AFRICA C4 Handbook

 AFRICA
C4
Handbook
COMMAND, CONTROL, COMMUNICATIONS,
AND COMPUTERS HANDBOOK
TABLE OF CONTENTS
C4 HANDBOOK INTRODUCTION .....................................................................3
Purpose ....................................................................................................................................... 3
Authoritative Documents .......................................................................................................... 3
Organization .............................................................................................................................. 3
Use............................................................................................................................................... 3
Version Information .................................................................................................................. 3
Disclaimer .................................................................................................................................. 4
Mission Planning Purpose ........................................................................................................ 5
Organizational Chain of Command ......................................................................................... 5
Africa Endeavor 2013 Network Diagram ................................................................................ 5
Mission Planning Procedures ................................................................................................... 6
Frequency Requests ................................................................................................................. 6
Mission Planning Gaps ............................................................................................................. 8
Commander’s Critical Information Requirements (CCIR) ..................................................... 8
Cyber Planning and Information Assurance ............................................................................ 9
MISSION EXECUTION .......................................................................................16
Mission Execution Purpose .................................................................................................... 16
Mission Execution Procedures ............................................................................................... 16
Source Document References ................................................................................................ 16
Routine Reporting.................................................................................................................. 16
Battle Rhythm ........................................................................................................................ 17
Communication Status Report ............................................................................................... 18
Incident Reporting ................................................................................................................. 18
Meaconing, Intrusion, Jamming, and Interference (MIJI) Reporting.................................... 20
Mission Execution Gaps ......................................................................................................... 21
Master Station Log (MSL) .................................................................................................... 21
“P.A.C.E.” Plan ..................................................................................................................... 21
Radio Procedures ................................................................................................................... 22
Radio Guard Chart ................................................................................................................. 27
Last updated: 23 July 2013
1
Cyber Operations and Information Assurance ...................................................................... 27
Brevity Codes ........................................................................................................................ 29
Information Compromise ...................................................................................................... 29
SIGNAL ANNEX ...................................................................................................31
Signal Annex Purpose ............................................................................................................. 31
Signal Annex Instructions ...................................................................................................... 31
Signal Annex Appendix Instructions ..................................................................................... 33
C4 HANDBOOK TABS ........................................................................................40
Tab 1 – CIS Connection Process ............................................................................................ 40
Tab 2 – Connection Authority Memorandum ...................................................................... 41
Tab 3 – System Architectural Description ............................................................................ 42
Tab 4 – Incident Response Form ........................................................................................... 4
Tab 5 – COMSTAT Report .................................................................................................... 4
Tab 6 – Authority to Connect Form ...................................................................................... 4
Tab 7 – Frequency Request Form ......................................................................................... 4
Tab 8 – Master Station Log Template ................................................................................... 4
Tab 9 – LOGSTAT Template ................................................................................................ Tab 12 - PERSTAT Template................................................................................................. Last updated: 23 January 2015
2
C4 HANDBOOK INTRODUCTION
Purpose
The purpose of the Africa Command, Control, Communications, and Computers
(C4) Handbook is to organize C4 efforts amongst the multiple nations participating in the International
exercises. In this handbook you will find critical Standard Operating Procedures (SOP)
that should be considered and implemented to ensure success for this, and any other, exercise or
operation.
Authoritative Documents
The Africa C4 Handbook was compiled as a supplement to the African Standby Force
Command Information Systems manual, the African Union Peace, Security, Operations Division
SOP, and the African Standby Force SOP.
Organization
The C4 Handbook is organized into four sections. The first two correlate with the phases of the
exercise – Mission Planning and Mission Execution. Each of the exercise phases is further
broken down into two sections – exercise procedures and gaps identified in those procedures.
The last two sections include the Signals Annex and a “Tabs” section that includes a number of
templates to help document some of the processes outlined in the Handbook.
