Due to the popularity of the previous article in this series, we present you with a real life example recorded during One Shepherd’s Fall 2015 field training exercise (FTX). The video was recorded in an S-250 communications shelter. It houses the radio/telephone operator (RTO) equipment used by the tactical operations center (TOC). In this specific example, it depicts a conversation between a team and higher command.
Communications Breakdown: Part 2
In Part 1 of this series, we framed the SOI as to its use and focused on the portions that do not involve a radio. Building upon that knowledge, we’ll discuss Call
Signs, Encryption Code/Authentication Tables, and Brevity Codes. Each of these is a must when communicating over a radio in order to keep your message ambiguous to any unwanted listening ear.
Call Signs:
In most circumstances, call signs are designated by an alpha-numerical group. For instance, in the above example “Y44”, pronounced “Yan-kee Fow-er Fow-er”, represents Higher Command. You will notice that for Squads 2-4 there is no letter assigned to them. This is because they all share the same designation of “B” or “Bravo”. In this situation all squads are represented by “Bravo” and designated by their different numbers. If I wanted to contact Squad 4 I would use the call sign “B22” (Bravo Two Two). Without getting too far into radio etiquette, when we want to contact someone we will say their name twice and our name once as seen below:
“Yankee Four Four, Yankee Four Four, this is Bravo Two One, OVER.”
Encryption Code/ Authentication Table:
This portion serves two different functions: Coding numbers and Authentication. To represent the numbers 0-9, we tend to use a single ten letter word with no repeated letters such as “Binoculars”. You can use a combination of words as long as it totals ten letters and does not repeat any of the letters between the two words as seen above with “Dumbwaiter”. In fact, the authentication table can simply be a combination of ten random letters; however, use of random letters makes memorizing the authentication table extremely difficult.
In the event that you believe someone is using your radio frequency that should not be using it (i.e. – you do not recognize the other person’s voice), you should request an Authentication to make sure they are who they say they are. The Authentication can change with every SOI or can be set as a Standard Operating Procedure (SOP) by the unit. In this case, the table states that the Authentication is “2 right”. This means that when someone requests an Authentication, you will move two slots to the right and return the letter and number. It will look something like this:
“Bravo Two One, Authenticate ‘Whiskey’, OVER”
“Yankee Four Four, I Authenticate ‘India Seven’, OVER”
You will notice that Higher requested authentication of “W”. From there we moved two positions to the right (2 right) and answer, “I-7”. As stated before, this authentication can be changed with every SOI or can be set in stone. The important thing is that EVERYONE is on the same page with what the authentication process is.
Brevity Codes:
As stated above, SOI can be much more comprehensive. Next we will discuss organization and use of an SOI. Below we see some examples of things you may wish to communicate in a secure manner.
Above are two categories; REQUESTS and SITUATION REPORTS (SITREP). Each message that we wish to send is on the left side of the columns while the code word it corresponds to is on the right side of the columns (i.e. – Situation Report = COLLAR). You will notice that within each category, all of the code words begin with the same letter. This is the chosen organizational method for this specific example. While organizing the categories’ code words is not required, it does make decoding significantly faster. This is due to the fact that if one hears a word that starts with “A” then they know to look under the SITREP column. The best way to understand how to use the SOI is to analyze a few examples.
For instance, let us say Higher Command wants to know where you are in your mission and what you are doing. They would be asking for a Situational Report (SITREP) and you want to tell them that you are at your Objective Rally Point (ORP). With Higher Command in BOLD and you in Italics, the radio traffic would look something like this:
Coded Message:
“Bravo Two One, Bravo Two One, this is Yankee Four Four, OVER”
“Yankee Four Four, this is Bravo Two One, OVER”
“Bravo Two One, message follows, OVER”
“Yankee Four Four, send message, OVER”
“I send, COLLAR, how copy. OVER”
“I copy COLLAR, OVER”
“Good Copy, Over”
“Wait one”
“Yankee Four Four, I send ARMAGEDDON, ARROGANT, ANSWER, how copy, OVER”
“I copy ARMAGEDDON, ARROGANT, ANSWER, OVER”
“Good Copy, OVER”
“Understood, Yankee Four Four, OUT”
Decoded Message:
“Bravo Two One, Bravo Two One, this is Yankee Four Four, OVER”
“Yankee Four Four, this is Bravo Two One, OVER”
“Bravo Two One, message follows, OVER”
- Higher is giving you a heads up that they are about to send a message so that you can get your writing materials ready to copy the message.
“Yankee Four Four, send message, OVER”
- Once you are prepared to copy the message, you tell Higher to send the message.
