedules (12 hours).
Messages profiled into the deferred folder are available via
Warrior Pull only. Messages may also be transmitted via VLF
broadcast or just the ZBO itself can be on the VLF broadcast.
Submarines are required to line up with the VLF broadcast during
each communications period. Figure 5-23 shows the Fixed Submarine
Broadcast Architecture).
5.3.4
5-61
NTP 4(E)
5.3.5
5-62
NTP 4(E)
NRTF Grindavik
COMSUBGRU-9
CTF 69
NCTS Cutler, ME
NCTAMS LANT
Lamoure, ND
NRTF Dixon
NCTS Sigonella, IT
COMSUBFOR
NCTS Jacksonville, FL
COMSUBPAC
NCTAMS PAC
NRTF Niscemi, IT
NRTF Aguada, PR
NRTF Lualualei
Legend
NCS H. E. Holt
LF
VLF
BTS
(NISBS
Capable)
Commander
Submarine Force
Figure 5-23
LF/VLF Fixed Submarine Broadcast Architecture
5.3.7
WARRIOR PULL
HF VALLOR CIRCUIT
5-63
NTP 4(E)
reception of record and tactical messages over an HF data circuit
by the submarine within or beyond LOS range from the transmitting
platform. A data signal is converted to an audio signal at the
transmitting station and converted back to a data signal at the
receiving station. Data is provided at a rate of 50bps.
5.3.9
IP COMMUNICATIONS
5-64
NTP 4(E)
traffic, web access to intelligence, weather, training, and
Strike Group data in addition to other tactical and strategic
related information and resources.
Submarines utilize the External Communications System (ECS) and
the ADNS to establish IP connectivity with the servicing SUBOPATH
over RF satellite communications circuits. There are several
pathways for establishing IP connectivity. These include UHF DAMA
Asymmetric, EHF Asymmetric, UHF MCAP, EHF MDR, and GBS. Figure 524 shows the current Submarine IP Architecture while Figure 5-25
shows the future Submarine IP Architecture.
Current Communications
IP Architecture
GBS
Throughput:
6 20 Mbps (Rcv Only)
Communications Links
Data Transfer
Video (CNN)
Data Rates:
2400 4800 baud
Up to 32 Kbps
Communications Links
SSIXS
SATCOM Voice
OTCIXS/TADIXS
BGIXS (MDU Delivery)
ADNS (Chat, Web, E-mail)
ISDS
Limited
Connectivity
SIPRNET
CSG / ESG
EHF
Su
b
BR
A-3
4
/ OE
H
DR
Data Rates:
LDR 2.4 Kbps
MDR 256 Kbps
Communications Links
MDU Delivery
EHF Voice
EHF HUITS (Imagery)
ADNS (Chat, Web, E-mail)
-538
Typ
e-8
/ Su
bH
DR
UHF
Shore BCA
Commander
Submarine Force
Figure 5-24
Current Submarine IP architecture
5-65
NTP 4(E)
Data Rates:
6 23 Mbps (GBS Receive Only)
128 + Kbps (SHF)
11 Mbps (KU)
Improved
Communications Links
Bandwidth
IP Messaging
ADNS (Chat, Web, E-mail)
CUP / COP
MDU Delivery
Video (Predator, CNN)
Imagery
High Speed Data Transfer
JWICS
TIPRNET
SIPRNET
NIPRNET
JTF
CSG / ESG
OE
53
Su
bH
Communications Links
IP Messaging
ADNS (Chat, Web, E-mail)
CUP / COP
MDU Delivery
Tactical Voice
Imagery
High Speed Data Transfer
VTC
Simultaneous
Operations
DR
Multiple
Connectivity Paths
pe 8
Communications Links
IP Messaging
ADNS (Chat, Web, E-mail)
CUP / COP
MDU Delivery
Tomahawk Strike Network
Tactical Voice
Data Rates:
MDR 1024 Kbps
/Ty
Data Rates:
Up to 32 Kbps
Full Worldwide
Connectivity
A-EHF / EHF
DR
GBS / SHF
Su
bH
UHF
NCA
Commander
Submarine Force
Figure 5-25
Future Submarine IP architecture
5-66
NTP 4(E)
CHAPTER 6
BASIC COMMUNICATIONS
6.1
GENERAL
SIMPLEX
DUPLEX
6-1
NTP 4(E)
simultaneous exchange of information;
b) Half duplex (HDX) is that type of operation which
provides unidirectional electrical communications
between stations.
3.
SEMIDUPLEX
6-2
NTP 4(E)
period terminations mandate maximum cooperation between
shore stations and afloat commanders, both prior to and
during an operation. Units having a need for a full period
termination, either for training or operational
requirements, will submit a termination request to the
COMMAREA NCTAMS at least 48 hours prior to activation time.
Emergency commitments or a command directive may necessitate
a lead-time less than 48 hours. However, whenever possible,
honor the two day limit to achieve maximum preparation and
coordination. DO NOT address COMNAVNETWARCOM on these
messages.
Termination requests will contain, but need not be limited
to the following:
PRECEDENCE/DATE-TIME-GROUP
FM REQUESTING UNIT
TO COMMAREA NCTAMS
INFO ALT NCTAMS
NUMBERED FLEET COMMANDER
FLTCOM
BT
CLASSIFICATION //N02700//
MSGID/GENADMIN/REQUESTING UNIT//
SUBJ/TERMINATION REQUEST//
REF/A/DOC/COMNAVNETWARCOM/01JAN08//
AMPN/NTP 4(E) PARA 6.3
RMKS/1. IAW REF A, REQ FOL TERM:
A. TYPE TERMINATION
B. POSITION/LOCATION
C. MODE OF OPERATION AND KEY LIST
D. REQUESTED TERMINATION STATION
E. DURATION OF TERM
F. BROADCAST CHNL(S) COPIES
G. SPECAT CERTIFICATION (FULL TIME/
PRIOR NOTIFICATION)
H. REMARKS
DECLASSIFY AS APPROPRIATE//
BT
(NOTES 1)
(NOTE 2)
(NOTE 3)
(NOTE 4)
(NOTE 5)
(NOTE 6)
(NOTE 7)
(NOTE 8)
NOTES:
1. Describe termination required, listing multiple
requirements in order:
a. Single channel or multi-channel UHF, landline, DSCS or
tactical satellite (full duplex or simplex).
b. CUDIXS subscriber.
c. MINI-NET.
d. Secure or non-secure voice.
6-3
NTP 4(E)
e. Air/ground.
f. NCCS.
2. Estimated position or location at time of termination
activation and projected area of operation during
termination.
3.
6-4
NTP 4(E)
assignment of broadcast channel for shore send side of
termination.
4. Issue coordination instructions for activation of
termination.
5. Provide information relative to proper submission of
COMSPOT reports and Broadcast Service Requests.
6. Provide other information as necessary.
6.3.2
CIRCUIT ACTIVATION
6-5
NTP 4(E)
technical control facility will:
1. Maintain an up-to-date ship/shore status board;
2. Stay informed of the ship's position for proper antenna
orientation;
3. Anticipate changes in propagation and ensure frequency
changes are made to meet changing conditions;
4. Be responsive to ship's requests for timely shift of
transmit frequencies.
6.3.3
MESSAGE CONTINUITY
6-6
NTP 4(E)
modules, if used at the NCTAMS/NAVCOMTELSTA and aboard ship,
will be reset to 0001Z at the start of each new RADAY.
6.3.5
TERMINATION SHIFTS
NTP 4(E)
TERMINATION CONTINUITY
NTP 4(E)
during 1230Z-1330Z would be considered as a trunk outage.
Overall trunk continuity for the RADAY would be computed as
follows:
Minutes that at least one channel in the trunk was usable
for traffic
Continuity = Minutes that trunk was required to be active
(1440-60) min
1440 min
1380
1440 =
96%
The ship will ensure that the ship send frequency is not in
use and that the shore send signal is tuned in and
cryptographically in synchronization. When the send
frequency is clear, turn on the transmitter and send a callup, indicating the number and precedence of messages
awaiting transmission and the shore send frequency which the
ship is copying (e.g., 0810Z NAM DE NSWU ZBO IP/2R 6 K).
The shore station may require the ship's position if a
directional antenna is to be used.
After the called shore station has acknowledged the call-up
and has indicated readiness to accept traffic, the ship will
commence transmission of traffic as follows:
6-9
NTP 4(E)
The ship will ensure that the circuit is not in use, then
will tune the transmitter and receiver to frequencies
normally assigned for duplex operation. It will then
perform a call-up as stated in duplex procedures except add
"half-duplex" in the call-up.
6.4.4
6-10
NTP 4(E)
6.4.5
NTP 4(E)
senior station/unit. This station/unit may in turn
designate another station/unit on the circuit to function as
NECOS. The shore station or other designated unit will
assign fully qualified operators to perform the duties of
NECOS. Positive and continuous circuit discipline is
mandatory to prevent circuit inefficiency, confusion and
transmission delay. Idle chatter, profanity, abusive
language and spurious transmissions are absolutely
forbidden. It is the responsibility of the NECOS to observe
all violations and to take immediate action to eliminate the
source. Repeated violators of circuit discipline will be
reported to higher authority for corrective action.
The NECOS will establish the net with an initial
transmission to ALL STATIONS THIS NET that contains the
following instructions:
1. Identification of NECOS (ZKA).
2. Net operation (free or directed) (ZKB).
3. Order for answering - turn number (ZGB).
4. Any other special instructions (ZWC).
The net control station is charged with the following
responsibilities:
1. Expedite traffic flow on the net.
2. Maintain circuit discipline.
3. Limit transmissions to the essential minimum.
4. Resolving disputes incident to message handling.
5. Determine procedural discrepancies and initiate
corrective action.
6. Conduct a roll call of stations after each frequency
shift, EMCON permitting.
7. Conduct a roll call of stations if the circuit is idle
for 30 minutes or longer, EMCON permitting. On radiotelephone circuits, a station is understood to have
good signal strength and readability unless otherwise
notified. Strength of signals and readability will not
be exchanged unless one station cannot clearly hear
another station.
8. Limit control action to that which is required to
immediately restore order. Amplification or exchange
of information regarding a breach of circuit discipline
must be sent via letter or message, rather than by
6-12
NTP 4(E)
control circuits.
The NECOS will periodically monitor his own transmissions to
ensure keying and cipher quality and frequency accuracy. As
the shore station cannot possibly measure the accuracy of
all ships' transmissions, it should only measure the
transmission of ships noticeably out of tolerance, informing
the ship directly of the discrepancy.
Authority of the NECOS extends to net operations within its
scope of authority, and in this regard, all decisions of the
NECOS are final. The NECOS does not have jurisdiction over
the administration of individual stations within the net.
6.7
FREE NET
DIRECTED NET
6-13
NTP 4(E)
6.10
STATUS BOARDS
TRANSMITTER STATUS
RESPONSE TIME
ON THE AIR CONTINUOUS CONTINUOUS
HIGH VOLTAGE ON
6-14
IMMEDIATE
NTP 4(E)
CHARLIE
Transmitters/frequencies
which can be activated
within ten minutes.
DELTA
Transmitters/frequencies
which can be activated
within twenty-four
hours.
ECHO - Transmitters down
for repair. Use of this
condition limited to
NCTAMS reporting.
TEN MINUTES
COLD IRON
TWENTY-FOUR
HOURS
INOPERATIVE
INDEFINITE
Table 6-1
Transmitter/frequency status terminology
In addition to the centralized status board, each circuit
operator will maintain a status sheet at each individual
operating position. This sheet will contain the following:
1. Circuit designation as listed in the effective
communications plan.
2. Frequencies in use. (Not required at each position of a
multi-channel system).
3. Address designators (call signs or routing indicators)
and identification of all stations on the net.
4. Identification of NECOS and ALTNECOS as appropriate.
5. Status of all stations on the circuit, e.g., "IN", "OUT
", EMCON, etc.
Each circuit operator will notify the supervisor when the
circuit status changes, when a backlog of traffic develops,
when an outgoing transmission is delayed, or when any
deviation from prescribed procedures is recognized. When
relieved, the circuit operator will pass-on information
pertaining to the circuit(s), which is not covered in the
circuit status information SOP'S.
6.11
6-15
NTP 4(E)
technical control to log the circuit out.
The decision to log out a circuit is, in many cases, an
interpretive one and must be made carefully. For example,
continual receipt of completely garbled messages or messages
with numerous transmission hits warrants logging out of the
circuit. However, one hit every few lines will not be
sufficient cause to log out the circuit. Generally, the
final authority for logging out a circuit rests with the
fleet center supervisor, not the circuit operator.
Immediately after notification of log out, technical control
assumes full responsibility for the circuit and all
attending outage until circuit is restored to traffic
quality. Technical control will ensure the distant station
is testing on the circuit and will direct equipment
adjustments and/or frequency shifts as required. Technical
control will direct whatever measures are necessary to
reestablish the circuit to traffic conditions. Under no
circumstances will there be any circuit operator chatter,
requests, or restoration attempts other than those directed
by technical control.
When technical control restores the circuit to traffic
quality, the circuit will be returned to the traffic
section. The traffic section will then notify the distant
end to send traffic. At this point of restoration and
acceptance, it will be the responsibility of technical
control to summarize to the user and to the distant end the
time the circuit was logged down and up, the reason for
outage (RFO) and any other pertinent information.
If a circuit is not restored within thirty minutes, a
COMSPOT report, as outlined in Annex B, will be submitted.
6.12
6-16
NTP 4(E)
If EMCON is imposed without notice, relay procedures to
deliver outgoing traffic may be attempted. Shore stations
must be alert to the sudden, unscheduled imposition of EMCON
and the accompanying lack of any transmissions from the
ship.
If the ship should enter EMCON without prior notice, the
shore station will keep a listening monitor on the ship's
frequencies until the ship returns to the air.
Additionally, a listening watch will be kept on the SATHICOM
net for possible contact from the ship.
Once a ship with a multi-channel termination has returned to
the air on previously assigned frequencies, the orderwire
will be restored before the traffic circuits. If the ship
maintains a single channel termination, the circuit will be
reestablished via the technical control center.
If the EMCON period is of sufficient duration, the ship will
notify technical control that it desires to secure the
termination.
6.13
In a Task Force/Task Group environment, a variety of intraTask Force/Task Group circuits will be activated according
to the dictates of the tactical situation.
Particular circuits to be activated will be as directed by
the Officer in Tactical Command (OTC) in the communications
plan. Ships expecting to deploy under the OPCON of a
particular task organization commander will ensure that
thorough preparations are made to comply with anticipated
circuit requirements. Operation Orders and the
Communications Plan should be reviewed as far in advance of
actual deployment as possible.
The five most common Task Force/Task Group circuits are as
follows:
1. Under Sea Warfare (USW) circuits, which can be either
FSK or voice, are used to coordinate intra-Task
Force/Task Group ASW actions.
2. Task Force/Task Group ADMIN circuits are used for
administrative coordination.
3. Task Force/Task Group Broadcast circuits are used for
rapid dissemination of information and are usually
keyed by the flagship.
4. Task Force/Task Group common circuits are used to pass
messages between units of the Force/Group or to pass
traffic to a CUDIXS Special subscriber within the
6-17
NTP 4(E)
Force/Group for relay to a NCTAMS.
5. The Fleet Warning/Tactical Net (277.8 MHz) is guarded
continuously by all Navy ships (except submarines) when
underway singly and by at least one ship of a group.
Coast Guard cutters may use this frequency to
communicate with Navy ships when required. The
frequency may be particularly useful for navigational
purposes during periods of reduced visibility when
entering or leaving port if Navy ships are in the
vicinity. The frequency is also used by the Navy for
local ship/shore harbor communications on a secondary
basis to inter-ship use. The OTC will designate one
ship, normally the flagship, to guard this net.
The Fleet Warning/Tactical Net may be utilized:
a. To establish communications between surface units and
between surface units and aircraft:
b. For promulgation (by the SOPA) of urgent warnings of
natural disaster, such as hurricanes and typhoons.
c. To pass emergency traffic.
d. To pass operational traffic when no common
communications plan is in effect.
e. The Fleet Warning/Tactical Net will be guarded by all
submarines while surfaced and in visual range of other
fleet units (availability of equipment permitting).
f. Normally, as a minimum, the circuit will be guarded on
the bridge either as a loudspeaker watch or with full
transmit capability as directed. Remote position
watches in CIC or Main Communications will be activated
as ordered;
g. The Fleet Warning/Tactical Net will not be used for
administrative matters. Circuit discipline on the net,
as well as on all other radiotelephone circuits, is
essential to the effective use of the net. Correct
voice radio procedure is contained in ACP 125, with
which all radiotelephone operators must be familiar.
6.14
NTP 4(E)
techniques called AUTOCAT, SATCAT, and MIDDLEMAN were
developed. With these techniques the range of tactical UHF
circuits (voice or data) may be extended by relay of
amplitude modulated UHF transmissions via HF or satellite.
In AUTOCAT a ship and in SATCAT, an airborne platform
provides the media for automatically relaying UHF
transmissions. In MIDDLEMAN, the same objectives are
obtained; however, this method requires an operator to copy
the messages with subsequent manual retransmission.
Typically, a ship under EMCON or HERO conditions will
transmit to a relay ship or aircraft on UHF. The relaying
platform then retransmits the signal on another frequency to
a terminated NCTAMS/NAVCOMTELSTA. Receiving techniques on
the originating ship remain unchanged.
AUTOCAT, SATCAT and MIDDLEMAN use three different types of
circuit configurations for reception and relay of UHF
transmissions. These circuits are:
1. A voice circuit where some units send and receive on
one frequency, and other units send and receive on any
other frequency.
2. A voice circuit where all units transmit on one
frequency and receive on another frequency.
3. A data circuit where all units transmit on one
frequency and receive on another frequency.
6.15 NON-ELECTRONIC RELAY SYSTEMS
There are two other message relay systems, PIGEON POST and
BEAN BAG.
Pigeon Post provides a method of traffic delivery to shore
by aircraft while Bean Bag provides a method for small ships
to deliver message traffic via helicopter to shore or to a
unit that is terminated full period for further
transmission.
6.16 HIGH FREQUENCY AUTOMATIC LINK ESTABLISHMENT (HF-ALE)
The military standard HF-ALE radio is widely deployed
throughout the US military and provides a viable alternative
to over burdened satellite communication systems. Automatic
Link Establishment (ALE) is an improvement to high frequency
(HF) radio that allows establishment of considerable clearer
over-the horizon voice communications and robust data
transmissions.
ALE is a communication system that permits HF radio stations
to call and link on the best HF channel automatically
6-19
NTP 4(E)
without operator assistance. Typically, ALE systems make use
of recently measured radio channel characteristics stored in
a memory matrix to select the best frequency. The system
works much like a telephone in that each radio in a network
is assigned an address (similar to a call sign). When not in
use, each radio receiver constantly scans through its
assigned frequencies, listening for calls addressed to it.
Detailed information and procedures for HF-ALE operations
can be found in NTTP 6-02.6.
6.17 VERY HIGH FREQUENCY AND ULTRAHIGH FREQUENCY LINE OF
SIGHT (LOS) COMMUNICATIONS
VHF and UHF LOS communications support ship-to-ship, shipto-shore, and ship-to-air LOS communications. Shipboard
tactical VHF radios use the 30 to 88 MHz and 108 to 156 MHz
segments of the VHF radio band for ship-to-shore
communications in amphibious operations and for land-mobile
shore communications. A portion of the VHF band (225 to 300
MHz) and the lower end of the UHF band (300 to 400 MHz)
provide tactical ship-to-ship, ship-to-shore, and ship-toaircraft radio nets. Havequick II and Link 4A also share the
UHF spectrum.
VHF and UHF LOS communication systems use a variety of
equipment. Only some of the equipment is transmitters and
receivers. The majority fit into a category called
transceivers a combination transmitter and receiver that
is generally compact, portable, and uses a single antenna.
The following is a compilation of commonly used VHF and UHF
LOS equipment and systems and their uses.
1. AN/ARC-182 VHF/UHF radio A multiband/multimode radio
(30 to 400 MHz) used for close air support, air traffic
control, maritime radiotelephone, and NATO
communications.
2. AN/GRT-21(V)3 VHF/UHF transmitter and AN/GRR-23(V)6
VHF/UHF receiver Used for transmitting and monitoring
aircraft distress communications (116.0 to 151.975 MHz)
in the VHF range and for air traffic control (225.0 to
399.97 MHz) in the high VHF and low UHF range.
3. AN/URC-93 VHF/UHF LOS radio - Several configurations
exist (225 to 400 MHz) that can be used with voice,
electronic counter-countermeasures (ECCM), LPI, data,
and wideband communications.
4. AN/VRC-40 series VHF radio Used aboard ship as well
as in vehicles (30 to 76 MHz) to support short range
two-way VHF communications.
6-20
NTP 4(E)
6-21
NTP 4(E)
Subscriber Services
(GCCS-M, voice,
LHA/LH
WSC6/WSC-8
DWTS
Radio #1
Radio #2
ADNS &
TSS
Switching
Subscriber
Services (GCCS-
DWTS
Radio #1
Radio #2
LP
Subscriber Services
(GCCS-M, voice,
Landing
Force
AN/MRC-142
or AN/GRC226
DWTS
Radio #1
Radio #2
LS
MAGTF C4I
Tactical
Figure 6-1
DWTS
6.19
6-22
NTP 4(E)
6.20 ENHANCED POSITION LOCATION REPORTING SYSTEM DATA
RADIO (EPLRS-DR)
EPLRS-DR is a secure, spread-spectrum, frequency-hopping,
UHF networking radio system. It provides digital
communications for the Amphibious Force command element at
the regiment to company level with reach back to the ESG.
Via its connection to the ADNS, EPLRS-DR provides a 57.6
Kbps digital IP data path between command elements aboard
ship and Marine networks ashore. Additionally, EPLRS
provides the position location information of each radio,
which is used to track and identify unit movement within the
operational area for SA. The EPLRS-DR network is selfhealing and provides automatic relaying up to six times for
increased mobility and range extension. The radio utilizes
synchronous TDMA, frequency division multiple access (FDMA),
and code division multiple access technology, combined with
embedded COMSEC for a secure, low probability of intercept,
low probability of jamming RF-network. EPLRS provides
interoperability with the Marine Corps, Army, and Air Force.
Shipboard configurations will consist of one, three, and
four radio suites depending on platform size and mission. A
radio suite consists of the RT-1720 radio, antenna, MUTE
interface (for LHD class ships), user readout unit, printer,
EPLRS network manager (ENM) computer, power adapter, KOK-13
COMSEC equipment, and various mounts and interface adapters.
6.21
NTP 4(E)
Ground Wave:
A ground wave is a radio wave on or near the earths surface.
The distance achieved by the ground wave portion of an HF
signal depends on the type of terrain and the amount of
transmitter power. Fortunately, the oceans surface provides
an excellent propagation environment which can permit
reliable communications out to hundreds of miles with output
power of as little as 100W in the lower end of the spectrum.
However, higher frequencies will typically be quieter in
regards to atmospheric noise. The rule of thumb is to select
the highest frequency that will achieve the desired distance.
Skywave:
A skywave is a radio wave that is refracted back to Earth by
the ionosphere, permitting transmission around the curve of
the earths surface.
The exact distances achieved by skywaves depend on the
heights of the layers of the Ionosphere above the Earth. The
heights of these layers are controlled by the season, the
time of day, and the level of sunspot activity. Time and
season are fairly easy to find. However, the sunspot cycle
takes a little more research. Solar events tend to run in
cycles of high and low activity, with peaks about every 11
years. The last peak was around 2001, with 2006 being in a
trough. The basic rule is the higher the solar activity, the
higher the sunspot number, the higher the ionization of the
layers, and the higher the frequency for a given distance.
Ionosphere Layers:
D Layer- Lowest layer. This layer absorbs radio waves.
Frequencies between 2 and 6MHz are very unreliable for
daytime skywave communications.
E Layer- The next higher layer, it dissipates rapidly
without direct sunshine. However, it can refract signals
back to earth, albeit sporadically.
F Layers F1 and F2, the highest layers are the most
important to long distance communications. They remain
ionized 24 hours a day, but more intensely in the daytime.
At night the D and E layers disappear and the F1 and F2
layers combine into one layer. Higher frequencies will pass
through these layers at night, but lower frequencies will be
refracted back to Earth.
6.22
NTP 4(E)
atmospheric noise), availability, and global coverage and
has seawater penetrating properties. The submarine VLF/LF
broadcasts operate in a frequency range from 14 to 60 kHz
and consist of six high-powered, multi-channel fixed VLF
(FVLF) sites and seven multi-channel LF sites located
worldwide.
The submarine VLF/LF broadcasts are generated by the BCA or
alternate BCA from messages created locally by the C2
processor or the submarine/satellite information exchange
system (SSIXS) processor, or accepted for relay by the
submarine operating authority (SUBOPAUTH). The BCAs and
alternate BCAs are connected to the transmitter sites by
dedicated inter-site links (ISLs) with the ability for the
JCS and USSTRATCOM to seize BCAs, at any time, for EAM
dissemination. At each of the transmitter sites, messages
received over the ISLs are decrypted and input into the
integrated submarine automated broadcast processor system
(ISABPS). Submarine VLF/LF broadcasts a continuous
transmission sequence of prioritized messages that normally
lasts two hours. It is generated by ISABPS and sent to the
VERDIN transmit terminal. The VERDIN transmit terminal is
used to multiplex, encrypt, encode, and modulate up to four
50 BPS submarine broadcast channels into VLF/LF radio
frequency signals that are amplified/radiated by the VLF/LF
transmitter antenna.
6.23 VERY HIGH FREQUENCY (VHF)
Very high frequency (VHF) communications, considered by some
more as a legacy communications path, still play a major
role in day-to-day operations onboard US Navy Ships.
Probably the most common use of VHF communications is the
Bridge-to-Bridge (BTB) radio. The BTB radio is typically set
to monitor channel 16 (The International Maritime Channel);
Channel 16 is first commonly recognized as the distress
channel. Channel 16 will also be used to establish
communications and coordinate safety of navigation with
other vessels. BTB radios will be monitored at all times
underway, at the very least, from the bridge and Combat
Direction Center (CDC). Occasionally a scanner will be used
in locations such as Radio to monitor BTB as well.
Previously, most US Navy BTB radios were militarized radios
(e.g. AN/URC-80), however compared to Commercial-Off-TheShelf (COTS) systems these radios were considered fairly
limited. As such, some ships, if not officially outfitted
with Commercial-Off-The-Shelf (COTS) systems have purchased
radios using their own funds.
Functions typically sought after are channel scanning and
dual channel monitoring.
6-25
NTP 4(E)
Figure 6-2
SINCGARS Concept of Operation
VHF Support for Aviation Communications
VHF communications still play a role in communicating with
aircraft and monitoring the International and Military Air
Distress (i.e. IAD and MAD respectively) channels. GRC-211
is the radio set commonly associated with this application
and has replaced the GRT-21/GR-23 radio suite on several
ships.
VHF Support for Naval Surface Fires Support
Supporting ground forces has always been an integral part of
the functions of US Navy ships. For over 30 years ships have
maintained the VRC-46 radio as a reliable means of
communicating with ground forces. In the last decade, the
VRC-46 has been getting replaced by the Single-Channel
Ground and Airborne Radio System (SINCGARS). SINCGARS
capabilities include:
1. Provides secure, anti-jam (AJ) VHF voice and data
communications in support of amphibious and Naval
Surface Fire Support (NSFS) operations
2. SINCGARS System Improvement Program (SIP) and Advanced
Shipboard Improvement Program (ASIP) provide improved
data performance at 16 kbps with forward error
correction, thus extending range
3. IP routing and data packet capabilities will be
implemented in the SINCGARS interface with ADNS Block 2
(MAGTF Router Upgrade).
6-26
NTP 4(E)
6.24 BANDWIDTH MANAGEMENT
In computer networking, bandwidth management is the process
of measuring and controlling the communications on a network
link, to avoid filling the link to capacity or overfilling
the link, which would result in network congestion and poor
performance.
Anyone who has an Internet connection has at some time
downloaded a large file and noticed that the web page starts
to load slowly, or fail to load. The reason is that the
bandwidth of the internet connection is limited, like the
size of a highway, and when someone tries to send too much
information down it, more than it capacity, a virtual
traffic jam results. This is also known as network
congestion.
6.25
6-27
NTP 4(E)
4. Ensure communications circuits are in accordance with
the OPTASK COMMS.
5. Monitor all communications outages, casualties, and
difficulties within the strike group and offer advice
and/or technical assistance as appropriate.
6. Coordinate operation of limited range intercept
circuits.
7. Enforce COMSPOT reporting throughout the strike group.
8. Provide ship-shore-ship message traffic relay for
strike group units requiring such support in the event
of CUDIXS, PCMT and/or Fleet SIPRNET Messaging
(FSM)/ADNS casualty.
6-28
NTP 4(E)
CHAPTER 7
ALLIED/COALITION COMMUNICATIONS
7.1
CENTRIXS-Maritime
NETWARCOM C4 TYCOM
O P N A V N6
C E N T R IX S /C A S
R e s o u r c e S po n s o r
C o m b a ta n t
C o m m a n d e rs
(C O C O M s)
NE T W A R C O M N3 2
C E N T R IX S /C A S
O PS T YCO M
D IS A M N IS JP O
C E N T R IX S - M
CDA
C AS Pro g ra m
S o ftw a r e
D e v e lo p er s
NC T A M S L A NT
UA R NO C
N C T S N a p le s
E C R NO C
SPAW AR 160
C E N T R IX S IS E A
NC T A M S P A C
P R NO C
N C T S B a h r a in
IO R N O C
A flo a t/S h o r e
US E R S
Figure 7-1
CENTRIXS-M Organizational Relationships
7-1
SPAW ARSY
S CHAS N
NTP 4(E)
7.1.2
Network Connectivity
10
Figure 7-2
CENTRIXS-M Global Connections
7.1.3
7-2
NTP 4(E)
(GCTF) and the NATO Initial Data Transfer System (NIDTS) networks.
UARNOC operates all IP services with a single watch organization.
That is, all SIPRNET, NIPRNET, SCI and CENTRIXS services will be
managed from a single watch section of primarily military
personnel. The watch is presently a 24/7 operation, and deemed
to remain 24/7 following the incorporation of CENTRIXS and CAS
services.
7.1.4
7-3
NTP 4(E)
7.1.6
CENTRIXS User
Block I
Block II
NTP 4(E)
Support Team (GST). Afloat commands that have not operated
CENTRIXS systems for extended periods (between deployment cycles)
can request refresher training through the CENTRIXS GST. Ships
are also responsible for ensuring that CENTRIXS hard drives
(Block 0/1) are onboard for network requirements. Multiple hard
drives are provided based on operational requirements at time of
installation. However, if/when requirements change, coordination
with SPAWAR CENTRIXS ISEA is necessary to ensure required
CENTRIXS enclaves can be accessed. Contact SPAWAR Fleet Support
Desk (FSD) for coordination.
7.1.9
7-5
NTP 4(E)
NOC Help Desk: users experiencing difficulties with CENTRIXS
enclaves, including software, hardware or configurations will
contact the Help Desk for troubleshooting and assistance. The
NOCs also manage a CAS Help Desk, co-located at the NOC watch
floor. Users will contact the appropriate NOC (PRNOC/UARNOC)
where their CENTRIXS (or SIPRNET/NIPRNET) services terminate.
This means that servicing NOCs that provide SIPRNET services will
also provide CENTRIXS Help Desk support for the same command/user.
Making contact with the NOC Help Desk can be accomplished via
telephone, email, COMSPOT or CHAT session. Refer to appropriate
CIB/CIAs for policy/procedures for obtaining Help Desk support.
Refer to GCIB 3B for detailed guidance for reporting guidance,
and IP address information for the various services.
7.2
Figure 7-3
Current CENTRIXS Architecture (single NOC)
7-6
NTP 4(E)
7.2.1
CENTRIXS Enclaves
7-7
NTP 4(E)
7.2.4
Allied forces in the Central Command (CENTCOM) AOR rely upon and
act in collaboration with coalition partners in pursuit of
national security objectives. The Commander, U.S. Navy Central
Command (CUSNC) has directed that the Global Counter Terrorism
Force (GCTF) enclave of the CENTRIXS is the network of choice for
maritime coordination throughout the CENTCOM AOR. CENTRIXS CNFC
is used for tactical level coordination between coalition nations
and forces operating as part of the CFMCC task organization.
COMUSNAVCENT has directed that all coalition ships and units
deployed to the C5F AOR to support CFMCC operations are operating
within the CNFC network.
7-8
NTP 4(E)
7.2.7
Bi-Lateral Networks
CENTRIXS-Korea (CENTRIXS-K)
CENTRIXS-K is a U.S. Forces Korea managed network (formerly GCCSK) that is supported exclusively at the PRNOC for U.S. Navy
maritime requirements/users. While CENTRIXS-K can be extended
worldwide via IP routing, anticipated use of CENTRIXS-K is
limited to the Pacific and Indian Ocean operating areas, and thus
will not be initially installed at UARNOC.
7.2.10 CENTRIXS-Japan (CENTRIXS-J)
CENTRIXS-J is a U.S. Forces Japan managed network (formerly the
bi-lateral wide area network BWAN)) supported by the PRNOC. As
noted with CENTRIXS-K, this network will also initially be
managed exclusively by PRNOC for all users/requirements.
7.3
The UARNOC serves as the sole U.S. Navy NOC to provide NIDTS/NATO
Secret (NSWAN) access to the NATO C4 network. While NIDTS
architecture is very similar to that of CENTRIXS enclaves, the
visibility and access only by NATO partner nations makes its use
unique and dissimilar to CENTRIXS. Additionally, NIDTS is
managed by SHAPE and subordinate NATO commands. Numerous
connections exist within the United States to NIDTS, however,
only those maritime NIDTS connections that support shipboard
users are managed by the UARNOC in Norfolk, VA.
NIDTS can be
accessed with the same equipment infrastructure used aboard
CENTRIXS configured ships by using a NIDTS hard drive and slight
IP routing configurations. For new NIDTS requirements contact
UARNOC personnel for details. There is currently no plan to
7-9
NTP 4(E)
provide the same dual NOC redundancy for NIDTS as for the other
CENTRIXS enclaves. Future plans will call for an alternate site
for NIDTS, however, specific details have not yet been
established.
Figure 7-4
NATO Initial Data Transfer System (basic architecture)
7.3.1
7-10
NTP 4(E)
BFEM Configuration
For setup of BFEM hardware for operational use consult the NCTAMS
Allied Networks link to obtain the Standard Operating Procedure
(SOP). This SPAWAR developed SOP provides configuration and
equipment setup procedures. If additional assistance is required
contact SPAWAR Charleston via contact information located in para
7.4.2 below.
7.4.2
E-mail Address
CCSPAWAR@SPAWAR.NAVY.
MIL
SIPRNET Address
CCSPAWAR@SPAWAR.CHAS.NAVY.SM
IL.MIL
7-11
NTP 4(E)
owned and operated by the US) and connect to the REL DMZ through
GRE tunnels from the locally managed US CCSA. From a user
perspective, using the REL Network and the REL DMZ and its
associated services closely mirrors a typical Windows enterprise
environment. Users will be provided standard Windows
applications/services such as a web browser, email client, office
applications, and file server access. See Table 2 for a more
complete listing of applications/services and the organization
that is responsible for providing them.
Two areas in which the user experience will differ from a typical
Windows experience are web access and email. Web Access through
the REL DMZ requires all web traffic to pass through a web proxy
and to be scanned by a content filter.
These mechanisms help
secure SIPRNet resources that have been deemed non-releasable.
For each browser session, the first attempt to access web content
will require the user to authenticate to the web proxy. Embedded
users will be presented with a dialog box similar to Figure 1 in
order to enter the authentication information. In-Country users
will not see this dialog box. If you are embedded and you do not
receive this dialog box when accessing web content for the first
time, contact your local administrator immediately.
DMZ Architecture
To WAN
Control
GNSC/TNC
via in-band
GISMC via
GESMC
mgt LAN
JIDS
Cisco 3550
Switch
Mgt Console
AITS-JPO
via in-band
Net Defense
via in-band
Local DECC
personnel
provides
touch labor
Cyber
Guard
IronPort
Mail GW
Securify
Forensics and
IDS tools
Visibility provided
to all Ops centers
Cisco 3550
Switch
Web Server
File and Print Server
UNCLASSIFIED//FOUO
Figure 7-5
Common SIPRNET Domain
Email differs from a typical Windows enterprise environment in
that there are specific requirements for mail to be delivered as
well as criteria that will reject email delivery under most
circumstances. For email to be considered for delivery it must
contain a CAPCO marking that marks the email content as
releasable to coalition partners.
CAPCO Releasable markings are
7-12
NTP 4(E)
found in Table 7-1. Email with an appropriate CAPCO marking will
be delivered unless the body of the email or any attachment
contains the term NOFORN. This term indicates the content is
not releasable to foreign nationals and will therefore be
rejected by the mail filter. It is possible to send NOFORNdesignated information via the REL DMZ with the use of a positive
marking statement. This statement will allow otherwise rejected
content to be delivered because the sender is certifying the
content is releasable to all parties. Contact your local
administrator if you feel you have a need to use the positive
marking filter.
CAPCO Classification Markings
Unclassified
SECRET//REL
Unclassified//FOUO
SECRET//REL
CONFIDENTIAL//REL TO
SECRET//REL
USA and GBR
CONFIDENTIAL//REL TO
SECRET//REL
USA and AUS
CONFIDENTIAL//REL TO
SECRET//REL
USA and CAN
GBR
CONFIDENTIAL//REL TO
SECRET//REL
USA, AUS and GBR
and GBR
CONFIDENTIAL//REL TO
R
USA, AUS, CAN and GB
TO USA, ACGU
TO USA and AUS
TO USA and CAN
TO USA and GBR
TO USA, AUS and
TO USA, AUS, CAN
Table 7-1
CAPCO Classification Markings
User Information
Embed users will have two (2) separate accounts: one (1) for the
REL DMZ and one (1) for their local CCSA. The REL DMZ account
will be used for web access only. The CCSA account will be used
for accessing all other services. Non-embed users will use their
REL DMZ account to access all services.
Table 7-2 provides a breakdown of the various user types, their
login and email domains, as well as their primary support contact.
The Expectations section further defines the group responsible
for providing various services and the support contact for these
services for each user type.
7-13
NTP 4(E)
User Type
In-Country
(GBR, AUS)
Login
Domain*
DMZ**
In-Country (CAN)
CAN
Embed
(GBR, AUS, CAN)
Local
domain
(e.g.