Use
The C4 Handbook will serve multiple purposes. It will serve as an additional source document
for exercises, listing procedures, report template, signal annex, etc. It is also
designed as a quick reference guide for procedures listed in the other source documents, as
outlined in the “Mission Execution” paragraph. Finally the C4 Handbook will be provided to the
participating countries’ to use as a reference guide in support of their host nation communications
planning initiatives.
Version Information
This document was last updated on 23 January by AFRICOM J691 Division
Revisions:
23 July, Added network and organizational chain of command diagrams
22 July, Added prowords, guard chart procedures, Master Station Log, frequency request process
& form, disclaimer, conducted final review
5 July, Added inputs from Cyber/IA working group
17 June, Included description of CCIRs, Brevity Codes, Battle Rhythm Reports
7 June, Added sections for the brevity codes and APAN use
Last updated: 23 January 2015
3
Disclaimer
In order to use the hyperlinks that link to documents outside the C4 Handbook, you must save
the documents in the same folder as the C4 Handbook. The documents are named to correspond
with their location in the C4 Handbook (“Tab 4 – Incident Response Form.pdf”) to help identify
which documents need to be downloaded (ex. If the C4 Handbook is on the desktop, all
associated documents need to be as well for the links to work).
Document Modifications
This is a living document. As such, comments, concerns, and recommendations can be provided
to the following individuals at any time:
AFRICOM J69 – [email protected]
Last updated: 23 January 2015
4
MISSION PLANNING
Mission Planning Purpose
To ensure the most effective outcome for an exercise, proper planning must be considered prior
to execution. While every possible scenario and branch plan cannot be identified, there are a
number of contingencies to consider based on prior experiences from real world operations and
exercises. The information below will help planners better plan for any requirement.
Organizational Chain of Command
In any organization, it is extremely important to understand the chain of command and the
organization structure. Included below is the organizational chart for AE13 and can be used as a
template for any similar requirement.
Network Diagram
Understanding the layout of the network is extremely important in any operation or exercise that
involves C4. The example below is the network diagram for AFRICA ENDEAVOR13 and can be used
as a template for any similar requirement.
Last updated: 23 July 2013
5
Mission Planning Procedures
Frequency Requests
It is extremely important to deconflict frequencies prior to an operation or exercise. If proper
planning is not considered for frequency requests, the exercise or operation could be jeopardized
by interference from pre-existing authorizations or future authorizations. The steps below
provide the basic steps required to request frequencies. It is important to note that while this is
the process for AE13, it varies depending on the country the operation or exercise is in. Consult
your frequency manager or higher headquarters to ensure proper procedures are being followed.
1) Complete frequency request form (C4 HANDBOOK TABS - Tab 7) and submit it to the
AU
2) AU will engage with Host Nation and deconflict available frequencies
3) Host Nation will provide requested frequencies, if available, to AU
4) AU will provide frequencies to requesting entity
It is important to start discussion on frequency requests as early as possible. Frequencies may
not be available due to conflicts, and the planners must have time to deconflict with the host
nation to work out a plan that will allow their equipment to operate. Instructions for filling out
the frequency request form (C4 HANDBOOK TABS - Tab 7) are found below:
Section 1) Request a specific number of frequencies within a band.
Last updated: 23 January 2015
6
•
Example: “6 HF frequencies”
Section 2) Enter beginning and ending date frequency will be used (day-month-year).
•
Example: “01 Jan 2013 TO 31 Jan 2014”
Section 3) For Air to Ground to Air and Air to Air requirements only, enter:
•
•
•
Desired geographical clearance in nautical miles in 3 digits including leading zeros
The service height to be protected in thousands of meters in 3 digits
Example: “0.50NM / .3M”
Section 4) Enter:
•
•
•
•
Transmitter location(s) or area
Country code
Specific geographical coordinates
Example: “Lusaka / ZM / 154167S 282833E”
Section 5) Enter:
•
•
•
•
Receiver location(s) or area
Country code
Specific geographical coordinates
Example: “Lusaka / ZM / 154167S 282833E”
Section 6) Enter the appropriate abbreviations for the class of station (fixed base, mobile,
aircraft).