“I send, COLLAR, how copy. OVER”
“I copy COLLAR, OVER”
“Good Copy, Over”
“Wait one”
- We decode to find out that COLLAR means SITREP. They want a Situation Report
- At this point we want to send that we are “Halted in our Objective Rally Point”, thus we use the codes for Halted, In/At/On, ORP
“Yankee Four Four, I send ARMAGEDDON, ARROGANT, ANSWER, how copy, OVER”
“I copy ARMAGEDDON, ARROGANT, ANSWER, OVER”
“Good Copy, OVER”
- Higher command decodes the message and understands that the patrol is in their ORP. Then sends:
Understood, Yankee Four Four, OUT
As you can see, Higher Command just got a real time situation report from a patrol in a secure manner. Even if the enemy was listening to the transmission, they would have no idea what was being communicated; unless of course they had one of our SOI’s. You will also notice that each time a coded message is sent, it is “copied” by the receiver to ensure that they heard the correct word over the radio. This seems redundant; however, this is the procedure used to ensure that communications are proficient and conveyed correctly. It is simply a procedure to make sure you are decoding the correct information and not recording the wrong code word, adding unnecessary confusion to your communication. Now, it is also important to understand that at times, these messages can be expedited as well. When communicating with someone who is familiar, certain steps can be skilled in order to speed up the communication. This is beneficial as it reduces the “time on the net” which in turn makes it more difficult for the enemy to triangulate your position, should they have the equipment to do so. That, however, is beyond the scope of this article.
Conclusion
An SOI can be as comprehensive or as simple as the mission requires. The important thing is that you have the ability to communicate securely and efficiently. Although technological advancements have allowed today’s militaries to encrypt communications, it is important to understand that technology fails. Yes, you may have a fancy GPS, but you should not solely rely on this equipment. You still carry and remain proficient with a map and compass. The same is true with this form of communication. Regardless of the manner chosen to communicate, the ability to communicate effectively can often times be the essential factor between success and failure. Over my many years of experience in One Shepherd, I cannot think of a single AAR that did not have communication come up as something to improve on. Communication is a force multiplier. Setting up lines of communication, establishing a communications SOP, and securing messages through efficient use of SOI can help any team communicate masterfully. These competencies in communication can be translated to any team, unit, project group, or leadership position. Good leaders acknowledge this fact and continuously seek to communicate more effectively.
Communications Breakdown: Part 1
The ability to communicate effectively is arguably the most important asset to any entity seeking to obtain a certain goal. Without communication the ability to relay ideas and goals to coworkers and teammates is nullified. Without properly conveying these ideas and goals to our team we fail to reach enabling and terminal objectives. It is not enough to simply open up a line of communication for the purposes of light fighting. A Standard Operating Procedure (SOP) must be established in order to make communications seamless and proficient. Establishing a pattern or sequence for communication allows us to communicate successfully with other teammates. Standardizing communication is especially important because we may not even know those receiving our message very well. If communication was not standardized, efficiencies of time and message would be lost.
Communication is used in order to coordinate and assign tasks, as well as to maintain situational awareness of teams. In several circumstances we seek to keep our communications proprietary; couples do not openly discuss their finances, businesses try to keep their newest ideas secret from their competitors so that they may gain advantage in the marketplace. The idea of shielding one’s communication is evident in almost any situation in which communication is involved. In the military, this idea is condensed to Operational Security (OPSEC). In communications, OPSEC is maintained through the application of Cryptology; the study of codes.
In World War II, the Japanese could virtually decipher every code the United States was using to communicate, thus operational success suffered. The Japanese knew when, where, and what U.S. forces planned to do as a result of the compromised communications. It does not matter how big a hammer you have, if your opponent knows when and where you plan to use it, that hammer is rendered ineffective. The introduction of the Navajo Code Talkers by U.S. forces effectively secured communications against Japanese Intelligence.
The Navajo Code Talker’s Dictionary is an example of Signal Operating Instructions (SOI). An SOI decreases the time on the net (radio frequency) by shortening the length of messages and, more importantly, allowing the user to communicate in a secure manner on an otherwise insecure net. The complexity of an SOI varies depending on the mission and unit. For instance, the nature of one mission may require a large amount of time when radio communications are forbidden. In other words, the unit needs to maintain radio silence so as not to alert the opposing forces of friendly activity. Some prefer a short SOI with just a few brevity codes, while others prefer a more robust and comprehensive SOI. The contemporary age has afforded advances in cryptology that have made this form of communication all but obsolete. Encrypted radio signals no longer require militaries to code their messages when facing a less technologically advanced enemy. Regardless, there are several instances where this technology can fail or be rendered obsolete. Plus, not everyone has access to top-of-the-line communications equipment. Thus, the study and use of an SOI is still quite valuable; especially in a leadership capacity.