DISA)
DMZ (via
Citrix)
Email Domain
Main Support
Contact
dmz.rel.smil.mil
CNC (GBR)
Local Admin
(AUS)
can.rel.smil.mil
Local
Administrator
Site specific email Local
Administrator
(e.g., disa.mil)
dmz.rel.smil.mil
CNC
* Contact your local administrator for help logging in to the correct domain
** DMZ domain passwords can be changed at www.dmz.rel.smil.mil. All other domains should contact their local administrator for assistance
Table 7-2
User Information
All user types will have a REL DMZ account. As a result, embed
users will have two (2) separate accounts: one (1) for the REL
DMZ and one (1) for their local CCSA. The REL DMZ account will
be used for web access only. The CCSA account will be used for
accessing all other services. Non-embed users will use their REL
DMZ account to access all services.
Expectations
REL Users should expect a core set of services available for
their use at all times. These services include access to office
applications, an email client, a web browser, network file shares,
an email account, and SIPRNet web sites. The provider(s) of each
service, and support of the service, is dependent on the user
type. This section identifies the provider and support contact
for each service by user type.
In-Country (GBR, AUS) Users
All core services except an email account and SIPRNet web access
are provided by the local In-Country enclave. Email accounts and
SIPRNet web access will be provided by the REL DMZ. Embed users
can change their REL DMZ password online at
http://www.dmz.rel.smil.mil or by using normal Windows procedures.
Users should contact the Coalition NetOps Center (CNC) if it is
necessary to reset their password or if they experience issues
accessing SIPRNet web sites. All other issues should be directed
to an In-Country administrator.
In-Country (CAN) Users
All core services except SIPRNet web access are provided by the
local In-Country enclave. SIPRNet web access will be provided by
the REL DMZ once a DD2875 form has been received and approved by
the CNC. Users should contact the CNC for issues accessing
SIPRNet web content. Users will be able to change their REL DMZ
7-14
NTP 4(E)
password using normal Windows procedures or by contacting an InCountry enclave administrator for help. All other issues,
including password resets, should be directed to an In-Country
administrator.
Embed (GBR, AUS, CAN) Users
All core services except SIPRNet web access are provided by the
local CCSA. SIPRNet web access will be provided by the REL DMZ.
Users should contact the CNC for issues accessing SIPRNet web
sites. Embed users can change their REL DMZ password Users can
change their REL DMZ password online at
http://www.dmz.rel.smil.mil. Changing the Windows logon password
can be achieved through Windows or by contacting a CCSA
administrator. Users should contact the CNC for REL DMZ password
resets and a CCSA administrator for Windows password resets. All
other issues should be directed to a CCSA administrator.
7.6 GRIFFIN
The Griffin Combined Wide Area Network (CWAN) is a classified
electronic information-sharing environment for collaborative
planning activities between strategic, operational and tactical
level headquarters. Griffin provides a means for dissemination
of information between participating nations for planning,
implementing and executing multinational operations. For
specific issues concerning releasibility and coalition partners
operating on Griffin, browse to:
http://rela.griffin.disa.smil.mil
Prior to requesting individual Command specific account, Commands
coordinate with Griffin Community Manager to establish a Command
Training Verification POC. User tutorials and foreign disclosure
training available are on the Griffin website to assist users in
getting started. Griffin users must be acutely aware of
limitations of the Griffin mail guards, and specifically, trained
on disclosure issues.
7.6.1 GRIFFIN Account Setup
1. Take Griffin Training online at Griffin website.
2. Notify Training Verification POC with Directory Contact
information: First Name, Last Name, Rank, Role, Country,
SIPRNET E-mail, and Phone Number.
3. All account information submitted by POC to Griffin by
Tuesday COB will have accounts ready by Friday of the same
week. Account information received after Tuesday COB will
be in the next weeks implementation.
4. When your account is ready, start sending Griffin E-mails
from your regular SIPRNET Inbox.
7-15
NTP 4(E)
7.7 High Frequency Internet Protocol (HFIP) Networking with
Coalition Partners
See Chapter 5 for HFIP discussion. Note: While HFIP is utilized
in a coalition environment, its architecture, setup and
procedures are comparable in both SIPRNET and CENTRIXS
environments.
7.8 UHF LOS Subnet Relay (SNR) with Coalition Partners / Line of
Sight and Beyond Line of Sight Networking with Coalition Partners
Line of Sight (LOS) and Beyond Line of Sight (BLOS) networking
with Coalition partners is being introduced on CENTRIXS via Ultra
High Frequency (UHF) Sub-Network Relay (SNR) and High Frequency
Internet Protocol (HF IP) systems as added Radio Frequency (RF)
bearers. HFIP and SNR are Global Maritime Partnership Initiative
programs that enable US ships to communicate up to normal HF and
UHF ranges in a tactical environment using CENTRIXS and enabling
interoperability in coalition and multinational operations such
as Anti-Surface Warfare, Maritime Interdiction Operations,
Humanitarian Assistance/Disaster Relief, Global War on Terror and
Major Combat Operations. In addition to SATCOM, CENTRIXS
networks will now employ LOS/BLOS networking systems such as UHF
SNR and HFIP.
7.9 High Frequency Internet Protocol (HFIP) and Sub-Network Relay
(SNR)
HFIP and SNR provide Allied, Coalition and US maritime units with
a direct platform-to-platform tactical networking capability
using standard UHF and HF voice radios with KG-84A/C generated
bulk encryption for Transmission Security (TRANSEC). Since the
two technologies operate efficiently with current legacy
equipment, they are cost effective solutions for achieving
tactical IP networking at sea. HFIP and SNR enable war fighters
on Combined Enterprise Regional Information Exchange SystemMaritime (CENTRIXS-M) to plan and execute coalition operations in
a real-time tactical environment by transporting IP data directly
to and from ships. HFIP operates in the HF spectrum capable of
data rates of 9.6 Kbps in single side band (SSB) and 19.2 kbps in
independent side band (ISB). SNR operates in the UHF spectrum
capable of data rates up to 96 Kbps. Both systems give surface
platforms the ability to share a single SATCOM resource for reach
back capability. HFIP also supports the hardware/software
upgrade requirements for Battle Force Email (BFEM 66) and is
designed to be backwards compatible with BFEM 66. Figure 7-6 is
an Operational View of HFIP and SNR.
7-16
NTP 4(E)
Figure 7-6
HFIP and SNR OV-1
Status
Based upon an emergent fleet requirement to accelerate fielding,
Assistant Secretary of the Navy, Research Development and
Acquisition (ASN RD&A) designated HFIP and SNR as a Rapid
Deployment Capability. In 2007, HARRY S TRUMAN was the first
Strike Group to deploy with HFIP and SNR. Two more Strike Groups
are planned to deploy in 2008 with HFIP and SNR. Over the next
six years the Navy plans to install HFIP and SNR on approximately
180 ships.
Developers
HFIP and SNR projects have distinct technical development and
sponsorship, but both address the same requirement: the transport
of IP data using existing tactical LOS and BLOS bearers.
Australia, Canada, New Zealand, United Kingdom and United States
(AUSCANNZUKUS) started the SNR project in 2000, with OPNAV
support in the United States to add an IP data transport
capability to tactical voice circuits. The resulting design was
optimized for UHF/VHF and the first SNR sea trial was in 2003.
The HFIP project was started in 2002, with the Office of Naval
Research (ONR) support, to add a full IP capability and robust
multi-member networking to the Battle Force Email system using HF.
HFIP conducted its first trial in 2002. More recently, both
systems have been the basis of AUSCANNZUKUS initiatives during
Trident Warrior 05, 06 and 07. Hardware for procurement and
development of both HFIP and SNR are now under the cognizance of
PEO C4I PMW/A-170, OPNAV N6 and NNWC.
7-17
NTP 4(E)
HFIP Overview
The HF IP controller implements an IP client, a BFEM 66 backwards
compatible mode, a wireless token ring channel access scheme (to
support multi-platform networking) and a STANAG 5066 Automatic
Repeat Request (ARQ) engine. The HF IP system is designed to be
used in conjunction with the MIL-STD-188-110B HF modems employed
by the BFEM 66 system. These modems burst at rates up to 9.6
kbps in Single Sideband (SSB) and 19.2 kbps in Independent
Sideband (ISB). HF IP is designed to employ the BFEM 66 HF
shipboard infrastructure. This typically consists of a Harris
RF5710A modem, a KG-84C crypto and HF transmitter, receiver,
couplers and antennas. HF IP brings one new piece of equipment:
the HFIP network controller. HFIP was designed to use HF ground
wave propagation in order to achieve maximum throughput on HF. HF
ground wave propagation distances are specific to a given
environment and transmit power, but surface ranges up to 150nm
can be expected.
SNR Overview
A typical SNR configuration would employ AN/WSC-3 UHF
transceiver, couplers and antenna, and KG-84A or KIV-7. UHF SNR
brings two new pieces of equipment: an SNR node controller and an
external, high speed UHF modem. The UHF SNR controller implements
a synchronous Time Division Multiple Access (TDMA) channel access
scheme to coordinate on-air transmissions between multiple
platforms, optional Automatic Repeat Requests (ARQ) for
retransmission of dropped data frames, and automatic traffic
relay to forward traffic in the event of multi-hop topologies.
The SNR subnet presents itself as a cloud to the attached
router with the details and dynamics of the underlying
connectivity. The SNR modem employs a multi-waveform concept,
supporting a range of data rates up to 96 Kbps. UHF SNR LOS
propagation depends largely upon the height of the UHF antennas
above the waterline. Maximum surface ranges up to 20nm can be
expected. SNR also provides for the automated relay of IP
traffic to nodes beyond the origination nodes radio horizon.
For example, Ship A may have traffic destined for ship C, which
is 35nm away. Ship B is able to see both ship A and Ship C.
Ship A is able to send IP traffic to ship C, via automatic relay
at Ship B. SNR supports up to 4 relays, providing a nominal
reach of 80nm if ship relay platforms are available. Airborne
relays would extend this relay reach considerably. Figure 7-7
illustrates a System View of SNR.
7-18
NTP 4(E)
Figure 7-7
SNR System View
Line of Sight Routing Architecture Overview
With HFIP and SNR providing Line of Sight networking with
Coalition, a discussion of the LOS networking architecture is in
order, as these are new technologies. HFIP and SNR provide
mobile ad hoc networking capability. CENTRIXS makes use of this
capability via dynamic routing over SNR and HFIP. This is
accomplished by implementing multiple Open Shortest Path First
(OSPF) Areas at sea and in running Border Gateway Protocol (BGP)
between the national NOCs. The router configurations are
maintained by their National NOCs and be well coordinated with
the CENTRIXS PRNOC. Figure 7-8 illustrates this routing
architecture.
7-19
NTP 4(E)
Figure 7-8
CENTRIXS LOS/ELOS Routing Architecture
On the ships, SATCOM links are assigned to OSPF Area 0 and the
LOS/ELOS links are assigned to OSPF Area 1. UHF SNR is assigned
a lower link cost than HF IP, since it supports higher
bandwidth. Ship Local Area Networks (LANs) are statically routed
and area-less. Router-to-router traffic is filtered to free up
bandwidth for operator applications. The ship and NOC routers
are configured so that ship-to-shore traffic will be routed to
the closest shore node. From this node, traffic is then routed
to its destination using terrestrial assets, such as NOC-NOC
links.
All shore-to-ship traffic is routed via the national NOC of the
destination ship, whenever that ship has a direct SATCOM
connection. Shore-to-ship traffic will fail over to another
national NOC only when direct SATCOM is down, and another
nations ship could reach the destination ship over the LOS/ELOS
bearers.
BGP weights are also employed to direct traffic destined for one
nations ships to its national NOC when that NOC advertises the
ship. In the PRNOC routing configuration, a BGP weight of 40,000
is assigned to simulated Coalition ship routes when learned from
a Coalition NOC. The default BGP weights are 0 when learned from
a BGP neighbor and 32,768 when self-injected. BGP prefers higher
7-20
NTP 4(E)
weights, so the path to the Coalition ship via the Coalition NOC
is preferred if present.
If the direct SATCOM link between a national NOC and one of
its ships fails, BGP will failover to a route via another
nations NOC, if one exists and there is no alternative path
within the national Autonomous System (AS). If the direct
SATCOM link recovers however, BGP will normally continue to
prefer the path via the other nations NOC, since the ship is
now regarded by BGP as belonging to the other nations AS. In
order to insure that routing is always via the direct
national connection when available, conditional BGP
advertisements are used. This is accomplished using
advertise maps and non-exist maps, keying off the
presence or absence of the SATCOM links in the BGP database.
One such entry will be required for each allied ship. These
statements eliminate the allied ship routes when the allied
SATCOM link recovers after a failure.
Finally, Autonomous System (AS) prepending is employed when
each national NOC injects routes learned from another nations
ships (through OSPF) into BGP. This is done so that external
traffic will be preferentially routed directly to the appropriate
national NOC whenever that NOC advertises that it can reach its
own ships.
Operational and Technical Support
As UHF SNR and HFIP are newly introduced technologies,
documenting the network configuration of those ships and Strike
Groups so equipped is essential to ensure proper operation,
configuration control and support. Allied Communications
Publication 200 (ACP 200) defines such a document, the OPTASK NET.
Within the OPTASK NET, detailed network configurations and points
of contact are delineated.
LOS networking offers the possibility of direct ship-ship
communications. To date, SOPS have been developed permitting
ship-ship DNS services, Exchange E-mail and C2PC Gateway traffic
if HFIP or SNR connections are available. If a Sametime chat
server is available on a Force Level ship, it is also possible to
utilize the Sametime Connect Client with the Force-Level ship
server in a ship-ship mode in the event of satellite outage.
In the event of SATCOM outage, and no Sametime server is
available afloat, the ship-ship connectivity permits units to
reach back to shore via another ship. HFIP or SNR will relay IP
traffic to a platform with SATCOM connectivity, allowing the
affected unit to reach shore services at the NOC and beyond.
7.10 AUSCANNZUKUS Background
Early in WW II the lack of communications interoperability
between Allied Forces became a matter of concern for all nations.
7-21
NTP 4(E)
During 1941 the first high level proposals to formally structure
combined operations between the US and United Kingdom was
considered. These discussions were the genesis of the current
Combined Communications Electronic Board (CCEB). The origins of
the AUSCANNZUKS organization arose from dialogue between Admiral
Burke and Admiral Lord Mountbatten, in 1960.
AUSCANNZUKUS
strategies are to establish C4 policy and standards; identify
interoperability requirements and risks; developing and utilizing
new technologies and exchanging information on national C4
capabilities, plans and projects. OPNAV N6, OPNAV N6F4, SPAWAR
05 and SPAWAR Systems Center San Diego chair and represent the US
at the various AUSCANNZUKUS conferences and working groups.
OPNAV N6F4, SPAWAR 05, and SSC SD work together to support the
HFIP and SNR Program Office PMW-170 and In-Service Engineering
Agent to ensure Strike Groups and coalition nations deploy with
the proper operation, configuration control and necessary support.
AUSCANNZUKUS, SPAWAR 05, SPAWAR Systems Center San Diego and the
ISEA will assist the Strike Group Commander in generating the
OPTASK NET. Figure 7-9 illustrates AUSCANNZUKUS interaction with
other interoperability groups.
Figure 7-9
AUSCANNZUKUS interoperability focus
CENTRIXS In-Service Engineering Agent (ISEA)
SPAWARSYSCEN Charleston has been designated as the ISEA and
provides onsite and remote shipboard software, hardware and
technical support for both systems. All requests for technical
support should be directed to the ISEA. Prior to deployment, the
ISEA will configure the HFIP and SNR controllers that enable
Strike Group units to seamlessly form the Ad-Hoc HFIP and SNR
sub-networks. With the support of AUSCANNZUKUS representatives,
coalition ships are also configured prior to deploying with the
7-22
NTP 4(E)
appropriate configurations required to form the Ad-Hoc HFIP and
SNR sub-networks with USS ships installed with HFIP and SNR.
Concept of Operations
A Concept of Operations (CONOPS) document developed by OPNAV N6,
PMW-170 and AUSCANNZUKUS describes the use of the HFIP/SNR
Communications systems and associated platform specific radio
equipment during application of command, control, communications,
computers and intelligence (C4I) operations involving ships,
aircraft, submarines and shore stations. Further, this CONOPS
distinguishes the use of HFIP/SNR systems in an Allied/Coalition
or US Only operating environments. For more information
concerning HFIP, SNR and this section, contact the following
POCs.
Points of Contacts
Space and Naval Warfare Systems Command (SPAWAR) PMW-170 HFIP/SNR
APM
Mr. Lindell Edwards at (619)524-7571,
lindell.edwards@navy.mil
Chief of Naval Operations Allied Interoperability Assistant and
AUSCANNZUKUS Rep LT Joe Zuliani at (703) 601-1409,
joseph.zuliani@navy.mil
Space and Naval Warfare Systems Center, Charleston SC Det STL
Juliens Creek DAPM-ISEA Mr. James (Jay) Smith at (757)558-6863,
james.smith5@navy.mil
Space and Naval Warfare Systems Command FORCENET Allied
Interoperability, Trident Warrior Coalition Lead Engineer and
AUSCANNZUKUS Rep Mr. Martin Jordan at (858) 537-0109,
martin.jordan@navy.mil
Space and Naval Warfare Systems Center San Diego Gov Engineer Mr.
Jonathan Chan at (619) 553-7903, jonathan.chan@navy.mil
7-23
NTP 4(E)
7-24
NTP 4(E)
CHAPTER 8
COLLABORATIVE TOOLS
8.1 COLLABORATION AT SEA (CAS)
CAS is a set of tools that allow replication of information. CAS
provides deployed naval personnel the requisite knowledge for
sound decision-making. The goal of Collaboration at Sea is to
support a Network Centric Operation by enhancing the Speed of
Command and Improving Situational Awareness through Close
Coordination and Collaboration CAS allows a geographically
dispersed/mobile organization to collaborate around the world
using a web browser as the least common denominator. CAS is a
tool set that allows users to share knowledge and information
around the world using minimum bandwidth.
CAS has a menu system that is completely customizable by the Web
site administrators. Each Web site will have designated
individuals who are tasked with its maintenance. These site
administrators may be on multiple locations or in one place. The
distribution of this workload is at the discretion on the
Knowledge Manager. The web applications allow content providers
to post data using only a web browser. These applications do not
require personnel be trained in Webmaster skills (HTML coding,
web design, layout, etc.). Thus allowing the content provider to
focus on the quality of the content (e.g. ESG, CSG, JTF, etc.),
vice the mechanics of display.
Ships update their web servers through their SIPRNET connectivity
to the closest NOC. Replication is done hourly but can be more
frequent if the operational situation requires. Due to server
size and bandwidth limitations, ships receive only the website of
their assigned SG. CAS has implemented selective replication
allowing low bandwidth units to replicate only the large files
requested vice all documents. If a shipboard user wants to access
another SGs website, they must browse off the ship to the NOC.
Sametime chat servers are also located at each NOC and several
CVNs, where they provide chat and whiteboard capabilities to each
SG. SGs can use Microsoft Net meeting if necessary, but Sametime
and Net meeting clients are not compatible, and therefore cannot
talk to each other.
8.1.2 IBM SAMETIME
IBM SAMETIME is a DISA Net-Centric Enterprise Services (NCES)
program collaboration tool that allows Naval units to dynamically
interoperate within a joint environment. IBM SAMETIME provides a
variety of capabilities including instant messaging, web
conferencing and persistent group chat rooms. Instant messaging
and web conferencing both include point-to-point audio and video
8-1
NTP 4(E)
support, while web conferencing adds shared whiteboards and
desktop/application sharing. The chat rooms enable users to
review activity and associated documents independent of other
users. A history feature captures user messages and activity
over time in a shared area so information can be revisited when
needed. Due to RADIA packaging issues associated with the NMCI
network, additional presence and awareness features such as a
global access list, primary contacts list, local saving of chat
transcripts, and creating groups and sub-groups are not
accessible with the current IBM SAMETIME version 7.5.1. RADIA
packaging issues will be resolved with IBM SAMETIME version 8.0
which is projected for mid to late 2008.
Availability on Navy enterprise networks. In the classified
environment, IBM SAMETIME is fully available for use on the Navy
Marine Corps Intranet (NMCI SIPRNET) and the OCONUS Navy
Enterprise Network (ONE-NET SIPRNET) and available with
limitations on the NMCI NIPRNET. Current NMCI NIPRNET firewall
settings cause audio and video degradations when used with
instant messaging or web-conferences, but efforts are underway to
resolve firewall configuration without compromising network
security. For afloat customers, IBM SAMETIME is available for
use on classified and unclassified Information Technology for the
Twenty-First Century (IT-21) networks. Due to bandwidth
constraints, this capability will be limited to essential combat
spaces such as the Combat Information Center (CIC).
Navy Telecommunications Directive (NTD) 13-07 (ALCOM 190/07)
provides specific instructions (to include registration of
accounts) for IBM SAMETIME use. This NTD may be viewed on the
NETWARCOM Enterprise Work Space (NEWS) at: https://www.
fleetforces.navy.mil/netwarcom/readiness/spa/standardsandpolicy/n
351/default.aspx.
8.1.3 PERSISTENT CHAT (PCHAT)
CHAT is a synchronous real-time system. If a user joins a CHAT
session late, or drops out of an existing session, there is no
record of the discussion that has taken place during the period
of absence. Persistent CHAT is a tool that allows users to recall
CHAT conversations within a CHAT room to review information
previously passed. The room will also remain available as users
come and go from the application. It is used in most cases as
the primary means of collaboration for CENTRIXS.
8.2
8-2
NTP 4(E)
business and operations capability. By using the Navy NEP
architecture as a tool, as-is architectures can be developed
that will facilitate the transformation of the Navy. Many of
these as-is systems are complex and interrelated to other
systems. By using the NEP as a tool these systems migrate toward
common implementations of hardware and software solutions. In
addition, the architecture encompasses the resources and plans
currently being developed for the network-centric infrastructures
and services. The goal is to better enable Navy personnel to
perform their mission by providing enterprise-wide access to
knowledge bases and IT tools.
Navy Enterprise Portal Architecture
The NEP framework is presented as a three-tiered architecture
describing where the different technologies reside. The three
tiers presentation/client, application, and data/content are
described below:
1. Presentation/client The presentation/client tier focuses on
browser-based implementations and other devices such as personal
digital assistants (PDAs) or cellular phones. At present, the
NMCI configuration requires Microsofts Internet Explorer (IE).
IE supports the display of hypertext mark-up language (HTML),
dynamic hypertext mark-up language (DHTML), and extensible markup language (XML), and can access data sources via hypertext
transfer protocol (HTTP) and hypertext transfer protocol secure
(HTTPS).
2. Application The application tier consists of both
application logic, often referred to as components, and the
server that supports these components, which is referred to as
the application server. Component Based Design is the
commercial term applied to the process of developing individual,
functionally segregated application logic that can be integrated
to form higher level applications. Implementing a component-based
design process is the underlying strategy for providing an
integrated, interoperable NEP.
Application servers provide supporting infrastructure for the
components. At the application layer, enterprise-wide systems are
recommended. Java 2 Enterprise Edition (J2EE) is the preferred
distribution object model. J2EE is based upon open standards that
promote common interfaces for object use, storage, and run-time
interactions. However, minimum standards and message formats are
provided that ensure interoperability with networks Navy-wide,
joint, or coalition.
3. Data/content Web content is typically derived from either
static HTML files stored on the web server, or from dynamic data,
as in a database. Static HTML is easy to create, but is difficult
to maintain on large websites because the look and feel of the
website is stored inseparably from the data. The best commercial
software development practices dictate that the look and feel of
the presentation should be separated from the content, allowing
8-3
NTP 4(E)
them to be managed separately. Data can originate from a variety
of sources including relational databases, local file stores,
legacy systems, e-mail systems, groupware systems, directories,
search engines, other web services, intelligent agents, and even
other websites. Information sources may also be information
consumers, resulting in bidirectional information flows. At the
data/content layer, application logic may use a range of data
source access methods; however, primary relational databases will
be accessed with structured query language via Java database
connectivity (JDBC) or open database connectivity.
Each of the three tiers (and the overall structure of NEP) is
supported by information assurance and interoperability.
1. Information assurance is provided at each of the tiers. At the
presentation/client tier, users must authenticate to their
workstations and to the portal server. It is strongly desired
that the user will use the DOD public key infrastructure (PKI)issued digital certificate stored in the common access card (CAC)
to authenticate to the portal server. At this tier, the web
browser and the portal server communicate over HTTPS. At the
application tier, the portal uses HTTPS for user interaction and
provides access control, content management, centralized
administration, and software application services. At the
data/content tier, the portal must authenticate itself to the
application to obtain information requested by the user. All
transactions between the portal and the application accessing the
content are audited for security purposes.
2. Interoperability is the inter/intra-tier interface between and
within each of the components in the NEP architecture. Standards
and technologies are used to communicate between and within the
levels of the three-tier architecture. Interfaces to data,
registering services, querying through a common interface, and
interfaces to services are all used to communicate between and
within each of the three tiers.
8.3 INTRA-AMPHIBIOUS READY GROUP DISTRIBUTIVE COLLABORATIVE
PLANNING (IDCP)
IDCP is a capability provided to amphibious platforms. This
capability includes voice, IP data, and VTC exchanged over a
wideband LOS RF path. Four key systems make up the IDCP set:
1. DWTS
2. TSS
3. ADNS
4. TAC-VTC
8-4
NTP 4(E)
8.4 DEFENSE COLLABORATIVE TOOL SUITE (DCTS)
The DCTS is a flexible, integrated set of applications providing
interoperable, synchronous, and asynchronous collaboration
capability to the DODs agencies, combatant commands, and
military services. The DCTS program identifies, fields, and
sustains a dynamic set of evolving standard collaboration tools
that bridge between the DOD and the intelligence community. These
tools enhance simultaneous, ad hoc crisis and deliberate
continuous operational action planning (vertically and
horizontally) across operational theaters and other domains that
provide operational units and defense organizations simultaneous
access to real-time operational, tactical, and administrative
information.
DCTS offers voice and video conferencing, document and
application sharing, instant messaging, and whiteboard
functionality to support defense planning. It enables two or more
distributed operational users to simultaneously participate in
the mission-planning process without the need to be collocated.
With DCTS, military forces enjoy the capability to link various
C4I and mission-planning systems together on a common network to
share data, conduct collaborative planning, and collaboratively
consult on information and data at various locations around the
world. Full utilization of DCTS for video and application sharing
is too bandwidth-intensive for effective shipboard use.
8-5
NTP 4(E)
8-6
NTP 4(E)
CHAPTER 9
VOICE COMMUNICATIONS
9.1 GENERAL
This chapter presents an overview of voice communication
capabilities within the Navy and is intended to only serve as a
ready reference guide. For amplifying information, consult
current operational orders (OPORDs), OPTASK COMMS, Communication
Information Bulletins (CIB's) and ACP 125 (F).
9.2 FREQUENCIES
Cognizant FLTCOMs control voice frequencies and promulgate them
through area NCTAMS CIB's. If frequencies are not known or are
of poor quality, aircraft or forces afloat may make initial
contact for voice services using Advanced Digital Voice Terminal
(ANDVT), SATHICOM, or full period terminations. In addition to
requesting a suitable frequency, the unit will provide the
precedence of the call, activity to be called, and the date and
time the connection is required. The NCTAMS/NAVCOMTELSTA
concerned will coordinate the call and provide a suitable working
frequency.
9.3 CALL SIGNS
A station may be identified by several types of call signs
including the unit's name, aircraft tail number or an assigned
JANAP 119 or daily changing call sign. Fleet Commanders
communications operating plans will prescribe the specific form
of call sign to be employed based on the network used, operating
conditions, type of voice report and intended recipient of the
voice report.
1. The JOINT VOICE CALL SIGN BOOK contains voice call signs
(words) assigned for the following:
a. U.S. Air Force (for further assignment)
b. U.S. Coast Guard ships and activities
c. U.S. Marine Corps activities (including lists of
voice call signs for further assignment by area
commands.
d. U.S. Naval activities and ships
e. U.S. Coast Guard, Marine Corps and miscellaneous
aircraft assignments
f. Task organization
g. local and/or temporary assignments by U.S. Unified
and Specified commands and Naval Commanders to
9-1
NTP 4(E)
h.
i.
j.
k.
l.
9-2
NTP 4(E)
9.5 RADIO VOICE LOGS
Whenever practical to do so, radio logs are to be maintained on
all radio nets. Not all types of stations will be able to keep a
full log. The operator in an armored fighting vehicle is not
expected to maintain a log as neatly or completely as say a watch
stander on a ship or headquarters who is dedicated to a single
task.
Subject to the above, the radio log should contain a complete and
continuous record of all transmitted and received messages, and
information concerning the radio net. The log should be written
legibly in the operators own hand, and include all relevant
details and timings of the following:
1. All transmitted and received informal messages and voice
conversations in full or, where this is impractical, the
gist of a message in sufficient detail to provide adequate
reference information. Operators should attempt to log
messages between other users of the radio net, but it is
accepted that the logging of traffic between third parties
is likely to be of second priority during busy periods.
2. The identity of formal messages written separately on a
message form.
3. The opening and closing of the radio stations on the net.
4. Changes in operating frequency and interference reports.
5. Sufficient reference data to identify all other calls or
procedural messages transmitted or received on the net.
6. Entries to the effect that the radio receiver is operating
correctly in the receive condition. (These should be made at
regular intervals during periods of net inactivity.)
7. Reports of stations with whom contact is difficult or
suspect, amplified with any corrective action taken.
8. Unusual occurrences such as procedural or security
violations, or suspected deception or jamming. Entries
should include the reporting action taken.
9. Handover and takeover by the radio station operators. The
receiving operator is to record his rank, name and signature
to the effect that the transfer has been completed
satisfactorily. Unless other arrangements exist, this
signature is also to confirm that a complete check of any
classified material has been made.
Good log keeping is an essential part of the efficient operation
of a radio station, particularly at Control where the operator is
9-3
NTP 4(E)
responsible for other stations on the net. Radio logs to be held
in safe keeping in accordance with national / theater / command
instructions.
9.6 SECURE VOICE COMMUNICATIONS (FLEET ACCESS TO SECURE VOICE)
Aboard many afloat commands, the need to interface manual shore
based interconnection systems for secure voice has been overcome
by the development of robust continuous-access voice and data
systems such as Commercial Wideband Satellite Program (CWSP) and
Defense Satellite Communications system (DSCS). DSCS and CWSP
provide dynamic commercial bandwidth-on-demand for Plain Old
Telephone System (POTS), Secure Telephone (STE) or STU-III, FAX,
targeting imagery, and Battle Group Email. Combined with DSCS
satellite bandwidth, DSCS and CWSP provides an aggregate
bandwidth of 768Kbps or more to empower the warfighter with
connectivity on par with ashore counterparts. This growing
capability, in concert with more powerful data compression
techniques, will give the warfighter the ability to access and
deliver information almost instantaneously.
The Tactical Shore Gateway (TSG) has been developed to access and
interconnect existing and future secure voice communications
subsystems and equipment. Naval Secure Voice Subsystems
incorporate major terrestrial (wireline), SATCOM (both UHF and
SHF), and HF secure communications links. The SRWI is an
integrator of those systems, developed primarily to alleviate
limitations of existing Fleet Secure Voice Links and provide
interoperability of existing and planned subsystems and
equipment.
The SRWI provides the capability to connect the shore-base
worldwide wireline systems with the SATCOM, Defense Satellite
Communications Systems (DSCS), and alternate HF systems. The
system effectively extends shore communications seaward and
provides the same secure voice telephone communications to
commands at sea that are currently provided to the worldwide
shore establishment. The SRWI provides interconnection with or
among the Secure Voice Improvement Program (SVIP) channels (STUIII/STE units), a RED telephone bus, the Advanced Narrowband
Digital Voice Terminal (ANDVT) AN/USC-43(V) SATCOM radio
terminals (UHF, SHF, and in the future, EHF).
The SRWI is a manned subsystem that provides operator (manual)
control of the secure voice operations. Calls may be initiated
from either ashore or afloat with initial contact being made with
a shore operator at the appropriate NCTAMS or NCTS servicing the
afloat subscribers. The shore operator can interface any two
compatible subscribing channels. The operator can monitor one
side of any communication in progress (except when designated
private) and can also act as a net control.
9-4
NTP 4(E)
CHAPTER 10
COMMERCIAL COMMUNICATIONS AT SEA
10.1 SHIPCOM (AT&T)
ShipCom is the United States' only provider of HF SSB
radiotelephone ship-to-shore service through its network of
public coast stations. ShipCom also provides VHF radiotelephone,
ship-to-shore and shore-to-ship radio-telex, telegrams, HF SSB
email, and satellite communications.
ShipCom is the United States only 24 hour provider of HF SSB
radiotelephone and VHF radiotelephone Ship to Shore voice
service. ShipCom stations WLO WCL KLB and KNN are all remotely
controlled from Mobile, Alabama where operators are on duty 24
hours per day 7 days per week for radiotelephone Ship to Shore
and Shore to Ship calls.
Email
ShipCom provides radio email service via HF SSB radio. The
ShipCom system supports SITOR, AMTOR, PACTOR and PACTOR II. No
special software is needed to access the ShipCom email system.
Vessels equipped with GMDSS HF SITOR may send email via the
ShipCom system using the SITOR TELEX terminal. Special software
now enables crew members on any vessel to setup an account with
ShipCom which will allow them to access Internet email via the
ship's SITOR TELEX system without any charges being incurred by
the vessel. Vessels equipped with Pactor and Pactor II modes of
transmission enjoy faster throughput and the full ascii character
set. The ShipCom email system also offers weather, news and
sports information.
ShipCom does an hourly FEC broadcast on each of the simplex
channels listed under frequencies. This broadcast may be used for
tuning purposes and to determine which ShipCom frequency provides
the best signal. To access the ShipCom email system, simply tune
your radio to the appropriate frequency as found under
frequencies on this web site. For SITOR/AMTOR modes place an ARQ
call to 1090 (XVSV). For Pactor modes, Pactor call WLO-1. Vessels
must be registered with ShipCom in order to send and receive
email and weather information. Operators are available 24 hours
daily for assistance if required. Type OPR to access the ShipCom
operator.
Fax
Vessels using ShipCom's SITOR or Pactor systems may send text
messages to any fax machine world wide. Messages are composed on
the ship's SITOR terminal and are sent to any fax machine using
the send fax command. While it is possible to send a fax message
from Shore to Ship on suitably equipped vessels, ShipCom does not
recommend this practice as delivery is usually difficult and the
10-1
NTP 4(E)
sender is charged for failed delivery attempts.
Satellite
ShipCom can send messages to any satellite terminal in the world.
Messages may be billed to Visa, Master Card, Discover, American
Express or to your home or business telephone. Messages to
satellite terminals should be addressed to wloradio@wloradio.com
and must include the Vessel name, radio callsign, MMSI and the
satellite number if known.
Telegrams
ShipCom can send radio - telegrams to most any ship in the world.
Telegrams may be billed to Visa, Master Card, Discover, American
Express or to your home or business telephone. The charge for
sending a radio-telegram to a ship is $25.00 for the first 50
words.
VHF
ShipCom provides VHF radiotelephone service to a typical distance
of 50 miles off shore from the above locations. To access the
ShipCom operator select the appropriate channel and hold your
transmit key for 5 seconds. The charge for VHF radiotelephone
service is .99/minute with a 3 minute minimum. Calls may be
placed collect to anywhere in the United States.
Telex
Vessels equipped with SITOR can send directly connected Telex
messages to any telex terminal in the world. Vessels can also
send store and forward Telex messages. Store and forward Telex
messages are less expensive and usually arrive within minutes of
transmission. Telex messages may be sent from shore to ship by
sending the telex to 6827072 or 505444. The message should
include the Ship Name and Radio Callsign and MMSI number. Telex
messages may also be sent by emailing to wloradio@wloradio.com.
The email containing the Telex message should also contain the
Ship Name, Radio Callsign and MMSI number. ShipCom will deliver
Telex messages via radio or satellite to the vessel. Parties
sending Telex messages sent with PC (paid confirmation) will
receive notification of successful delivery of the message to the
Ship.
Weather
The ShipCom operators can provide vessels with weather
information and are always available should an emergency ever
arise while you are at sea. Using ShipCom is simple. Simply tune
your radio to the appropriate channel as listed on our
frequencies page. Call one of the ShipCom stations by depressing
your microphone and saying WLO WLO WLO this is the M/V My Ship
10-2
NTP 4(E)
calling on channel 824. The operator will ask you for your
position and will optimize the radio circuit before placing your
call. For Shore to Ship calls, the calling party should give the
operator the name of the vessel and radio callsign. ShipCom will
broadcast a list of vessels that we are holding calls for at the
top of each hour following the weather broadcast.
ShipCom transmits hourly weather and traffic list on selected ITU
HF SSB voice channels. For a schedule of the weather products and
broadcast times see the frequencies page. Virtually any weather
product is available via ShipCom's HF SITOR / Pactor system on
demand. All ShipCom weather products are automatically updated
from the National Weather Service. Vessels sending AMVER and OBS
messages are entitled to receive free weather products via SITOR
or Pactor. For more information on the AMVER/OBS programs ask
your ShipCom operator.
10-3
NTP 4(E)
10-4
NTP 4(E)
CHAPTER 11
INFORMATION ASSURANCE/COMPUTER NETWORK DEFENSE
11.1
INFORMATION ASSURANCE
11-1
NTP 4(E)
assistance in designing optimal technical solutions to combat
virus software.
11.1.3
ANTI-VIRUS SOFTWARE:
11-2
NTP 4(E)
1. Prevention: adopt good, virus-awareness habits of PC use.
Taking simple precautions can prevent many hours of tedious
work required to disinfect a PC should a virus occur.
2. Detection: viruses can normally be detected only by the use
of special virus-detection software which can also be
downloaded from the INFOSEC website.
3. Cure: promptly eliminating viruses if/when found. The NCDOC
support staff can assist and provide alternative methods for
virus elimination. The Navy's INFOSEC Help Desk / Service
Center (1.800.304.4636) can also assist you with the Antiviral Software and virus problems.
Some helpful hints in maintaining your PC virus free:
1. Beware of an e-mail message with a binary file attachment.
You can catch a virus from a binary file attachment to an email message, like the MIME or Uuencoded files that are
normally sent over the Internet. If you receive a binary
file, scan it with a virus scanner before opening it.
2. Install a memory-resident virus checker to detect suspicious
program activity. Norton and McAfee Anti-Virus are good
choices. Also, regularly scan your hard disk for viruses.
Home PCs are often infected by your children or yourself
passing diskettes around, by disks from the office, or by
computer repair shop diagnostic disks. This is one of the
largest points of entry for DoD infections.
3. Scan anything you download off the Internet or online
services. Some software packages do this for you. Ideally,
you should download programs to a floppy and then scan them
before copying them to your hard disk.
4. Use several types of virus scanners. A virus that slips past
one product might be picked up by another.
5. Disable Java/JavaScript in your browser unless youre
visiting a TRUSTED Site. Java is a very powerful tool and
works by downloading executable files to your PC. Security
is built in, but Java may contain holes for virus makers to
exploit. Caution should be exercised when you notice JAVA
running.