•
Example: “Fixed Base / D”
Section 7) Enter the necessary bandwidth and modulation type .
•
.5kHz, FM
Section 8) Enter:
•
•
•
Letter for the type of power (M=Mean, P=Peak)
Power expressed in dBW
Example: “M / 30 dBW”
Section 9) Enter:
•
•
Antenna gain in dBi
Direction of maximum radiation
Last updated: 23 January 2015
7
For R/R and VHF land/mobile enter the following additional information:
•
•
•
•
•
Polarization
Height above ground
Elevation above main sea level
Horizontal halfpower beamwidth
Example: “03 / 090 / V / 020C / 30m / 60.0 / 60.0
Section 10) Enter the “from” and “to” hours in 4 digits.
•
Example: “0000 / 2359”
Section 11) Enter:
•
•
•
Tuning range of the system,
Tuning increments
Example: 2mHz – 30mHz / .01mHz
Section 12) Enter the type of operation.
•
Example: “S”
Section 13) Enter the date by which frequency is required.
•
Example: “10 Jan 2013”
Section 14) Enter:
•
•
Any necessary information which could not be fitted in points 1 to 14A.
Name of the POC, contact information, and address
Mission Planning Gaps
Throughout the authoritative documents, there are procedures that can be improved upon. These
are defined as “gaps” in this document. The information below will help improve the mission
planning capability to achieve a more successful operation or exercise execution.
Commander’s Critical Information Requirements (CCIR)
In every operation or exercise, there is certain information the Commander will want regular
updates on. This information will be different for each Commander as well as each event. The
CCIRs facilitate timely decision making that enables successful mission accomplishment.
CCIRs should be defined as early as possible in the event and may be refined by the Commander
as the situation changes.
Last updated: 23 January 2015
8
Some examples of CCIRs are:
1)
2)
3)
4)
5)
6)
Arrival of critical supplies
Initial Operations Capability (IOC)
Network setup at 75%
Full Operations Capability
Loss of ventilation/air conditioning in the server area
Less than 50% spare parts in inventory
The CCIRs utilized during AE13 are located in the PSOD Operations Centre Standard Operating
Procedures on page 19.
Cyber Planning and Information Assurance
System Configuration
Prior to any system being connected to the op network, the baseline security configuration must
be implemented. Due to the high volume of vulnerabilities that exist, it is vital to ensure
protection of these assets.
To ensure all systems and OSs are maintained, minimize threat of known vulnerabilities to the
system, and limit unauthorized access to the data, the following configuration from AE should be
followed:
1) OS Requirements
• The OS baseline is Windows Server 2008 for servers and Windows 7 for
workstations
• All deviations to this standard need to be reported to the unit Information Assurance
(IA) Officer
2) Patching/Service Pack
• Systems should have the latest OS patch/service pack and/or hot fixes installed
3) Ports and Running Services
• Ports and running services which are NOT necessary for the exercise, should be
deactivated
• Port Security will be implemented on all devices to ensure only authorized devices
access the network
4) Accounts
• All system default accounts must be disabled, deleted, or renamed and new passwords
must be assigned
• System administrators shall have specific accounts assigned that belong to the
appropriate administrator groups
• The system administrator standard user accounts should not be assigned to privileged
users groups
• The default administrator account should be deleted
• The privileged system administrator accounts should not be used to surf the web or
allow email access
Last updated: 23 January 2015
9
All non-essential accounts should be disabled
All accounts should be password protected
No generic or anonymous LAN accounts will be allowed
Screensavers should be set to automatically engage after 5 minutes of idle
workstation and/or server inactivity
• Screensavers should require password verification before allowing re-use of the
workstation and/or server
• Users should be required to lock their workstations when their workstation is
unattended
Session Controls and Requirements
• All systems (workstations, servers, multi-function devices) shall establish and enforce
network session controls that define rules and conditions
• SESSION LOCK - All systems, network and/or applications, used to process, store,
or transfer data shall automatically initiate a session/screen lock after a limited period
of inactivity, not to exceed 10 (ten) minutes. This must remain in effect until the user
re-establishes access using appropriate identification and authentication
• SESSION TERMINATION - All remote access networked sessions and public facing
applications requiring a logon must automatically TERMINATE the connection after
an inactivity timeout of 10 (ten) minutes. The user must provide appropriate
identification and authentication to reestablish the connection
• Access to, and interconnections with, AE networks from external networks and
systems shall occur through controlled and approved interfaces
Least Privilege Access Controls
• User privileges should be limited to only permit the user to do their job and perform
required mission tasks
Media
• All media used or connected to a working network, must first be approved by
the unit’s senior communications officer
• All USB devices and CD must be virus scanned by a standalone system prior to
connecting to a working Network
Classification
• All information and information systems should have a designated classification
The designated classification can be UNCLASSIFIED
•
•
•
•
5)
6)
7)
8)
•
Identification and Authentication Management
As the complexity and residual risk of Communication and Information Systems (CIS) increase,
the need for identification and authentication of users and processes becomes significant.