One of the most noticeable traits of good leaders is their ability to communicate effectively. This entails the ability to express their vision through Commander’s Intent (CI) as well as disseminate information under stress. In One Shepherd’s Technical Institute of Leadership, we apply the use of SOI during training to not only shield communications from the Opposing Force (OPFOR), but also to facilitate our student leaders in learning how to communicate effectively under stress. Using an SOI in stressful situations forces the user to condense the message down to its simplest form. Thus, teaching leaders the art of clear and concise communication. In order for leaders to apply the use of SOI, they must first learn its composition and how to employ it.
So what goes into an SOI? Due to the comprehensive nature of this topic, this article will condense the information into five main points; Call Signs, SOI Timeline, Encryption Code/ Authentication Table, Passwords, and Brevity Codes. An example of SOI will help gain a more comprehensive understanding of its use.
Example format of the “required” information in an SOI.
Not every member of the patrol carries a radio, but every member must be familiar with the SOI should they be the one to need to communicate using the radio. Part 1 of this article will focus on the portions that every member of the patrol must be familiar with as they are explicitly non-radio based – the SOI Timeline and Passwords.
SOI Timeline:
This section is rather intuitive. By extensive use of the same SOI, the opposition is allotted the time and repetitiveness to decipher our SOI. Thus, an SOI is only used for a designated time; often 24 hours. In the above timeline, you should observe that the SOI is in effect starting at 071630SNOV14. This is a Date Time Group (DTG) of the form DDHHMMT MM YY. So the first part “07” represents the 7th day. The next four numbers represent the time “1630” or 4:30 P.M. Next we have “S” which is the Time Zone designator for Central Time. “NOV” represents the month of November and finally “14” indicates the year 2014. So putting everything together we get that the date time group is saying that the SOI will go in effect at 16:30 Central time on the 7th of November, 2014.
Passwords:
When linking up with another unit, each other, or simply making contact with another person in the field, it is imperative to immediately identify whether they are “friend or foe”. We do this through Challenge and Passwords. An all too familiar Challenge and Password is that of the Allied forces during WWII – Thunder and Flash. The movie Saving Private Ryan contains several classic examples of passage of lines. Passage of lines is conducted several times with the Challenge and Password to confirm the identity of each other. This film contains a fatal flaw. When giving a challenge and password it would be extremely easy to pick-up the challenge of ‘thunder’ and the password of ‘flash’. The proper (more secure) way of conducting the challenge and password would be to incorporate the two words into a sentence. Using the example table from above, it may look something like this:
Challenge
“Halt! Did you find the Badger in the garden?”
Password
“Nah, but we did locate a Priest so that Joe can go to confession”
The incorporation of the Challenge and Password into a sentences make it less obvious to a spy/ scout/ or enemy nearby. Another important step to this process is to inform the challenger of how many people you have with you so they may count them in. This is a procedure used to maintain a unit head count as well as keep an enemy spy from infiltrating your patrol; however unlikely it may be. Sometimes we know that we are going to make contact with another unit and we do not have the time and luxury of stopping and having this dialogue. In situations like this, we use what we call a running password. When using a running password you continuously yell out the word AND the number of people you have with you. A fellow warrior you are running towards hears you call out the running password, he knows you are friendly and that you are in a hurry. Secondly, he hears you call out a number and he knows how many friendlies are following you. For instance, you hear “Popcorn 5, Popcorn 5…” You know that 5 friendlies are coming in. Any one after that is considered an enemy.
“One, Two, Three, Four, and Five……… wait Six? (BANG!!!)”
The other password you see in the table is the number combination. With the number combination, the sum of the challenge and password must equal the designated number. Above we have the number combination of “Five”. The challenge can be anything less than five and the password has to be the number that creates the sum of five (i.e. – Challenge “2”, so Password is “3”; 2+3 = 5). While not necessarily required, you should incorporate these numbers into a sentence similar to the Challenge and Password from before. Using the same number combination, 5, it may look something like this:
Challenge
“Halt! Did you get those 4 apples I asked for?
Password
“Yes, and I found 1 raccoon too!”
Here we can see that 4 and 1 add to make 5, thus completing the number combination. While you can standardize when, or even if, you use each type of password, the general rule of thumb is that number combinations are used behind enemy lines and the Challenge and Password is used behind friendly lines.
Conclusion: Part 1
Every member of the patrol should be familiar with the Timeline and Password portions of the SOI. These basic building blocks should be rehearsed prior to step off and the patrol leader should quiz the members of the patrol on these two areas during the pre-combat inspection (PCI). Without these communication control measures in place, the entire operation can be compromised should an enemy sneak into your patrol. Even worse is avoidable fratricide. Learn and practice these basic concepts first, and you’ll be well on your way to maintaining solid communications with your team.