12. In the event detection is unavoidable, operators must implement
Operators must continue operating and must never reveal an awareness of
enemy jamming; therefore, making it difficult for the enemy to determine the
success of his efforts.
Your unit SOI contains a list of ECCM in the
supplemental instructions.
13. The following checklist is a guide for use in determining radio
exists when the answer to all of the following questions is negative.
a. Is radio silence being violated?
b. Is
unofficial
conversation
(chatter)
being
exchanged
between
operators?
c. Are transmissions taking place in a directed net without permission?
d. Is the operator's personal sign being transmitted?
e. Are call signs being compromised by their association with plain
language unit designations?
f. Is plain language used instead of authorized prosigns and operating
signals?
g. Are the operators using unauthorized and incorrect procedures?
h. Do unnecessary transmissions occur?
i. Is the identification of units and individuals being disclosed in
transmissions?
j. Are calls being transmitted excessively?
k. Are transmitting operators sending too fast for receiving operators?
l. Is excessive transmitting power being used?
m. Are transmitters being tuned with the antenna connected?
n. Is excessive time consumed in tuning, testing, changing frequency,
and adjusting equipment?
o. Are authentication requirements and procedures being violated?
18