Identification and authentication controls are required to ensure only authorized users with a
need-to-know obtain access to the CIS and its information. These measures include Unique
Identification, Logon, Data Controls, Identification Management, and Authentication Method
Protection.
Last updated: 23 January 2015
10
1) Unique Identification and Password:
• Each user must possess a unique user name or token for logon that identifies that
individual
• Users must prevent disclosure of unique identification to non-users
• Group accounts are not authorized logon ability
• Users may not log on with other users’ identification
2) Data Controls
• Each user must be granted permissions to access information and systems
• User shall not attempt to access systems or information to which they have not
received specific authorization
• Data owners are responsible for determining and authorizing users’ access to their
information by using operating system data controls
• System owners are responsible for determining and authorizing users’ access to their
equipment and networks
3) Identification Management
• User accounts must have an expiration date commensurate with the system,
information, and employment requirements
• Users requesting accounts must present valid identification documents before release
of account information to the user
4) Authentication Method Protection
• Each unique user account must possess a strong password for authentication to the
systems and network. Passwords should have at least: 8 characters, 1 upper case, 1
lower case, 1 special character
• Users may not share authentication information with other personnel including
systems administrators
• All administrator passwords should be written down, placed in a shielded envelope
and stored in a protected location where only authorized personnel have access. This
precaution is for emergency situations where the password must be obtained for
network continuity
5) Policy Compliance
• Validation of compliance to this policy will be performed by IA personnel through
manual review of administrator configuration or automated scan
Audit Capability
Underlying requirements
Security auditing involves recognizing, recording, storing, and analyzing information related to
relevant system activities. The audit records can be used to determine which activities occurred
and which user or process was responsible for them. Auditing information involved in Cyber
investigations must be made available to the Cyber personnel. All systems that handle
confidential information, accept network connections, or make access control (authentication and
authorization) decisions shall record and retain audit-logging information sufficient to answer the
following questions as best as possible:
Last updated: 23 January 2015
11
1) What type of activity was performed? (reading email, accessing network, configuring
router, etc…)
2) Who, or what process, performed the activity?
3) Where, or on what system, was the activity performed?
4) When was the activity performed?
5) What tool(s) was the activity performed with? (metasploit, equipment jamming, etc…)
6) What was the status (ex. “successful”, “failed”), outcome, or result of the activity?