6. Scan all portable media brought into your Command.
11-3
NTP 4(E)
DoDI O-8530.2, CJCSM 6510.01 and NETWARCOM Instruction 5450.4.
NCDOC responsibilities involve, but are not limited to, the
following:
1. 24/7 CND Service Subscriber Support: NCDOC maintains a 24/7
watch that monitors the defensive readiness of Navy
NIPRNET/SIPRNET networks and aggressively fights the net
through detection and analysis of adversarial operations.
NCDOC personnel pro-actively detect, deter, respond, and
remediate intruder threats within Navy networks, including
malicious activity (either internal or external in origin)
and malicious logic (computer viruses, worms, etc.). NCDOC
will provide tailored assistance and recovery
recommendations and/or directives to Navy commands involved
in cyber incidents.
2. Navy Enterprise Sensor Grid: NCDOC monitors and oversees the
operation of the Navy Enterprise Sensor Grid and all
Intrusion Detection Systems (IDS)/Intrusion Prevention
Systems (IPS) capabilities in place on Navy NMCI, BUMED,
Excepted (legacy) and ONENET networks. The recent conversion
of IPS sensors at Network Operation Security Centers (NOSCs)
and Fleet Network Operations Centers (FLTNOCs) provide a
proactive defense mechanism designed to detect malicious
activity across all Navy enclaves, including IT-21. The Navy
Enterprise Sensor Grid provides an optimized, robust, joint
interoperable computer network defense capability enhancing
the Navys defense in depth strategy.
3. Vulnerability Assessment (VA) Support: Vulnerability
assessments are a critical contributor to CND operational
readiness and essential as a means of measuring the posture
of DoD information systems and computer networks. NCDOC
conducts directed network vulnerability scanning to check
for compliancy with IAVM, UTN-P Policy and STIGs.
4. Notifications: NCDOC will notify CND service Subscribers of
activity that may adversely affect Navy networks. These
notifications will be in the form of NCDOC advisories and
alerts. The advisories/alerts will be disseminated via
record message traffic (DMS) and will include maintenance
actions, power outages affecting sensors or other CND
capabilities, virus outbreaks, network threats and
vulnerability assessments. NCDOC will also notify CND
Service Subscribers upon completion of an incident
investigation.
5. Information Assurance Vulnerability Management (IAVM): The
IAVM Process is one of the core components of both the
Navy's and the Joint Forces Information Assurance Program.
IAVM is the process by which emerging vulnerabilities are
identified and corrected throughout the DoD. The Assistant
Secretary of Defense has the overall responsibility for the
implementation of the IAVM program policy and procedures
11-4
NTP 4(E)
across all C/S/As and field activity. USSTRATCOM is
responsible for maintaining overall responsibility for IAVM
program execution. JTF-GNO is responsible for monitoring
relevant sources of information to discover security
conditions that may require IAVM vulnerability notification,
assessing risk associated with software vulnerabilities and
developing IAVM vulnerability notifications. JTF-GNO reports
directly to USSTRATCOM and is responsible for integrating,
coordinating, and executing computer network operations
across the joint services.
Upon detection or reporting of a new vulnerability, JTF-GNO will
validate the presence and impact of the vulnerability. In the
event JTF-GNO determines the vulnerability poses an immediate
risk to DoD systems, an Information Assurance Vulnerability Alert
(IAVA) will be issued. At a minimum, the IAVA will contain a
summary of the vulnerability, its probable impacts, and any
countermeasures or actions JTF-GNO may direct.
Within the Navy, NCDOC is responsible for all CND operations.
When an IAVA message is received, NCDOC is required to
immediately notify all affected Navy units and coordinate
compliance activities across the entire Navy. NCDOC is required
to take corrective action within 30 days and report back to JTFGNO with the Navy's compliance statistics. When in receipt of an
IAVA, Navy units will take the following actions:
1. Navy units must confirm acknowledgement of IAVAs by
identifying and submitting report of affected assets in the
Online Compliance Reporting System (OCRS) no later than 4
days (additional days if they fall on a weekend) after
release. Units must comply within the compliance date,
generally 30 days. If they are unable to meet compliance
deadline, a mitigation plan must be submitted and approved
for non-compliant assets.
2. Navy units must confirm acknowledgement of IAVBs by
identifying and submitting report of affected assets in the
OCRS no later than 4 days (additional days if they fall on a
weekend) after release. Units must comply within the
compliance date, generally within 45 days or less. If they
are unable to meet compliance deadline, a mitigation plan
must be submitted and approved for non-compliant assets.
3. Navy units will acknowledge receipt of CTOs based on
criticality (usually 4 days, but may be adjusted). Units
will comply with CTOs based on criticality as defined by
NCDOC/NETWARCOM.
4. NCDOC will notify the DAA in situations where IAVA
compliance cannot be achieved in a timely fashion, when
applicable. The DAA may recommend disconnection from the GIG.
In certain cases, the DAA may approve commands or Programs
of Record (POR) to operate in a high risk status for a short
11-5
NTP 4(E)
period of time. This typically applies to Programs of
Record (POR) that require formal configuration control and
testing prior to deploying any new patches. These waivers
are not permanent and the POR is required to address the
IAVA. In some situations where IAVA compliance could
adversely impact the operational capability of the Fleet or
an individual ship, the ship's CO has the authority for nonPOR systems to issue a temporary waiver until such time as
the immediate operational situation is resolved. NETWARCOM
has the authority to not publish IAVM messages if they
determine there will be a major impact to the fleet, etc.
NTP 4(E)
11-7
NTP 4(E)
attack in order to ensure the availability and integrity of
critical systems and data. The DoD has identified four specific
layers for defense in depth:
1. Host or end user systems.
2. Enclaves and the enclave boundary, in this case a shipboard
LAN.
3. Networks that link the enclaves, typically WANs.
4. Supporting infrastructures.
CND for the CSG or ESG is primarily focused on the first three
layers.
1. CSG/ESG CND begins at the FLTNOC. There, all IP traffic
addressed to the SG goes through a sophisticated array of
screening routers, firewalls, network intrusion detection
sensors, and virus scanning software before being routed to
the SG.
2. The WAN links between the NOC and an individual SG ship
consist of satellite communication links, which vary
depending on ship class and installed systems. These links
are encrypted at the appropriate classification level by
standard cryptographic devices. For wideband SATCOM systems
such as SHF, additional bulk encryption of the entire
communications channel is performed to provide transmission
security (TRANSEC).
3. Shipboard, CND is provided by routers, firewalls, intrusion
detection devices, virus protection software, and network
monitoring tools. Exact configurations vary greatly, with
CVNs and other ship classes configured with large LANs
having the most comprehensive and sophisticated capabilities.
The Navy is moving as much as possible toward embedded
security features that are built in to both software
applications and hardware in an effort to minimize network
complexity and to automate CND functions.
11.3 INCIDENT HANDLING REPORTS
Comprehensive reporting and responding to reportable events and
incidents is vital to ensuring commanders successful
accomplishment of their operational missions and continued
operation of DoD systems and networks.
Due to increased Joint and Combined operations, increased
reliance on IT, increased threat to IT, and increased network
centric operations requiring networks to be more resilient, the
11-8
NTP 4(E)
need for standardized incident handling practices across the DoD
is imperative.
Federal guidance mandates establishment of an incident response
capability. The Federal Information Security Management Act
(FISMA) of 2002 requires federal agencies to have in place
incident detection and reporting mechanisms. Appendix III to
Office of Management and Budget(OMB) Circular No. A-130 Security
of Federal Automated Information Resources directs agencies to
establish formal incident response mechanisms. DODI O-8530.01
identifies five phases of CND:
1.
2.
3.
4.
5.
Protect
Monitor
Detect
Analyze
Respond
NTP 4(E)
FM COMMAND NAME//
TO NAVCYBERDEFOPSCOM NORFOLK VA//
INFO COMSTRKFORTRAPAC//
NAVIOCOM NORFOLK VA//
NAVIOCOM SAN DIEGO CA//
(APPROPRIATE CHAIN OF COMMAND)//
//CLASSIFICATION// SECRET FOR SIPRNET OR UNCLAS//FOUO FOR NIPRNET,
REFER TO CJCSM 6510.01 CH3, PAGE 44 SECTION F FOR MORE
INFORMATION)
SUBJ: POSSIBLE COMPUTER INTRUSION INCIDENT//
MSGID/GENADMIN//
REF/A/DOC/CJCSM/8MAR2006//
REF/B/MSG/COMNAVNETWARCOM NORFOLK VA/151503ZMAY2006//
REF/C/DOC/OPNAV/03MAR1998//
NARR//REF A IS CJCSM 6510.01, CHANGE 3, DEFENSE-IN-DEPTH:
INFORMATION ASSURANCE (IA) AND COMPUTER NETWORK DEFENSE (CND)
- APPENDIX B, INCIDENT HANDLING PROGRAM. REF B IS NAVY
TELECOMMUNICATIONS DIRECTIVE (NTD) 04-06, COMPUTER INCIDENT
HANDLING PROGRAM. REF C IS OPNAVINST 2201.2 NAVY AND MARINE CORPS
COMPUTER INCIDENT RESPONSE.
RMKS/1. CERT/CIRT INCIDENT NUMBER:
2. PRIMARY INCIDENT CATEGORY:
3. SECONDARY INCIDENT CATEGORY:
4. ATTACK VECTOR:
5. WEAKNESS:
6. LAST UPDATE:
7. INCIDENT START DATE:
8. INCIDENT END DATE:
9. STATUS:
10. SYSTEM CLASSIFICATION:
11. DETECTING UNIT OR ORGANIZATION:
12. ACTION TAKEN:
13. ORGANIZATION TRACKING:
14. CERT DATE REPORTED:
15. OPERATIONAL IMPACT:
16. MAJOR COMMAND:
17. SYSTEM IMPACT:
18. SYSTEMS AFFECTED:
19. STAFF HOURS LOST:
20. EXERCISE NAME:
21. EVENT DESCRIPTION:
22. SOURCE IP AND PORT:
23. INTRUDER(S) (IF KNOWN):
24. ORIGIN (COUNTRY):
25. TARGET IP(S) AND PORT:
26. TECHNICAL DETAILS:
27. PHYSICAL LOCATION (BASE, CAMP, PORT OR STATION):
28. TECHNIQUE, TOOL, OR EXPLOIT USED:
29. OS AND VERSION OF OS:
30. USE OF TARGET (E.G. WEB SERVER, FILE SERVER, HOST):
31. DOD NETWORK:
32. COMMENTS:
33. SYNOPSIS:
11-10
NTP 4(E)
34. OPREP 3 REPORTING:
35. CONTACT INFORMATION:
NAME:
ORGANIZATION:
TELEPHONE:
FAX:
E-MAIL:
11.5 INFOCON
The INFOCON strategy has shifted from a threat-based, reactive
system to a readiness-based and proactive approach. This
represents a significant change in how commanders at all levels
ensure the security and operational readiness of their
information networks. CJTF-GNO will recommend changes in DoD
INFOCON levels to CDRUSSTRATCOM who will, based upon necessity,
direct a DoD level INFOCON change. NCDOC will disseminate global
INFOCON level changes to Navy components. Combatant Commanders
(COCOM) retain the authority to set regional INFOCON levels,
however, regional and/or theater INFOCON levels must remain at
least as stringent as the DoD level. Regional COCOMS who
independently raise INFOCON levels are required to notify
USSTRATCOM as time allows. NCDOC will coordinate Navy INFOCON
implementation with COCOMS and Service components in advance. The
INFOCON mirrors the alert system of the Chairman of the Joint
Chiefs of Staff, Defense Conditions (CJCS Manual 3402.1B, Alert
System of the Chairman of the Joint Chiefs of Staff) and are a
uniform system of 5 progressive readiness conditions. INFOCON
5,INFOCON 4, INFOCON 3, INFOCON 2, and INFOCON 1. INFOCON 5 is
normal readiness and INFOCON 1 is maximum readiness. Each level
represents an increasing level of network readiness based on
current operations, threats, and vulnerabilities. INFCON specific
tasks are augmented by tailored readiness options (TROS), which
are applied in order to respond to specific intrusion
characteristics or activities as directed by CDRUSSTRATCOM or
COCOMS.
The INFOCON system relies heavily on the capabilities of system
administrators to manage their networks and data systems,
ensuring a heightened level of readiness for day-to-day and
crisis operations. INFOCON attainment is paramount to mitigating
enemy capabilities and deterring intent of computer exploitation
and attacks. Specific tasks are reference in Appendix 12 to Annex
C (Operations) to JTF-GNO OPORD 05-01 (Global Network
Operations). The 5 progressive INFCON levels are defined below:
INFOCON 5 Characterized by routing NETOPS normal readiness of
information systems and networks that can be sustained
indefinitely. Information networks are fully operational in a
known baseline condition with standard information assurance
policies in place and enforced. Baseline is defined as a process
allowing system administrators, either by software or manually, a
means to measurable restore confidence in their information
11-11
NTP 4(E)
systems. By comparing a known good baseline of each network asset
to its current state, an administrator can potentially detect the
presence of intruder activity. The first step in establishing a
known valid baseline is accomplished when a system is first
brought on line or has been rebuilt. This is a snapshot of the
network in its most pristine state and establishes the norm
to which all future comparisons are made. At this point, a
restoration image of the operating system, critical applications
and firmware should be created. The second step, referred to as
validation, is the portion of the base lining procedure in which
a snapshot of a current system is compared to the known valid
pristine baseline and the changes between the two are
identified and accounted for. During INFOCON 5, system and
network administrators will create and maintain a snapshot
baseline of critical and non-critical systems, servers,
workstations (i.e., BDC, PDC, routers, etc) in a known good
configuration and develop processes to update that baseline for
authorized changes. Validations of the known baseline occur every
180 days.
INFOCON 4 Increases NETOPS readiness either in preparation for
operations or exercises or in response to network events, with a
limited impact to the end user. System and network administrators
will establish an operational rhythm to validate the known good
image of an information network against the current state and
identify unauthorized changes. Additionally, user profiles and
accounts are reviewed and checks conducted for dormant accounts.
By increasing the frequency of this validation process, the state
of an information network is confirmed as unaltered (i.e., good)
or determined to be compromised. Impact to end-users is
negligible. This INFOCON level should be able to be maintained
for a prolonged period of time as the situation dictates.
INFOCON 3 Further increases NETOPS readiness by increasing the
frequency of validation of the information network and its
corresponding configuration. Impact to end-users is minor. This
INFOCON level should be able to be maintained for a moderate
period of time as the situation dictates.
INFOCON 2 Is a readiness condition requiring a further increase
in frequency of validation of the information network and its
corresponding configuration. The impact on system administrators
will increase in comparison to INFOCN 3 and will require an
increase in preplanning, personnel training, and the exercising
and pre-positioning of system rebuilding utilities. Use of hot
spare equipment can substantially reduce downtime by allowing
rebuilding in parallel. Impact to end-users could be significant
for short periods. This impact can be partially mitigated through
thorough training and proper sequencing of INFOCON actions. This
INFOCON level should be able to be maintained for a moderate
period of time as the situation dictates but it is understood it
will impose significant resource challenges.
INFOCON 1 Is the highest readiness condition and addresses
intrusion techniques that cannot be identified or defeated at
lower readiness levels (e.g. Kernel Root Kit). It should be
11-12
NTP 4(E)
implemented only in those limited cases where INFCON 2 measures
repeatedly indicate anomalous activities that cannot be explained
except by the presences of these intrusion techniques. Once a
baseline comparison no longer indicates anomalous activities,
INFOCON 1 should be terminated. The impact on system
administrators will be significant and will require an increase
in preplanning, personnel training and the exercising and prepositioning of system rebuilding utilities. Use of hot spare
equipment can substantially reduce downtime by allowing
rebuilding in parallel. Impact to end-users could be significant
for short periods. This impact can be partially mitigated through
thorough training and proper sequencing of INFOCON actions. This
INFOCON level should be able to be maintained for a brief period
of time as the situation dictates. NCDOC will direct Global
INFOCON level changes to navy assets. In addition to the Global
INFOCON level set by USSTRATCOM, COCOMS may, based on their own
established evaluation criteria, raise the theater INFOCON level
higher than the established DoD Global INFOCON level. COCOMS are
required to notify USSTRATCOM of theater directed INFOCON changes
to determine and mitigate operational impact to the GIG. NCDOC
will coordinate Navy INFOCON implementation with COCOMS and
service components.
11.6 RED TEAM SURVEYS
The Navy Information Operations Command Norfolk (NIOC-N) Red Team
was initially formed to support the Secretary of the Navys
(SECNAV) memorandum of 24 October 1996, as a process by which to
gauge the information assurance operational readiness of United
States Naval Forces.
The Red Teams role in the Information Assurance process
logically follows a policy review and vulnerability assessment.
The Red Team may or may not be a part of the actual assessment
process. Following the policy review and assessment, and a
network vulnerability assessment, a penetration test can be
requested by the requesting command. The Penetration test is
normally conducted in two phases. Phase 1 involves the collection
of unclassified information through open sources. During this
phase, the Red Team will attempt to characterize the target and
its systems, identify potential vulnerabilities, and concurrently
analyze information gathered to plan activities to be considered
for execution during the next phase. Phase 2 is the active
network attack/exploit phase and requires 24/7 White Cell to
ensure the scope of the exercises is maintained, and that all
exercise activity ceases immediately in the case of real world
activities. Generally, the Red Team emulates an opposition force
and collects information on the target, processes the information
to plan an IO attack, then carries out the attack. The goal is to
improve the readiness of U.S. Forces through discovery and
demonstration of information vulnerabilities and illustration of
achievable adversary operational impact.
11-13
NTP 4(E)
The Red Team process and application can be found at the
following website: https://www.ncdoc.navy.mil
11.7
11-14
NTP 4 (E)
APPENDIX A
LIST OF ACRONYMS
One of the side effects of modern communications is the
proliferation of acronyms, abbreviations and code words that have
come into use. This appendix is a list of common Command, Control
Communications, Computers, and Intelligence (C4I) acronyms. This
appendix is by no means all-inclusive. It is entered as an aid to
persons new to Naval Communications and C4I systems to enable
them to more easily grasp this increasingly complex field.
AADC
AADS
AAN
AAP
AARC
AATC
AAW
AAWC
ABM
ACC
ACU
ACAT
ACCES
ACL
ACLS
ACTD
ACTS
ACU
ACDS
ACINT
ACLS
ACMS
ACMS
ACO
ACT
ACTD
ADA
ADE
ADMS
ADNS
ADP
ADS
ADS
ADS
ADSI
ADTU
ADT
AdvHDR
ADW
AEHF
AEGIS
NTP 4 (E)
AEHF
AEL
AER
AFATDS
AFB
AFRTS
AGF
AIC
AIEWS
AIG
AIM
AIMD
AIP
AIPS
AIS
AIS
AIT
AJ
AKDC
ALCND
ALE
ALIS
AMHS
AM
AMP
AMPS
ANCC
ANCC/ATC
ANDVT
ANSI
AOA
AOC
AODA
AOP
AOR
AOR
AOR
AOR-E
AOR-W
APG
API
APL
APM
APS
APTS
APTS
AR
ARG
ARGSIT
ARS-ST
System
Advanced EHF
Allowance Equipage List
Alteration Equivalent to a Repair
Advanced Field Artillery Tactical Data System
Air Force Base
Armed Forces Radio Television Service
Command Ship
Air Intercept Control
Advanced Integrated Electronic Warfare System
Address Indicator Group
Advanced INFOSEC Module
Aircraft Intermediate Maintenance Departments
Assured IP (Internet Protocol)
Alteration Installation Planning System
Automatic Identification System
Automated Information System
Alteration Installation Team
Anti-Jam
Automatic Key Distribution Center
Computer Network Defense Alert
Automated Link Establishment
Aegis LAN Interconnection System
Automated Message Handling System
Amplitude Modulation
Advanced Message Protocol
Afloat Master Planning System
Automated Network Control Center
Automated Network Control Center/
Automated Technical Center
Advanced Narrowband Digital Voice Terminal
American National Standards Institute
Analysis of Alternatives
Air Operations Center
Air/Ocean Data Assimilation
Air/Ocean Prediction
Area of Responsibility
Area of Operational Readiness
Atlantic Ocean Region (W-West; E-East)
Atlantic Ocean Region East
Atlantic Ocean Region West
Antenna Pedestal Group
Application Programming Interface
Allowance Parts List
Assistant Program Manager
Afloat Planning System
Afloat Personal Telecommunications Service
Afloat Personal Telecommunications System
Alteration Request
Amphibious Ready Group
Amphibious Ready Group System Integration
Testing
Airborne Receiving System-Surface Terminal
A-2
NTP 4 (E)
ARPA
ASCII
ASD
ASD
ASN
ASCIET
ASCII
ASIU
ASOS
ASSU
ASTAB
ASW
ATC
ATC
ATDLS
ATG
ATIS
ATIS
ATM
ATO
ATO
ATOCS
ATP
ATRC
AUTODIN
AUTODIN
AV3M
B2CA
BAN
BAR
BARP
BBS
BCA
BCST
BER
BEST
BEUI
BEWT
BF
BFAO
BFEM
BF CCB
BFIN
BFIT
BFO
BFOSS
NTP 4 (E)
BFS
BFT
BFTT
BG
BG CELL
BGDBM
BGSA
BGIT
BGIXS
BGPHES
BIOS
BISOG
BIT
BLOS
BLII
BM
BMCs
BMD
BMTA
BNIDS
BNMC
BOD
BOM
BPR
bps
BPSK
BRB
BRT
BTU
BUMED
BUPERS
BW
BWS
C@S
C&L
C2
C2I
C2P
C2PC
C2W
C2WC
C2WCM
C3
C3F
C3I
C4
C4I
NTP 4 (E)
C5I
C5IMP
C4IFTW
C4IMP
C4ISR
CA
C&A
CAC
CAW
C&A
CA
CATS
CAC
CADRT
CAEMS
CAF
CAI
CAIII
CAINS
CALS
CANTRAC
CAP
CARTS
CAS
CASREP
CASS
CATCC
CATF
CBT
CBI
CC
CCA
CCB
CCIB
CCIP
CCOP
CCOI
CCSG
CCTV
CDBS
CDC
CDD
CDE
CDF
CDL
CDL-N
CDLMS
CDLS
CDMA
and Intelligence
Command, Control, Communications, Computers,
Intelligence, and Combat Systems
C5I Modernization Process
C4I For The Warrior
C4I Modernization Plan
Command, Control, Communications, Computers,
Intelligence, Surveillance, and
Reconnaissance
Certificate Authority
Certification & Accreditation
Common Access Card
Certificate Authority Workstation
Certification and Accreditation
Challenge Athena
Consolidated Area Telephone System
Common Access Card
Computer Aided Dead Reckoning Tracer
Computer Aided Embarkation Management System
Combat Air Forces
Computer Aided Instruction
Challenge Athena III (Now CWSP)
Carrier Aircraft Inertial Navigation System
Continuous Acquisition and Life Cycle Support
Catalog of Navy Training Courses
Channel Access Protocol
CASREP ACTION RESPONSE TRACKING SYSTEM
Call Accounting System
Casualty Report
Centralized Aircraft Support System
Carrier Air Traffic Control Center
Commander Amphibious Task Force
Computer Based Training
Computer Based Instruction
Combat Control
Circuit Card Assembly
Change Control Board
Configuration Control Interoperability Board
Requirements Group
C4I Capabilities Implementation Plan
Cryptologic Carry-On Program
Critical Contact of Interest
Commander Carrier Strike Group (Formerly BG)
Closed Circuit Television
Central Data Base Server
Combat Direction Center
Capability Development Document
Common Desktop Environment
Combat Direction Finding
Combat Data Link
CDL-Navy
Common Data Link Management System
Common Data Link System
Code Divisional Multiple Access
A-5
NTP 4 (E)
CDO
CD ROM
CDNU
CDSA
CDU
CEA
CEC
CEG
CENTRIXS
CEO
CEPS
CeTARS
CEVI
CFCP
CFE
CFFC
CFM:
CFT
CG
CG MEF
CHBDL-ST
CHET
CIA
CIB
CIBS-M
CID
CIDLS
CIP
CINC
CISN
CISSP
CIWS
CJTF
CJCSI
CLAN
CLEW
CLIN
CLIP
CM
CMATT
CMFP
CMIO
CMP
CMS
CMS
CMSA
NTP 4 (E)
CNAF
CNAL
CND
CNDiD/BA
NTP 4 (E)
CRT
CRWG
CRIU
CSAR
CSD
CSD
CSDTS
CSEL
CSFTL/P
CSG
CSMP
CSRR
CSRR
CST
CSU
CSU
CSP
CSDTS
CSEDS
CSEL
CSG
CSIT
CSMA/CA
CSMA/CD
CSO
CSOSS
CSRR
CSS
CSU
CTAPS
CTO
CTP
CTT/HR
CUB
CUDIXS
CV/CVN
CVBG
CVNS
CVIC
CW
CWID
CWSP
C2/MC2
C3/MC3
NTP 4 (E)
DAA
DAB
DAGR
DAMA
DAT
DB
DBSS
DBU
DCE
DCD
DCGS-N
DCM
DCP
DCS
DCS
DD
DDG
DDN
DDS
DDRT
DECM
DED
DEERS
DEP
DESRON
DF
DFAS
DFAX
DGSIT
DGAR
DGB
DHCP
DIACAP
DII
DIWS-A
DIN
DISA
DISN
DITSCAP
DITCO
DL
DLT
DMA
DMP
DMR
DMS
DMSP
DNC
DNL
DNP
- D
Designated Approval Authority
Defense Acquisition Board
Defense Advanced GPS Receiver
Demand Assigned Multiple Access
Digital Audio Tape
Decibel
Direct Broadcast Satellite Service
DMS Business Utility
Data Communications Equipment
Decision Centered Design
Distributed Common Ground Station-Navy
Drydock Continuous Maintenance
Department of the Navy Control Points
Defense Communications System
Display Control Subsystem
Destroyer
Guided Missile Destroyer
Defense Data Network
Digital Data Set
Digital Dead Reckoning Tracer
Decoy Electronic Countermeasures
Dead Availability
Defense Eligibility Enrollment System
Distributed Engineering Plant
Destroyer Squadron
Direction Finding
Defense Finance and Accounting System
Direct-dial Facsimile
Deploying Group Systems Integration Testing
Defense Advanced GPS Receiver
Design Guidance Baseline
Dynamic Host Configuration Protocol
Defense Information Assurance Certification
and Accreditation Program
Defense Information Infrastructure
Digital Imagery Workstation Suite Afloat
Defense Intelligence Network
Defense Information Systems Agency
Defense Information System Network
Defense Information Technology Security
Certification and Accreditation Process
Defense Information Technology Contracting
Organization
Depot Level
Digital Line Tape
Defense Mapping Agency
Depot Modernization Period
Digital Modular Radio
Defense Message System
Defense Meteorological Satellite Program
Digital Nautical Charts
Dual Net Link
Dual Net Processor
A-9
NTP 4 (E)
DNS
DoD
DODCP
DODIIS
DON
DOS
DPS
DRPM
DRSN
DS
DSA
DSA
DSA
DSCS
DSIU
DSL
DSN
DSN
DSP
DSP
DSP
DSU
DSVL
DSVT
DTD
DT&E
DTE
DTED
DTH
DT/OT
DTR
DTS
DTTS
DTTS
DUCA
DUSC
DWT
DWTS
E3
EADS
EC5G
EC
EC
EC
eCCB
ECCM
ECDIS-N
NTP 4 (E)
ECMU
ECP
ECRC
ECRNOC
ECS
ECU
EDD
EDM
EDO
EDSRA
EELV
EFW
EHF
EHF MDR
EIP
EIP
EIRP
E JNL
EKMS
ELF
ELINT
EMC
EMCON
EMI
EMP
EMS
EMSS
eNTRS
ENTSG
ENWGS
EOA
EOB
EOD
EOL
EPLRS
ERDB
ERNOC
ERP
ESD
ESF
ESG
ESIT
ESM
ESPG
ESRA
ETEC
ETEPP
ETCS
ETT
EURCENT
Systems - Navy
Extended Core Memory Core Unit
Engineering Change Proposal
Expeditionary Combat Readiness Center
European Central Region Network Operating
Center
Exterior Communications System
End Cryptographic Equipment
Estimated Delivery Date
Engineering Development Model
Engineering Duty Officer
Extended Drydocking Selected Restricted
Availability
Evolved Expendable Launch Vehicle
Embedded Firewall
Extremely High Frequency (30-300 GHz)
Extremely High Frequency, Medium Data Rate
Embeddable Infosec Product
Enterprise Information Portal
Effective Isotropic Radiated Power
Electronic JTIDS Network Library
Electronic Key Management System
Extra Low Frequency
Electronics Intelligence
Electromagnetic Compatibility
Emission Control
Electro Magnetic Interference
Electro Magnetic Pulse
Element Management System
Enhanced Mobile Satellite Service (IRIDIUM)
Enterprise Naval Training Reservation System
Enterprise Strike Group
Enhanced Naval War Gaming System
End Of Availability
Electronic Order of Battle
Explosive Ordnance Disposal
End of Life
Enhanced Position Location Reporting System
Emerging Requirements Data Base
Element Management System
Enterprise and Resource Planning
Electrostatic Discharge
Expeditionary Security Force
Expeditionary Strike Group
Embarkable Staff Integration Teams
Electronic Support Measures
Embedded System Processor Group
Extended Ship Restricted Availability
End-to-End Capability
Electronic Tomahawk Employment Planning
Package
Expeditionary Tactical Communication System
Expeditionary Training Team
Central Europe
A-11
NTP 4 (E)
EVP
EVS
EW
FAM
FAOE
FAS
FAT
FBC
FBC
FBE
FC
FCC
FCCL
FCIP
FCP
FDDI
FDRR
FDRR
FDMA
FDNF
FDRR
FDS
FEC
FEP
FFC
FFG
FIBL
FID
FIFO
FIN
FIPS
FIWC
FIST
FIT
FLEETEX
FLTCINC
FLTSAT
FLT CON
FM
FMX
FMAV
FMP
FMP
FMPMIS
FMS
FMX
FNBDT
FnM
FNMOC
FOT
NTP 4 (E)
FOUO
FRCB
FRP
FRPA
FSB
FSD
FSET
FSK
FSM
FSM
FTP
FTSC
FTSR
FTP
FTSC
FUNC
FW
FY
FYDP
FYOH
FYPR
GALA
GALE
GATM
GBS
GCBS
GCCS
GCCS-M
GCSS
GCF
GCTF
GDSC
GENSER
GEMIII
GFCP
GFCS
GFE
GFM
GFO
GHz
GIG
GIG-E
GINA
GMDSS
GMF
GNFPP
GNO
GNOSC
NTP 4 (E)
GOBI
GOES
GOGO
GOTS
G&PP
GPETE
GPS
GRAM
GRU
GSM
GUI
GWOT
HAG
HAWK
HAZMAT
HCI
HDR
HF
HFDS
HFRG
HHR
HHST
HI
HICOM
HIDS
HITS
HM&E
HP
HPA
HQ
HQMC
HSBCA
HSD
HSFB
HSGR
HSI
HSSI
HTML
HTTP
HVAC
HW
HYDRA
IA
IA
I&A
I&W
IAAW
IACS
-- I -Information Assurance
Installing Activity
Identification and Authentication
Indications and Warning
Information Assurance Assist Visit
Integrated Acoustic Communications System
A-14
NTP 4 (E)
IAS
IASM
IAT
IATO
IAVA
IAVM
IBC
IBFT
IBR
IBS
IC
ICAS
ICD
ICD
ICDB
ICE
ICO
ICSTF
ICW
IDS
IDTC
IO
I/O
ICOM
IDB
IDB
IDB
IDCP
IDM
IDRS
IDS
IETM
IFF
ILS
ILSMP
ILSP
IM
IMA
IMAV
IMO
IMI
IMINT
IMPACTS
INE
INFOSEC
INM
INMARSAT
INS
INTELSAT
IO
IOC
IORNOC
NTP 4 (E)
IP
IPGPS
IPR
IPT
IPv6
IPX
IR
IRC
IS
ISAR
ISB
ISDN
ISDS
ISEA
ISIC
ISM
ISM
ISNS
ISO
ISP
ISP
ISR
ISRAT
IAM
IAO
IT
IT-21
ITAC
ITAWDS
ITC
ITO
ITOC
ITP
ITSS
IUSS
IVCS
IVS
IW
IXS
Center
Internet Protocol
Interim Portable GPS
In Process Review
Integrated Product Team
Internet Protocol Version 6
Internet Packet Exchange
Instruction Report
Internet Relay Chat
INTELSAT Satellite
Inverse Synthetic Aperture Radar
Independent Side Band
Integrated Services Digital Network
Information Screening & Delivery Subsystem
In-Service Engineering Agent
Immediate Superior in Command
Information System Maintenance
Iridium Secure Module
Integrated Shipboard Network System
International Standardization Organization
Internet Service Provider
Inside Cable Plant
Intelligence Surveillance & Reconnaissance
Integration C4I Installation Synchronization
And Realignment Action Team(Carrier, Ship and
Shore)
Information Assurance Manager
Information Assurance Officer
Information Technology
Information Technology for the 21st Century
Information Technical Assistance Center
Integrated Tactical Amphibious Warfare Data
System
Information Technology Center
Integrated Tasking Order
Integrated Technology Outreach Center
Integrated Terminal Programs
Information Technology Support Center
Integrated Undersea Surveillance System
Integrated Voice Communications System
Integrated Video System
Information Warfare
Information Exchange Subsystem
-- J --
JATACS
JBS
JCA
JCALS
JCDX
JCMPO
JCF
NTP 4 (E)
JCS
JDISS
JDMS
JEAP
JETS
JFACC
JFMCC
JFMM
JFN
JFTOC
JIC
JICO
JICF
JINTACCS
JIST
JMAST
JMCIS
JMCIS-A
JMCOMS
JMHS
JMINI
JMIO
JMTCSS
JNL
JOC
JOCC
JOPES
JOTS
JPO
JPALS
JPMO
JRE
JROC
JSTARS
JSIPS-N
JSN
JTF
JTFEX
JTG
JTIDS
JTRS
JTT
JU
JWID
NTP 4 (E)
JWICS
kbps
KEYMAT
kHz
KL
KP
KU
KWEB
LAAS
LAC
LAN
LANE
LAR
LAWS
LCC
LCM
LCMS
LDR
LDSA
LCM
LEDS
LEO
LES
LF
LF
LHA/LHD
LHR
LK-4A
LK-11
LK-16
LLFA
LLTM
LMC
LMD
LMS
LMS
LNA
LNB
LOB
LOCE
LOGCOP
LOS
LPD
LPI
LPI/D
LPM
NTP 4 (E)
LPRU
LRA
LRIP
LRU
LSB
LSD
LWCA
MAD
MAGR
MAGTF
MALS
MAN
MARCEMP
MARCORSYSCOM
MARMC
MAST
Mbps
MCAG
MCAP
MCCR
MCFI
MCPP
MCPT-1
MCU
MCIXS
MCMRON
MCNOC
MC
MCS
MCS
MCSE
MCTN
MCTSSA
MDA
MDEP
MDDS
MDR
MDS
MDU
MEF
MEF
MEFSAG
MEDAL
METMF
MetOc
MEU
METOC
MF
MFI
NTP 4 (E)
MFL
MFU
MFU
MOC
MHQ
MHz
MICFAC
MIDB
MIDS
MILSPEC
MILSATCOM
MILSTAR
MIL STD
MILSTRIP
Multi-Frequency Link
Message Forwarding Utility
Mission Folder Update
Maritime Operations Center
Maritime Headquarters
Megahertz
Mobile Integrated Communications Facility
Modern Integrated Data Base
Multi-Functional Distribution System
Military Specification
Military Satellite Communications
Military Strategic and Tactical Relay
Military Standard
Military Standard Requisitioning and Issue
Procedure
MINI DAMA
Miniaturized Demand Assigned Multiple Access
MINI NOC
Miniature Network Operation Center
MISREP
Mission Report
MITE
Monthly Inport TADIL Exercise
MITT
Maritime Integrated Tailored Training
MIUW
Mobile Inshore Undersea Warfare
MIWRG
Mine Warfare Readiness Group
MLA
Mail List Agent
MLDN
Maritime Logistics Data Network
MLP
Multi-Function Precedence Preemption
MLS
Multi-Level Security
MMG
Mast Mechanical Group
MOA
Memorandum of Agreement
MOCC
Mobile Operations Command Center
MOSPF
Multicast Open Shortest Path First
MOU
Memorandum of Understanding
MPEG
Moving Picture Expert Group
MPT
Manpower, Personnel and Training
MRMS
Maintenance Resource Management System
MROC
Multi-Command Required Operational Capability
MRS
Mini Rawinsonde System
MSC
Military Sealift Command
MSD
Material Support Date
MSE
Mobile Subscriber Equipment
MSEL
Master Scenario Event List
MSKC
MetOc Systems Knowledge Center
MSL
Multi-Security Level
MSOC
Milstar Satellite Operations Center
MSP
Message Security Protocol
MSS
Multiple Subscriber Service
MSS
Mobile Satellite Service
MSS
Multi-Protocol Switch Server
MSWG
USMC Wing Support Groups
MTA
Message Transfer Agent
MTC
Multi Tadil Capability
MTP
Multi Tadil Processor
MTT
Mobile Training Team
MUOS
MWSS
USMC Wing Support Squadrons
A-20
NTP 4 (E)
-- N -1NCD
NACC
NADGE
NALCOMIS
NALCOMIS IMA
NALCOMIS OMA
NALDA
NAN
NAS
NAT IPT
NATO
NAVAIRSYSCOM
NCDOC
NAVICP
NAVCOMPT
NAVELSG
NAVFLIRS
NAVMEDIACEN
NAVMACS
NAVNEWS
NAVOCEANO
NAVSUP
NAVSEA
NAVSTAR GPS
NAVSSI
NAVSUP
NAVTEX
NCDOC
NCTAMS
NCSS
NCS
NCTS
NCTSI
NCVI
NCW
NCW
NDE
NCT
NDI
NECC
NECC
NECOS
NECSS
NTP 4 (E)
NES
NESP
NETC
NETBEUI
NETBIOS
NETC
NAVNETWARCOM
NEXRAD PUP
NFC
NFN
NGCR
NGN
NIAPS
NIAT
NIC
NICC
NIDTS
NIF
NIMA
NIIN
NIEWS
NILE
NIMA
NIPRNET
NIPS
NIPS
NISE
NITDS
NITES
NKDS
NKMS
NKO
NLT
NMC
NMCI
NMIMC
NMPS
NNFE
NNSOC
NNWC
NOC
NOFORN
NOS
NOW
NOWNET
NRAD
NRI
NSA
NSA
NSB
NSC
NTP 4 (E)
NSGA
NSIPS
NSOM
NSS
NSS
NSS
NST
NSV
NSVT
NSWC
NT
NTCS-A
NTCSS
NTDS
NTDPS
NTIRA
NTMPS
NTP
NTR
NTS
NTSP
NUWG
OA
OA
OASIS
OAT
OBRP
OBT
OBU/OED
OCONUS
OCRS
OCSP
OEM
OIMA
OJT
OMA
OM-FTS
OM&N
OMS
OMMS
ONE NET
ONI
ONR
OOMA
OEF
OOMA
Operational Architecture
Operational Assessment
OTH-T Aircraft Sensor Interface System
Optional Application Tape
On Board Repair Parts
On Board Training
Ocean Surveillance Information System(OSIS)
Baseline Upgrade/OSIS Evolutionary
Development
Outside Continental United States
Online Compliance Reporting System
On-Line Certificate Status Protocol
Original Equipment Manufacturer
Optimized Intermediate Maintenance Activities
On the Job Training
Organizational Maintenance Activity
Operational Maneuver From the Sea
Operations Maintenance Navy
Ordnance Management System
Organizational Maintenance Management System
Overseas Navy Enterprise Network (Replaces
BLII)
Office of Naval Intelligence
Office of Naval Research
Optimized Organizational Maintenance
Activities
Operation Enduring Freedom
Marine Air Logistics Squadron
A-23
NTP 4 (E)
OPEVAL
OPN
OPS
OPTEVFOR
OQPSK
OR
ORD
ORDALT
ORTS
OS
OSI
OSIS
OSP
OSPF
OSS
OTAR
OTAT
OTCIXS
OTH-T
OTRR
OUTBOARD
Operational Evaluation
Other Procurement Navy
Operations
Operational; Test and Evaluation Force
Off Quadrature Phase Shift Keying
Operational Requirement
Operational Requirements Document
Ordnance Alteration
Operational Readiness Test System
Operating System
Open System Interconnection
Ocean Surveillance Information System
Outside Cable Plant
Open Shortest Path First
Operations Support System
Over The Air Rekeying
Over The Air Transmission
Officer in Tactical Command Information
Exchange System
Over-the-Horizon Targeting
Operational Test Readiness Review
Shipboard Acquisition and Direction Finding
System
-- P --
P3I
PABX
PACMEF
PACOM
PARM
PBL
PBX
PC
PCMT
PCS
PD
PD
PDA
PDR
PDU
PEO
PERA
PE
PEO
PEOCMPANDUAV
PGM
PGWS
PHIBGRU
PHIBRON
PICT
NTP 4 (E)
PIDS
PIP
PITCO
PJOCS
PK
PKE
PKI
PLAD
PLGR
PLL
PLRS
PLT
PM
PMA
PMO
PMW
PMINT
PNT
POA&M
POC
POM
PoP
POR
POTS
PPBS
PPL
PPS
PRNOC
PSA
PSK
PSTN
PTA
PTP
PTW
PU
PVT
PY
QA
QMCS
QMS
QOS
QPL
QPSK
QRC
Quality Assurance
Quality Monitoring Control System
Quality Monitoring System
Quality of Service
Qualified Parts List
Quadrature Phase Shift Keying
Quick Reaction Capability
-- R --
R&D
R&S
R&R
RA
NTP 4 (E)
RADDS
RAID
RAPIDS
RAST
RAV
RBS
RCOH
RCS
RCS
RDA
RDD
RDC
RDF
REM
REPEAT
RF
RITC
RLAR
RLGN
RMA
RMC
RMMCO
RNOC
RNOSC
ROC&POE
ROH
ROM
RPA
RSIM
RTC
RTS
SA
SAASM
SABER
SABRES
SACCS
SADS
SAFENET
SALTS
SAML
SAMS
SAR
Situation Awareness
Selective Availability Anti-Spoofing Module
Situational Awareness Beacon with Reply
Ship Alteration Budget Reporting and
Evaluation System
Shipboard Automated Communication Control
System
Submarine Antenna Distribution Systems
Survivable Adaptable Fiber Optic Embedded
Network
Streamlined Automated Logistics Transmission
System
Security Assertion Markup Language
Shipboard Automated Medical System
Search and Rescue
A-26
NTP 4 (E)
SAR
SAR
SARTIS
SAS
SATCOM
SATNAV
SBM
SC21
SC
SCAMP
SCC
SCCD
SCCP
SCD
SCI
SCLSIS
SCN
SCONUM
SCSI
SCSS
SD
SDU
SDB
SELOR
SEMCIP
SES
SFEWG
SGITR
SGLS
SGMTT
SGOT
SGS/AC
SHF
SHIPALT
SI
SIAB
SIC
SID
SIDE
SIGINT
SIGSEC
SIM
SINCGARS-SIP/
ASIP
SIOC
SIPRNET
SITE
SITREP
NTP 4 (E)
SKED
SLA
SLEP
SLEW
SLVR
SMART-T
SMB
SME
SMG
SMOOS
SMQ-11
SMS
SMS
SMTP
SNADIS
SNAP
SNMP
SNR
SOE
SOF
SOI
SOMS
SONET
SOTA
SOVT
SPARC
SPAWAR
SPM
SPX
SPRAC
SQL
SRA
SRBM
SRCS
SRGPS
SRK
SRS
SSA
SSA
SSAA
SSB
SSBN
SSDS
SSC
SSE
SSEE
SSES
SSFA
SSGN
SSIL
SSIXS
Schedules (ships)
Service Level Agreement
Service Life Extension Program
Single Tone Link-11 Waveform
Submarine LF/VLF VME Bus Receiver
Secure Mobile Anti-Jam Reliable Tactical
Terminal
Submarine Message Buffer
Subject Matter Expert
Secure Mail Guard
Shipboard Meteorological and Oceanographic
Observation System
Weather Satellite Receiving-Recording System
Skills Management System
Single Messaging Solution
Simple Message Transfer Protocol
Submarine Non-Tactical Application Delivery
Interface System
Shipboard Non-tactical ADP Program
Simple Network Management Protocol
Signal-to-Noise Ration
Schedule of Events
Special Operations Forces
Signals of Interest
Shift Operations Maintenance System
Synchronous Optical Network
Satellite Ocean Tactical Application
Systems Operational Verification Test
Scalable Processor Architecture
Space and Naval Warfare Systems Command
Ships Program Manager
Sequence Packet Exchange
Special Reporting and Coordination Net
Structured Query Language
Selected Restricted Availability
Shipboard Receive Broadcast Manager
Shore Remote Control System
Shipboard Relative Global Positioning System
Steady Receive Key
Shipboard Receive Suite
Software Support Activity
Solid State Amplifier
System Security Authorization Agreement
Single Side Band
Submersible, Ship, Ballistics, Nuclear (sub)
Ship Self Defense System (ACDS follow-on)
SPAWAR Systems Center
Systems Security Engineering
Ship Signal Exploitation Equipment
Ship Signal Exploitation Space
SPAWAR Space Field Activity
Submersible Ship, Guided, Nuclear (sub)
Systems/Sub System Interface List
Submarine Satellite Information Exchange
A-28
NTP 4 (E)
SSN
SSNS
SSO
SSPA
SSS
SSRBM
SSRS
STAR
STARS
STAR-T
STE
STU III
STP
STELLA
STEP
STEP
STICS
STIMS
S-TRED
STS
STT
SUB HDR
SURTASS
SVoIP
SVGA
SW
SWEDE
SWR
SWRMC
SYSCOM
Subsystem
Navy Nuclear-powered (attack) Submarine
Standard Supply Numbering System
Single Sign On
Solid State Power Amplifier
System Supervisor Station
Sub-Surface Receive Broadcast Manager
Sub-Surface Receive Suite
Standard Attribute Reference Manual
Standard Accounting and Recording System
SHF Tri-Band Advances Range Extension Terminal
Secure Terminal Equipment
Secure Telephone Unit III
Shielded Twisted Pair
System to Estimate Latitude and Longitude
Astronomically
Standardized Tactical Entry Point
Secure Telecommunications Entry Point
Scalable Transportable Intelligence Communications
System
Shipboard Tactical Information Management
System
Standard Tactical Receive Equipment Display
Secure Telephone System
Shore Targeting Terminal
Submarine High Data Rate
Surveillance Towed Array Sensor System
Secure Voice Over Internet Protocol
Super Video Graphics Array
Software
Sea Warrior Enterprise Data Environment
Supplemental Weather Radar
Southwest Regional Maintenance Center
Systems Command
-- T --
T-1
T-3
T&C
TAC
TACAN
TACCIMS
TACINTELL II
TACS
TACTERM
TAV
TADIL
TADIXS
TAMD
1.544 Mbps
45 Mbps
Telemetry and Command
Tactical Advanced Computer
Tactical Air Navigation
Theater Automated Command and Control
Information Management System
Tactical Intelligence Information Exchange
System Phase II
Theater Air Control System (USAF)
Tactical Terminal
Technical Availability
Tactical Data Information Link
Tactical Digital Information Exchange
System/Subsystem
Theater Air Missile Defense
A-29
NTP 4 (E)
TAMPS
TARPS
TASS
TAV
TBD
TBMCS
TBMD
TCD
TCO
TCP
TCS
TD:
TDA
TDBM
TDL
TDN
TDMA
T&E
TEAMS
TEDS
TELEPORT
TEMPEST
TEMPALT
TEPP
TESS(3)
TFDS
TFTA
TDMA
TDP
TEPEE
TES-N
TESS
TFCC
TFW
TGRS
THAAD
TIBS
TIC
TIDS
TIMS
TIP
TIP
TIS
TISS
TLAM
TLS
TMG
TMIP
T-nT
TOPSCENE
TPS
NTP 4 (E)
TRAP
TRE
TRDF
TRIDENT IRR
TRITAC
TRPPM
TRSS
TRWS
TSA
TSC
TSIP
TSCM
TSS
TSw
TS/SCI
TSSS
TTC
TTE
TTGP
TTRAMS
TTY
TV-DTS
TVRO
TVS
TWCS
TYCOM
U2
UARNOC
UA
UAV
UB
UDP
UFO
UFO/E
UFO/EE
UHF
UIC
UK
ULSS
UPS
USA
USAF
USB
USCG
USMC
USMTF
USN
UTP
NTP 4 (E)
-- V -5VM
VAAP
VCNO
VEIL
VHF
VIG
VIP
VIXS
VLAN
VLF
VME
VMS
VoIP
VPN
VSRR
VSRT
VTC
VVFDT
WAN
WAPS
WAAS
WDC
WEB ATIS
WECAN
WGS
WGS
WINS
WMT
WOO
WSF
WSV
WWMCCS
WWW
X-DECK
Cross Deck
-- Y--
Y2K
Year 2000
A-32
NTP 4 (E)
CLASSIFICATION MARKINGS FOR ILLUSTRATION PURPOSES ONLY
APPENDIX B
COMSPOT REPORTING
Communications Spot (COMSPOT) reports will be submitted by all
ships and shore facilities at any time communication outages or
degradations are encountered. Submit the COMSPOT to the
servicing NCTAMS and communications station respectively, info to
the appropriate numbered fleet commander and ISIC. Timely
submissions of COMSPOT reports are required, within thirty
minutes of outage. Updates will be provided every hour or upon
significant change in status. If systems can not be restored
within 48 hours, submission of a CASREP will be sent in
accordance with Joint Force Maintenance Manual. Do not delay
CASREP submission because the cause of the outage is unclear
(e.g., transport versus network). Intermittent outages should be
considered for CASREP as well once the troubleshooting has
exceeded the 48 hour window. The following COMSPOT report will be
used by all units:
COMSPOT drafters will adhere to the following:
- Use the CNO mandated message drafting application Common
Message Processor (CMP).
