I dug this field manual up the other night. There is ALOT of good information in it. I highly recommend downloading it. What I am posting here is basically what most of my writing has been about. Signal Intelligence and defeating signal intelligence gathered. Everything in italics is what I added. I would suggest you add some of these radio procedures to your own group comms.

10-6. Electronic protection is the division of electronic warfare involving actions taken to protect personnel,
facilities, and equipment from any effects of friendly or enemy use of the electromagnetic spectrum that
degrade, neutralize or destroy friendly combat capability friendly combat capability (JP 3-13.1).

Table 10-1. Techniques for minimizing transmissions and transmission times

Ensure all
transmissions are
Analysis of U.S. tactical communications indicates that most communication used in
training exercises are explanatory and not directive. Radio communications must never
use as a substitute for complete planning. Tactical radio communications should be used
to convey orders and critical information rapidly. Execution of the operation must be
inherent in training, planning, ingenuity, teamwork, and established and practiced
standing operating procedures. The high volume of radio communications that usually
precedes a tactical operation makes the friendly force vulnerable to enemy interception,
direction finding, jamming, and deception. (STAY OFF THE RADIO UNLESS ABSOLUTELY NECESSARY!)
Note. When communications are secure, the volume of radio transmissions can betray an operation, and the enemy
can still disrupt or destroy the ability of U.S. forces to communicate.
Preplan messages
prior to
transmitting them.
The radio operator should know what to say before beginning a transmission. When the
situation and time permit, write out the message before beginning the transmission. This
minimizes the number of pauses in the transmission and decreases transmission time. It
also ensures the conciseness of the message. The Joint Interoperability of Tactical
Command and Control System provide a standard vocabulary used for message
planning. The Joint Interoperability of Tactical Command and Control System voice
templates are some of the best tools a radio operator can use to minimize transmission
Transmit quickly
and precisely as
This is critical when the quality of communications is poor. This minimizes the need to
repeat a radio transmission. Unnecessary repetition increases transmission time and the
enemy’s opportunity to intercept U.S. transmissions and thus gain valuable information.
When a transmission is necessary, the radio operator should speak in a clear, well-
modulated voice, and use proper radiotelephone procedures. (SHORTER TIMES = LESS LIKELY TO DF OR INTERCEPT)
Use equipment
capable of data
burst transmission.
This is one of the most significant advantages of tactical satellite communications
systems. When messages are encoded on a digital entry device for transmission over
satellite systems, the transmission time is greatly reduced. (DIGITAL RADIO USING SMS FEATURE)
Use an alternate
means of
Alternate means of communications, such as cable, wire, or organic Soldiers performing
as messengers, used to convey necessary directives and information. Other means of
communications used, when practical.
Use of brevity
A brevity code is a code that provides no security, but which has as its sole purpose the
shortening of messages rather than the concealment of their content.

(Refer to
ATP 1-02.1 for more information.)

10-54. The following are additional techniques to consider for minimizing transmissions and transmission
 Protect transmissions from enemy interception.
 Use low power.
 Select the proper antenna. Select the antenna with the shortest range possible. Use directional
 Select a site that masks transmitted signals from the enemy interception.
 Use mobile antennas.
 Use decoy antennas.
 Use steerable null antenna processors.
 Practice good radio operator procedures.
 Reduce operator distinguishing characteristics.
 Operate on a random schedule.
 Authenticate.
 Encrypt all essential elements of friendly information. (A RADIO WITH AES ENCRYPTION)
 Use COMSEC equipment when available.
 Use prowords.


  1. In the very special case where you are transmitting from a secure location, perhaps to multiple mobile teams or other fixed units, you can employ the technique of ensuring that “most” transmissions are UNnecessary. This is the technique employed by a Navy radio station in the NorthWest, on 4006.5 kHz, which transmits encoded teletype 24/7/365. It never stops, so the technique of traffic analysis against it fails. It requires receiving units to know exactly when to listen, or perhaps monitor for random coded strings to begin recording for decode. Most of what is sent is random, meaningless text so efforts to decode fail and might waste enemy resources. Of course it need not be so persistant. Maybe 1 hour per day, every day, same time and frequency would suffice – as long as most of the transmission is just random strings.


Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

%d bloggers like this: