c. Battlefield spectrum management. Battlefield spectrum management is
the systematic planning, engineering, coordinating, allotting assets for,
and managing the radio frequency (RF) spectrum.
Systems to support the
commander in the ALB rely on the RF spectrum - a limited resource. Without
proper management, the RF spectrum will reach the saturation point and
seriously degrade mission performance.
The user's operational needs
determine battlefield spectrum requirements. After RF spectrum requirements
are identified, the signal officer obtains the needed frequencies, matches
the frequencies to the requirements, distributes the frequencies to the
user, and evaluates and optimizes frequency use. Spectrum management is a
The spectrum requirements are identified at
The frequency support request is forwarded up through
spectrum management channels to the level where resources are available to
the same channels to the user. Due to the large number of systems competing
for limited frequencies, requirements must be prioritized and frequencies
may be allocated at a less-than optimum level.
Coordination is also
required by the spectrum manager with intelligence operations to prevent
have minimum adverse effect on friendly operations.
d. Software management. Software management is the control of software
version updates, ensuring software security, and establishing policies and
procedures pertaining to software use.
The signal officer is responsible
for providing staff supervision of software management and advising the
The user is responsible for
coordinating his internal policies and procedures with the Signal Officer.
Information security management
consists of the measures taken to control and protect classified and
unclassified information from unauthorized disclosure, interruption and
These measures include physical and electronic procedures.
also provides for measures to be taken for expected threats from computer
(1) Physical security includes all measures to safeguard classified
(3) Emission security includes protection against interception and
electronic analysis of compromising emanations.