- Ensure the MSGID is listed as COMSPOT and is followed by
the units name. For example, USS Theodore Roosevelt will
be entered as Theodore Roosevelt. Ensure proper use of
serial numbers, and indicate if initial, update or final.
- Ensure the COMEV field is presented as a date time group
value. For example, if a circuit goes down at 0101Z on 01
December, enter it as 010101ZDEC07. Ensure that log up
times are entered in the same way, (i.e.,:
COMEV/OTG/010101ZDEC07/010203ZDEC07//. If an initial
report, fill in the log up field with a dash.
- POC data shall be provided to include, at a minimum, the
name, rank and position (i.e., CWO, LCPO, CSIO) of the
individual submitting the report. Ensure a valid
telephone number (if available) and e-mail address are
included. For example: POC/IT1 SMITH/CWO/ARLEIGH
BURKE/PRIPHN:757-555-1212/EMAIL:SMITH4@DDG51.NAVY.MIL//
The NCTAMS will include trouble ticket numbers in COMPSOT
responses. These numbers will enable user commands to track
incidents through the TMS. However, user commands will not be
able to correlate trouble ticket numbers until the afloat
interface for TMS is made available, which is currently planned
for Increment II A, late 2008.
The following COMSPOT report will be used by all units:
B-1
NTP 4 (E)
Precedence Up to IMMEDIATE is authorized
FM
(Name of unit)
TO
(Servicing NCTAMS)
(Servicing NCTS, if applicable)
(Communications Control Ship (CCS) if applicable)
B-2
NTP 4 (E)
5. (C) This paragraph will contain specific requests for
support, actions, or services from the action addressees of
the COMSPOT report.
6. (C) This paragraph will contain the ETR. It may read
UNKNOWN.
7. (C) This paragraph will contain the RFO. It may read
UNKNOWN in an initial or update COMSPOT, but not in a
final COMSPOT. In the event an RFO can not be determined for
a final COMSPOT report, this paragraph will contain a
synopsis of the actions taken in order to restore service.
8. (C) This paragraph is for narrative comments from the
originator regarding this issue.
9. (C) This paragraph will contain POC information for the
originating station. At a minimum, it will contain the name,
rank and position of the individual submitting the report,
i.e. IT1 Smith, CWO. Also, include any and all e-mail
addresses (NIPR and SIPR), telephone (commercial and DSN),
or other method of direct contact.
DECL/(Declassification data)//
B-3
NTP 4 (E)
B-4
APPENDIX C
CONTENT INDICATOR CODES (CICs) FOR USE WITHIN THE USN
1.
USE OF CIC
The CICs listed below are the only codes authorized for
intra-Navy use on messages sent in data format. However, the
CIC "ZZEZ" may be used on data-formatted messages when none
of these CICs are applicable.
CODE
NBAA
REPORT
High Value Asset Control (HIVAC) Transaction
Reporting
NBAT
NBZA
Transaction Reporting
NCEA
NFBA
NFBC
NFBE
NFBF
NFCB
NFCC
NFCE
NFDC
NFGD
NFGE
NFLT
NGBA
NGCC
NGCN
NGGC
NGHZ
NGIZ
NGMA
NGMB
NGMC
NGMD
NGZA
NHAB
NHAC
NHAE
NHAF
NHAG
NHAH
NHAI
NHAJ
NHAK
C-2
NHAL
NHAM
NHAO
NHBC
NHBD
NHBE
NHBF
NHDE
NHDZ
NHEF
NHHF
NIAZ
NIBZ
NICZ
NIDZ
NISZ
Investigative Report
NJGB
NSTD
NXCF
Exercise CASREP
NXEC
NXEG
NXNF
EXERCISE NAVFORSTAT
NZPO
C-3
C-4
APPENDIX D
C4I (COMMAND, CONTROL, COMMUNICATIONS, COMPUTERS AND
INTELLIGENCE) INFORMATION BULLETINS (CIBs) AND C4I
ADVISORIES (CIAs)
1.
GENERAL
CIB DESIGNATIONS
CIBs and CIAs are divided into Global, Joint and AORspecific. Global CIBs/CIAs standardize procedures in all
COMMAREAS, and the goal is to make all CIBs and CIAs Global
whenever technically possible. Joint CIBs/CIAs standardize
procedures in COMMAREAS and are controlled by the 2 NCTAMS.
AOR-specific CIBs/CIAs apply to the COMMAREA controlled by a
single NCTAMS and are labeled as LANT or PAC. In order to
standardize CIB numbering Navy-wide, CIBs are divided into
the categories listed in Global CIB 22A (Numbering of C4I
information bulletins and advisories); these categories are
further expanded by alphabetic characters (e.g., CIB 2A) to
ensure all possible C4I subjects are included. The subject
lines of CIBs and CIAs are preceded by the applicable
COMMAREA to facilitate easy identification by fleet units
using JMHS, AMHS, and Microsoft Outlook to read message
traffic. CIAs are designated by sequential number and the
year in which they are promulgated. For example, LANT CIA
03-01 denotes the third CIA of the year 2001 for the
COMMAREAS controlled by NCTAMS LANT.
CIBs will be cancelled by date-time-group and by complete
CIB designation. Global CIB 1 contains a complete listing
of effective CIBs and CIAs; however, the SIPRNET homepage of
each NCTAMS contain the definitive, most current listing.
3.
D-2
APPENDIX E
FREQUENCY EMISSIONS, BANDS AND DESIGNATIONS
1. The DoD policy is that the term "hertz" will be the
appropriate term for the unit of frequency to be used when
referencing radio frequencies, frequency bands, or operating
frequencies of communications-electronics equipment in all
correspondence, records, standards, procedures, documents
and, where applicable, on equipments.
REFERENCES.
DOD Directive 4650.1, Subject: Management and Use of the
Radio Frequency Spectrum.
DOD Directive 5100.35, Subject: Military CommunicationsElectronics Board (MCEB).
DOD Directive 3222.3, Subject: DOD Electromagnetic
Compatibility Program.
DOD JSC HDBK-80-11-1, Subject: Frequency Resource Record
System (FRRS) Handbook, VOLUME I.
JCS MEMORANDUM MJCS 34-82, "Guidance on Joint and Interservice Military Frequency Engineering and Management".
MCEB PUB 7, Frequency Resource Record System (FRRS),
Standard Frequency Action Format (SFAF)
Naval Telecommunications Procedures (NTP) 6 Series,
"Spectrum Management Manual".
2.
FREQUENCY RANGE
Frequency Range
3 to 30 kHz
LF (Low Frequency)
30 to 300 kHz
MF (Medium Frequency)
HF (High Frequency)
E-1
3.
30 to 300 MHz
3 to 30 GHz
30 to 300 GHz
H
K
M
G
for
for
for
for
Hertz
Kilohertz
Megahertz
Gigahertz
DESIGNATION OF EMISSIONS
E-2
Table E-1
Required Emission Classification Symbols
First Symbol - Designates Type of Modulation of the Main Carrier
Unmodulated
N - Emission of unmodulated carrier
Amplitude Modulated (AM): An emission in which the main carrier
is AM (including cases where sub-carriers are angle-modulated).
A - Double sideband
H - Single sideband, full carrier
R - Single sideband, reduced or variable level carrier
J - Single sideband, suppressed carrier
B - Independent sidebands
C - Vestigial sidebands
Angle-Modulated: An emission in which the main carrier is anglemodulated.
F - Frequency modulation (FM)
G - Phase modulation
Amplitude and Angle-Modulated: Emission in which the main
carrier is amplitude modulated and angle-modulated either
simultaneously or in a pre-established sequence pulse. (See
Note)
D - Main carrier is amplitude-modulated and angle-modulated
simultaneously or in a pre-established sequence
NOTE: Emission, where the main carrier is directly modulated by
a signal which has been coded into quantized form (pulse code
modulation (PCM)), shall be designated as either an emission in
which the main carrier is AM, or an emission in which the main
carrier is angle-modulated.
Pulse
P - Sequence of unmodulated pulses
K - Modulated in amplitude
L - Modulated in width/duration
M - Modulated in position phase
Q - Carrier is angle-modulated during the period of the pulse
V - Combination of the foregoing or is produced by other means
Combination
W - Cases not covered above in which an emission consists of the
main carrier being modulated, either simultaneously or in a preestablished sequence, in a combination of two or more of the
following modes: amplitude, angle, pulse
Other
X - Cases not otherwise covered
Second Symbol - Designates the
the Main Carrier
0 - No modulating signal
1 - A single channel containing
without the use of a modulating
division multiplex (TDM))
2 - A single channel containing
E-3
E-4
division multiplex
X - Other types of multiplexing
Most Common Emission Designators
HF (2-30 MHz)
Carrierwave (CW)
100HA1A
1K10F1B
(ISB)
6K00B7B
6K00B8E
6K00B9W
9K00B9W
25K0F2D
25K0F3D
25K0F2E
25K0F3E
30K0F3E
32K0F1E or
37K5F1E
32K0F1D or
37K5F1D
8K50F3E or
16K0F3E
12K0F3E
8K50F1E or
20K0F1E
E-5
6K00A3E
8K50F3E or
16K0F3E
8K50F1E or
20K0F1E
1M30F9W
6K00A3E
25K0A1E or
37K5A1E
E-6
NTP 4 (E)
APPENDIX F
MILITARY AFFILIATE RADIO SYSTEM (MARS) OPERATIONS
REFERENCES:
a. NTP 8
b. MARS Area Operations Guides
1. PURPOSE. To provide information on Military Affiliate Radio
System (MARS) operations.
2.GENERAL
It is the policy of the Department of the Navy to support MARS.
Basic policy instructions and guidance for MARS operations within
Navy and Marine Corps activities are contained in references (a)
and (b).
The primary purpose of the MARS program is for EMERGENCY/
AUXILIARY communications among military, civil and disaster officials.
A secondary function is to assist in effecting normal Naval
communications under emergency conditions and the handling of
morale and quasi-official communications for US Government
personnel throughout the world.
There are MARS communication areas: Northeast, Central, South,
and Pacific. Each area has their own operations guide which is
used as a supplement to reference a. These guides can be found on
the MARS website, http://www.navymars/org.
3.
PROCEDURES
NTP 4 (E)
application procedures prescribed in references (a) and (b) but
shall apply as follows:
ROUTINE DTG
FM REQUESTING UNIT
TO CHNAVMARCORMARS WILLIAMSBURG VA
APPROPRIATE FLEET CDR
INFO (NUMBERED FLEET COMMANDER WHEN UNDER THEIR OPCON/TACON)
(TYPE COMMANDER)
(OPERATIONAL COMMANDER)
BT
UNCLAS //N02090//
MSGID/GENADMIN/ORIGINATOR'S PLA//
SUBJ/MARS AFLOAT OPERATION//
POC/NAME/CODE/DSNPHONE/CMLPHONE//
RMKS/1. UNODIR INTEND CONDUCT MARS OPS FM--------- TO---------.
2.COMMAND MARS OFFICER OR STATION CUSTODIAN: NAME, SSN,
RANK, SVC, LICENSE NUMBER/MARS CALL SIGN/EXP DATE (IF APPLICABLE)
3.COMMAND MARS CHIEF OPR OR AUTHORIZED OPR: NAME, SSN,
RANK, SVC, LICENSE NUMBER/MARS CALL SIGN/EXP DATE (IF APPLICABLE)
4.UNITS CURRENT MAILING ADDRESS. //
BT
Operational/type commanders objecting to MARS Afloat
operation shall inform COMLANTFLT or COMPACFLT,
CHNAVMARCORMARS to preclude inadvertent licensing of an
afloat unit.
If no objection to the request is interposed by the chain of
command within ten working days, CHNAVMARCORMARS
WILLIAMSBURG VA will reply with an official message
assigning the MARS call sign and will mail station license,
a copy of Pacific/Atlantic Afloat Specialty Network current
operations guide and other pertinent information.
Frequencies will be assigned IAW NTP 8 or by CHNAVMARCORMARS and
will comprise the Pacific or Atlantic MARS Afloat Specialty
network, respectively.
MARS is a non-secure system. The responsibility for maintenance
of proper standards of security by personnel using shipboard MARS
radio facilities rests with the commanding officer. The
commanding officer shall:
a) Promulgate detailed instructions on control and operation of
MARS. Security education programs should include procedures
to prevent inadvertent disclosure of classified information
when using MARS.
F-2
NTP 4 (E)
b) Ensure that conversations are limited to unofficial,
unclassified personal topics. Phone patches to detailers
from afloat units are authorized. Any message, which may
result in financial or material gain, is considered business
in nature and will not be handled via MARS.
c) Designate an officer as Command MARS Officer with
responsibility to the commanding officer for control and
security of the MARS station.
d) Designate an operator as Command MARS Chief Operator with
responsibility to the Command MARS Officer for control and
operations of the MARS station.
Operational commanders shall provide direction for control of
MARS operations as part of EMCON instructions.
The Numbered Fleet Commanders and Type Commanders will review
reports of security violations, take corrective action as necessary, and, if warranted, suspend or cancel MARS radio operations
in the unit concerned.
Commanding officers and Command MARS Officers shall be familiar
with the regulations and instructions relative to operating
stations in foreign ports and third party communications.
COMSEC monitoring of MARS will periodically occur. The purpose
of COMSEC monitoring of MARS is to ascertain and reduce security
vulnerabilities. In order to satisfy DOD requirements concerning
the consensual monitoring of MARS communications for COMSEC
purposes, the following actions shall be accomplished at each
command having a MARS station:
1. Retain on file for a period of one year a consent form
signed by prospective MARS users which states: "I understand that periodic COMSEC monitoring of MARS conversations
will occur and use of MARS equipment constitutes consent to
such monitoring."
2. Before a telephonically originated call is connected, the
MARS operator will:
a. Ensure the caller has a current consent form on file.
b. Orally advise the caller that MARS communications are
subject to monitoring. After the caller acknowledges
this statement, a log entry will be made and the call
completed.
3. A sign stating, "MARS COMMUNICATIONS ARE SUBJECT TO
COMMUNICATIONS SECURITY MONITORING AT ALL TIMES. USE OF MARS
CONSTITUTES CONSENT TO COMMUNICATIONS SECURITY MONITORING"
shall be displayed in full view of MARS users.
F-3
NTP 4 (E)
4. In cases of emergency in which the call must be placed
immediately and no consent form is on file, the following
procedures will apply:
a. Orally advise the caller "MARS communications are subject to
periodic COMSEC monitoring and use of MARS constitutes
consent to monitoring."
b. After the caller acknowledges this statement, a log entry
will be made and the call completed. The log entry shall
note the nature of the emergency, oral notification, and
acknowledgement by the caller.
F-4
NTP 4(E)
APPENDIX G
VISUAL COMMUNICATIONS
Description and Purpose
Visual signaling is a means of passing tactical and
administrative information between ships within visual signaling
range, and between ships and signal stations ashore. Methods
employed are flashing light (directional and non-directional,
including infrared), flag hoist, semaphore, colored lights, and
pyrotechnics. Quartermasters also perform submarine, ship, and
aircraft recognition and identification, communications with nonallied naval and merchant ships, and special signaling during
amphibious operations, convoy escort, and underway
replenishments.
The U.S. Navy reserves several signals for its own use, such as
those contained in the USN ADDENDUM to ATP 1 VOL II (when in
force), and the U.S. SUPPLEMENT to ACP 131. This chapter covers
areas not specifically addressed in allied publications and
amplifies existing instructions where needed. When operating
exclusively with units of the U.S. Navy, the procedures
prescribed herein shall govern.
Security
All personnel whose duties require them to handle classified
material must be familiar with SECNAVINST 5510.36 series
(Department of the Navy Information and Personnel Security
Program). Signal bridge personnel must possess the security
clearance commensurate with the material handled. A training
program, stressing the importance of safeguarding classified
material, must be kept in force at all times. The signal watch
must diligently protect classified material. Quartermasters must
be trained in communications security (COMSEC) by becoming
familiar with Chapter 4 of this publication and EKMS-1 (series).
Signal bridge personnel also have the responsibility of storage
and care for equipment that is susceptible to pilferage. The
loss of equipment such as binoculars, night observation devices,
flares and multipurpose lights is not only costly, but can
seriously hamper the mission of the signal bridge and jeopardize
the safety of the ship.
Publications
In addition to the publications that are customarily kept on the
signal bridge, Quartermasters must be aware of other publications
that are maintained onboard. The ship's naval warfare
publications librarian maintains an index of these publications
G-1
NTP 4(E)
as well as information on allowances and procurement.
Because communications requirements change constantly, governing
documents are subject to frequent updates and changes should be
entered immediately unless otherwise stated. See paragraph 1.5.5
of this publication for complete information on communications
publications and changes.
Changes or corrections to PUB 102, International Code of
Signals, are normally issued through Notice to Mariners (N/M)
messages. The Navigation department maintains the correction
card for PUB 102.
In addition to publications, there are many notices and
instructions issued by various commands that are of interest to
visual communications personnel. OPNAV NOTE 5215 (Consolidated
Subject Index), distributed semi-annually, contains a complete
list of instructions issued by Washington headquarters
organizations. The ship's administrative office normally
maintains these notices and instructions.
Operation Orders
Prior to beginning an underway period, all signal bridge
personnel must be familiar with the communications portion of the
operation order (OPORD) or letter of instruction (LOI). The
Leading Quartermaster should obtain the OPORD or LOI from the
communications officer. The Leading Quartermaster must consult
the OPORD frequently to insure the signal team is kept up-to-date
on any changes
At a minimum, the signal bridge must have a list showing the Task
Organization, call signs, schedule of events and any special
lighting measures or signals. The Leading Quartermaster of ships
assigned to the Task Organization will meet for a pre-underway
brief to cover visual communications, use of call signs, drills,
etc. A great advantage will be gained by discussing these items
prior to sailing. The staff or leading Quartermaster of the
senior ship will initiate such meetings.
Standard Operating Procedures (SOPs)
The Leading Quartermaster must maintain a set of SOPs and/or
standing orders on the signal bridge with a provision for each
individual's signature indicating their familiarity with such
orders. These SOPs shall be reviewed and signed at the
discretion of the leading Quartermaster. The leading
Quartermaster usually drafts these orders and the communications
officer or Navigator reviews and approves them. They contain
guidelines tailored to the unique requirements of a signal
bridge, e.g., traffic handling and message routing, duties and
G-2
NTP 4(E)
conduct of watch standers, publication/equipment/log
accountability, and certification of personal signs, safety
precautions, and visual message release authority.
Training
Maintain a separate log for the purpose of recording visual
communications drills and exercises. Keep the format the same as
that of the official log, but label the drill log clearly as
such. Destroy the drill log by the same method as that
prescribed for the official log. There is no retention
requirement for the drill log after the final entry.
In conjunction with the drill log, maintain a separate visual
station file for visual communications drill messages. Label,
maintain, and destroy this file consistent with the instructions
for the drill log. There is no retention requirement for the
drill visual station file.
Quartermasters must contend with poor visibility, heavy seas,
changing tactical formations and other adverse conditions. All
these serve to hinder operators and place a unique burden upon
the communications effort. Quartermasters will not be able to
effectively contribute to the mission of the signal bridge if not
thoroughly qualified. Therefore:
(1) Every effort will be made to conduct visual
communications training between ships while in company. When
steaming independently, quartermasters shall conduct daily
training amongst themselves. Visual training shall be a part of
the daily routine when possible;
(2) Leading Quartermasters onboard flagships shall
coordinate visual training between ships within the strike group
and schedule periodic meetings to discuss problem areas and
future training schedules.
Performance Testing
The Personnel Advancement Requirements (PAR'S) stipulate that
personnel in the QM rate must successfully complete flashing
light and semaphore performance tests prior to recommendation for
advancement. Appendix E of the Navy Enlisted Manpower and
Personnel Classifications and Occupational Standards (NAVPERS
18068F) contains a list of the required performance tests.
Performance tests may be ordered per provisions contained in the
Advancement Manual, (BUPERSINST 1430.16), or prepared locally
using the following criteria:
(1) Each coded message text must include all letters
of the alphabet, numerals 0 through 9, and all punctuation
symbols listed in ACP 130. Do not include the word drill in
text;
G-3
NTP 4(E)
(2) Each plain language message text shall contain
subject matter consistent with that of an official naval message,
but shall not include the security classification, the word drill
or phonetic spelling. Punctuation symbols shall be used in
semaphore messages;
(3) To determine the required number of words in the
plain language text, count each letter, numeral and punctuation
symbol as one character. Five characters are equivalent to one
word. The text of flashing light and semaphore messages will
contain the required number of words or coded groups, and shall
be sent and received at a minimum of three words per minute.
A qualified observer must be present during performance testing.
An observer shall be senior in pay grade to individual being
tested. No individual will be administered a performance test for
a pay grade which is more than one pay grade above that currently
held. Recommend using an assist ship to administer performance
tests. Responsibility for observer selection lies with the
Communications Officer, and shall be in the following order:
(1)
QM assigned by Staff;
(2)
(3)
(4)
Senior QM onboard.
NTP 4(E)
Unofficial Signaling
Unofficial operator-to-operator traffic signaling during watches
is an effective means of maintaining and increasing operator
efficiency. The Leading Quartermaster should encourage training
during watches on a not to interfere with normal operations
basis. Although there is normally no objection to such signaling
in peacetime, obtain permission to do so from the OOD. Personnel
engaged in unofficial signaling must always be alert to the
danger of inadvertently revealing classified information
regarding past or future ship movements, exercises, casualties,
G-5
NTP 4(E)
etc.
Unofficial signaling between ships and private individuals ashore
is prohibited.
Signaling Ships of The Former Soviet Union
On 25 May 1972, the governments of the U.S. and the U.S.S.R.
signed an agreement containing procedures designed to prevent
incidents on and over the high seas. This is called the INCSEA
Agreement and is promulgated within the U.S. Navy as OPNAVINST
C5711.96. As part of the agreement a special table of signals
was drafted for use between United States and Soviet warships and
auxiliary vessels. The INCSEA agreement now extends to the
former Soviet Union (see Notice to Mariners 18/92).
Signal personnel should pay particular attention to the
requirement to hoist "YVp1" which indicates signals from the
INCSEA Agreement, and "YVp1 TACK ZLp1" which answers/acknowledges
signals from the INCSEA Agreement. Do not hoist the
answer/acknowledgement signal at the dip. Instead, hoist it
close up after receiving permission from the Commanding Officer
via the OOD.
Signaling Merchant Ships
When signaling merchant ships use flashing light as the primary
visual method. Merchant ships use flag hoist to a limited degree
and semaphore use is not a requirement. Bridgeto-Bridge
radiotelephone has resulted in a further decrease in visual
communications use by merchant ships and often, after visual
communications have been established, the merchant will request a
shift to radiotelephone, or will sometimes respond to a visual
call by radiotelephone. Signal personnel must be thoroughly
familiar with Chapter 1, Sections 8 and 10 of PUB 102,
International Code of Signals, and bridgeto-bridge
radiotelephone regulations contained in COMDTINST M16672.2,
Navigation Rules, International - Inland.
As with all signaling, conduct communications with merchant ships
in a courteous and professional manner.
Unless higher authority directs otherwise, determining the
identity/nationality of merchant ships by exchanging
international call signs is authorized. U.S. Naval vessels may
identify status by flashing "DE US NAVY" or "DE US MAN OF WAR".
Communicating With Aircraft
When Signaling between aircraft and surface vessels is normally
conducted only during aircraft emergencies and is slow and
difficult at best. In the event signaling with aircraft is
required, the ship's signal team must be alert to interpret
intelligence conveyed by aircraft maneuvers. Surface vessels
G-6
NTP 4(E)
should establish the identity of an aircraft prior to any effort
to communicate by flashing light. Due to the speed of the
aircraft use a multi-purpose light to achieve the most efficient
communications.
Because communicating with aircraft is slow and difficult, the
Leading Quartermaster will ensure frequent exercises are
conducted to improve skills in this area.
Chapter 6, Section 6 of ATP 1 VOL I contains aircraft emergency
signals. Extracts are permitted and must be readily available on
the signal bridge.
PUB 102 (International Code of Signals), Chapter 4, Section 2
contains international signals used by aircraft engaged in search
and rescue operations.
Call Signs
Single letter type indicators for U.S. Naval ships and craft are
derived from SECNAVINST 5030.1 (Classification of Naval Ships and
Craft) are reflected below:
"A"
AUXILIARIES/
LOGISTICS
"B"
BATTLESHIPS
BB
"C"
CRUISERS
CG CGN
"D"
DESTROYERS
DD DDG
"F"
FRIGATES
FF FFG
"L"
AMPHIBIOUS/
ASSAULT
LCAC LCC LCM LCPL LCU LHA LHD LPD LPH LSD
LST LSV SDV
"M"
MINE WARFARE
MCM MHC
"N"
MINE CONTROL
SHIP
MCS
"P"
PATROL
"R"
AIRCRAFT
CARRIERS
CV CVN
"S"
SUBMARINES
SSBN SSN
"Y"
SUPPORT
AFDL AFDM ARD ARDM DSRV DSV IX TR YDT YPD
CRAFT
YFU YO YOG YP YTB YTT
U.S Naval Ships and Crafts Type Indicators
G-7
NTP 4(E)
The Intra-USN type indicator "U" is used to denote "SURFACE"
organizations established by COMNAVSURFLANT/COMNAVSURFPAC and
precedes or follows Group/Squad/Div to construct collective or
commander call signs:
U DIV
U GROUP p4
SQUAD U
G-8
NTP 4(E)
The use of special Task Organization call signs contained in ACP
130 is extended to intra-USN messages transmitted by flashing
light. The following are examples of this type of call sign and
transmission by all methods:
COMMANDER CALL
FLAGHOIST
FLASHING LIGHT
CTF 50
CTG 50.3
CTU 50.3.5
CTE 50.3.5.1
COMSIXTHFLT
0p5p0
*1p3
*2p5
*3p1
4p6
CTF 50
CTG 50.3
CTU 50.3.5
CTE 50.3.5.1
COMSIXTHFLT
COLLECTIVE CALL
TF 50
6p5p0
TF 50
TG 50.3
*7p3
TG 50.3
TU 50.3.5
*8p5
TU 50.3.5
TE 50.3.5.1
*9p1
TE 50.3.5.1
Denotes within own Task Organization
FLASHING LIGHT/
SEMAPHORE(intraUSN)
ZERO p5p0
*ONE p3
*TWO p5
*THREE p1
FOUR p6
SIX p5p0
*SEVEN p3
*EIGHT p5
*NINE p1
LPH-10...LP0
LPD-10...LP1P0
These call signs may be used for calling, answering, relaying and
in the address of visual messages delivered solely by visual
means. This does not preclude the use of command calls where
appropriate.
G-9
NTP 4(E)
Methods of Transmission
Directional flashing light is a means of passing traffic to a
single unit using visible or infrared light. This method uses a
12-inch searchlight or a small multi-purpose (portable) light.
During hours of darkness the 12-inch signal searchlight and
multi-purpose light are fitted with:
(1) Amber filter for normal steaming (aircraft
carriers are authorized to use blue filter);
(2) Red filter for flight operations and
replenishments;
(3) Red filter with reducing diaphragm when
maneuvering alongside;
(4)
required.
Non-directional flashing light enables simultaneous transmission
to more than one unit and uses white yardarm blinker lights or
infrared beacons. Both are used during hours of darkness and
provide 360 degree coverage. OOD and OTC permission must be
granted prior to using white yardarm blinker lights due to
brilliancy.