Activities to be logged
Logs shall be created whenever any of the following activities are requested to be performed by
the system:
1) Create, read, update, or delete confidential information, including confidential
authentication information such as passwords
2) When a Network connection is initiated or ended
3) Accept a network connection
4) User authentication and authorization for activities covered in 1) such as user login and
logout
5) Grant, modify, or revoke access rights, including adding a new user or group, changing
user privilege levels, changing file permissions, changing database object permissions,
changing firewall rules, and user password changes
6) System, network, or services configuration changes, including installation of software,
patches and updates
7) Application process startup, shutdown, or restart
8) Application process abort, failure, or abnormal end, especially due to resource exhaustion
or reaching a resource limit or threshold (such as for CPU, memory, network
connections, network bandwidth, disk space, or other resources), the failure of network
services such as DHCP or DNS, or hardware fault;
9) Detection of suspicious/malicious activity such as from an Intrusion Detection or
Prevention System (IDS/IPS), anti-virus system, or anti-spyware system
Elements of the log
Logs should identify or contain the following elements at a minimum:
1) Type of action – examples include authorize, create, read, update, delete, and accept
network connection
2) Subsystem performing the action – examples include process or transaction name,
process or transaction identifier
3) Identifiers (as many as available) for the subject requesting the action – examples include
user name, computer name, IP address, and MAC address. Note that such identifiers
should be standardized in order to facilitate log correlation
4) Identifiers (as many as available) for the object the action was performed on – examples
include file names accessed, unique identifiers of records accessed in a database, query
parameters used to determine records accessed in a database, computer name, IP address,
Last updated: 23 January 2015
12
5)
6)
7)
8)
and MAC address. Note that such identifiers should be standardized in order to facilitate
log correlation
Before and after values when action involved updating a data element, if feasible
Date and time the action was performed, including relevant time-zone information if not
in Coordinated Universal Time
Whether the action was allowed or denied by access-control mechanisms
Description and/or reason-codes of why the action was denied by the access-control
mechanism, if applicable
Formatting and storage
The system should support the formatting and storage of audit logs in such a way as to ensure the
integrity of the logs and to support analysis and reporting. Note the construction of a log
management mechanism is outside the scope of this document. Mechanisms known to support
these goals include, but are not limited to, the following:
1) Local Windows logs or local server/system logs will be used to capture data as required
by this appendix
2) Systems should be set to capture at least 8Mb of historical logs
3) Logs kept in a well-documented format sent via syslog, syslog-ng, or syslog-reliable
network protocols to a centralized log management system
4) Logs stored in a database that itself generates audit logs in compliance with the
requirements of this document
Continuity of Operations (COOP) Plan
Brigades need to identify the critical CIS and the critical information that supports the mission.
A COOP needs to be established for all critical CIS meeting all identified requirements
(Operation Requirements, System Backup, System Recovery, Contingency Plan, and Physical
Relocation).
Operation Requirements
Critical CIS need alternate power source ensures (APS) so the system availability is maintained
in the event of a loss of primary power. An APS can also provide a time to perform the
procedures for orderly system shutdown to ensure no loss of data.
System Backup
Critical CIS need to establish procedures for the regular backup of the OS, applications, and
information to ensure continuity of operations. The periodic checking of backup inventory and
testing of the ability to restore information validates that the overall backup process is functional
and adequate. Procedures must be created for the backup to include where the data will be stored
and how it will be provided to the Cyber IA representative.
Last updated: 23 January 2015
13
System Recovery
System recovery addresses the functions that respond to failures or interruptions in operations.
Recovery shall ensure systems are returned to a condition where all security-relevant functions
are operational or system operation must be suspended.
Procedures must be created for the recovery of critical CIS and provided to the Cyber
representatives. Periodic testing of recovery procedures is required to ensure effectiveness. If
any abnormal conditions arise during recovery, the IS shall be accessible only via terminals
monitored by the Cyber representative.
Contingency Plan
A contingency plan is a plan that must be put in place prior to any potential emergencies. It
allows organizations to handle possible future emergencies and continue operations. It pertains
to training personnel, performing backups, preparing critical facilities, and recovering from an
emergency or disaster so operations can continue.
Any continuity operation requirements for the critical CIS that can’t be fulfilled, such as not
having an alternate power source, should be documented in the Connection Authority (CA)
memorandum (C4 HANDBOOK TABS - Tab 2).
Physical Relocation
Due to unforeseen events (flood, power outage, impending attack, etc…), it may be necessary to
relocate to an alternate location to conduct operations. It is important to designate an alternate
facility prior to the operation or exercise and ensure critical services (comm, power,
heating/cooling, etc…) have been tested prior to relocating.
