routes of communications. With enough routes, the loss of one or more will
not seriously degrade the overall system. Figure 3 shows the three possible
The straight-line method provides no alternate
The grid method allows as many alternate routes as can be planned
Enemy forces can extract
vital information from friendly
friendly forces should not have any
sort of communications pattern.
constant) should also be practiced.
sent can tell enemy analysts what
type of mission friendly forces are
Introducing false messages on a
random basis can prevent an enemy
from detecting operations. This is
especially true during periods when
actual message traffic decreases.
Properly using and enforcing signal
operation instructions (SOI) can
Whatever method is used
needs to be carefully planned and
fully integrated into the unit's
OPLANs and OPORDs.
Figure 4-3. Deployment
type of equipment used and its
methods when planning ECCM. To make
communications more secure, use:
(1) Low power until you must use high power.
(2) Frequency hopping to deny interception from enemy forces.
(4) Spread spectrum techniques to suppress interference and provide
multiple access for other users.
communications routes. These must be planned and exercised before engaging
an enemy. This can stop them from setting up a database on primary friendly
It can also help to maintain the primary communication
means available to the tactical commander.
Replacement actions must be
carefully planned, coordinated, and integrated into the units OPLAN or