Flag hoist is a non-directional means of transmitting signals
with predetermined meanings taken from authorized publications.
The U.S. and Allied navies use 68 different flags/pennants or
combinations thereof for this purpose.
Semaphore may be considered directional or non-directional;
however, non-directional procedures are used during transmission.
This method uses small hand flags during daylight hours and wands
fitted with red lenses during hours of darkness. Signal personnel
must take care to avoid confusion with paddle/wand signals from
replenishment stations while conducting alongside operations.
Additional non-directional methods for transmitting signals with
predetermined meanings are:
1. Pyrotechnic signaling using rockets, flares, or colored
smoke;
2. Day shapes
3. Colored lights, either fixed or flashing
Infrared Signaling
Infrared signaling is normally ordered during periods of darken
ship, but may be used at any time visible light systems are
considered inappropriate. Ships with traffic for transmission
G-10
NTP 4(E)
may notify addressees by secure voice radio using the code word
"NANCY HANKS," or the relevant signal from ATP 1 VOL II or ACP
131. Depending on the degree of darken ship in effect,
addressees may also be notified by flashing light using the code
word "NANCY." Additionally, the OTC may establish infrared
calling periods eliminating the need for an operator to
continuously monitor an infrared receiver.
Point of Train Lights (POT) remain on during transmission when
communicating with directional infrared searchlights using
"directional flashing light procedure". They are turned off at
all other times.
Flag Hoist Procedures
This paragraph amplifies flag hoist procedures prescribed in ACP
130 and also explains unique intra-USN requirements.
When an addressee desires to question a signal, the signal shall
be hoisted at the dip and the INTERROGATIVE pennant hoisted
close-up on an adjacent halyard. The call sign of the originator
does not need to be hoisted when in direct communication.
1. The originator must acknowledge an INTERROGATIVE signal,
unless such signal can be clarified or canceled immediately.
2. The INTERROGATIVE pennant may be amplified and used as
indicated below. These signals are most effective in
expediting flag hoist signals when passed by flashing light.
Once operators identify the problem they should adhere to
the procedures in ACP 130 for canceling or correcting a
hoist to avoid the possibility of early execution or further
delay of communications.
SIGNAL
MEANING
INT(CHAPTER GROUP)
INT 1
G-11
NTP 4(E)
INT 2
INT 3
I am repeating signal
incorrectly.
3.
When a flag hoist signal is questioned or canceled,
INTERROGATIVE and NEGAT are, in themselves, separate signals and
will be logged as such in the exact sequence in which they occur,
regardless of the method of transmission.
The information signals in chapters 4 through 9 of ATP 1 VOL II,
including those originated by an OTC, shall not be answered or
repeated unless preceded by a call sign.
Directional flashing light may be used to expedite flag hoist
signals, employing the operating signal ZJL (SIGNAL).
Substitutes, when used to modify the heading, and numeral flags
in the heading shall be spelled out. Numeral pennants shall be
transmitted as digits. For example, the flag hoist heading "1st
AP6-3P8" is transmitted "FIRST A6 TACK THREE 8."
When numerals from ACP 131 are needed to complete the meaning of
a "Q" or "Z" signal, numeral flags shall be used between allied
units. Numeral pennants must be used when using "Q" signals with
non-allied units and merchant ships.
The signals shown below are designed to direct the ship's boat
during recovery operations, and to enable the boat Quartermaster
to convey information to the ship.
G-12
NTP 4(E)
SHIP TO BOAT FLASHING LIGHT
"TAPS CODE"
MEANING
SHIP
BOAT
Flash series of
"A"s
Answer with
series of "A"s
Steer straight
toward ship
Flash series of
"T"s
Answer with
series of "T"s
Flash series of
"P"s
Answer with
series of "P"s
Steady light
Steady light
Drop steady
Drop steady
Flash series of
"S"s
Answer with
series of "S"s
Steady light
Steady light
Drop steady
Drop steady
Return to ship
Flash series of
"Q"s
BOAT TO SHIP FLASHING LIGHT "ARC CODE"
MEANING
BOAT
Answer with
series of "Q"s
SHIP
Need assistance
Flash series of
"A"s
Flash "RRR"
Flash series of
"R"s
Flash "RRR"
Flash series of
"C"s
Flash "RRR"
G-11
NTP 4(E)
BOAT SIGNALS
BOAT SIGNALS (SHIP TO BOAT)
FLAGHOIST
SEE ATP 1, VOL
II
PYROTECHNICS
MEANING
Return to ship
MEANING
Need assistance
FLAG
PREP
INDICATOR
SUNRISE
NORMALLY
DISPLAYED
AT YARDARM.
REPEATED BY
ADDRESSEE(S)
(NOT UNDERWAY)
MEANING
CLOSE UP: 5 MINUTE
STANDBY
HAULED DOWN: OBSERVE
SUNRISE
G-12
NTP 4(E)
Speed flags should be used when entering or leaving port only if
U.S. or allied naval units are also underway in the vicinity.
Speed flags are of no interest to ships pier side or at anchor,
nor do they carry any meaning to non-allied naval ships or
merchant ships.
The senior officer among a nest or group of ships will assign a
visual communications duty ship for the nest/group. This ship
will display the visual guard flag during daylight hours, and
will transmit, answer, receipt for and deliver all visual traffic
for the nest/group. In addition, this ship will display the prep
flag for sunrise, morning and evening colors for all ships in the
nest/group. The use of prosigns to indicate relay/transmission
to other ships in the nest/group is not required.
Double Flash Procedure
This procedure, explained in ACP 130, article 607, is used when
no recorder is available and removes the element of speed from a
visual transmission. Since the ship's bridge area is
continuously manned while underway, operators shall use prudence
and good judgment before asking for double flash procedure.
Signal Handling
All signals transmitted by flag hoist, flashing light, or
semaphore are tactical, informative, or administrative in nature.
Visual communications use the following signal publications most
frequently:
1. ATP 1 VOL II (Allied Maritime Tactical Signal and
Maneuvering Book);
2. ATP 2 VOL II (Allied Naval Control of Shipping
Manual Guide to Masters);
3. ACP 131 (Operating Signals);
4. NWP 22-3 (Shipto-Shore Movement);
5. PUB 102 (International Code of Signals).
Unless instructions indicate otherwise, a signal may be sent
using any authorized visual transmission medium; however, the
method of transmission has no bearing on the action to be taken
upon receipt of the signal. All signals must be handled
promptly.
The intra-USN message format using signals from ATP 1 VOL II will
not contain a DTG/TG in the heading/ending.
Visual Messages
When a message has been released for visual transmission but no
specific method is identified, the signal watch supervisor will
G-13
NTP 4(E)
select the most appropriate method for passing the message.
The following provides recording information for the visual
message form:
1. CALL UP BLOCK. Show all contents of the call element
exactly as transmitted/received; (See ACP 130, article 116.)
2. DATE BLOCK.
G-14
NTP 4(E)
\\\
G-15
NTP 4(E)
G-16
Plaindress format:
P 022000Z JAN 97 GR9 BT
G-17
(2)
(3)
Plaindress format:
P 022000Z MAR 00 GR6 BT
INT ZDK 021500Z MAR 00
ZAR3 BT K
G-18
(3)
Juliett
Zulu
Slash (Z)
Zero
Numeral one
Numeral nine
Group/Flotilla
Time of receipt.
b. Incoming flaghoist:
at the dip.
TOD/CU
a. Outgoing morse/sem: Final TOD. Note that an
outgoing message should be logged only once.
Show interim TODs for multiple deliveries in
the service cross.
b. Incoming flaghoist (flaghoist which has been
closed up by units for which you are
responsible) and ANS: Time own ship closes up.
c. Outgoing flaghoist:
Time own
TOX/HD
a. Morse: Time of execution of executive method
message.
b. SL:
c. BK:
Yardarm blinkers
Flag hoist
G-21
TASK ORG
TASK ORGANIZATION
DESIGNATION/ASSIGNED
UNITS
SPECIAL
TASK ORG
CALL
SIGN
VISUAL
CALL
SIGN
CTG 42.3
1p3
p0p7
TG 42.3
TASK/BATTLE GROUP
7p3
p7
CTU 42.3.1
2p1
p0p3p7/p0p8
CARRIER GROUP
JOHN F KENNEDY(CVN-67)
8p1
p3p7/p8
Rp6p7
SCREEN CDR
2p2
p0p5/p0p8
SCREEN
LEAHY (CG-16)
SAMUEL B ROBERTS (FFG-58)
LEYTE GULF (CG-55)
REED (FFG-30)
8p2
p5/p8
Cp1p6
Fp5p8
Cp5p5
Fp3p0
2p3
p0p7p2/p0p8
REPLENISHMENT FORCE
SYLVANIA (AFS-2)
JOSHUA HUMPHREYS(TAO-188)
8p3
p7p2/p8
Ap2
Ap1p8p8
TU 42.3.1
(F) (FF)
CTU 42.3.2
TU 42.3.2
(F)
CTU 42.3.3
TU 42.3.3
(F)
G-23
INTL
CALL
SIGN
NJFK
NWDL
NSBR
NLEG
NSLR
NMYU
NNJH
G-24
G-25
G-26
NTP 4 (E)
APPENDIX H
COMMUNICATIONS INSTRUCTIONS AND PROCEDURES
FOR NAVAL ACTIVITIES COMMUNICATING WITH
US FLAG MERCHANT SHIPS (MERSHIPS)
GENERAL INFORMATION
General
This section provides instructions and procedures for Naval
activities to communicate with U.S. Flag Merchant Ships
(MERSHIPS) per CNO policy.
Because there is no single structured method or capability for
communicating with MERSHIPS, this section describes
MERSHIP/commercial record carrier capabilities and the
established procedures for Naval activities to communicate with
MERSHIPS.
The Navy has no system specifically designated for communications
with MERSHIPS. The limited Navy ship/shore facilities currently
in operation provide communications support primarily for ships
under the control of the Military Sealift Command (MSC). The
Navy relies mainly on the following capabilities to communicate
with MERSHIPS:
(1) Coast Guard COMMSTA ship/shore and broadcast; ARQ/Simplex
Teleprinting Over Radio (SITOR). This is an automatic repeat,
error-correcting high frequency radio teletype system which is
also called Narrow Band Direct Printing (NBDP) CR radiotelex or
simply HF-RATT;
2) Commercial carriers such as COMSAT General, who provide
maritime satellite services via the international maritime
satellite organization.
While increasing numbers of MERSHIPS are being equipped with
INMARSAT voice/record communications terminals and SITOR systems,
a significant number of them have only CW and MF/HF voice
communications capability. Also MERSHIPS ordinarily do not carry
crypto systems. All government or government-contract classified
and unclassified national security-related information
transmitted via INMARSAT, i.e., all official business, must be
encrypted. Per DOD and Navy policy, encryption devices must be
National Security Agency (NSA) approved cryptographic equipment,
e.g., STU-III, GILLAROO, KG-84, ANDVT, which provide protection
from exploitation by unauthorized intercept. Additionally, due
to the costs associated with delivering messages via commercial
carriers, messages must be as brief as possible.
Navy originated message traffic, which is commercially refiled
for delivery to MERSHIPS, is generally grouped into two
categories because processing requirements differ in each case.
H-1
NTP 4 (E)
(1) The first category is the General Emergency Message
originated by the Chief of Naval Operations (CNO) to advise
MERSHIPS of mobilization or that the United States is at war.
This message is identified in the Defense Mapping Agency
Hydrographic Topographic Center publication 117 (series). It is
assigned a FLASH precedence (urgent signal XXX) and must be
delivered to all MERSHIPS via the most expeditious means
available. Special handling is required. Procedures are
described below.
(2) The second message traffic category is that operational
traffic originated by other Naval commands throughout the world
and addressed to any of the ships in the merchant fleet. This
traffic is routed per established DOD routing doctrine and
commercially refiled with commercial record carriers. Procedures
for routing and delivering operational traffic are described in
subsequent paragraphs of this chapter.
Messages addressed to MERSHIPS are delivered via commercial
coastal radio stations using SITOR or via INMARSAT systems.
Procedures for communicating with MERSHIPS via INMARSAT are
described under International Maritime Satellite Communications
System procedures paragraph. U.S. coastal stations, which
operate SITOR communication is identified in the U.S. Merchant
Marine/U.S Navy Communications Call-Up Procedures in Emergency
Situations paragraph.
INMARSAT ID numbers are for official use only (FOUO). To provide
access control for Navy ships and prevent INMARSAT terminals from
being inundated with unofficial phone traffic, distribution of a
list of INMARSAT ID numbers is limited to Fleet and Type
Commanders. INMARSAT ID numbers are not to be released outside of
U. S. Government channels without authorization from appropriate
Fleet Commanders or Service Headquarters.
CNO General Emergency Message Procedures
GENERAL.
In the event of the declaration of a state of war or a national
emergency, merchant vessels of the United States and those
foreign flag vessels which are considered under effective United
States control will be subject to control by agencies of the
United States Government. Appropriate agencies of the Maritime
Administration (MARAD) of the Department of Transportation will
allocate and employ such merchant vessels and allocate domestic
port facilities, equipment, and services. The Coast Guard will
coordinate the movement of merchant ships within domestic ports
and dispersal anchorages. Appropriate Naval commanders, through
the Naval Control of Shipping Organization (NCSORG), will control
the movement, routing and diversion of merchant ships at sea.
The Chief of Naval Operations (CNO) will announce a state of war
or a national emergency to merchant ships in a plain language
H-2
NTP 4 (E)
emergency message. This message will be broadcast through
available commercial and military communications systems. The
message will place merchant vessels of particular types under
United States control and will direct them to comply with
instructions in Chapter 8 of the Defense Mapping Agency
Hydrographic Topographic Center (DMAHTC) publication 117 (series)
(Radio Navigational Aids).
Appropriate authority may direct these procedures be followed
during Naval Control of Shipping exercises.
MESSAGE INITIATION PROCEDURE
The CNO Duty Officer will initiate the CNO General Emergency
Message, which will contain a special accounting code "CNO NA".
This code indicates to commercial communications systems, namely
the International Telegraph and Telephone Company (ITT) and Radio
Corporation of America (RCA) that this message is to be handled
at "no charge". Based upon a 1976 FCC ruling ITT and RCA have
agreed that the CNO General Emergency Message and like emergency
messages transmitted during Naval exercises can be accepted and
broadcast to MERSHIPS by associated coastal stations free of
charge. An exception to this free service, however, will be made
if messages are transmitted via American Telephone and Telegraph
(AT&T) and MCI affiliated Radio Manila stations "DZG" and "DZR".
Normal charges will accrue in these cases since these foreign
government stations are not bound by the FCC rule. On receipt of
messages containing the symbol "CNO NA", operating personnel at
the ITT and RCA Washington Operations Centers can immediately
call the CNO Duty Officer at the Pentagon, at their option, to
verify the authenticity of the message. After such coordination,
ITT and RCA Operations Center personnel will forward the message
to coastal stations and INMARSAT entry stations, as appropriate,
for broadcast to MERSHIPS.
The address "ALL US CONTROLLED MERCHANT SHIPS" is a Collective
Address Designator (CAD) for message routing purposes. The
heading and general contents of the CNO General Emergency Message
will be similar to the example below:
FLASH
(DATE-TIME GROUP)
FM COMNAVNETOPSCOM WASHINGTON DC//N32/N31/N3//
TO COGARD CAMSLANT CHESAPEAKE VA//OO//
COGARD CMASPAC PT REYES CA//OO//
COMCOGARD MARSEC GU
COGARD COMMSTA KODIAK AK//00//
COMDT COGARD WASHINGTON DC//HSC-4T//
COMLANTAREA COGARD PORTSMOUTH VA//AT//
COMPACAREA COGARD ALAMEDA CA//00//
COMPSRON TWO//
MARITIME ADMIN WASHINGTON DC// MAR 745//
NCTAMS LANT NORFOLK VA//3514W/3514/35/351//
NAVCOMTELSTA DIEGO GARCIA//N3//
H-3
NTP 4 (E)
NCTAMS PAC HONOLULU HI//N5/N5131/N33//
NCTAMS EURCENT NAPLES IT//N63//
NAVCOMTELSTA GUAM GU//80//
COMSCLANT BAYONNE NJ//
COMSCPAC OAKLAND CA//
COMSCFE YOKOHOMA JA//
COMSCEUR LONDON UK//
COMPSRON THREE//
COMPSRON ONE//
INFO CNO WASHINGTON DC//N61//
CINCLANTFLT NORFOLK VA//N3/N6//
CINCPACFLT PEARL HARBOR HI//N5//
CINCUSNAVEUR LONDON UK//N6//
COMSC WASHINGTON DC//N67//
NAVCOMTELSTA WASHINGTON DC//N3//
BT
UNCLAS //N00000//
MSGID/GENADMIN/CNO//
SUBJ/GENERAL EMERGENCY MESSAGE//
RMKS/1. UNITED STATES AT WAR WITH ____________. MASTERS OF
U.S.CONTROLLED MERCHANT SHIPS COMPLY WITH INSTRUCTIONS CONTAINED
IN CHAPTER EIGHT ENVELOPE ALFA OF DEFENSE MAPPING AGENCY
HYDROGRAPHIC CENTER PUB 117, ON RECEIPT.//
EXAMPLE OF CNO GENERAL EMERGENCY MESSAGE
The CNO Duty Captain shall release the message to the OPNAV TCC
who in turn shall route the message via the Automatic Digital
Network (AUTODIN) to the fleet commanders, all NCTAMS,
NAVCOMTELSTA'S, COAST GUARD CAMSLANT, CHESAPEAKE, VA, CAMSPAC PT
REYES, COMMSTA'S and MARAD for transmission to all U.S.
controlled merchant ships as indicated below.
A routing profile has been established to deliver the CNO General
Emergency Message via AUTODIN to Naval Coast Guard CAMSLANT,
CHESAPEAKE, VA, CAMSPAC PT REYES, CA AND COMMSTA KODIAL, AK for
further transmission to merchant ships by all available military
and commercial communications systems. NCTAMS and NAVCOMTELSTA'S
will automatically route the emergency message to the common
channels of satellite broadcasts via NAVCOMPARS. For other
broadcasts and circuits the message must be routed and
transmitted as described below.
BROADCAST PROCEDURES. Each of the communications commands listed
above will broadcast the CNO General Emergency Message per the
following procedures.
NCTAMS/NAVCOMMSTA/NAVCOMTELSTA
(a) Where required to guard 500 kHz by Communications
Operating Requirements (COR), broadcast the emergency message
every hour for 24 hours. Commence transmission of the message
during the last 30 seconds of the first silent period.
H-4
NTP 4 (E)
(b) On all active single channel broadcasts, transmit the
emergency message at the beginning of each schedule or every hour
for a 24-hour period.
COAST GUARD COMMSTA'S
The emergency message will be routed via DTH to Coast Guard
CAMSLANT, CHESAPEAKE, VA, CAMSPAC PT REYES, AND COMMSTA Kodiak
AK.
These stations will transmit the emergency message via NAVTEX
broadcast on 518 kHz immediately upon receipt and each scheduled
broadcast thereafter.
Each COMMSTA will transmit the emergency message on SITOR,
ship/shore and mobile maritime and public correspondence circuits
as applicable.
Routing Record Messages To Merships
General. MERSHIPS engaged in foreign commerce are required by
law to report their positions every 48 hours while underway and
when entering and departing port using the U.S. Flag Merchant
Vessels Location Filing System (USMER). Per request of the U.S.
Maritime Administration (MARAD), Masters and Radio Officers of
MERSHIPS should include the primary and local geographic radio
stations being guarded in the remarks section of their USMER
reports. MERSHIPS sends these reports to the Naval Marine
Intelligence Center (NAVMARINTCEN), who provides the information
to the U.S. Coast Guard for their Automated Mutual Assistance
Vessel Rescue (AMVER) system. AMVER, described in detail in
paragraph 631 of this publication, is a voluntary participatory
computerized system for maintaining the positions of
participating merchant vessels and is used for search and rescue
purposes.
LOCATING ROUTING INFORMATION. The U.S. Military CommunicationsElectronics Board (USMCEB) has designated the Naval Computer and
Telecommunications Area Master Station, Pacific (NCTAMS PAC) the
DOD central routing authority for messages addressed to MERSHIPS.
To ensure proper routing and delivery of messages to MERSHIPS,
all Naval activities should send record traffic to NCTAMS PAC for
further routing to MERSHIPS unless they have other positive
message routing information available.
Routing information for ships controlled by the Commander,
Military Sealift Command (COMSC) is available per the procedures
described in COMSCINST 2000.2.
NCTAMS PAC uses the following standard operating procedures to
obtain communications routing information for MERSHIPS not under
COMSC control.
The NCTAMS database operator will request the routing
H-5
NTP 4 (E)
information from the NAVMARINTCEN Merchant Analyst, DSN 293-2106
or Commercial (301) 763-2106. NAVMARINTCEN will provide
information from its radio guard database, which is updated by
information taken from ships' AMVER reports. If NAVMARINTCEN is
unable to provide the requested information,
The NCTAMS database operator will then call Commander, Military
Sealift Command (COMSC) in Washington, D.C. (during working hours
only) DSN 288-2666 or commercial 202-433-2666 to request any
routing information available on the merchant vessel.
If routing information is not available from COMSC, the NCTAMS
database operator will then attempt to locate the ship by
requesting information on the ship's owner from MARAD during
working hours.
MESSAGE DELIVERY TO MERSHIPS. NCTAMS, upon determination of the
best known routing, will forward messages for delivery.
Established DOD communications doctrine permits traffic to be
delivered via AUTODIN to the commercial refile station nearest
the coastal station transmitting traffic to the ship. Because
complete information is not always available within government
channels as to what station is serving a particular ship, it is
often difficult to achieve positive message routing.
Consequently, messages addressed to merchant ships are sometimes
delayed. To improve this situation, the FCC has ruled that
record carriers should improve the alternate route capability and
interconnectivity between coastal stations for final delivery by
transmission to ships. Better interconnectivity between coastal
stations will improve traffic delivery to merchant ships.
Messages can then be directly routed to another coastal station
for transmission in the event a ship did not establish contact
with a primary calling station. The record carriers also reserve
the option of using either INMARSAT or the coastal stations to
deliver messages to merchant ships at sea. However, when it is
known that a U.S. Flag Merchant Ship is guarding INMARSAT, the
INMARSAT procedures detailed below may be used for message
delivery.
International Maritime Satellite Communications System (INMARSAT)
Procedures
GENERAL. The INMARSAT commenced formal operations on 1 February
1982. The Communications Satellite Corporation (COMSAT),
Washington, D.C., is the sole U.S. representative in the INMARSAT
Organization, which is headquartered in London, UK. COMSAT
operates INMARSAT earth stations in the United States at
Southbury, Connecticut and Santa Paula, California and overseas
at Ata, Turkey to provide worldwide commercial satellite services
over INMARSAT.
To ensure rapid and reliable communications are available when
needed, the Chief of Naval Operations (CNO) has directed that
procedures be established to permit Naval commands to communicate
H-6
NTP 4 (E)
with MERSHIPS via commercial maritime satellite systems. Naval
commands are authorized to communicate with MERSHIPS via INMARSAT
using the procedures outlined below. Per CNO direction, INMARSAT
will be used to communicate with MERSHIPS for transmission of
emergency messages and messages pertaining to fleet support
operations only. Routine operational, administrative,
hydrographic and navigational area warning messages will be
transmitted by Naval commands to MERSHIPS via INMARSAT at the
discretion of the Officer in Tactical Command (OTC). INMARSAT
services are available to MERSHIPS and all others operated under
the control of COMSC.
Communications With U.S. Flag Merships Via SITOR
The Navy relies on the Coast Guard to provide a real time
communications interface with MERSHIPS. The use of HF SITOR,
also called Narrow Band Direct Printing (NBDP) CR radiotelex, is
the U.S. and international standard means for ship-shore-ship
unclassified record message send and receive. The Safety of Life
At Sea (SOLAS) convention, as amended by the Global Maritime
Distress and Safety System (GMDSS) 1988 amendments, requires
SITOR to be on all ships not having INMARSAT ship earth stations.
SITOR is now the standard for unclassified terrestrial data and
message communications to ships. It replaces unclassified radio
teletype (RATT) for this purpose.
Coast Guard telecommunications facilities presently equipped with
SITOR are COGARD CAMSLANT (NMN), COGARD CAMSPAC (NMC), and
COMMSTA Kodiak (NOJ
CNO has validated the need for interconnecting circuits between
Coast Guard COMMSTAS and Naval communication stations in support
of communications with U.S. Flag Vessels. Connectivity now
exists between the following:
(1) COGARD CAMSPAC PT Reyes, CA and NAVCOMTELSTA Sand
Diego, CA.
(2) COGARD CAMSLANT Chesapeake, VA and NCTAMS LANT,
Norfolk VA.
In determining the use of Coast Guard HF SITOR equipment to
support emergency communications with U.S. Flag Vessels, the
following points were considered: the SITOR equipment at Coast
Guard COMMSTAS is used on a daily basis which ensures that
operators are trained on the equipment and its use, the operating
condition of the equipment is known at all times; the equipment
is supportable through the Coast Guard Electronic Maintenance
System.
Allied Merchant Ship Communications Systems (MERCOMMS)
A new Allied Merchant Ship Communications System (MERCOMMS) is
evolving in the Allied Nations Communications Agency (ANCA) to
H-7
NTP 4 (E)
improve allied protection of merchant shipping in time of war
under the Naval Control of Shipping Organization. Merchant ship
message routing responsibilities in MERCOMM will be relatively
the same, except that Ocean Control Authorities (OCA) in the NCSO
will be responsible for message delivery to allied merchant ships
in assigned ocean areas, using specifically designated military,
Coast Guard, and commercial communications facilities.
Pending the availability of MERCOMMS, communications with
merchant ships under stressed conditions are as outlined in ACP
149 and Defense Mapping Agency DMAHTC 117 A & B (series)
publications.
U.S. Merchant Marine/U.S. Navy Communications Call-Up Procedures
In Emergency Situations
CNO established the following procedures to ensure that U.S. Flag
and U.S. Controlled Fleet merchant ships may quickly establish
communications with U.S. Navy commands via INMARSAT and HF radio.
These procedures were implemented by CNO ltr 2099 Ser
941C/BU535705 of 31 May 88. It is essential that personnel in
command centers, ashore communications facilities and surface
units are familiar with these requirements and procedures in
order to respond to merchant ship requests for Navy assistance.
The following situations warrant immediate use of emergency
communications for MERSHIPS requesting assistance from the U.S.
Navy.
(1) Attacks, threats of attack or hostile actions by
military forces. This includes warning shots and/or observation
of mining operations in international waters, as well as actual
attack.
(2) Harassment by military forces, including threats
or attempts of boarding and seizure or hostage taking.
(3)
(4)
Piracy
seizure.
NTP 4 (E)
communications coverage.
EMERGENCY AREA PHONE NUMBERS
Ocean Area
Mediterranean
, Baltic, Mid
East
Command Name
CINCUSNAVEUR
OPCONCEN London UK
NCTAMS EURCENT
Naples IT
Telephone
044-1-4094479/4473/4527*
From CONUS: 011-44-1409-XXXX
Telex
039-81-760-6343
From CONUS: 011-3981-760-6343
127-775
Atlantic,
Caribbean,
Atlantic
Approaches to
Panama Canal,
North Sea
COMLANTAREA COGARD
(757) 298-6246
Portsmouth, VA
CINCLANTFLT OPCONCEN (804) 444-6602, 445Norfolk, VA
5582
NCTAMS LANT Norfolk
VA
COMLANTAREA GOGARD
Portsmouth, VA
Eastern
Pacific,
Mexico,
Central
America
COGARD CAMSLANT
Chesapeake VA
CINCPACFLT OPCONCEN
Pearl Harbor, HI
NCTAMS PAC Honolulu
HI
NAVCOMTELSTA San
Diego CA
Mid Pacific,
Northern
Pacific,
Pacific
Approaches to
Panama Canal,
South America
(757) 421-6240
(808) 471-3201, 4225944
(808) 653-5544, 6535303
(619) 239-9381 thru
9385
COMPACAREA COGARD
San Francisco, CA
(510) 437-3700
COGARD COMMSTA
Kodiak, AK
(907) 487-5778
H-9
72-343
NTP 4 (E)
Ocean Area
Western
Pacific,
South
Command Name
CINCPACFLT OPCONCEN
Pearl Harbor, HI
Telephone
(808) 471-3201, 4225944
Telex
NACOMTELSTA Guam, GU
Emergency Area Phone Numbers
011-671-355-5373
NAVCOMTELSTA FAR
EAST YOKOSUKA JA
Pacific,
Southeast
Asia, Straits
of Malacca,
Sea of Japan,
Indian Ocean
Persian Gulf,
Red Sea
011-0468-26-1911, Ext
7497
COGARD MARSEC, GU
COGARD COMMSTA
Kodiak, AK
011-672-355-5653
(907) 487-5778
0039-81-760-6343
Form CONUS 011-39-81760-6343
INMARSAT
ID #1501733
127-775
(757) 398-6246
COMLANTAREA GOGARD
Portsmouth, VA
Emergency Area Phone Numbers
Navy communications facilities with FLTSATCOM interface
capability will, on direction from FLTCOM OPCONCENs, place calls
to the following Navy communication stations which have a
conference bridge capability to establish unclassified ship-toship voice connectivity with Navy afloat units via Navy FLTSATCOM
systems.
NCTAMS LANT NORFOLK VA
(808) 653-5549
NCTS GUAM GU
011-671-5511
NCTS NAPLES IT
capability.
H-10
NTP 4 (E)
merchant ship and the commands/facilities ashore and afloat.
However, record communications should also be used when
appropriate. MERSHIPS are authorized to use frequencies
allocated to FLTCOM High Command Worldwide Voice Network (HICOM)
to enter the net to pass emergency traffic.
g.
Merchant ships will use the following voice call-up
procedures if an indefinite call-up address is to be used:
"ANY NAVY/AIR FORCE/COAST GUARD STATION GUARDING THIS NET, THIS
IS SS EXAMPLE, EMERGENCY MESSAGE FOLLOWS."
Merchant ships are cautioned that Navy shore stations and/or
afloat units guarding HICOM or other tactical HF nets may respond
with an alpha-numeric daily changing call sign and advise the
merchant ship to send traffic. The Navy unit will not reveal its
name to prevent compromising the call sign.
h.
Merchant ships equipped with INMARSAT will attempt to
direct dial the appropriate FLTCOM via the listed telephone
numbers above to report an incident. If the call cannot be
completed via direct dial, they will place the call via the
INMARSAT operator who will attempt to contact the OPCONCEN. If
the call cannot be completed in this manner, merchant ships will
then dial the appropriate Naval Telecommunications facility for
patch or relay to the FLTCOM OPCONCEN. If contact cannot be made
via the NCTAMS/NAVCOMTELSTA, merchant ships will request the
INMARSAT operator to place the call to the U.S. Coast Guard Area
Operations Centers who will notify the FLTCOM. U.S. Flag or
effective U.S. controlled merchant ships operating in the North
Arabian Sea/Persian Gulf area requiring assistance from USN ships
of Joint Task Force Mid East should call NCT GUAM GU to patch the
call.
i. When using HF, the merchant will first contact FLTCOM
OPCONCENs via the HF Public Coast Radio Station, giving
information in prescribed format noted earlier in this appendix.
If contact cannot be made, the MERSHIP will call the closest
NCTAMS/NAVCOMTELSTA, USAF Communications Station or U.S. Coast
Guard Communications Station to relay the request to the
appropriate OPCONCEN. MERSHIP-to-Navy communication may also be
initiated for initial call-up on 2182 kHz or one of the Navy
HICOM or tactical frequencies. However, FLTCOM OPCONCEN must
approve establishing extended ship-to-ship communications between
merchant ships and USN afloat units in advance. Emergency
messages may also be transmitted over the International Distress
frequency (500 kHz) and should be addressed to Coast Guard or
private sector stations, with request for relay of messages to
Navy OPCONCENS.
Merchant ships which use HF SITOR/Narrowband Direct Printing
(NBDP) or CW record communications send traffic to the Coast
Guard Communications Station or Public Coast HF Radio station(s)
normally providing record communications support services.
H-11
NTP 4 (E)
INMARSAT equipped ships file voice or TELEX traffic via
appropriate earth stations. Emergency/distress messages received
by non-US navy facilities will be immediately forwarded to the
appropriate Navy Command center.
Merchant ships will use the following format for brevity and
uniformity in reporting incidents:
To:
EXAMPLE:
TO:
A. SS NOGALES
B. KCSD
C. LAT 05N, LONG 105E
D. 231800Z JAN 00
E. SHIP UNDER ATTACK BY MACHINE GUN AND RIFLE FIRE, ETC.
Upon receipt of an emergency transmission by the OPCONCEN the
FLTCOM will determine what action will be taken, e.g., dispatch
of forces, establishing direct communications between the
merchant ship and Navy afloat unit, providing guidance. Decision
factors affecting Navy response are contingent upon availability
of USN units, proximity of them to the merchant ship, and Rules
of Engagement applicable to the theater of operations. The
FLTCOM OPCONCEN may consider it essential for the merchant ship
to establish direct non-secure voice communications with U.S.
Navy surface units. If so, it will direct the merchant ship to
call the appropriate NCTAMS for a patch to the Navy ship(s) by
use of voice conference bridge between the commercial media
(INMARSAT, HF) and the Navy's Fleet Satellite Communications
(FLTSATCOM) system (for those ships that do not have INMARSAT).
If direct HF voice connectivity between the merchant ship and the
Navy unit is required, the FLTCOM OPCONCEN will arrange a
specific frequency assignment for coordination purposes. Any
required billing will be done per tariff regulations applicable
to INMARSAT and HF Public Coast Radio Stations.
U.S. Navy and Air Force HF voice communications nets are
dedicated to command and control of military units and air
traffic control. These nets will normally not be used for
training purposes unless specifically designated by services'
operational commander(s) for use by merchant ships as part of a
scheduled exercise. However, MERSHIPS may use commercial
communications systems (INMARSAT, HF) aboard ship for personnel
training and equipment check-out procedures by placing calls to
H-12
NTP 4 (E)
the FLTCOM OPCONCEN. MERSHIPS will initiate tests by dialing the
appropriate FLTCOM OPCONCEN for the ocean area involved.
Shipping line owners will fund costs incurred for tests initiated
by their merchant ships. The FLTCOM will determine if the test
calls should be extended to USN afloat units via the FLTSATCOM
interfaces and NCTAMS. The FLTCOM may desire to use HF HICOM for
MERSHIPS under Navy control as well as MERSHIPS not under Navy
control during Naval Control of Shipping exercises or for test
prior to in-chop. Except in crisis situations, MERSHIPS under
charter to COMSC will use procedures outlined in other portions
of this publication.
n.
Frequencies authorized for use by MERSHIPS for
emergency communications are listed below:
NAVY
Voice
Station
Control Area
Control Station
Mediterranea
n
NCTAMS EURCENT
DET LONDON UK
Eastern and
Northern
Atlantic
NCTAMS EURCENT
DET ROTA SP
AOK
Caribbean
(Caribbean
Emergency
Net)
COMNAVACTS
Puerto Rico
Designated
afloat units
CARIB
NAVSTA
Guantanamo Bay
Cuba
Any
Navy
Station
this
net
NAW
Indian Ocean
NAVCOMTELSTA
Diego Garcia
NKW
Voice Net
Designated
afloat units
Any
Navy
station
this
net
H-13
NTP 4 (E)
NOTES:
1. NAVCOMTELSTA Iceland guards frequency from 2000-0800Z,
NAVCOMTELSTA
Puerto Rico from 0001-1345Z.
2. NAVCOMTELSTA Iceland guards frequency from 0800-2000Z.
3. NAVCOMTELSTA Puerto Rico guards frequency from 1345-2359Z.
EMERGENCY COMMUNICATIONS FREQUENCIES
Control Area
Southwest
Pacific
Micronesia
AIR FORCE
Control Station Voice
Call
Andersen AFB
"Andersen
Guam
"
Northwest
Pacific Sea of
Japan
Mid Pacific
Hickam AFB
Hawaii
"Hickam"
Northern
Pacific
Elmendorf AFB
"Elmendor
f"
"McClella
n"
"Albrook"
Northern
Atlantic East
Coast CONUS,
Canada,
Caribbean Gulf
"McDill"
McDill AFB
Florida
H-14
SSB (Carrier)
Frequencies (Khz)
6738 (0200-1200Z)
8967 (24 hr)
11176 (24 hr)
13201 (24 hr)
18002 (2200-0700Z)
4747 (1000-2100Z)
6738 (0900-2400Z)
8967 (24 hr)
11236 (24 hr)
13201 (2100-1000Z)
18002 (0001-0900Z)
3144 (0600-1700Z)
6738 (0400-0900)
8964 (24 hr)
11179 (24 hr)
13201 (1700-0600Z)
18002 (0001-0900Z)
6738 (24 hr)
8989 (24 hr)
11176 (24 hr)
13201 (24 hr)
4746 (0400-1600Z)
6738 (0400-1600Z)
8989 (24 hr)
11239 (24 hr)
15031 (1600-0400Z)
18002 (1600-0400Z)
5710 (0200-1200Z)
6683 (0001-1400Z)
8993 (24 hr)
11176 (24 hr)
15015 (1200-0200Z)
18019 (0900-2400Z)
Northern Atlantic
5688 (0001-1400Z)
8989 (24 hr)
11179 (0900-2400Z)
13244 (0900-2400Z)
NTP 4 (E)
Control Area
AIR FORCE
Control Station Voice
Call
of Mexico
SSB (Carrier)
Frequencies (Khz)
18019 (0900-2400Z)
Central Atlantic
4746 (0001-0900Z)
6750 (0001-0900Z)
11179 (0900-2400Z)
11246 (24 hr)
13244 (0900-2400Z)
Southern Atlantic
4746 (0001-0900Z)
6750 (0001-0900Z)
8993 (24 hr)
11246 (24 hr)
13244 (0900-2400Z)
Northern
Atlantic
Canada,
Greenland
Eastern
Atlantic
Iceland North
Sea, Baltic
Thule AB
"Thule"
Croughton AB UK "Croughto
n"
Eastern
Lajes AB Azores "Lajes"
Atlantic Spain,
Western
Mediterranean,
North Africa
South Atlantic
Cape of Good
Hope Western
Indian Ocean,
Red Sea
Central and
Eastern
Mediterranean
Strait of
Hormuz Persian
Gulf Northern
Red Sea
Ascension
Island
Auxiliary AB
"Ascensio
n"
Incirlik AB
Turkey
"Incirlik
"
H-15
Gulf of Mexico
4746 (0001-0900Z)
6750 (0002-0900Z)
8993 (24 hr)
11246 (24 hr)
6738
8967
13201 (Slight delay
in answering)
3076 (2300-0500Z)
5703 (2100-0800Z)
6750 (24 hr)
9011 (0500-2300Z)
11176 (24 hr)
13214 (0800-2100Z)
3081 (2100-1000Z)
4746 (2100-1000Z)
6750 (24 hr)
8967 (24 hr)
11226 (1000-2100Z)
13244 (1000-2100Z)
6753 (2000-0800Z)
8993 (24 hr)
11176 (1800-1000Z)
13244 (1000-1800Z)
15015 (08000-2000Z)
6738 (24 hr)
11176 (24 hr)
13244 (24 hr)
15015 (24 hr)
NTP 4 (E)
16698.2 22299.2
(16696.5)
HJ
HJ
Pt Reyes (NMC)
(1096)*
Coast Freq
22386
(4213.8)
(22384.3)
Ship Freq 4178
25202.5
(4176.3)
(16691.3)
O/R HN
4215.5
25380
(6321.8)
(25378.3)
6271.7
6323.5
8426.0
12600
16815.5
(8424.3) (12598.3)
(16814.8)
8386
22294
12497.5
16693
(6270.8)
(8384.3)
(12495.8)
(22292.3)
(25200.8)
H24
O/R
HJ
O/R
O/R
4215,5
6319.5 8422
12585
16812.5
(4213.8) (6317.8) (8420.3)
(12583.3)
(16810.8)
(22380.3)
4178
6268.5 8382
12482.5
16689
(4176.3) (6266.8) (8380.3)
(12480.8)
(16687.3)
(22288.3)
O/R
O/R
HN
H24
H24
22382
22290
HJ
H-16
NTP 4 (E)
Coast Freq
4212
6316
8429.5
12589
16819.5 22389.5
(4210.3) (6314.3) (8427.8)
(12587.3)
(16817.8)
(22387.8)
Ship Freq
4174
6264.5 8389.5
12486.5 16696.5 22297.5
(4172.3) (6262.8) (8387.8) (12484.8)
(16694.8)
(22295.8)
O/R
O/R
H24
H24
O/R
HJ
* Coast station identification number for use with selective
calling devices
Note 1: The carrier or dial frequency in parenthesis is located
1.7 kHz below the assigned frequency.