Physical Security and Visual Access
Physical security is every user, every person, and every nation’s responsibility. Safeguards shall
be established that deter, detect, and prevent unauthorized access to any CIS as well as any
unauthorized modification of the CIS hardware and software. Any personnel who do not have a
“need to know” and who are not cleared for access need to be escorted and supervised while in
the area of CIS. Any device that displays information in human-readable form shall be
positioned to prevent unauthorized personnel from reading the information (i.e. shoulder
surfing).
Malicious Code Prevention
Policies and procedures should be implemented to detect and deter incidents caused by malicious
code, such as viruses or unauthorized modification to software.
Last updated: 23 January 2015
14
1) Antivirus software
• Each system should run antivirus software. Open Source Anti-virus software should
be used, at a minimum, with licensed software being preferred
• Antivirus software should be updated manually or automatically daily
• Centralized antivirus management should be used when possible
2) Host Based Intrusion Detection
• User systems should have comprehensive security software installed
• Users, other than administrators, should not change configurations of the information
system
3) Software Configuration
• Software should be configured using the manufacturer’s recommendation applying
the most stringent security setting that allows required functionality
• Software should be configured to fail secure
4) Patch Management
• System administrators should apply all published patches to installed software within
72 hours of release
• Whenever possible, patches and updates should be tested in a laboratory environment
which resembles the operational network
• When possible, systems administrators and Cyber personnel should register with all
installed software manufactures for notification of available patches, updates, and
security concerns
• Patches, updates, and other essential files should only be downloaded from vetted
sources such as a manufacturing vendor or Government agency. No third party
download site may be used for downloading patches or updates
5) Administrator Rights
• Users logged on with administrator rights should not access the internet. Whenever
possible, administrator accounts should be configured to deny internet access
• Administrators should possess limited user accounts (LUA) for daily activity which
does not involve administration of devices or networks
• Patches, updates, and other files downloaded from the internet should be executed
using LUA; not administrator accounts
Authority to Connect
Prior to any CIS being connected to the operational network the connection process needs to be
completed. The steps in the connection process are below:
1) Full IA review of the device
2) Authority to Connect form completed (C4 HANDBOOK TABS - Tab 6)
3) Complete the requirements outlined in the system architectural description tab (C4
HANDBOOK TABS – Tab 3)
4) Member provides CA Memo (C4 HANDBOOK TABS - Tab 2) and other
documentation to the Cyber personnel for review
5) Memo is forwarded to the EMB Approving Official (AO) and/or Delegation Chief
Last updated: 23 January 2015
15
6) The EMB AO or Delegation Chief approves request and coordinates signature from
National or organization security accreditation authorities
Cyber personnel will assist the EMB AO in reviewing any CAs.
MISSION EXECUTION
Mission Execution Purpose
Even the most well-planned exercise will face some unforeseen events. This section contains
both the SOPs for exercise execution as well as some procedures and templates to successfully
report and overcome contingency operations.
Mission Execution Procedures
Source Document References
There are multiple authoritative documents utilized during exercise and real-world operations in
Africa. These documents contain multiple procedures to ensure different countries and forces
operate the same way. The list below is not all inclusive, but contains the majority of the
mission execution procedures listed in each document with a reference to the procedures’
descriptions.
African Standby Force Command Information Systems Manual
No defined procedures
African Union Peace, Security, Operations Division SOP
Incident Reporting – Page 6, section 1.4 and 1.5
Duty Officer Watch Log – Page 27
Maintenance and Preventive Maintenance Log – Page 30
Daily Situational Report – Page 31
African Standby Force SOP
Frequency Document Management - Adobe Acrobat page 386
Communications Security – Adobe Acrobat page 387
Virus Reporting – Adobe Acrobat page 395
Security Incident Reporting – Adobe Acrobat page 154
MIJI Reporting – Adobe Acrobat page 398
Radio Etiquette – Adobe Acrobat page 404
Transmission Procedures – Adobe Acrobat page 405
Routine Reporting
Routine reporting is essential for the success of an operation or exercise. There are numerous
reports due daily to various organizations. The battle rhythm for reports and report templates are
Last updated: 23 January 2015
16
found below with brief descriptions of each. Additionally, each report can be sent electronically
as an email attachment, printed and faxed, or conveyed over a voice medium.