Note 2: Time definitions
HJ
Daytime
(2 hours after sunrise until 2 hours
before sunset;
local time)
HN
Nighttime
(2 hours before sunset until 2 hours
after sunrise;
local time)
H24 Continuous
(24 hours)
HF WORKING FREQUENCIES
H-17
NTP 4 (E)
H-18
NTP 4 (E)
APPENDIX I
SAMPLE DRILL PACKAGES
The samples listed here are classified for illustration purposes
only, the content is unclassified. The format follows FXP 3 (Rev
G) figure 2-1. Italicized areas are to be replaced with
appropriate information for the exercise. These are samples only
some line items may change as exercise/mission dictates, make
changes as appropriate.
Note: Paragraph U (Communications) of the Pre-Ex message can be
whatever circuits the strike group chooses to use based on
equipment limitations and the nature of the exercise.
DRILL PACKAGE ALPHA UHF SECURE/NONSECURE VOICE
1. PROVIDED IS THE STANDING PRE-EX (C4I PKG ALPHA) UHF
SECURE/NONSECURE VOICE ACTIVATION. THE CRITERIA FOR MEASURING
EFFECTIVENESS OF THE BASELINE STANDARDS WILL PRIMARILY BE BY USE
OF NMETLS. ALL NMETLS CAN BE FOUND ON THE COMSTRKFORTRALANT OR
COMSTRKFORTRAPAC CAS SITE(S). ALL RELATED WARFARE AREA NMETLS
CAN BE FOUND ON THE Strike Group CAS SITE. IN ADDITION TO NMETLS,
ALL UNITS WILL USE THE FXP-3 AND SELF-OBSERVE APPLICABLE AREAS
AND PROVIDE OBSERVED GRADED STATUS.
A. EXERCISE: ACTIVATION OF UHF SECURE/NONSECURE VOICE
B. OSE: Strike Group Commander
C. OTC: Strike Group Commander
D. OCE: CO, (PRI) USS CV/CVN, LHA/LHD (SEC) USS CG
G. PARTICIPANTS: Strike Group Units
NOTE: ALL PARTICIPANTS MAY NOT BE ASSIGNED TO PARTICIPATE
IN EACH C4I STANDING PRE-EX EVENT AS INDICATED IN THE
PARTICIPANTS COLUMN.
I. TIME ZONE: ZULU
J. COMEX: IAW SOE (NO NOTICE)
JJ. FINEX: IAW SOE
N. AREA OF EXERCISE: IAW CURRENT TASKING AS ASSIGNED
U. COMMUNICATIONS: SIPR CHAT/VOICE COMMS
A. COORDINATION CIRCUITS:
1. PRI COORD:
2. SEC COORD:
V. INSTRUCTIONS:
V1. ALL UNITS MUST BE PREPARED TO ACTIVATE DESIGNATED CIRCUIT
LINE NUMBER UPON REQUEST VIA COMSPOT AS DIRECTED BY THE
COMMUNICATION CONTROL SHIP. ROLL CALL ASSIGNMENT WILL BE
DESIGNATED BY the Strike Group Commander.
V2. OCE WILL CONDUCT ROLL CALL ON VOICE NET OPTASK COMMS line
number. EACH UNIT WILL INITIATE CALL UP TO THE CCS ADVISING
RECEIPT AND READABILITY OF ROLL CALL. ONCE AMPLE CALL UPS ARE
RECEIVED, USS CV/CVN, LHA/LHD WILL SHIFT TO PLAIN AND COMMUNICATE
UTILIZING CALL SIGNS. STRICT USE OF AUTHENTICATION, GINGERBREAD
AND EEFI PROCEDURES WILL BE ADHERED TO. USS CVN/LHA/LHD WILL
I-1
NTP 4 (E)
INITIATE NUCO/UN-NUCO TRAFFIC TO ALL PARTICIPANTS.
ZZ. 1.) THIS EXERCISE IS DESIGNED TO TEST THE CAPABILITIES OF
CV/CVN, LHA/LHD Strike group OF ACTIVATING AN UNSCHEDULED UHF
SECURE/UNSECURE VOICE CIRCUIT. ALL UNITS MUST BE PREPARED TO
EXECUTE WHEN EXERCISE IS INITIATED.
----------------------------------------------------------------- GOAL ACTIVATE UHF SECURE/UNSECURE VOICE.
----------------------------------------------------------------- TRANSMIT AND RECEIVE ON UHF VOICE CIRCUIT (SECURE/UNSECURE).
----------------------------------------------------------------C4I PKG ALPHA
(UHF CIRCUITS)
(ACTIVATE UNSKED UHF
CIRCUIT)
NMETL/NTA(S)
NTA 5.1.1.1.2 PROVIDE EXTERNAL COMMUNICATIONS
S1. COMMUNICATIONS CONTROL SHIP (CCS) EFFECTIVENESS STANDARDS:
----------------------------------------------------------------S1H. TIME (MINUTES) TO ACTIVATE UHF SECURE/NONSECURE VOICE. (T1)5, (T2) 5-20, (T3) 20-30, (T4)-30
----------------------------------------------------------------FXP:
CCC-5-SF SYSTEM CONTROL SECURE/NONSECURE VOICE
CCC-6-SF RADIO-TELEPHONE DRILLS
CCC-34-SF SYSTEM CONTROL - SINGLE AUDIO SYSYTEM (SAS) AND BLACK
AUDIO SYSTEM (BAS)
----------------------------------------------------------------- ATTAINABLE GOAL STANDARD REQUIRED IS T2.
---------------------------------------------------------------2. (C) CCS WILL GENERATE COMSPOT DETAILING UHF SECURE/NONSECURE
UPON FINEX. OCE WILL PROVIDE GRADE STANDARDS AND MEASURES OF
EFFECTIVENESS RESULTS TO BE POSTED VIA Strike Group CAS: indicate
IP Address//
Downgrading instructions in accordance with SECNAV M5510.36 (June
2006)
I-2
NTP 4 (E)
DRILL PACKAGE BRAVO HF SECURE/NONSECURE VOICE
1. PROVIDED IS THE STANDING PRE-EX (C4I PKG BRAVO) HF
SECURE/NONSECURE VOICE ACTIVATION. THE CRITERIA FOR MEASURING
EFFECTIVENESS OF THE BASELINE STANDARDS WILL PRIMARILY BE BY USE
OF NMETLS. ALL NMETLS CAN BE FOUND ON THE COMSTRKFORTRALANT OR
COMSTRKTRAPAC CAS(S) SITE. ALL RELATED WARFARE AREA NMETLS CAN BE
FOUND ON THE strike group CAS SITE. IN ADDITION TO NMETLS, ALL
UNITS WILL USE THE FXP-3 AND SELF-OBSERVE APPLICABLE AREAS AND
PROVIDE OBSERVED GRADED STATUS.
A. EXERCISE: ACTIVATION OF HF SECURE/NONSECURE VOICE
B. OSE: strike group commander
C. OTC: strike group commander
D. OCE: (PRI) USS CV/CVN, LHA/LHD (SEC) USS CG
G. PARTICIPANTS: Strike Group Units
NOTE: ALL PARTICIPANTS MAY NOT BE ASSIGNED TO PARTICIPATE
IN EACH C4I STANDING PRE-EX EVENT AS INDICATED IN THE
PARTICIPANTS COLUMN.
I. TIME ZONE: ZULU
J. COMEX: IAW SOE (NO NOTICE)
JJ. FINEX: IAW SOE
N. AREA OF EXERCISE: IAW CURRENT TASKING AS ASSIGNED
U. COMMUNICATIONS: VOICE COMMS/SIPR CHAT
A. COORDINATION CIRCUITS:
1. PRI COORD:
2. SEC COORD:
V. INSTRUCTIONS:
V1. ALL UNITS MUST BE PREPARED TO ACTIVATE DESIGNATED CIRCUIT
LINE NUMBER UPON REQUEST VIA COMSPOT AS DIRECTED BY THE
COMMUNICATION CONTROL SHIP (CCS). ROLL CALL ASSIGNMENT WILL BE
DESIGNATED BY OCE. HF PREDICTION AND PROPAGATION WILL BE
DETERMINED PRIOR TO EXECUTION OF DRILL. CCS WILL GENERATE HF
PREDICTION MESSAGE TO SUPPORT THIS EXERCISE.
V2. OCE WILL CONDUCT ROLL CALL ON PRIMARY CIRCUIT OPTASK COMMS
line number. EACH UNIT WILL INITIATE CALL UP TO THE CCS ADVISING
RECEIPT AND READABILITY OF ROLL CALL. ONCE AMPLE CALL UPS ARE
RECEIVED, GINGERBREAD PROCEDURES WILL BE ADHERED TO. USS CV/CVN,
LHA/LHD WILL INITIATE NUCO/UN-NUCO TRAFFIC TO ALL PARTICIPANTS.
ZZ. 1.) THIS EXERCISE IS DESIGNED TO TEST THE CAPABILITIES OF
CV/CVN, LHA/LHD Strike group OF ACTIVATING AN UNSCHEDULED HF
SECURE/
UNSECURE VOICE CIRCUIT. ALL UNITS MUST BE PREPARED TO
EXECUTE WHEN EXERCISE IS INITIATED.
----------------------------------------------------------------- GOAL ACTIVATE HF SECURE/UNSECURE VOICE.
----------------------------------------------------------------- TRANSMIT AND RECEIVE ON HF VOICE CIRCUIT (SECURE/UNSECURE).
----------------------------------------------------------------C4I PKG BRAVO
(HF CIRCUITS)
(ACTIVATE UNSKED HF
CIRCUIT)
NMETL/NTA(S)
NTA 5.1.1.1.2 PROVIDE EXTERNAL COMMUNICATIONS
I-3
NTP 4 (E)
I-4
NTP 4 (E)
DRILL PACKAGE CHARLIE EHF PERFORMANCE AND CIRCUIT ACTIVATION
1. PROVIDED IS THE STANDING PRE-EX (C4I PKG CHARLIE) FOR EHF
EXTERNAL COMMUNICATIONS AND MEASURES OF EFFECTIVENESS GRADING
CRITERIA. THE CRITERIA FOR MEASURING EFFECTIVENESS AND BASELINE
STANDARDS WILL PRIMARILY BE BY USE OF NMETLS. ALL NMETLS CAN BE
FOUND ON THE COMSTRKFORTRALANT OR COMSTRKFORTRAPAC CAS SITE(S).
ALL RELATED WARFARE AREA NMETLS CAN BE FOUND ON THE Strike Group
CAS SITE. IN ADDITION TO NMETLS, ALL UNITS WILL USE THE FXP-3 AND
SELF-OBSERVE APPLICABLE AREAS AND PROVIDE OBSERVED GRADED STATUS.
A. PROVIDE EXTERNAL EHF COMMUNICATIONS FOT LDR, MDR, AND NECC.
B. OSE: Strike Group Commander
C. OTC: Strike Group Commander
D. OCE: (PRI) USS CV/CVN, LHA/LHD (SEC) USS CG
G. PARTICIPANTS: Strike Group Units
NOTE: ALL PARTICIPANTS MAY NOT BE ASSIGNED TO PARTICIPATE IN
EACH C4I STANDING PRE-EX EVENT AS INDICATED IN THE PARTICIPANTS
COLUMN IAW REF B SCHEDULE OF EVENTS (SOE).
I. TIME ZONE: ZULU
J. COMEX: IAW SOE (NO NOTICE)
JJ. FINEX: IAW SOE
N. AREA OF EXERCISE: IAW CURRENT TASKING AS ASSIGNED
U. COMMUNICATIONS: PRIMARY WARFARE COMMANDERS VOICE AND
CHATCIRCUITS AS DESIGNATED IN STRIKE GROUP EFFECTIVE
OPTASK COMMS ISO TRANSLANT.
U. COMMUNICATIONS: SIPR CHAT/VOICE COMMS
A. COORDINATION CIRCUITS:
1. PRI COORD:
2. SEC COORD:
V. INSTRUCTIONS:
V1. OCE WILL ANNOUNCE THE ACTIVATION OF NETS OR REQUEST
PERFORMANCE STATUS UPON NOTICE. ALL UNITS MUST BE PREPARED TO
EXECUTE WHEN EXERCISE IS INITIATED.
----------------------------------------------------------------ZZ. 1.) THIS EXERCISE IS DESIGNED TO TEST CV/CVN, LHA/LHD STRIKE
GROUPS ABILITY TO CONDUCT EHF FOT PERFORMANCE AND CIRCUIT
ACTIVATIONS TO MEET NMETL/NTA STANDARDS ISO COMPTUEX OBJECTIVES.
----------------------------------------------------------------- MAINTAIN ATTAINABLE GOAL STANDARD REQUIRED OF T2.
----------------------------------------------------------------- PROVIDED BELOW ARE THE LISTED NMETL/NTA OBJECTIVES WHICH WILL
BE OBSERVED.
----------------------------------------------------------------C4I PKG CHARLIE (EHF LDR/MDR/FOT/NECC SYSTEM PERFORM EXERCISE)
(PERFORM VARIOUS EHF SYSTEM CHECKS)
NMELT/NTA(S)
----------------------------------------------------------------NTA 5.1.1.1.2 PROVIDE EXTERNAL COMMUNICATIONS EHF
LDR/MDR/FOT/NECC
------------------------------------------------------------------
I-5
NTP 4 (E)
DEMONSTRATE ABILITY TO INTERPRET RF PERFORMANCE SCREEN AND
CONDUCT SATELLITE LOOP TEST (SLT). T1=YES, T2=N/A, T3=N/A, T4=NO.
- WHEN DIRECTED BY NECOS ALL UNITS WILL SEND COMSPOT DETAILING
THE RF PERFORMANCE SCREEN.
----------------------------------------------------------------(NECC)
TIME IN (MINUTES) TO LOAD THE CORRECT NECC COMM CONFIGURATION FOR
CURRENT AOR. T1=<15, T2=15-30, T3=30-45, T4=>45.
- OCE WILL PROVIDE STATUS ON ALL UNITS REACHABLE VIA NECC.
- OCE WILL CONDUCT OTO WITH ALL REACHABLE UNITS.
- OCE WILL HANOVER NECOS VIA NECC.
------------------------------------------------------------------TERMINAL FAULT STATUS
TIME IN (MINUTES) TO PERFORM AUTOMATIC TEST SEQUENCE (ATS) TO
ENSURE NO FAULTS ARE PRESENT. T1=<5, T2=6-7, T3=8-9, T4=>9.
- ENSURE A QUALIFIED EHF TECH IS PRESENT WITH THE EHF OPERATOR
WHEN CONDUCTING ANY PERFORMANCE TESTING.
- NECOS WILL DESIGNATE WHEN EACH UNIT WILL CONDUCT ATS.
- UPON COMPLETION PROVIDE STATUS OF ATS FAULTS VIA COMSPOT.
------------------------------------------------------------------TIME IN (MINUTES) TO DEMONSTRATE JOINING A BEAM MANAGED (BM) NET.
T1=<5, T2=6-10, T3=11-15, T4=>15.
- NECOS WILL DIRECT ALL UNITS TO EXIT ALL LDR AND MDR NETS LESS
ADNS DUAL SIMPLEX NETS.
- NECOS WILL ORDER THE ACTIVATION OF DESIGNATED NET FOR ALL
UNITS.
----------------------------------------------------------------FXP:
CCC-26-SF EXTREMELY HIGH FREQUENCY SATELLITE COMMUNICATIONS
----------------------------------------------------------------2.) OCE WILL PROVIDE GRADE STANDARDS AND MEASURES OF
EFFECTIVENESS RESULTS TO BE POSTED VIA Strike Group CAS II:
indicate IP address.//
Downgrading instructions in accordance with SECNAV M5510.36 (June
2006)
I-6
NTP 4 (E)
DRILL PACKAGE CHARLIE ONE EHF POINT TO POINT (PTP)
1. PROVIDED IS THE STANDING PRE-EX (C4I PKG CHARLIE-ONE) FOR EHF
POINT TO POINT COMMUNICATIONS AND MEASURES OF EFFECTIVENESS
GRADING CRITERIA. THE CRITERIA FOR MEASURING EFFECTIVENESS AND
BASELINE STANDARDS WILL PRIMARILY BE BY USE OF NMETLS. ALL
NMETLS CAN BE FOUND ON THE COMSTRKFORTRALANT OR COMSTRKGORTRAPAC
CAS SITE(S). ALL RELATED WARFARE AREA NMETLS CAN BE FOUND ON THE
Strike Group CAS SITE. IN ADDITION TO NMETLS, ALL UNITS WILL USE
THE FXP-3 AND SELF-OBSERVE APPLICABLE AREAS AND PROVIDE OBSERVED
GRADED STATUS.
A. EXERCISE: EHF POINT TO POINT ACTIVATION
B. OSE: Strike Group Commander
C. OTC: Strike Group Commander
D. OCE: (PRI) USS CV/CVN, LHA/LHD (SEC) USS CG
G. PARTICIPANTS: Strike Group Units
I. TIME ZONE: ZULU
J. COMEX: IAW SOE (NO NOTICE)
JJ. FINEX: IAW SOE
N. AREA OF EXERCISE: IAW CURRENT TASKING AS ASSIGNED
U. COMMUNICATIONS: SIPR CHAT/VOICE COMMS
A. COORDINATION CIRCUITS:
1. PRI COORD:
2. SEC COORD:
V. INSTRUCTIONS:
V1. ALL UNITS BE PREPARED TO ACTIVATE EHF PTP ON CALL AT A
MOMENTS NOTICE IAW WITH COMEX/FINEX TIME PERIOD INDICATED.
CCS WILL DESIGNATE TIME TO ACTIVE EHF PTP VIA IMMEDIATE COMSPOT.
CCS WILL INDICATE THE ORDER OF SHIPS FOR THE CALL IN THE COMSPOT.
V2. ALL UNITS MUST HAVE USKAT B5693 AND USKAT B5697 TO BE
PREPARED TO CONDUCT PTP AND CROSSLINK WITH UNITS IN C2F, C6F,
C5F, AND C7F. ENSURE UNIT DIRECTORY TERMINAL ID(S) ARE AVAILABLE
AT ALL TIMES. ALL PARTICIPANTS MUST BE PREPARED TO ACTIVATE PTP
UPON NOTICE. ALL UNITS MUST BE PREPARED TO EXECUTE WHEN EXERCISE
IS INITIATED.
----------------------------------------------------------------ZZ. 1.) THIS EXERCISE IS DESIGNED TO TEST CV/CVN, LHA/LHDs
STRIKE GROUP ABILITY TO RECEIVE AN EHF PTP AND MEET THE T1
ATTAINABLE GOAL.
----------------------------------------------------------------C4I PKG CHARLIE ONE
(EHF P-T-P)
NMETL/NTA(S)
-----------------NTA 5.1.1.1.2 PROVIDE EXTERNAL COMMUNICATIONS EHF
LDR/MDR/FOT/NECC
S1. COMMUNICATIONS CONTROL SHIPS EFFECTIVENESS STANDARDS
TIME IN (MINUTES) TO ESTABLISH AN EHF PTP VOICE CIRCUIT WITH
STRIKE GROUP UNITS.
I-7
NTP 4 (E)
(T1)-5, (T2) 6-15, (T3) 16-30, (T4) 30.
----------------------------------------------------------------FXP:
CCC-26-SF EXTREMELY HIGH FREQUENCY SATELLITE COMMUNICATIONS
----------------------------------------------------------------2. (C) OCE WILL PROVIDE GRADE STANDARDS AND MEASURES OF
EFFECTIVENESS RESULTS TO BE POSTED VIA Strike Group CAS II:
indicate IP address.//
Downgrading instructions in accordance with SECNAV M5510.36 (June
2006)
I-8
NTP 4 (E)
DRILL PACKAGE DELTA BATTLE FORCE EMAIL NETWORK ACTIVATION
1. PROVIDED IS THE STANDING PRE-EX (C4I PKG DELTA) BATTLE FORCE
EMAIL NETWORK ACTIVATION AND THE CRITERIA FOR MEASURING
EFFECTIVENESS OF THE BASELINE STANDARDS WILL PRIMARILY BE BY USE
OF NMETLS. ALL NMETLS CAN BE FOUND ON THE COMSTRKFORTRALANT OR
COMSTRKFORTRAPAC CAS SITE(S). ALL RELATED WARFARE AREA NMETLS CAN
BE FOUND ON THE strike group CAS SITE. IN ADDITION TO NMETLS, ALL
UNITS WILL USE THE FXP-3 AND SELF-OBSERVE APPLICABLE AREAS AND
PROVIDE OBSERVED GRADED STATUS.
A. EXERCISE: BATTLE FORCE EMAIL ACTIVATION IAW NTA5.1.1.2 S1I
B. OSE: Strike Group Commander
C. OTC: Strike Group Commander
D. OCE: (PRI) USS CV/CVN, LHA/LHD (SEC) USS CG
G. PARTICIPANTS: Strike Group Units
NOTE: ALL PARTICIPANTS MAY NOT BE ASSIGNED TO PARTICIPATE
IN EACH C4I STANDING PRE-EX EVENT AS INDICATED IN THE
PARTICIPANTS COLUMN.
I. TIME ZONE: ZULU
J. COMEX: IAW SOE (NO NOTICE)
JJ. FINEX: IAW SOE
N. AREA OF EXERCISE: IAW CURRENT TASKING AS ASSIGNED
U. COMMUNICATIONS: SIPR CHAT/VOICE COMMS
A. COORDINATION CIRCUITS:
1. PRI COORD:
2. SEC COORD:
V. INSTRUCTIONS:
V1. ALL UNITS BE PREPARED TO ACTIVATE DESIGNATED CIRCUIT LINE
NUMBER UPON REQUEST. HF PREDICTION AND PROPAGATION WILL BE
DETERMINED PRIOR TO EXECUTION OF DRILL.
V2. VERIFY BFEM 66 GATEWAY SERVER IS ACTIVE (BOTH HF MESSENGER
APPLICATIONS - SMS AND HF DELIVERY AGENT).
V3. VERIFY MICROSOFT EXCHANGE SERVER IS RUNNING PROPERLY WITH
GATEWAY SERVER.
V4. VERIFY USER ACCOUNTS/PASSWORDS ARE BUILT.
V5. VERIFY PROPER SETUP OF RF EQUIPMENT. SYSTEM MUST BE OPERATING
PROPERLY PRIOR TO EXECUTION OF DRILL.
V6. CCS IS REQUIRED TO TRANSMIT THREE EMAIL MESSAGES ADDRESSED TO
ALL PARTICIPANTS. ALT CCS WILL TRANSMIT THREE EMAIL MESSAGES TO
ALL PARTICIPANTS. ALL PARTICIPANTS ARE TO QSL ALL THREE MESSAGES
UTILIZING BATTLEFORCE EMAIL, AND SEND A COMSPOT TO CCS AND Strike
Group Commander.
V7. IN CASE OF EQUIPMENT PROBLEMS, PASS RESULTS OF DRILL (I.E.
PROBLEMS, TROUBLESHOOTING EFFORTS) TO OCE VIA Usually SIPR CHAT
or Radio email address. UNITS ARE ENCOURAGED TO CONTINUE
TROUBLESHOOTING AFTER DRILL IS COMPLETE. CONTACT CCS FOR SME
ASSISTANCE IF REQUIRED. TROUBLESHOOTING VIA SIPR CHAT WITH ALL
UNITS IS HIGHLY ENCOURAGED. ALL UNITS MUST BE PREPARED TO EXECUTE
WHEN EXERCISE IS INITIATED.
----------------------------------------------------------------- GOAL IS TO MAINTAIN BFEM OPERATIONS AND ACTIVATE CIRCUIT
USING NMTEL/NTA NTA5.1.1.2 S1I.
I-9
NTP 4 (E)
STANDARDS FOR ACTIVATION ISAS FOLLOWS:
----------------------------------------------------------------T1 0-5 MINS - T2 5-20 MINS - T3 20-30 MINS - T4 30 MINS
----------------------------------------------------------------ATTAINABLE GOAL STANDARD REQUIRED IS T2.
----------------------------------------------------------------2). OCE WILL DEBRIEF VIA COMM COORD CHAT. OCE WILL PROVIDE GRADE
STANDARDS AND MEASURES OF EFFECTIVENESS RESULTS WILL BE POSTED
VIA Strike Group CAS II: indicate IP address.//
Downgrading instructions in accordance with SECNAV M5510.36 (June
2006)
I-10
NTP 4 (E)
DRILL PACKAGE ECHO FREQUENCY SHIFT AND KICK PROCEDURES
1. PROVIDED IS THE STANDING PRE-EX (C4I PKG ECHO) FOR WARFARE
CMDRS FREQUENCY SHIFT AND KICKS. THE CRITERIA FOR MEASURING
EFFECTIVENESS AND BASELINE STANDARDS WILL PRIMARILY BE BY USE OF
NMETLS. ALL NMETLS CAN BE FOUND ON THE COMSTRKFORTRALANT AND
COMSTRKFORTRAPAC CAS SITE(S). ALL RELATED WARFARE AREA NMETLS CAN
BE FOUND ON THE Strike Group CAS SITE. IN ADDITION TO NMETLS, ALL
UNITS WILL USE THE FXP-3 AND SELF-OBSERVE APPLICABLE AREAS AND
PROVIDE OBSERVED GRADED STATUS.
A. WARFARE COMMANDER FREQUENCY SHIFTS AND KICKS.
B. OSE: Strike Group Commander
C. OTC: Strike Group Commander
D. OCE: (PRI) USS CV/CVN, LHA/LHD (SEC) USS CG
G. PARTICIPANTS: Strike group units
NOTE: ALL PARTICIPANTS MAY NOT BE ASSIGNED TO PARTICIPATE IN
EACH C4I STANDING PRE-EX EVENT AS INDICATED IN THE PARTICIPANTS
COLUMN IAW REF B (MTO).
I. TIME ZONE: ZULU
J. COMEX: IAW SOE (NO NOTICE)
JJ. FINEX: IAW SOE
N. AREA OF EXERCISE: IAW CURRENT TASKING AS ASSIGNED
U. COMMUNICATIONS: PRIMARY WARFARE COMMANDERS VOICE AND CHAT
CIRCUITS AS DESIGNATED IN Strike Groups EFFECTIVE OPTASK COMMS
ISO exercise/evolution.
A. COORDINATION CIRCUITS:
1. PRI COORD:
2. SEC COORD:
V. INSTRUCTIONS:
V1. EACH WARFARE COMMANDER WILL BE RESPONSIBLE FOR INITIATING
FREQUENCY SHIFTS OR KICKS AT LEAST TWICE DAILY UTILIZING ASSIGNED
CIRCUITS AND FREQUENCIES PROVIDED VIA THE EFFECTIVE OPTASK COMMS.
V2. ALL IT(S) IN MAINCOMM WILL BE READY TO ASSIST INDIVIDUAL
WARFARE CMDRS WITH DETERMINING BEST COURSE OF ACTION AND
EXECUTION WHEN SHIFTING FREQUENCIES BASED ON EQUIPMENT STATUS AND
AVAILABILITY OF RESOURCES.
----------------------------------------------------------------ZZ. 1.) THIS EXERCISE IS DESIGNED TO TEST strike group ABILITY TO
SHIFT FREQUENCIES AND MEET NMETL/NTA STANDARDS ISO
exercise/evolution OBJECTIVES.
----------------------------------------------------------------- GOAL WILL BE TO SHIFT FREQUENCIES/CIRCUITS AS DIRECTED BY
WARFARE CMDRS.
----------------------------------------------------------------- MAINTAIN ATTAINABLE GOAL STANDARD REQUIRED OF T2.
----------------------------------------------------------------- GOAL WILL BE TO MAINTAIN ASSIGNED AND GUARDED WARFARE CMDR
NETS. ALL CIRCUITS MUST BE ACTIVATED AS DIRECTED ISO EXECUTING
C4I EXERCISE EVENT.
----------------------------------------------------------------- PROVIDED BELOW ARE THE NMETL/NTA OBJECTIVES WHICH WILL BE
OBSERVED.
-----------------------------------------------------------------
I-11
NTP 4 (E)
C4I PKG ECHO
(KICK DRILL)
NMETL/NTA(S)
-----------------NTA 5.1.1.1.2 PROVIDE EXTERNAL COMMUNICATIONS
S1.- COMMUNICATIONS CONTROL SHIP (CCS) EFFECTIVENESS STANDARDS
S4.- WARFARE COMMANDER CIRCUIT SHIFTS (KICK)
(INCLUDES VOICE OR CHAT AS DESIGNATED VIA OPTASK COMMS)
S4A.- TIME (MINUTES) TO SHIFT AND RESTORE COMMUNICATIONS ON
SCC PRIMARY WARFARE NET FROM AN ESTABLISHED NET TO A DESIGNATED
ALTERNATE NET (IAW COMPLAN) AND COMPLETE ROLL CALL WITH
APPROPRIATE STRIKE GROUP UNITS WHEN DIRECTED.
(T1)-5, (T2) 5-10, (T3) 10-15, (T4)-15
----------------------------------------------------------------S4B. TIME (MINUTES) TO SHIFT AND RESTORE COMMUNICATIONS ON IWC
PRIMARY WARFARE NET FROM AN ESTABLISHED NET TO A DESIGNATED
ALTERNATE NET (IAW COMPLAN) AND COMPLETE ROLL CALL WITH
APPROPRIATE STIKE GROUP UNITS WHEN DIRECTED.
(T1)-5, (T2) 5-10, (T3) 10-15, (T4)-15
----------------------------------------------------------------S4C. TIME (MINUTES) TO SHIFT AND RESTORE COMMUNICATIONS ON ADC
PRIMARY WARFARE NET FROM AN ESTABLISHED NET TO A DESIGNATED
ALTERNATE NET (IAW COMPLAN) AND COMPLETE ROLL CALL WITH
APPROPRIATE STRIKE GROUP UNITS WHEN DIRECTED.
(T1)-5, (T2) 5-10, (T3) 10-15, (T4)-15
----------------------------------------------------------------S4E. TIME (MINUTES) TO SHIFT AND RESTORE COMMUNICATIONS ON STRIKE
WARFARE COMMANDER'S PRIMARY WARFARE NET FROM AN ESTABLISHED NET
TO A DESIGNATED ALTERNATE NET (IAW COMPLAN) AND COMPLETE ROLL
CALL WITH APPROPRIATE STRIKE GROUP UNITS WHEN DIRECTED.
(T1)-5, (T2) 5-10, (T3)> 10-15, (T4)-15
---------------------------------------------------------------S4F. TIME (MINUTES) TO SHIFT AND RESTORE STRIKE GROUP CHAT
COMMUNICATIONS ON SECONDARY CHAT SERVER (IAW OPTASK COMMS/OPTASK
IM) WHEN DIRECTED.
(T1)-5, (T2) 5-10, (T3)> 10-15, (T4)-15
----------------------------------------------------------------S3. STRIKE GROUP COMMAND AND REPORTING NETS EFFECTIVENESS
--------------------------------------------------------- CHAT ROOM SHIFTS
S3A. ABILITY OF SEA COMBAT COMMANDER COMMAND AND REPORTING NET
SUPPORT SCC COMMUNICATIONS WITH ALL UNITS DIRECTED TO GUARD THE
CIRCUIT/DESIGNATED CHAT ROOM AS PER OPTASK COMMS (PERCENT AVERAGE
DAILY AVAILABILITY).
I-12
NTP 4 (E)
(T1)-98, (T2) 98-95, (T3) 95-90, (T4)-90
S3B. ABILITY OF IWC COMMAND AND REPORTING NET TO SUPPORT IWC
COMMUNICATIONS WITH ALL UNITS DIRECTED TO GUARD THE
CIRCUIT/DESIGNATED CHAT ROOM AS PER OPTASK COMMS (PERCENT AVERAGE
DAILY AVAILABILITY).
(T1)-98, (T2) 98-95, (T3) 95-90, (T4)-90
S3C. ABILITY OF ADC COMMAND AND REPORTING NET TO SUPPORT ADC
COMMUNICATIONS WITH ALL UNITS DIRECTED TO GUARD THE
CIRCUIT/DESIGNATED CHAT ROOM AS PER OPTASK COMMS (PERCENT AVERAGE
DAILY AVAILABILITY).
(T1)-98, (T2) 98-95, (T3) 95-90, (T4) 90
S3E. ABILITY OF STRIKE COMMAND AND REPORTING NET TO SUPPORT
STRIKE COMMUNICATIONS WITH ALL UNITS DIRECTED TO GUARD THE
CIRCUIT/DESIGNATED CHAT ROOM AS PER OPTASK COMMS (PERCENT AVERAGE
DAILY AVAILABILITY).
(T1)- 98, (T2) 98-95, (T3) 95-90, (T4) 90
S3F. ABILITY OF SELECTED (CHAT, ALTERNATE CIRCUITS AS DIRECTED)
STRIKE GROUP COMMAND AND REPORTING NETS TO SUPPORT STRIKE GROUP
COMMUNICATIONS WITH ALL UNITS DIRECTED TO GUARD THE
CIRCUIT/DESIGNATED CHAT ROOM AS PER OPTASK COMMS (PERCENT AVERAGE
DAILY AVAILABILITY).
(T1)- 98, (T2) 98-95, (T3) 95-90, (T4) 90
----------------------------------------------------------------- NOTE WARFARE COMMANDER WILL INITIATE AND EXECUTE
FREQUENCY/SHIFT. THIS ALSO INCLUDES MAINTAINING ROLL AS WELL.
- CONNECTIVITY OF ALL DESIGNATED CIRCUITS EITHER VOICE OR CHAT
WILL BE MONITORIED BY BOTH CCSG12 AND INDIVIDUAL WARFARE CMDRS.
-TOTAL TIME OF CIRCUITS ACTIVE WILL BE RECORDED AND PROVIDED
AT THE END OF RADIO DAY.
- CWC/IWC/ADC/SCC/STWC WARFARE CMDRS WILL THEN CONDUCT ROLL CALL
IMMEDIATELY AFTER SHIFT IS EXECUTED.
- HF, UHF, AND SATCOM WILL BE UTILIZED DURING THE EXERCISE.
----------------------------------------------------------------FXPs:
CCC-5-SF
SECURE/NON-SECURE VOICE SYSTEMS
CCC-6-SF RADIO TELEPHONE DRILLS
CCC-24-SF NARROWBAND/WIDEBAND SATELLITE COMMUNICATION SYSTEMS
2.) OCE WILL PROVIDE GRADE STANDARDS AND MEASURES OF
EFFECTIVENESS RESULTS TO BE POSTED VIA Strike Group CAS II:
indicate IP address.//
Downgrading instructions in accordance with SECNAV M5510.36 (June
I-13
NTP 4 (E)
2006)
I-14
NTP 4 (E)
DRILL PACKAGE ECHO ONE WARFARE COMMANDERS ROLL CALL
1. PROVIDED IS THE STANDING PRE-EX (C4I PKG ECHO ONE) FOR
WARFARE CMDRS 24 HOUR ROLL CALLS. MEASURES OF EFFECTIVENESS AND
GRADING CRITERIA. THE CRITERIA FOR MEASURING EFFECTIVENESS AND
BASELINE STANDARDS WILL PRIMARILY BE BY USE OF NMETLS. ALL
NMETLS CAN BE FOUND ON THE COMSTRKFORTRALANT OR COMSTRKFORTRAPAC
CAS SITE. ALL RELATED WARFARE AREA NMETLS CAN BE FOUND ON THE
Strike Group CAS SITE. IN ADDITION TO NMETLS, ALL UNITS WILL USE
THE FXP-3 AND SELF-OBSERVE APPLICABLE AREAS AND PROVIDE OBSERVED
GRADED STATUS.
A. WARFARE COMMANDER(S) PRIMARY GUARDED CIRCUIT 24 HOUR ROLL
CALLS.
B. OSE: Strike Group Commander
C. OTC: Strike Group Commander
D. OCE: USS CV/CVN, LHA/LHD (SEC) USS CG
G. PARTICIPANTS: Strike group units
NOTE: ALL PARTICIPANTS MAY NOT BE ASSIGNED TO PARTICIPATE IN
EACH C4I STANDING PRE-EX EVENT AS INDICATED IN THE PARTICIPANTS
COLUMN IAW REF B SCHEDULE OF EVENTS (SOE).
I. TIME ZONE: ALL TIMES ARE ZULU
J. COMEX: IAW SOE (NO NOTICE)
JJ. FINEX: IAW SOE
N. AREA OF EXERCISE: IAW CURRENT TASKING AS ASSIGNED
U. COMMUNICATIONS: PRIMARY WARFARE COMMANDERS VOICE AND CHAT
CIRCUITS AS DESIGNATED IN strike group EFFECTIVE OPTASK COMMS ISO
exercise/evolution.
A. COORDINATION CIRCUITS:
1. PRI COORD:
2. SEC COORD:
V. INSTRUCTIONS:
V.1 EACH WARFARE COMMANDER WILL BE RESPONSIBLE FOR INITIATING
FREQUENCY SHIFTS OR KICKS AT LEAST TWICE DAILY UTILIZING ASSIGNED
CIRCUITS AND FREQUENCIES PROVIDED VIA THE EFFECTIVE OPTASK COMMS.
V.2 ALL IT(S) IN MAINCOMM WILL BE READY TO ASSIST INDIVIDUAL
WARFARE CMDRS WITH DETERMINING BEST COURSE OF ACTION AND
EXECUTION WHEN SHIFTING FREQUENCIES BASED ON EQUIPMENT STATUS AND
AVAILABILITY OF RESOURCES.
----------------------------------------------------------------ZZ. 1.) THIS EXERCISE IS DESIGNED TO TEST strike group ABILITY TO
SHIFT FREQUENCIES AND MEET NMETL/NTA STANDARDS ISO
exercise/evolution OBJECTIVES.
---------------------------------------------------------------- GOAL WILL BE TO SHIFT FREQUENCIES/CIRCUITS AS DIRECTED BY
WARFARE CMDRS.
----------------------------------------------------------------- MAINTAIN ATTAINABLE GOAL STANDARD REQUIRED OF T2.
----------------------------------------------------------------- GOAL WILL BE TO MAINTAIN ASSIGNED AND GUARDED WARFARE CMDR
NETS. ALL CIRCUITS MUST BE ACTIVATED AS DIRECTED ISO EXECUTING
C4I EXERCISE EVENT.
I-15
NTP 4 (E)
----------------------------------------------------------------- PROVIDED BELOW ARE LISTED THE NMETL/NTA OBJECTIVES WHICH WILL
BE OBSERVED.
----------------------------------------------------------------C4I PKG ECHO ONE (WARFARE COMMANDERS ROLL CALLS)
NMETL/NTA(S)
--------------NTA 5.1.1.1.2 PROVIDE EXTERNAL COMMUNICATIONS
S1.- COMMUNICATIONS CONTROL SHIP (CCS) EFFECTIVENESS STANDARDS
NTA 5.1.1.1.2 PROVIDE EXTERNAL COMMUNICATIONS
S3A. ABILITY OF SEA COMBAT COMMANDER COMMAND AND REPORTING NET
SUPPORT SCC COMMUNICATIONS TO MAINTAIN 24 HOUR ROLL CALL
ACCOUNTABILITY ON DESIGNATED CIRCUIT(S) WITH ALL UNITS (PERCENT
AVERAGE DAILY AVAILABILITY).
(T1)-98, (T2) 98-95, (T3) 95-90, (T4)-90
S3B. ABILITY OF IWC COMMAND AND REPORTING NET TO SUPPORT IWC
COMMUNICATIONS TO MAINTAIN 24 HOUR ROLL CALL ACCOUNTABILITY ON
DESIGNATED CIRCUIT(S) WITH ALL UNITS (PERCENT AVERAGE DAILY
AVAILABILITY).
(T1)-98, (T2) 98-95, (T3) 95-90, (T4)-90
S3C. ABILITY OF ADC COMMAND AND REPORTING NET TO SUPPORT ADC
COMMUNICATIONS TO MAINTAIN 24 HOUR ROLL CALL ACCOUNTABILITY ON
DESIGNATED CIRCUIT(S) WITH ALL UNITS (PERCENT AVERAGE DAILY
AVAILABILITY).
(T1)-98, (T2) 98-95, (T3) 95-90, (T4)-90
S3E. ABILITY OF STRIKE COMMAND AND REPORTING NET TO SUPPORT
STRIKE COMMUNICATIONS TO MAINTAIN 24 HOUR ROLL CALL
ACCOUNTABILITY ON DESIGNATED CIRCUIT(S) WITH ALL UNITS (PERCENT
AVERAGE DAILY AVAILABILITY).
(T1)-98, (T2) 98-95, (T3) 95-90, (T4)-90
----------------------------------------------------------------- NOTE WARFARE COMMANDERS WILL CONDUCT THE FOLLOWING:
- INITIATE AND EXECUTE ROLL CALLS.
- DESIGNATE ROLL CALLS AND CONDUCT DAILY THROUGHOUT THE 24 HOUR
PERIOD.
- MONITOR CONNECTIVITY PERCENTAGE OF ALL DESIGNATED VOICE
CIRCUITS.
- PROVIDE TOTAL TIME CIRCUITS ACTIVE AT THE END OF RADIO DAY VIA
I-16
NTP 4 (E)
CHAT AND OPREP-5 FEEDER.
----------------------------------------------------------------FXPs:
CCC-5-SF
SECURE/NON-SECURE VOICE SYSTEMS
CCC-6-SF RADIO TELEPHONE DRILLS
CCC-24-SF NARROWBAND/WIDEBAND SATELLITE COMMUNICATION SYSTEMS
----------------------------------------------------------------2.) OCE WILL PROVIDE GRADE STANDARDS AND MEASURES OF
EFFECTIVENESS RESULTS TO BE POSTED VIA Strike Group CAS II:
indicate IP address.//
Downgrading instructions in accordance with SECNAV M5510.36 (June
2006)
I-17
NTP 4 (E)
I-18
NTP 4 (E)
TRANSMISSION, DELIVERY, AND RECEIPT CAPABILITIES.ALL UNITS MUST
BE PREPARED TO EXECUTE WHEN EXERCISE IS INITIATED.
----------------------------------------------------------------- GOAL IS TO DELIVER A SOLID COPY OF THE ATO/DIMS TO ALL UNITS.
----------------------------------------------------------------- GOAL IS TO MAINTAIN ALL ATO PATHS AND ENSURE ALL SYSTEMS ARE
OPERATIONAL. ALL CIRCUITS MUST BE ACTIVE PRIOR TO COMEX ISO
EXECUTING C4I EXERCISE EVENT.
----------------------------------------------------------------C4I PKG FOXTROT
(ATO SND/RCV DATA)
(ATO ALL PATHS SND/RCV)
NMETL/NTA(S)/FXP
-----------------NTA 5.1.1.1.2 PROVIDE EXTERNAL COMMUNICATIONS
S1. COMMUNICATIONS CONTROL SHIP (CCS) EFFECTIVENESS STANDARDS:
----------------------------------------------------------------S1F. PERCENT OF EVERY APPLICABLE COMM PATH USED TO SEND/RECEIVE
DATA (SELECTED MESSAGE I.E. ATO, DIMS ETC...).
(T1)-98, (T2) 98-90, (T3) 90-80, (T4) 80
----------------------------------------------------------------S1G. AVERAGE TIME (HOURS) TO DISSEMINATE (SELECTED MESSAGE I.E.
ATO, DIMS ETC...) TO ALL STRIKE GROUP UNITS.
(T1)-1.5, (T2) 1.5 - 2, (T3) 2 3, (T4) 3
- AVG TIME IN MINUTES WILL BE EVALUATED TO DISSEMINATE ATO TO
ALL SG UNITS.
----------------------------------------------------------------- ATTAINABLE GOAL STANDARD REQUIRED IS T2.
----------------------------------------------------------------FXPs:
CCC-4-SF
SYSTEM CONTROL SHIP TERMINATION FOR B, C, D AND G
SYSTEMS
CCC-26-SF EXTREMELY HIGH FREQUENCY SATELLITE COMMUNICATIONS
2.) CCS WILL GENERATE AN ATO STATUS REPORT VIA COMSPOT UPON
FINEX. OCE WILL PROVIDE GRADE STANDARDS AND MEASURES OF
EFFECTIVENESS RESULTS TO BE POSTED VIA Strike Group CAS II:
indicate IP address.//Downgrading instructions in accordance with
SECNAV M5510.36 (June 2006)
I-19
NTP 4 (E)
DRILL PACKAGE GOLF VTC ACTIVATION
1. PROVIDED IS THE STANDING PRE-EX (C4I PKG GOLF) GENSER, JWICS,
AND TANDBERG VTC. THE CRITERIA FOR MEASURING EFFECTIVENESS AND
BASELINE STANDARDS WILL PRIMARILY BE BY USE OF NMETLS. ALL
NMETLS CAN BE FOUND ON THE COMSTRKFORTRALANT OR COMSTRKFORTRAPAC
CAS SITE. ALL RELATED WARFARE AREA NMETLS CAN BE FOUND ON THE
strike group CAS SITE. IN ADDITION TO NMETLS, ALL UNITS WILL USE
THE FXP-3 AND SELF-OBSERVE APPLICABLE AREAS AND PROVIDE OBSERVED
GRADED STATUS.
A. PROVIDE GENSER VTC.
B. OSE: Strike Group Commander
C. OTC: Strike Group Commander
D. OCE: USS CV/CVN, LHA/LHD (SEC) USS CG
G. PARTICIPANTS: Strike group units
NOTE: ALL PARTICIPANTS MAY NOT BE ASSIGNED TO PARTICIPATE IN
EACH C4I STANDING PRE-EX EVENT AS INDICATED IN THE PARTICIPANTS
COLUMN IAW REF B SCHEDULE OF EVENTS (SOE).
I. TIME ZONE: ALL TIMES ARE LOCAL
J. COMEX: IAW SOE (NO NOTICE)
JJ. FINEX: IAW SOE
N. AREA OF EXERCISE: IAW CURRENT TASKING AS ASSIGNED
U. COMMUNICATIONS: SIPR CHAT/VOICE COMMS
A. COORDINATION CIRCUITS:
1. PRI COORD:
2. SEC COORD:
V. INSTRUCTIONS:
V1. ALL UNITS MUST BE PREPARED TO ACTIVATE DESIGNATED CIRCUIT
LINE NUMBER UPON REQUEST VIA COMSPOT AS DIRECTED BY THE
COMMUNICATION CONTROL SHIP. UNITS MUST BE PREPARED TO EXECUTE
WHEN EXERCISE IS INITIATED.
V2. DESIGNATED UNITS WILL CONDUCT BRIDGE CHECK AS DIRECTED. ALL
UNITS WILL OBTAIN AUDIO/VISUAL CHECK WITH BRIDGE.
----------------------------------------------------------------ZZ. 1.) THIS EXERCISE IS DESIGNED TO TEST STRIKE GROUP
ABILITY TO CONDUCT GENSER VTC TO MEET NMETL/NTA STANDARDS
ISO exercise/evolution OBJECTIVES.
----------------------------------------------------------------- MAINTAIN ATTAINABLE GOAL STANDARD REQUIRED OF T2.
----------------------------------------------------------------- PRIOR COORDINATION REQUIRED WITH DISTANT END USER(S)
----------------------------------------------------------------- NOT TO INTERFERE WITH NORMAL VTC WINDOW PREVIOUSLY SCHEDULED
----------------------------------------------------------------- PROVIDED BELOW ARE THE LISTED NMETL/NTA OBJECTIVES WHICH WILL
BE OBSERVED.
----------------------------------------------------------------C4I PKG GOLF (GENSER VTC/JWICS/TANDBERG VTC)
(ACTIVATE UNSKED VTC GENSER)
NMETL/NTA(S)
NTA 5.1.1.1.2 PROVIDE EXTERNAL COMMUNICATIONS
I-20
NTP 4 (E)
----------------------------------------------------------------DEMONSTRATE ABILITY TO PERFORM VTC.
(T1) = YES, (T2) = N/A, (T3) = N/A, (T4) = NO.
- WHEN DIRECTED BY CCS ALL UNITS WILL INITIATE AUDIO/VIDEO CHECK.
----------------------------------------------------------------TIME IN (MINUTES) TO DEMONSTRATE VTC.
(T1) < 5, (T2) 6-10, (T3) 11-15, (T4) > 15.
- CCS WILL DIRECT ALL UNITS TO EXIT VTC AUDIO/VIDEO CHECK.
- CCS WILL ORDER THE ACTIVATION OF DESIGNATED NET FOR ALL UNITS.
----------------------------------------------------------------CCC-25-SF SUPER HIGH FREQUENCY SATELLITE COMMUNICATIONS
----------------------------------------------------------------2. OCE WILL PROVIDE GRADE STANDARDS AND MEASURES OF EFFECTIVENESS
RESULTS TO BE POSTED VIA Strike Group CAS II: indicate IP
address.//
Downgrading instructions in accordance with SECNAV M5510.36 (June
2006)
I-21
NTP 4 (E)
DRILL PACKAGE HOTEL HF TTY ACTIVATION
1. PROVIDED IS THE STANDING PRE-EX (C4I PKG HOTEL) HF TTY
ACTIVATION AND THE CRITERIA FOR MEASURING EFFECTIVENESS OF THE
BASELINE STANDARDS WILL PRIMARILY BE BY USE OF NMETLS. ALL
NMETLS CAN BE FOUND ON THE COMSTRKFORTRALANT OR COMSTRKFORTRAPAC
CAS SITE. ALL RELATED WARFARE AREA NMETLS CAN BE FOUND ON THE
Strike Group CAS SITE. IN ADDITION TO NMETLS, ALL UNITS WILL USE
THE FXP-3 AND SELF-OBSERVE APPLICABLE AREAS AND PROVIDE OBSERVED
GRADED STATUS. UNITS MUST BE PREPARED TO EXECUTE WHEN EXERCISE
IS INITIATED.
A. EXERCISE: HF TTY ACTIVATION
B. OSE: Strike Group Commander
C. OTC: Strike Group Commander
D. OCE: USS CV/CVN, LHA/LHD (SEC) USS CG
G. PARTICIPANTS: Strike group units
NOTE: ALL PARTICIPANTS MAY NOT BE ASSIGNED TO PARTICIPATE
IN EACH C4I STANDING PRE-EX EVENT AS INDICATED IN THE
PARTICIPANTS COLUMN.
I. TIME ZONE: ALL TIMES ARE ZULU
J. COMEX: IAW SOE (NO NOTICE)
JJ. FINEX: IAW SOE
N. AREA OF EXERCISE: IAW CURRENT TASKING AS ASSIGNED
U. COMMUNICATIONS: SIPR CHAT/VOICE COMMS/TELETYPE RELAY
A. COORDINATION CIRCUITS:
1. PRI PRI COORD:
2. SEC COORD:
3. TTY NET: TELETYPE CIRCUIT DIRECTED
V. INSTRUCTIONS:
V.1. ALL UNITS MUST BE PREPARED TO ACTIVATE DESIGNATED CIRCUIT
LINE NUMBER UPON REQUEST VIA COMSPOT AS DIRECTED BY THE
COMMUNICATION CONTROL SHIP. HF PREDICTION AND PROPAGATION WILL
BE DETERMINED PRIOR TO EXECUTION OF DRILL. CCS WILL GENERATE HF
PREDICTION MESSAGE TO SUPPORT THIS EXERCISE.
V2. UNIT DESIGNATED WILL GENERATE A QUICK BROWN FOX TEST TO ALL
PARTICIPANTS. EACH UNIT WILL INITIATE CALL UP TO THE CONTROL
SHIP ADVISING RECEIPT AND READABILITY OF THE TEST. ONCE AMPLE
CALL UPS ARE RECEIVED, CCS WILL TRANSMIT 5 MESSAGES IN A STRING
AND UPON COMPLETION RECIPIENT WILL PROVIDE TIME FO RECEIPT VIA
COMSPOT.
V3. ALL PARTICIPANTS WILL PROVIDE A PRINT ACCEPTABILITY (ZBZ 1-5)
REPORT VIA Strike Group COMM_COORD. CCS WILL PROVIDE A QRY LIST
INDICATING EACH UNITS TURN TO TRANSMIT.
V4. ALL PARTICIPANTS MUST PAY SPECIAL ATTENTION TO THE ZBO AND BE
PREPARED TO RESPOND TO ACTION MESSAGES AS THEY APPLY.
ZZ. 1.) THIS EXERCISE IS DESIGNED TO TEST CV/CVN, LHA/LHD STRIKE
GROUP ATO TRANSMISSION, DELIVERY, AND RECEIPT CAPABILITIES.
----------------------------------------------------------------- GOAL ACTIVATE ENTSG WORKING HF TTY.
----------------------------------------------------------------- TRANSMIT AND RECEIVE MESSAGE TRAFFIC VIA ENTSG COMM COORD HF
TTY.
-----------------------------------------------------------------
I-22
NTP 4 (E)
C4I PKG HOTEL
NMETL/NTA(S)/FXP
(HF CIRCUITS)
I-23
NTP 4 (E)
DRILL PACKAGE INDIA OTAT/OTAR ACTIVATION
1. PROVIDED IS THE STANDING PRE-EX (C4I PKG INDIA) OTAT/OTAR
ACTIVATION AND THE CRITERIA FOR MEASURING EFFECTIVENESS OF THE
BASELINE STANDARDS WILL PRIMARILY BE BY USE OF NMETLS. ALL
NMETLS CAN BE FOUND ON THE COMSTRKFORTRALANT OR COMSTRKFORTRAPAC
CAS SITE. ALL RELATED WARFARE AREA NMETLS CAN BE FOUND ON THE
Strike Group CAS SITE. IN ADDITION TO NMETLS, ALL UNITS WILL USE
THE FXP-3 AND
SELF-OBSERVE APPLICABLE AREAS AND PROVIDE OBSERVED GRADED STATUS.
A. EXERCISE: OTAT/OTAR RELAY
B. OSE: Strike Group Commander
C. OTC: Strike Group Commander
D. OCE: USS CV/CVN, LHA/LHD (SEC) USS CG
G. PARTICIPANTS: Strike group units
NOTE: ALL PARTICIPANTS MAY NOT BE ASSIGNED TO PARTICIPATE
IN EACH C4I STANDING PRE-EX EVENT AS INDICATED IN THE
PARTICIPANTS COLUMN.
I. TIME ZONE: ALL TIMES ARE ZULU
J. COMEX: IAW SOE
JJ. FINEX: IAW SOE
N. AREA OF EXERCISE: IAW CURRENT TASKING AS ASSIGNED
U. COMMUNICATIONS: VOICE COMMS/SIPR CHAT
A. COORDINATION CIRCUITS:
1. PRI COORD:
2. SEC COORD:
3. EHF PTP
V. INSTRUCTIONS:
V.1. ALL UNITS MUST BE PREPARED TO ACTIVATE DESIGNATED CIRCUIT
LINE NUMBER UPON REQUEST VIA COMSPOT AS DIRECTED BY THE
COMMUNICATION CONTROL SHIP. HF PREDICTION AND PROPAGATION WILL BE
DETERMINED PRIOR TO EXECUTION OF DRILL WHEN CONDUCTING DRILLS ON
A HF CIRCUIT. CCS WILL GENERATE HF PREDICTION MESSAGE TO SUPPORT
THIS EXERCISE.
V2. CCS WILL CONDUCT ROLL CALL 15 MIN PRIOR TO COMEX. EACH UNIT
WILL CALL UP AND ADVISE READABILITY ADVISING READABILITY. ONCE
AMPLE CALL UPS ARE RECEIVED, CCS WILL TRANSMIT OTAT UTILIZING
NAG-16. CCS WILL TRANSMIT THE OTAT THREE CONSECUTIVE TIMES. UPON
THE LAST TRANSMITTAL, CCS WILL CALL UP ALL UNITS IF IN RECEIPT OF
OTAT TRANSMISSION. A SECOND TRANSMITTAL OF OTAT
CAN BE CONDUCTED AT THE DISCRETION OF CCS IF WITHIN THE NMTL TIME
LIMIT. ALL UNITS WILL PROVIDE TIME OF RECEIPT VIA IMMEDIATE
COMSPOT.
ZZ. 1.) THIS EXERCISE IS DESIGNED TO TEST CV/CVN, LHA/LHD STRIKE
GROUPS ABILITY TO CONDUCT OTAT/OTAR TO MEET NMETL/NTA STANDARDS
ISO COMPTUEX OBJECTIVES.
----------------------------------------------------------------- GOAL TO SUCCESSFULLY TRANSMIT OTAT/OTAR.
----------------------------------------------------------------C4I PKG INDIA
(CCS OTAT/ALT CCS OTAT) (INITIATE OTAT SCENARIO)
NTA 5.1.1.1.2 PROVIDE EXTERNAL COMMUNICATIONS
I-24
NTP 4 (E)
NMETL/NTA(S)
S1. COMMUNICATIONS CONTROL SHIP (CCS) EFFECTIVENESS STANDARDS:
FXP EXERCISE(S)
- OTAT TO SG VIA KYV-5 AND KY-58
- COMMUNICATION CONTROL SHIP WILL INITIATE OTAT ROLL CALL.
- UPON RECEIPT BY ALL UNITS, CCS WILL DIRECT USAGE OF OTAT
RECEIVED AND ADVISE WHEN TO ACTIVATE DESIGNATED CIRCUIT.
- LOAD EFFECTIVE CRYPTO AND CONDUCT READABILITY CHECK VIA THE
DESIGNATED CIRCUIT.
----------------------------------------------------------------(S1H.) TIME IN (MINUTES) TO DEMONSTRATE OTAT.
- (T1) = 5, (T2) = 6-10, (T3) = 11-15, (T4) = 15.
- NECOS WILL ORDER THE ACTIVATION OF DESIGNATED NET FOR ALL
UNITS.
- WHEN DIRECTED BY NECOS ALL UNITS WILL INITIATE OTAT.
- NECOS WILL DIRECT ALL UNITS TO EXIT OTAT.
------------------------------------------------------------------FXP:
CCC-30-SF OVER THE AIR TRANSFER AND OVER THE AIR REKEY
CCC-6-SF RADIO TELEPHONE DRILLS
CCC-5-SF SYSTEM CONTROL - SECURE/NONSECURE VOICE SYSTEMS
----------------------------------------------------------------- ATTAINABLE GOAL STANDARD REQUIRED IS T2.
----------------------------------------------------------------2. CCS WILL PROVIDE GRADE STANDARDS AND MEASURES OF EFFECTIVENESS
RESULTS VIA Strike Group CAS II: indicate IP address.//
Downgrading instructions in accordance with SECNAV M5510.36 (June
2006).
I-25
NTP 4 (E)
DRILL PACKAGE JULIETT RESTORE UHF DAMA
1. PROVIDED IS THE STANDING PRE-EX (C4I PKG JULIET) FOR UHF DAMA.
THE CRITERIA FOR MEASURING EFFECTIVENESS AND BASELINE STANDARDS
WILL PRIMARILY BE BY USE OF NMETLS. ALL NMETLS CAN BE FOUND ON
THE COMSTRKFORTRALANT OR COMSTRKFORTRAPAC CAS SITE. ALL RELATED
WARFARE AREA NMETLS CAN BE FOUND ON THE Strike Group CAS SITE. IN
ADDITION TO NMETLS, ALL UNITS WILL USE THE FXP-3 AND SELF-OBSERVE
APPLICABLE AREAS AND PROVIDE OBSERVED GRADED STATUS.
A. PROVIDE RESTORE UHF DAMA.
B. OSE: Strike Group Commander
C. OTC: Strike Group Commander
D. OCE: USS CV/CVN, LHA/LHD (SEC) USS CG
G. PARTICIPANTS: Strike group units
NOTE: ALL PARTICIPANTS MAY NOT BE ASSIGNED TO PARTICIPATE IN
EACH C4I STANDING PRE-EX EVENT AS INDICATED IN THE PARTICIPANTS
COLUMN IAW REF B (MTO).
I. TIME ZONE: ALL TIMES ARE ZULU
J. COMEX: IAW SOE (NO NOTICE)
JJ. FINEX: IAW SOE
N. AREA OF EXERCISE: IAW CURRENT TASKING AS ASSIGNED
-------------------------------------------------------------U. COMMUNICATIONS: PRIMARY WARFARE COMMANDERS VOICE AND CHAT
CIRCUITS AS DESIGNATED IN CV/CVN, LHA/LHD STRIKE GROUP EFFECTIVE
OPTASK COMMS ISO exercise/evolution.
A. COORDINATION CIRCUITS:
1. PRI COORD:
2. SEC COORD:
V. INSTRUCTIONS:
----------------------------------------------------------------ZZ. 1. THIS EXERCISE IS DESIGNED TO TEST STRIKE GROUP
ABILITY TO COME UP ON UHF DAMA TO MEET NMETL/NTA STANDARDS
ISO exercise/evolution OBJECTIVES.
----------------------------------------------------------------- MAINTAIN ATTAINABLE GOAL STANDARD REQUIRED OF T2.
----------------------------------------------------------------- DETERMINE SINGLE DAMA CIRCUIT TO BE AFFECTED.
----------------------------------------------------------------- UNEXPECTED LOSS OF DAMA CIRCUITS MAY OCCUR.
----------------------------------------------------------------- CWC CMD/CUDIXS/CSG CMD NET/SATHICOM ARE SOME OF THE CIRCUITS
TO BE DISTRUTIBED AT ANY GIVEN TIME WITH OUT NOTICE. UNITS WILL
BE PROMPTED AND RESTORED INITIATED BY GUIDANCE OF CCS.
----------------------------------------------------------------- PROVIDED BELOW ARE THE LISTED NMETL/NTA OBJECTIVES WHICH WILL
BE OBSERVED.
----------------------------------------------------------------NMETL/NTA(S)
NTA 5.1.1.1.2 PROVIDE EXTERNAL COMMUNICATIONS
S1. COMMUNICATIONS CONTROL SHIP (CCS) EFFECTIVENESS STANDARDS:
I-26
NTP 4 (E)
I-27
NTP 4 (E)
DRILL PACKAGE KILO ACTIVATE AND
INITIATE DEMAND CALL VIA KY-68
1. PROVIDED IS THE STANDING PRE-EX (C4I PKG KILO) FOR KY-68 OF
EFFECTIVENESS GRADING CRITERIA. THE CRITERIA FOR MEASURING
EFFECTIVENESS AND BASELINE STANDARDS WILL PRIMARILY BE BY USE OF
NMETLS. ALL NMETLS CAN BE FOUND ON THE COMSTRKFORTRALANT OR
COMSTRKFORTRAPAC CAS SITE. ALL RELATED WARFARE AREA NMETLS CAN BE
FOUND ON THE Strike Group CAS SITE. IN ADDITION TO NMETLS, ALL
UNITS WILL USE THE FXP-3 AND SELF-OBSERVE APPLICABLE AREAS AND
PROVIDE OBSERVED GRADED STATUS.
A. PROVIDE KY-68.
B. OSE: Strike Group Commander
C. OTC: Strike Group Commander
D. OCE: USS CV/CVN, LHA/LHD (SEC) USS CG
G. PARTICIPANTS: Strike group units
NOTE: ALL PARTICIPANTS MAY NOT BE ASSIGNED TO PARTICIPATE IN
EACH C4I STANDING PRE-EX EVENT AS INDICATED IN THE PARTICIPANTS
COLUMN REF B (MTO).
I. TIME ZONE: ALL TIMES ARE ZULU
J. COMEX: IAW SOE (NO NOTICE)
JJ. FINEX: IAW SOE
N. AREA OF EXERCISE: IAW CURRENT TASKING AS ASSIGNED
-------------------------------------------------------------U. COMMUNICATIONS: PRIMARY WARFARE COMMANDERS VOICE AND CHAT
CIRCUITS AS DESIGNATED IN CV/CVN, LHA/LHD STRIKE GROUP EFFECTIVE
OPTASK COMMS ISO exercise/evolution.
A. COORDINATION CIRCUITS:
1. PRI COORD:
2. SEC COORD:
V. INSTRUCTIONS:
------------------------------------------------------------------ZZ. 1.) THIS EXERCISE IS DESIGNED TO TEST STRIKE GROUP
ABILITY TO ACTIVATE AND INITIATE KY-68 ON DEMAND CALLS TO MEET
NMETL/NTA STANDARDS ISO exercise/evolution OBJECTIVES.
----------------------------------------------------------------- MAINTAIN ATTAINABLE GOAL STANDARD REQUIRED OF T2.
----------------------------------------------------------------- ACTIVATE AND INITIATE ON DEMAND CALL VIA KY-68
END USER CONTACT INFO:
CUSNC TFCC WATCH
This information will be
DSN 318-439-4006
unique to each AOR.
DRSN 721-0099
CENTCOM TCCC CWO
DSN 318-439-3875
DRSN 539-2504
C6F TFCC WATCH
DRSN 626-2356
NCTS NAPLES COW
DSN 314-626-3725/3350
----------------------------------------------------------------- PROVIDED BELOW ARE THE LISTED NMETL/NTA OBJECTIVES WHICH WILL
I-28
NTP 4 (E)
BE OBSERVED.
----------------------------------------------------------------C4I PKG KILO
(KY-68)
(ACTIVATE AND INITIATE ON DEMAND
CALL)
NMETL/NTA(S)
NTA 5.1.1.1.2 PROVIDE EXTERNAL COMMUNICATIONS
S1. COMMUNICATIONS CONTROL SHIP (CCS) EFFECTIVENESS STANDARDS:
TIME IN (MINUTES) TO ESTABLISH DRSN CONNECTIVITY WITH END USER.
T1=<15, T2=15-25, T3=25-40, T4=>40.
ARE UNITS ABLE TO ESTABLISH VOICE COMMUNICATION WITH C5F/C6F AOR
END USER VIA LONG LOCAL TERMINATION?
T1=YES, T2=N/A, T3=N/A, T4=NO.
----------------------------------------------------------------DEMONSTRATE ABILITY TO PERFORM ACTIVATION OF KY-68 CALL. T1=YES,
T2=N/A, T3=N/A, T4=NO.
----------------------------------------------------------------- NECOS WILL ORDER THE ACTIVATION OF DESIGNATED CKT FOR ALL
UNITS.
----------------------------------------------------------------CCC-25-SF SUPER HIGH FREQUENCY SATELLITE COMMUNICATIONS
----------------------------------------------------------------2.) OCE WILL PROVIDE GRADE STANDARDS AND MEASURES OF
EFFECTIVENESS RESULTS TO BE POSTED VIA Strike Group CAS II:
indicate IP address.//
Downgrading instructions in accordance with SECNAV M5510.36 (June
2006.)
I-29
NTP 4 (E)
DRILL PACKAGE LIMA CSG/ESG BANDWIDTH MANAGEMENT
1. PROVIDED IS THE STANDING PRE-EX FOR C4I PKG LIMA BANDWIDTH
MANAGEMENT. THE CRITERIA FOR MEASURING EFFECTIVENESS AND BASELINE
STANDARDS WILL PRIMARILY BE BY USE OF NMETLS. ALL
NMETLS CAN BE FOUND ON THE COMSTRKFORTRALANT OR COMSTRKFORTRAPAC
CAS SITE. ALL RELATED WARFARE AREA NMETLS CAN BE FOUND ON THE
Strike Group CAS SITE. IN ADDITION TO NMETLS, ALL UNITS WILL USE
THE FXP-3 AND
SELF-OBSERVE APPLICABLE AREAS AND PROVIDE OBSERVED GRADED STATUS.
A. PROVIDE BANDWIDTH MANAGEMENT.
B. OSE: Strike Group Commander
C. OTC: Strike Group Commander
D. OCE: USS CV/CVN, LHA/LHD (SEC) USS CG
G. PARTICIPANTS: Strike group units
NOTE: ALL PARTICIPANTS MAY NOT BE ASSIGNED TO PARTICIPATE IN
EACH C4I STANDING PRE-EX EVENT AS INDICATED IN THE PARTICIPANTS
COLUMN REF B (MTO).
I. TIME ZONE: ALL TIMES ARE ZULU
J. COMEX: IAW SOE (NO NOTICE)
JJ. FINEX: IAW SOE
N. AREA OF EXERCISE: IAW CURRENT TASKING AS ASSIGNED
-------------------------------------------------------------U. COMMUNICATIONS: PRIMARY WARFARE COMMANDERS VOICE AND CHAT
CIRCUITS AS DESIGNATED IN STRIKE GROUP EFFECTIVE OPTASK COMMS ISO
exercise/evolution.
A. COORDINATION CIRCUITS:
1. PRI COORD:
2. SEC COORD:
V. INSTRUCTIONS:
---------------------------------------------------------------ZZ. 1.) THIS EXERCISE IS DESIGNED TO TEST STRIKE GROUP
ABILITY TO ADJUST THE BANDWIDTH MANAGEMENT TO MEET NMETL/NTA
STANDARDS ISO exercise/evolution OBJECTIVES.
----------------------------------------------------------------- MAINTAIN ATTAINABLE GOAL STANDARD REQUIRED OF T2.
----------------------------------------------------------------- ADJUST AND MANAGE STAFF B/W PLAN.
----------------------------------------------------------------- PROVIDED BELOW ARE THE LISTED NMETL/NTA OBJECTIVES WHICH WILL
BE OBSERVED.
-----------------------------------------------------------------C4I PKG LIMA
(BANDWIDTH MANAGEMENT)
(ADJUST AND MANAGE STAFF B/W PLAN)
NTA 5.1.1.1.2 PROVIDE EXTERNAL COMMUNICATIONS
NMETL/NTA(S)
----------------------------------------------------------------DEMONSTRATE ABILITY TO PERFORM ADJUSTMENT AND MANAGE STAFF B/W
PLAN.
T1=YES, T2=N/A, T3=N/A, T4=NO.
-----------------------------------------------------------------
I-30
NTP 4 (E)
(NECC)
TIME IN (MINUTES) TO LOAD THE CORRECT NECC COMM CONFIGURATION FOR
CURRENT AOR. T1=<15, T2=15-30, T3=30-45, T4=>45.
- NECOS WILL PROVIDE STATUS ON ALL UNITS REACHABLE VIA NECC.
- NECOS WILL CONDUCT OTO WITH ALL REACHABLE UNITS.
- NECOS WILL HANDOVER NECOS VIA NECC.
----------------------------------------------------------------TERMINAL FAULT STATUS
TIME IN (MINUTES) TO PERFORM AUTOMATIC TEST SEQUENCE (ATS) TO
ENSURE NO FAULTS ARE PRESENT. T1=<5, T2=6-7, T3=8-9, T4=>9.
- ENSURE A QUALIFIED VTC TECH IS PRESENT WITH THE VTC OPERATOR
WHEN CONDUCTING ANY TESTING.
- NECOS WILL DESIGNATE WHEN EACH UNIT WILL CONDUCT ATS.
- UPON COMPLETION PROVIDE STATUS OF ATS FAULTS VIA COMSPOT.
----------------------------------------------------------------TIME IN (MINUTES) TO PERFORM ADJUSTMENT AND MANAGE STAFF
B/W PLAN. T1 <45, T2 45 - 75, T3 75 - 180, T4 >180.
- NECOS WILL ORDER THE ACTIVATION OF DESIGNATED NET FOR ALL
UNITS.
----------------------------------------------------------------2.) OCE WILL PROVIDE GRADE STANDARDS AND MEASURES OF
EFFECTIVENESS RESULTS TO BE POSTED VIA Strike Group CAS II:
indicate IP address.//
Downgrading instructions in accordance with SECNAV M5510.36 (June
2006)
I-31
NTP 4 (E)
DRILL PACKAGE MIKE CENTRIXS REPLICATION /
CROSS DOMAIN SOLUTION
1. PROVIDED IS THE STANDING PRE-EX (C4I PKG MIKE) FOR CROSSDOMAIN MAIL GUARD. THE CRITERIA FOR MEASURING EFFECTIVENESS AND
BASELINE STANDARDS WILL PRIMARILY BE BY USE OF NMETLS. ALL NMETLS
CAN BE FOUND ON THE COMSTRKFORTRALANT OR COMSTRKFORTRAPAC CAS
SITE. ALL RELATED WARFARE AREA NMETLS CAN BE FOUND ON THE Strike
Group CAS SITE. IN ADDITION TO NMETLS, ALL UNITS WILL USE THE
FXP-3 AND SELF-OBSERVE APPLICABLE AREAS AND PROVIDE OBSERVED
GRADED STATUS.
A. EXERCISE: SIPR TO CENTRIXS CROSS DOMAIN SOLUTION
B. OSE: Strike Group Commander
C. OTC: Strike Group Commander
D. OCE: USS CV/CVN, LHA/LHD (SEC) USS CG
G. PARTICIPANTS: TBD
NOTE: ALL PARTICIPANTS MAY NOT BE ASSIGNED TO PARTICIPATE IN
EACH C4I STANDING PRE-EX EVENT AS INDICATED IN THE PARTICIPANTS
COLUMN IAW REF A THRU J SCHEDULE OF EVENTS (SOE).
I. TIME ZONE: ALL TIMES ARE ZULU
J. COMEX: IAW SOE (NO NOTICE)
JJ. FINEX: IAW SOE
N. AREA OF EXERCISE: IAW CURRENT TASKING AS ASSIGNED
----------------------------------------------------------------U. COMMUNICATIONS: PRIMARY WARFARE COMMANDERS VOICE AND CHAT
CIRCUITS AS DESIGNATED IN CV/CVN, LHA/LHD STRIKE GROUP EFFECTIVE
OPTASK COMMS ISO exercise/evolution..
A. COORDINATION CIRCUITS:
1. PRI COORD:
2. SEC COORD: CENTRIXS SAMETIME CHAT (IP:
)
V. INSTRUCTIONS:
----------------------------------------------------------------ZZ.1) THIS EXERCISE IS DESIGNED TO TEST STRIKE GROUP
ABILITY TO DEMONSTRATE CENTRIXS REPLICATION TO MEET NMETL/NTA
STANDARDS ISO exercise/evolution OBJECTIVES.
----------------------------------------------------------------- PROVIDED BELOW ARE THE LISTED NMETL/NTA OBJECTIVES WHICH WILL
BE OBSERVED.
----------------------------------------------------------------- NMETL/NTA(S)
NTA 5.1.1.1.2 PROVIDE EXTERNAL COMMUNICATIONS
-----------------------------------------------------------------. COMMUNICATIONS CONTROL SHIP (CCS) EFFECTIVENESS STANDARD:
TIME IN (MINUTES) TO ESTABLISH CENTRIXS CONNECTIVITY WITH STRIKE
GROUP UNITS VIA A CHOSEN ENCLAVE AND SENDING AN EMAIL TO ALL
UNITS WITHIN THE SG TO CONFIRM RECEIPT AND OPERATION OF THE
SELECTED ENCLAVE.
----------------------------------------------------------------(T1) < 20, (T2) 20-30, (T3) 30-45, (T4) > 45.
-----------------------------------------------------------------
I-32
NTP 4 (E)
ARE ALL EMAIL ADDRESSES FOR THE STRIKE GROUP UPDATED WITHIN THE
MAIL GUARD SYSTEM FOR EACH ENCLAVE?
----------------------------------------------------------------(T1) = YES, (T2) = N/A, (T3) = N/A, (T4) = NO.