Battle Rhythm
The Battle Rhythm is the sequencing of standardized command and control activities within a
headquarters and throughout the force to facilitate effective command and control. It establishes
the time, frequency, and type of meetings, working groups, boards, and other events, as well as
who attends them. Reports, briefings, meetings, and working groups all require input and
preparation. Additionally, the outputs of certain working groups are inputs for other working
groups. The battle rhythm accounts for such requirements. Staff officers and subordinate units
require a schedule to prepare for each C2 event.
The chart below indicates a typical Battle Rhythm reporting timeline. The respective staff
organization is responsible for generating and submitting their report at the scheduled reporting
time. For example, the COMSAT, or the Communications Status, report is generated by the
Signal (J6) representative. For AE purposes, the following reports listed below (PERSTAT,
LOGSTAT, and LOGREP) will not be required to be generated, however, a fabricated report
will be provided to the member representing each organization for submission at the
scheduled reporting time.
PERSTAT (Personnel Status Report prepared by the personnel staff or the J1) captures military
and civilian personnel who are present for duty, Soldiers on R&R or emergency leave, those
TDY in CONUS, etc. The PERSTAT provides "boots on the ground" numbers and reflect all
civilians (DoD and contractors) and all Service members from each military service who are
assigned, attached, or are under operational control and present in the theater of operations at the
time of the report.
LOGSTAT (Logistic Status Report prepared by the logistics staff or the J4) is submitted to
higher headquarters for the purpose of keeping the Commander informed of the logistics status
of deployed forces. The report will focus on supply status in deployment, equipment status,
shortages and maintenance deficiencies
LOGREP (Logistics Report) takes into account the general logistics situation within the
missions. Based on the information collected, the head of administration or equivalent will draft
a daily LOGREP to HQ.
SITREP (Situation Report) is a report sent by an element to another high or lower element to
inform of its situation. There exist multiple versions and alterations of the SITREP that are used
in various forces and at various levels. It provides a detailed overview over the unit’s entire
situation including location, activity, combat effectiveness, disposition, intelligence and
reconnaissance, logistics, communications and status of personnel.
Last updated: 23 January 2015
17
Sample Battle Rhythm Reporting Timeline
Repot Name
Time Due Current As Of
COMSTAT
0900
0800
LOCSTAT
0900
0800
PERSREP
1100
0800
LOGREP
1200
0900
SITREP
1300
1000
COMSTAT
1200
0900
PERSREP
1400
1100
LOGREP
1500
1200
SITREP
1600
1300
INTSUM
1600
1300
From
BN HQ
BN HQ
BN HQ
BN HQ
BN HQ
AMICA BDE HQ
AMICA BDE HQ
AMICA BDE HQ
AMICA BDE HQ
AMICA BDE HQ
To
AMICA BDE HQ
AMICA BDE HQ
AMICA BDE HQ
AMICA BDE HQ
AMICA BDE HQ
AU PSOC
AU PSOC
AU PSOC
AU PSOC
AU PSOC & BN HQ
Communication Status Report
The COMSTAT report is used to track the current status of all communication capabilities. The
sample and electronic copy of the COMSTAT Report are located in C4 HANDBOOK TABS –
Tab 5.
With the attached COMSTAT Report, a commander has the ability to modify the report to track
any and all capabilities they wish. The individual filling out the report simply has to enter the
system name in the “Status of” line and indicate the status.
As indicated on the report, a status of “G”, or “green”, indicates the system is fully operational
with no issues to report. A status of “A”, or “amber”, indicates the system is running, but at a
degraded capability. A status of “R”, or “red”, indicates the system is not operational at that
time. Finally, a status of “B”, or “black”, indicates no capability or equipment exists to meet the
requirement.