----------------------------------------------------------------FXP:
CCC-25-SF SUPER HIGH FREQUENCY SATELLITE COMMUNICATIONS
----------------------------------------------------------------2). CCS WILL GENERATE COMSPOT DETAILING CROSS-DOMAIN CONNECTIVITY
UPON FINEX. OCE WILL PROVIDE GRADE STANDARDS AND MEASURES OF
EFFECTIVENESS RESULTS TO BE POSTED VIA Strike Group CAS II:
indicate IP address.//
Downgrading instructions in accordance with SECNAV M5510.36 (June
2006.
I-33
NTP 4 (E)
DRILL PACKAGE NOVEMBER COMMUNICATE VIA CENTRIXS EMAIL
1. PROVIDED IS THE STANDING PRE-EX FOR CENTRIXS (enclave) CHECKS.
THE CRITERIA FOR MEASURING EFFECTIVENESS AND BASELINE
STANDARDS WILL PRIMARILY BE BY USE OF NMETLS. ALL NMETLS CAN BE
FOUND ON THE COMSTRKFORTRAPAC AND COMSTRKFORTRALANT CAS SITE. IN
ADDITION TO NMETLS, ALL UNITS WILL USE THE FXP-3 AND SELF-OBSERVE
APPLICABLE AREAS AND PROVIDE OBSERVED GRADED STATUS.
A. PERFORM AND OBSERVE IN HOUSE SYSTEM CHECKS ON CENTRIXS
(enclave)
B. OSE: Strike Group Commander
C. OTC: Strike Group Commander
D. OCE: (PRI) USS CV/CVN, LHA/LHD (SEC) AFLOAT COALITION UNIT
G. PARTICIPANTS:
I. TIME ZONE: ALL TIMES ARE ZULU
J. COMEX:
JJ. FINEX:
N. AREA OF EXERCISE: IAW CURRENT TASKING AS ASSIGNED
-----------------------------------------------------------------U. COMMUNICATIONS: PRIMARY WARFARE COMMANDERS CHAT CIRCUITS
AS DESIGNATED IN STRIKE GROUP EFFECTIVE OPTASK COMMS ISO
exercise/evolution.
A. COORDINATION CIRCUITS:
1. PRI COORD:
V.1 INSTRUCTIONS:
-----------------------------------------------------------------ZZ. 1. THIS EXERCISE IS DESIGNED TO TEST STRIKE GROUP
ABILITY TO USE A SELECTED ENCLAVE OF CENTRIXS TO ESTABLISH
CENTRIXS CONNECTIVITY WITH STRIKE GROUP UNITS VIA A CHOSEN
ENCLAVE WITHIN NMETL/NTA STANDARDS AND OPERATIONAL OBJECTIVES.
-ALL SHIPS ACTIVATE CENTRIXS enclave. CONCENTRATE ON IN HOUSE
SYSTEM CHECKS ON THE _______ ENCLAVES.
-PROVIDE THE STAFF WITH ALL EMAIL ACCOUNTS FOR TESTING PURPOSES.
-EMAIL ADDRESSES SHOULD BE EMAILED TO Strike Group SIPR address.
-VERIFY CORRECT CRYPTO IS ON HAND.
-INSTALL ALL ACTIVE X AND JAVA PATCHES.
-CENTRIXS enclave HOMEPAGE IS _______________
-ENSURE APPROPRIATE CAS ACCOUNTS (CO, XO, TAO, BWC, RADIO, ETC.)
ARE CREATED.
-ENTER SAMETIME CHAT MEETING ROOM (enter name of chat room)
ALL ACTIONS SET FORTH IN THIS MESSAGE MUST BE COMPLETED IN ORDER
TO SUCCESSFULLY COMPLETE FUTURE COMMUNICATIONS WITH CENTRIXS.
REPORT COMPLIANCE WITH THIS PRE-EX TO THE STRIKE GROUP VIA
IMMEDIATE COMSPOT.
----------------------------------------------------------------- PROVIDED BELOW ARE LISTED NMETL/NTA OBJECTIVES WHICH WILL BE
OBSERVED.
----------------------------------------------------------------XM (S8D). TIME (HOURS) TO SHIFT TO THE "________" ENCLAVE USING
SG
SOP, AND VERIFY ESTABLISHED CONNECTIVITY WITH ALL STRIKE GROUP
I-34
NTP 4 (E)
UNITS BY EXCHANGING EMAILS.
T1<2, T2<3, T3<4, T4>4.
----------------------------------------------------------------XM (S8I). WHILE IN THE _____________" ENCLAVE CONFIRM/VERIFY
THE FOLLOWING FOR ALL STRIKE GROUP UNITS:
T1 >93%, T2 >86%, T3 =>79%, T4 < 79%
-APPROPRIATE PERSONNEL AND WATCHSTATIONS HAVE A REGISTERED
EMAIL
ADDRESS.
-ABILITY TO ACCESS THE CAS HUB SITE AND THE STRIKE GROUP CAS
SITE
-PROPERLY CONNECT/USE SAMETIME CHAT
-LATEST VERSION OF SAMETIME CHAT LOADED ON ALL WORKSTATIONS
INCLUDING THE PDC AND BDC
-LATEST VERSION OF NORTON ANTIVIRUS LOADED ON ALL WORKSTATIONS
INCLUDING THE PDC AND BDC
-SYSTEM CLOCK SET TO ZULU TIME
-STRIKE GROUP/SHIP SOP (WITH CHECKLIST) ADDRESSING THE STEP-BYSTEP
PROCESS TO SHIFT ENCLAVES
-CENTRIXS PROPERLY AND ADEQUATELY ADDRESSED IN THEIR OPTASK
IM/COMMS/CHAT
-PROPER LABELING, STORAGE AND ACCOUNTABILITY OF ALL AVAILABLE
HARD DRIVES, INCLUDING THE PDC, BDC AND LAPTOP DRIVES.
----------------------------------------------------------------FXP:
CCC-25-SF SUPER HIGH FREQUENCY SATELLITE COMMUNICATIONS
----------------------------------------------------------------//
I-35
NTP 4 (E)
DRILL PACKAGE OSCAR RIVER CITY
1. PROVIDED IS THE STANDING PRE-EX (C4I PKG OSCAR) RIVER CITY.
THE CRITERIA FOR MEASURING EFFECTIVENESS AND BASELINE STANDARDS
WILL PRIMARILY BE BY USE OF NMETLS. ALL NMETLS CAN BE FOUND ON
THE COMSTRKFORTRALANT OR COMSTRKFORTRAPAC CAS SITE. ALL RELATED
WARFARE AREA
NMETLS CAN BE FOUND ON THE Strike Group CAS SITE. IN ADDITION TO
NMETLS, ALL UNITS WILL USE THE FXP-3 AND SELF-OBSERVE APPLICABLE
AREAS AND PROVIDE OBSERVED GRADED STATUS.
A. RIVER CITY WARFARE COMMANDER FREQUENCY SHIFTS AND KICKS.
B. OSE: Strike Group Commander
C. OTC: Strike Group Commander
D. OCE: (PRI) USS CV/CVN, LHA/LHD (SEC) USS CG
G. PARTICIPANTS: Strike Group Units
NOTE: ALL PARTICIPANTS MAY NOT BE ASSIGNED TO PARTICIPATE IN
EACH C4I STANDING PRE-EX EVENT AS INDICATED IN THE PARTICIPANTS
COLUMN IAW REF A AND B SCHEDULE OF EVENTS (SOE).
I. TIME ZONE: ALL TIMES ARE ZULU
J. COMEX: IAW SOE (NO NOTICE)
JJ. FINEX: IAW SOE
N. AREA OF EXERCISE: IAW CURRENT TASKING AS ASSIGNED
U. COMMUNICATIONS: PRIMARY WARFARE COMMANDERS VOICE AND CHAT
CIRCUITS AS DESIGNATED IN CV/CVN, LHA/LHD STRIKE GROUP EFFECTIVE
OPTASK COMMS ISO exercise/evolution.
A. COORDINATION CIRCUITS:
1. PRI COORD:
2. SEC COORD:
V. INSTRUCTIONS:
V.1 EACH IAM WILL TAKE NECESSARY PRECAUTION AND ENSURE RIVER
CITY IS FULLYWARFARE COMMANDER WILL BE RESPONSIBLE FOR INITIATING
FREQUENCY SHIFTS OR KICKS AT LEAST TWICE DAILY UTILIZING ASSIGNED
CIRCUITS AND FREQUENCIES PROVIDED VIA THE EFFECTIVE OPTASK COMMS.
- ALL IT(S) IN MAINCOMM WILL BE READY TO ASSIST INDIVIDUAL
WARFARE CMDRS WITH DETERMINING BEST COURSE OF ACTION AND
EXECUTION WHEN SHIFTING FREQUENCIES BASED ON EQUIPMENT STATUS AND
AVAILABILITY OF RESOURCES.
----------------------------------------------------------------ZZ. 1.) THIS EXERCISE IS DESIGNED TO TEST CV/CVN, LHA/LHD STRIKE
GROUPS ABILITY TO SHIFT FREQUENCIES AND MEET NMETL/NTA STANDARDS
ISO exercise/evolution OBJECTIVES.
----------------------------------------------------------------- GOAL WILL BE TO SHIFT FREQUENCIES/CISRCUITS AS DIRECTED BY
WARFARE CMDRS.
----------------------------------------------------------------- MAINTAIN ATTAINABLE GOAL STANDARD REQUIRED OF T2.
----------------------------------------------------------------- GOAL WILL BE TO MAINTAIN ASSIGNED AND GUARDED WARFARE CMDR
NETS. ALL CIRCUITS MUST BE ACTIVATED AS DIRECTED ISO EXECUTING
C4I EXERCISE EVENT.
----------------------------------------------------------------- PROVIDED BELOW ARE LISTED THE NMETL/NTA OBJECTIVES WHICH WILL
BE OBSERVED.
I-36
NTP 4 (E)
----------------------------------------------------------------C4I PKG OSCAR
(RIVERCITY IMPLEMENTATION)
(SET VARIOUS RIVERCITY CONDITIONS)
NMETL/NTA(S)
NTA 5.1.1.1.2 PROVIDE EXTERNAL COMMUNICATIONS
S1.- COMMUNICATIONS CONTROL SHIP (CCS) EFFECTIVENESS STANDARDS
----------------------------------------------------------------NTA 5.5.5 PERFORM INFORMATION ASSURANCE
S1. COMMUNICATIONS CONTROL SHIP (CCS) EFFECTIVENESS STANDARDS:
----------------------------------------------------------------S4. SET/REPORT RIVERCITY CONDITION TO IWC.
S4A. TIME TO SET (MINUTES) RIVERCITY CONDITION 3.
(T1)-9, (T2) 9-10, (T3) 10-12, (T4) 12
S4B. TIME TO SET (MINUTES) RIVERCITY CONDITION 2.
(T1)-7, (T2) 7-8, (T3)
8-10, (T3) 10
I-37
NTP 4 (E)
DRILL PACKAGE PAPA INFOCON
1. PROVIDED IS THE STANDING PRE-EX (C4I PKG PAPA) INFOCON
EXERCISE.
THE CRITERIA FOR MEASURING EFFECTIVENESS AND BASELINE STANDARDS
WILL PRIMARILY BE BY USE OF NMETLS. ALL NMETLS CAN BE FOUND ON
THE COMSTRKFORTRALANT OR COMSTRKFORTRAPAC CAS SITE. ALL RELATED
WARFARE AREA NMETLS CAN BE FOUND ON THE Strike Group CAS SITE.
A. (C) EXERCISE TO BE CONDUCTED: INFOCON DRILL
B. OSE: Strike Group Commander
C. OTC: Strike Group Commander
D. OCE: (PRI) USS CV/CVN, LHA/LHD (SEC) USS CG
G. PARTICIPANTS: Strike Group Units
NOTE: ALL PARTICIPANTS MAY NOT BE ASSIGNED TO PARTICIPATE IN
EACH C4I STANDING PRE-EX EVENT AS INDICATED IN THE PARTICIPANTS
COLUMN IAW (MTO).
I. (U) TIME ZONE: ALL TIMES ARE ZULU
J. COMEX: IAW SOE (NO NOTICE)
JJ. FINEX: IAW SOE
N. AREA OF EXERCISE:
U. COMMUNICATIONS: PRIMARY WARFARE COMMANDERS VOICE AND CHAT
CIRCUITS AS DESIGNATED IN CV/CVN, LHA/LHD STRIKE GROUP EFFECTIVE
OPTASK COMMS ISO exercise/evolution.
A. COORDINATION CIRCUITS:
1. PRI COORD:
2. SEC COORD:
3. TER COORD:
COORDINATION CIRCUITS ARE SECURED DUE TO RIVER CITY
IMPLEMENTATION, REPORTS WILL BE MADE VIA VOICE CIRCUIT.
V. INSTRUCTIONS:
V.1. (C) BACKGROUND: INFOCON IS A COMPREHENSIVE COMPUTER NETWORK
MANAGEMENT POSTURE BASED ON THE STATUS OF INFORMATION SYSTEMS,
MILITARY OPERATIONS, AND ADVERSARY CAPABILITIES, INTENT AND
ACTIONS. EACH INFOCON LEVEL INCLUDES MEASURES TO UNIFORMLY
HEIGHTEN OR REDUCE CND POSTURE, TO DEFEND AGAINST COMPUTER
NETWORK ATTACKS AND TO MITIGATE DAMAGE TO THE DOD INFORMATION
INFRASTRUCTURE, SPECIFICALLY
COMPUTER NETWORKS. THE PURPOSE OF THIS EXERCISE IS TO ENSURE
THAT strike group UNITS HAVE VALID USER GROUPS, THAT ESSENTIAL
CONNECTIVITY WITH THE OFF-SHIP CHAIN OF COMMAND IS MAINTAINED,
AND THAT NETWORK MANAGERS AND IAMS ARE PROFICIENT AT SETTING AND
CHANGING INFOCON LEVELS AND USE OF THE IA TOOL KIT.
V.2. (C) PROCEDURES: ALL UNITS SHALL SUBMIT INTRUSION DETECTION
SYSTEM BASELINES NLT COMEX OF EVENT AND BE LOGGED IN TO THE
strike group commander IW CHATROOM
V.3. UPON COMEX, IWC WILL DIRECT CHANGES TO INFOCON LEVELS AND
UNITS WILL PASS ATTAINMENT REPORTS VIA CHAT. IF CHAT IS LOST, ALL
UNITS ASSUME INFOCON B AT COMEX, ESTABLISH INFOCON CHARLIE AT 30
MIN AFTER COMEX. FOR AT LEAST 30 MINUTES, THEN SWITCH BACK TO
INFOCON B UNTIL FINEX. DURING ALL PHASES OF THIS EXERCISE, SHIPS
ARE TO TEST CONNECTIVITY OF CRITICAL NODES IN THE COMMAND, I.E.
CO/XO/OPSO/TAO/SUPPO/CMC AND MONITOR SNORT BASELINES FOR NETWORK
I-38
NTP 4 (E)
SCANS AND INTRUSIONS BY NIOC CND TRAINERS.
A. ALL UNITS WILL MAKE ATTAINMENT REPORTS TO IWC VIA CHAT ON THE
SECONDFLT SERVER. THE IP ADDRESS IS 206.36.162.13 AND THE
CHATROOM IS strike group_IWC_COORD.
B. FOLLOW GUIDANCE AS PROMULGATED IN Strike Group Commander OPORD
6000-04 AND NIOC CND TACMEMO 3-13.1-03 AS WELL AS LOCAL INFOCON
SOP'S WHEN SETTING EACH INFOCON LEVEL. COMMANDS REQUIRING
ELECTRONIC REFERENCES REFER TO STRIKE GROUP'S CAS SITE.
C. PRE-DEFINED USER GROUP METHODOLOGY WILL BE USED TO ENSURE
OPERATIONALLY ESSENTIAL PERSONNEL MAINTAIN ACCESS THROUGHOUT
INFOCON SETTINGS.
D. EACH UNIT WILL ASSESS IMPACT TO OPERATIONAL CAPABILITY DURING
DIRECTED INFOCON LEVEL AND PROVIDE POSTEX LESSONS LEARNED TO ORIG
VIA EMAIL WITHIN 48 HRS OF FINEX.
4. IN THE EVENT OF REAL-WORLD CONTINGENCIES, ANY UNIT MAY ENACT
RELAXATION OF RESTRICTIVE INFOCON LEVELS TO PROPERLY POSTURE
SYSTEMS IN RESPONSE TO ON-GOING OPERATIONS.
5. CCS WILL GENERATE COMSPOT DETAILING RIVERCITY IMPLEMENTATION
UPON FINEX. OCE WILL PROVIDE GRADE STANDARDS AND MEASURES OF
EFFECTIVENESS RESULTS TO BE POSTED VIA Strike Group CAS II:
indicate IP address.//
Downgrading instructions in accordance with SECNAV M5510.36 (June
2006.
I-39
NTP 4 (E)
DRILL PACKAGE QUEBEC CND INCIDENT ASSURANCE MONITORING
1. PROVIDED IS THE STANDING PRE-EX (C4I PKG QUEBEC) CND INCIDENT
REPORTING ACTIVATION AND THE CRITERIA FOR MEASURING EFFECTIVENESS
OF THE BASELINE STANDARDS WILL PRIMARILY BE BY USE OF NMETLS.
ALL NMETLS CAN BE FOUND ON THE COMSTRKFORTRALANT OR
COMSTRKFORTRAPAC CAS SITE. ALL RELATED WARFARE AREA NMETLS CAN
BE FOUND ON THE Strike Group CAS SITE.
A. EXERCISE: CND INCIDENT AND REPORTING SCENARIO
B. OSE: Strike Group Commander
C. OTC: Strike Group Commander
D. OCE: (PRI) USS CV/CVN, LHA/LHD (SEC) USS CG
G. PARTICIPANTS: Strike Group Units
I. TIME ZONE: ALL TIMES ARE ZULU
J. COMEX: IAW SOE (NO NOTICE)
JJ. FINEX: IAW SOE
N. AREA OF EXERCISE: IAW CURRENT TASKING AS ASSIGNED
U. COMMUNICATIONS: SIPR CHAT/VOICE COMMS
A. COORDINATION CIRCUITS:
1. PRI COORD:
2. SEC COORD:
V. INSTRUCTIONS:
V.1 BACKGROUND: COMPUTER VIRUSES, TROJAN HORSES, AND MALICIOUS
CODE INCIDENTS, KNOWN OR SUSPECTED NETWORK INTRUSIONS AND OTHER
SUSPICIOUS COMPUTER INCIDENTS MUST BE REPORTED TO NCDOC OPNAVINST
2201.2. THIS EXERCISE IS DESIGNED TO FLEX THE COMPUTER INCIDENT
REPORTING SYSTEM.
V.2. SCENARIO: YOUR COMMAND RECEIVED THE ZOTOB.E TROJAN FROM A
STAFF'S RECENT EMBARKATION WHILE ATTEMPTING TO EMBARK AND CONNECT
TO AN NMCI HOST. OVER TWO DOZEN WORKSTATIONS HAVE BEEN INFECTED
AND HAD TO BE MANUALLY CLEANED.
V3. SIX HUNDRED TWENTY FIVE MAN-HOURS WERE EXPENDED WHILE
ISOLATING THE CAUSE OF THE OUTAGE AND CLEANING INFECTED
WORKSTATIONS. FOR THE PUPOSE OF THIS EXERCISE, DRAFT AN INCIDENT
REPORT IAW GUIDANCE FROM OPNAVINST 2201.2. INCLUDE YOUR EXCHANGE
SERVER ANTI-VIRUS SOFTWARE VERSION, LATEST SIGNATURE DATE AND POC
INFO. EXERCISE WILL BE EVALUATED ON TIMELINESS OF SUBMISSION AND
ACCURACY OF REPORT.
----------------------------------------------------------------ZZ.1. THIS EXERCISE IS DESIGNED TO TEST STRIKE GROUP ABILITY TO
PERFOM BELOW NTAS.
----------------------------------------------------------------C4I PKG QUEBEC
(CND INCIDENT AND REPORTING SCENARIO)
(INJECT, IMPLEMENT, AND DETECT CND TASKER)
NMETL/NTA(S)
----------------------------------------------------------------NTA 5.5.5 PERFORM INFORMATION ASSURANCE
A. ARE SUFFICIENT INCIDENT REPORTING PROCEDURES ESTABLISHED,
IMPLEMENTED, AND TESTED NMETL STANDARDS OBSERVED ARE:
------------------------------------------------------------------
I-40
NTP 4 (E)
NTA 5.5.5 PERFORM INFORMATION ASSURANCE
----------------------------------------------------------------CND OBJECTIVES ARE INTEGRATED INTO TRAINING AND DRILLS.
(T1)-YES, (T2)-N/A, (T3)-N/A, (T4)-NO.
----------------------------------------------------------------COMPUTER INCIDENT REPORTING PROCEDURES INTEGRATED AND
EVALUATED WITHIN THE COMMAND EXERCISES AND OPERATIONS.
(T1)-YES, (T2)-N/A, (T3)-N/A, (T4)-NO.
----------------------------------------------------------------2.. RESULTS OF EXERCISE WILL BE PROVIDED SEPCOR VIA IMMEDIATE
COMSPOT.//
Downgrading instructions in accordance with SECNAV M5510.36 (June
2006.
I-41
NTP 4 (E)
DRILL PACKAGE ROMEO INFORMATION ASSURANCE MONITORING
1. PROVIDED IS THE STANDING PRE-EX (C4I PKG ROMEO) FOR IA
MONITORING. THE CRITERIA FOR MEASURING EFFECTIVENESS AND
BASELINE STANDARDS WILL PRIMARILY BE BY USE OF NMETLS. ALL
NMETLS CAN BE FOUND ON THE COMSTRKFORTRALANT OR COMSTRKFORTRAPAC
CAS SITE. ALL RELATED WARFARE AREA NMETLS CAN BE FOUND ON THE
Strike Group CAS SITE. IN ADDITION TO NMETLS, ALL UNITS WILL USE
THE FXP-3 AND SELF-OBSERVE APPLICABLE AREAS AND PROVIDE OBSERVED
GRADED STATUS.
A. EXERCISE: IA MONITORING SCENARIO
B. OSE: Strike Group Commander
C. OTC: Strike Group Commander
D. OCE: (PRI) USS CV/CVN, LHA/LHD (SEC) USS CG
G. PARTICIPANTS: Strike Group Units
I. TIME ZONE: ALL TIMES ARE ZULU
J. COMEX: IAW SOE (NO NOTICE)
JJ.FINEX: IAW SOE
N. AREA OF EXERCISE: IAW CURRENT TASKING AS ASSIGNED
U. COMMUNICATIONS: CHAT, MESSAGE.
A. COORDINATION CIRCUITS:
1. PRI COORD:
2. SEC COORD:
V. INSTRUCTIONS:
V1. (C) BACKGROUND: INFORMATION ASSURANCE AND COMPUTER NETWORK
DEFENSE ARE COMPREHENSIVE EVALUATED EXERCISES TO DEFEND AGAINST
COMPUTER NETWORK ATTACKS/INTRUSIONS AND TO MITIGATE DAMAGE TO THE
DOD INFORMATION INFRASTRUCTURE, SPECIFICALLY COMPUTER NETWORKS.
THE PURPOSE OF THIS EXERCISE IS TO ASSESS THE CURRENT
VULNERABILITIES OF Strike Group COMMANDS, TO ASSESS SHIPBOARD
PERSONNEL ACTIONS TO PROTECT SHIPBOARD NETWORKS, THAT OFF-SHIP
CONNECTIVITY WITH OTHER STRKGRU UNITS IS MAINTAINED, AND THAT
NETWORK AND SECURITY MANAGERS ARE PROFICIENT AT USING THE
INFORMATION ASSURANCE (IA) TOOL KIT.
V2. (C) PROCEDURES:
ENSURE ALL APPROVED IAVA SOFTWARE PATCHES ARE INSTALLED, AND THAT
INTRUSION DETECTION SYSTEM (IDS; SNORT OR REALSECURE) IS ACTIVE
WITH LOGGING BEING MONITORED. ALL UNITS SHALL BE LOGGED IN TO THE
Strike Group_COMM_COORD CHATROOM TWO HOURS PRIOR TO THE CNDEX
EACH DAY. REPORT SUSPICIOUS ACTIVITY VIA CND INCIDENT REPORTS AND
TO IWC VIA CHAT. DURING ALL PHASES OF THIS EXERCISE, SHIPS ARE TO
MONITOR IDS FOR NETWORK SCANS AND INTRUSIONS.
V3. (U) REPORTING REQUIREMENTS:
REPORT POSSIBLE INTRUSIONS USING FORMAT SPECIFIED IN REF F. WHILE
INTRUSIONS ARE OCCURRING DURING AN EXERCISE PERIOD, PARTICIPANTS
SHOULD CONSIDER ALL INTRUSIONS AS ACTUAL INTRUSIONS UNTIL
OTHERWISE DETERMINED BY NCDOC.
-------------------------------------------------------------V.4. ALL UNITS SHALL VERIFY PASSWORD CRACK PROGRAM IS AVAILABLE.
PROGRAM SHOULD RUN FOR APPROXIMATELY ONE HOUR. ENSURE ACCOUNTS
WITH CRACKED PASSWORDS ARE DISABLED AND THAT NO DEFAULT PASSWORDS
ARE ACTIVE. NLT date/time, PROVIDE A SUMMARY REPORT VIA RMG ON
INFORMATION ASSURANCE TOOLKIT PASSWORD CRACKER. MESSAGE ACTION TO
I-42
NTP 4 (E)
Commander Strike Group (FOR DESRON SHIPS INFO COMDESRON XX) SHALL
INCLUDE THE BELOW LISTED ITEMS.
A. PASSWORD CRACKING. STATE DATE AND TIME PASSWORD CRACK WAS RUN
AND PROVIDE BELOW STATISTICS.
NUMBER OF UNCLASSIFIED PASSWORDS TOTAL
NUMBER OF UNCLASSIFIED PASSWORDS CRACKED TOTAL
NUMBER OF UNCLASSIFIED ADMINISTRATOR ACCOUNT PASSWORDS CRACKED
NUMBER OF CLASSIFIED PASSWORDS TOTAL
NUMBER OF CLASSIFIED PASSWORDS CRACKED TOTAL
NUMBER OF CLASSIFIED ADMINISTRATOR ACCOUNT PASSWORDS CRACKED
2. USERS WITH WEAK PASSWORDS SHOULD BE TRAINED ON PROPER PASSWORD
CREATION AND ATTEND AN INFORMATION ASSURANCE REFRESHER COURSE.
3. COMMAND IA/CND REPORT. FOR ALL PARTICIPATING UNITS PROVIDE THE
FOLLOWING INFORMATION VIA RMG:
A. LIST OF UNIT PERSONNEL PARTICIPATING IN THESE GROUP SAIL
EXERCISE EVENTS BY NAME/RATE OR RANK/BILLET/PRD WHO HAVE RECEIVED
CND TRAINING. LIST, BY EVENT NUMBER, THE Strike Group CND
TRAINING EVENTS THE PERSON PARTICIPATED IN DURING
exercise/evolution.
TRAINING EVENT CODES:
1 - ATTENDED NIOC IA/CND AFLOAT, NIOC
2 - NAVY IAM COURSE GRADUATE
3 - CIVILIAN COMPUTER SECURITY CERTIFICATES OR EQUIVALENTS
4 - NETWORK SECURITY VULNERABILITY TECHNICIAN GRADUATE
5 - JOURNEYMAN NETWORKING CORE GRADUATE
6 - COMMAND WEBMASTER
EXAMPLE: M. MOORE/IT1/IAM/01MAR07/1,2,3,4,5,6/
B. DATE OF YOUR COMMAND'S LAST NCDOC ON-LINE SURVEY ON NIPR AND
SIPR NETWORKS.
C. SUMMARY OF YOUR SIPR AND NIPR NETWORK PASWORD POLICY. SUMMARY
SHOULD INCLUDE THE FOLLOWING INFORMATION AT A MINIMUM.
1. CHANGE OF PASSWORD FREQUENCY.
2. MINIMUM PASSWORD HISTORY.
3. MINIMUM PASSWORD CHARACTERS.
4. # OF LOGON ATTEMPTS BEFORE LOCKOUT.
D. SIPR AND NIPR NETWORK ACCREDITATION STATUS. ARE YOUR NETWORKS
FULLY ACCREDITED IAW THE DEPARTMENT OF DEFENSE INFORMATION
TECHNOLOGY CERTIFICATION AND ACCREDITATION PROCESS (DITSCAP)? IF
NOT, IS THERE AN INTERIM AUTHORITY TO OPERATE (IATO) IN EFFECT?
WHAT IS THE DATE OF THE IATO?
E. CURRENT VERSION OF THE INFORMATION ASSURANCE TOOLKIT HELD
ONBOARD.
F. COMMANDS INFORMATION ASSURANCE TRAINING PLAN. HOW ARE DON
REQUIREMENTS MET?
G. DATE OF SYMANTEC ANTIVIRUS SIGNATURE ON YOUR NIPR AND SIPR
SERVERS.
ZZ.1 THIS EXERCISE IS DESIGNED TO TEST STRIKE GROUP ABILITY TO
CONDUCT IA MONITORING AND MEET NTA STANDARDS.
----------------------------------------------------------------NTA STANDARDS TO BE OBSERVED:
NTA 5.5.5. INFORMATION ASSURANCE (IA) FOR INTERMEDIATE PHASE
-----------------------------------------------------------------
I-43
NTP 4 (E)
IA OBJECTIVES ARE INTEGRATED INTO TRAINING AND DRILLS.
----------------------------------------------------------------T1=Yes, T2=N/A, T3=N/A, T4=NO
----------------------------------------------------------------DOES THE COMMAND HAVE THE TRAINING (I.E. NSVT, ANA ETC...)
REQUIRED TO
RECONSTRUCT UNAUTHORIZED ACTIVITY AND ATTACKS?
----------------------------------------------------------------T1=YES, T2=N/A, T3=N/A, T4=NO
----------------------------------------------------------------NTA 5.5.5. INFORMATION ASSURANCE (IA) for BASIC PHASE
----------------------------------------------------------------NUMBER OF FULL-TIME SYSTEM ADMINISTRATORS ASSIGNED TO MAINTAIN
SYSTEMS WITH PROPER NEC'S.
----------------------------------------------------------------T1= YES, T2=N/A, T3=N/A, T4=NO
----------------------------------------------------------------PERCENT OF NETWORKS THAT COMPLETED CERTIFICATION AND
ACCREDITATIONS (C&A) IAW DOD INFORMATION TECHNOLOGY SECURITY
CERTIFICATION AND ACCREDITATION PROCESS (DITSCAP). ADEQUATE
ARCHITECTURE FOR SECURING SYSTEMS AND NETWORKS ARE IN
PLACE.
----------------------------------------------------------------T1=100%, T2=N/A, T3=N/A, T4=<100%
----------------------------------------------------------------IA OBJECTIVES ARE INTEGRATED INTO COMMAND LEVEL TRAINING AND
EXERCISES.
----------------------------------------------------------------1=YES, T2=N/A, T3=N/A, T4=NO
----------------------------------------------------------------DOES THE COMMAND HAVE A REGISTERED COPY OF THE FLEET IA TOOLKIT
(Version 1.0).
----------------------------------------------------------------T1=YES, T2=N/A, T3=N/A, T4=NO
----------------------------------------------------------------NTA 5.5.5.1 COMPUTER NETWORK DEFENSE (CND) BASIC PHASE
----------------------------------------------------------------REGULAR AND PROACTIVE VULNERABILITY ANALYSIS, ASSESSMENTS AND
EVALUATIONS PROGRAM TO IDENTIFY DEFICICIENCIES. (NCDOC SCANNING).
----------------------------------------------------------------T1=YES, T2=N/A, T3=N/A, T4=NO
----------------------------------------------------------------DOES THE COMMAND ENFORCE STRONG PASSWORD MANAGEMENT AND CHANGE
POLICY EVERY 90 DAYS.
----------------------------------------------------------------T1=Yes, T2=N/A, T3=N/A, T4=No.
----------------------------------------------------------------PERCENT OF PASSWORDS IDENTIFIED (CRACKED) AS NOT MEETING STRONG
AUTHENTICATIONS PASSWORD (RUN NUTCRACKER IAW STANDING CONOP)
----------------------------------------------------------------------------T1=<8, T2=8-15, T3=15-25, T4=>25
----------------------------------------------------------------FXP:
I-44
NTP 4 (E)
CCC-41-SF INFORMATION ASSURANCE
----------------------------------------------------------------2. ALL UNITS UNABLE TO PARTICIPATE IN ANY PART OF THIS EXERCISE
SHOULD SUBMIT IMMEDIATE COMSPOT WITH SUMMARY OF DEFICIENCIES.//
Downgrading instructions in accordance with SECNAV M5510.36 (June
2006.
I-45
NTP 4 (E)
DRILL PACKAGE SIERRA GBS
1. PROVIDED IS THE STANDING PRE-EX (C4I PKG SIERRA) FOR GBS
MONITORING. THE CRITERIA FOR MEASURING EFFECTIVENESS AND
BASELINE STANDARDS WILL PRIMARILY BE BY USE OF NMETLS. ALL
NMETLS CAN BE FOUND ON THE COMSTRKFORTRALANT OR COMSTRKFORTRAPAC
CAS SITE. ALL RELATED WARFARE AREA NMETLS CAN BE FOUND ON THE
Strike Group CAS SITE. IN ADDITION TO NMETLS, ALL UNITS WILL USE
THE FXP-3 AND SELF-OBSERVE APPLICABLE AREAS AND PROVIDE OBSERVED
GRADED STATUS.
A. EXERCISE: GBS MONITORING SCENARIO
B. OSE: Strike Group Commander
C. OTC: Strike Group Commander
D. OCE: (PRI) USS CV/CVN, LHA/LHD (SEC) USS CG
G. PARTICIPANTS: Strike Group Units
I. TIME ZONE: ALL TIMES ARE ZULU
J. COMEX: IAW SOE (NO NOTICE)
JJ.FINEX: IAW SOE
N. AREA OF EXERCISE: IAW CURRENT TASKING AS ASSIGNED
U. COMMUNICATIONS: CHAT, MESSAGE.
A. COORDINATION CIRCUITS:
1. PRI COORD:
2. SEC COORD:
V. INSTRUCTIONS:
V1. (C) PROCEDURES:
V2. (U) REPORTING REQUIREMENTS:
------------------------------------------------------ZZ.1 THIS EXERCISE IS DESIGNED TO TEST STRIKE GROUP ABILITY TO
MEET THE FOLLOWING NTAS.
NTA STANDARDS TO BE OBSERVED:
NTA 5.1.1.1.2 PROVIDE EXTERNAL COMMUNICATIONS
SERVICE (GBS)
GLOBAL BROADCAST
I-46
NTP 4 (E)
TRANSPONDER
I-47
NTP 4 (E)
DRILL PACKAGE TANGO (C4I JEOPARDY PUBEX)
PROVIDED IS THE STANDING PRE-EX FOR C4I PKG TANGO C4I/INFO
SYS/OPORD 6000 PUBEX. THE CRITERIA FOR MEASURING EFFECTIVENESS OF
THE BASELINE STANDARDS WILL PRIMARILY BE BY USE OF NMETLS. ALL
NMETLS CAN BE FOUND ON THE COMSTRKFORTRALANT OR COMSTRKFORTRAPAC
CAS SITE. ALL RELATED WARFARE AREA NMETLS CAN BE FOUND ON THE
Strike Group CAS SITE. IN ADDITION TO NMETLS, ALL UNITS WILL USE
THE
FXP-3 AND SELF-OBSERVE APPLICABLE AREAS AND PROVIDE OBSERVED
GRADED STATUS.
A. STANDARD PRE-EX FOR C4I PACKAGE TANGO PUBEX
A. EXERCISE: EXECUTION OF C4I PUBEX
A. EXERCISE: IA MONITORING SCENARIO
B. OSE: Strike Group Commander
C. OTC: Strike Group Commander
D. OCE: (PRI) USS CV/CVN, LHA/LHD (SEC) USS CG
G. PARTICIPANTS: Strike Group Units
I. TIME ZONE: ALL TIMES ARE ZULU
J. COMEX: IAW SOE (NO NOTICE)
JJ.FINEX: IAW SOE
N. AREA OF EXERCISE: IAW CURRENT TASKING AS ASSIGNED
U. COMMUNICATIONS: CHAT, MESSAGE.
A. COORDINATION CIRCUITS:
1. PRI COORD:
2. SEC COORD:
V. INSTRUCTIONS:
V1. ALL UNITS MUST BE PREPARED TO ACTIVATE DESIGNATED CIRCUIT
LINE NUMBER UPON REQUEST VIA COMSPOT AS DIRECTED BY CCS.
V2. CCS WILL CONDUCT ROLL CALL ON PRIMARY COMM COORD CIRCUIT
AS ASSIGNED. EACH UNIT WILL INITIATE CALL UP TO THE CONTROL SHIP
ADVISING RECEIPT AND READABILITY OF ROLL CALL.
----------------------------------------------------------------- GOAL CONDUCT C4I JEOPARDY PUBEX VIA COMM COORD.
----------------------------------------------------------------- USS____ WILL ACT AS ALEX TREBEK
----------------------------------------------------------------- C4I JEOPARDY (PUBEX) REFERENCES NTP 4(F)
Strike Group Commander OPORD 6000 (LOCATED ON CAS II SITE)
NWP 6-01(REV A)
NTP 3 SUPP-1 (L)
EKMS 1
----------------------------------------------------------------- USS_____(ALEX TREBEK) WILL ASK A TOTAL OF 20 QUESTIONS IN A
ROUND ROBIN FASHION TO ALL PARTICIPANTS. EACH SHIP HAS TWO
MINUTES TO PROVIDE CORRECT ANSWER AFTER ROGER OUT.
- EACH QUESTION ANSWERED CORRECTLY IS WORTH 2 POINTS EACH AND
EACH INCORRECT ANSWER WILL BE A DEDUCTION OF 2 POINTS. IF UNIT
UNABLE TO ANSWER THE QUESTION IT WILL THEN BE FORWARDED OVER TO
THE OTHER PARTICIPANT FOR THE ANSWER AND THE POINTS.
- ALL ANSWERS WILL BE PROVIDED ALONG WITH PAGE NUMBER AND
I-48
NTP 4 (E)
PARAGRAPH. CONDUCT COMM CHECK 30 MIN PRIOR TO EVENT COMEX ON COMM
COORD AS ASSIGNED IAW SOE.
----------------------------------------------------------------V.3. PUBEX WILL BE CONDUCTED FOR THE DAY AND NIGHT WATCHTEAMS
V.4. OCE WILL GENERATE COMSPOT DETAILING PUBEX UPON FINEX AND
PROVIDE GRADE STANDARDS AND MEASURES OF EFFECTIVENESS.
RESULTS TO BE POSTED ON Strike Group CAS II: indicate IP
address.//
Downgrading instructions in accordance with SECNAV M5510.36 (June
2006.
I-49
NTP 4 (E)
I-50