Alternate Methods of COMSTAT Reporting
If electronic capabilities (ie. computer connected to internet) do not exist, the information can be
transmitted via voice by following the instructions below:
Transmission Line 1: “COMSTAT”
Transmission Line 2: Name of reporting organization
Transmission Line 3: Date Time Group (DDHHYY)
Transmission Line 4: System name and status
Transmission Line 5: System name and status
….complete list of systems and their respective statuses….
Transmission Line 6: Status details for any systems not “G”, or fully operational, as required
Incident Reporting
Not all reports will have a due date and time. Some reports will be generated based on an
unforeseen event. The “Incident Response” form is used to capture any C4 incident. Examples
of an "incident" include, but are not limited to, C4 outage, denial of service, virus detection,
Last updated: 23 July 2013
18
intrusion detection, unauthorized device, and espionage. The date and time are EXTREMELY
important and must be included in the report. Include as many details about the event as possible
to ensure appropriate action can be taken
Participants will report security incidents or suspicious activity to their IA representative. As
incidents are resolved, the report will be updated and closed. The Cyber Working Group will
review events, develop responses, and provide analysis associated with the reported incident.
Incident Response Process:
1) Upon detection, the user will disconnect the computer from the network
2) The user will contact the Brigade Cyber Operations Officer
3) Fill out the Incident Response form and provide it to the Cyber IA working group
4) Cyber IA working group will investigate the incident
5) Remove any vulnerabilities identified in the investigation, conduct any refresher training
required, develop a closing report
6) Submit report to Brigade Commander, the EMB, and the Exercise Director
Instructions for filling out the Incident Response form:
1) “From:” field: This is the organization or unit sending the incident form
2) “DTG” field: This includes the date and time the report is being sent in the following
format DDHHmmZMMMYY (ex. 051649ZJUL13
3) “To:” field: This is the organization or unit needing to take action on the incident
4) “Info:” field: This is the organization or unit needing information only about the event
5) “Subject” field: This field contains details about the type of event. This should be as
descriptive as possible (ex. “Virus on the Brigade Commander’s computer” or “HF
interference”)
6) “DTG of Incident” area: This should include the date and time the incident occurred in
the following format: DDHHmmZMMMYY (ex. 051649ZJUL13)
7) “Priority of Incident” area: This should indicate how important the incident is. If the
incident impacted a large # of people or has a significant impact on an operation, it will
have a higher priority than an incident that only impacts a few people and low impact on
an operation (ex. “Serious”, “Medium”, “Low”)
8) “Impact of Incident” area: This section explains the impact the incident has on the
operation (ex. “3 machines are infected by a virus” or “Brigade to Battalion comms are
inoperable”)
9) “Description of Incident” area: This section explains what happened during the incident.
(ex. “HF antenna collapsed during high winds”)
10) “Actions Taken” area: This section explains what actions have been taken to alleviate the
incident. (ex. “2 of 6 antennas have been erected, but 4 remain down due to damage to
the antennas”)
Last updated: 23 January 2015
19
11) “Internal Distribution” field: This section includes any internal organization that needs to
receive the message.
12) “Drafted By” field: This is who filled out the report
13) “Releasing Officer” field: This is who reviewed and authorized the report for release
The electronic copy of the Incident Response form is located in C4 HANDBOOK TABS – Tab
4.
Incident Response Form Uses
The Incident Response form can be used for a number of different incidents. Most of the areas
on the form are standardized, but it is important to capture specific information in the
“Description of Incident” for Cyber Incidents (see “Cyber Incident Management” below).
When dealing with a cyber incident (ex. Denial of Service, Virus Attack, Espionage,
Unauthorized Access), the following information must be included in the “Description of
Incident” area:
1) The name and type of device involved
2) How the incident was detected
This information will help the technicians troubleshoot the issue and ensure they take the proper
initial actions prior to taking any further steps toward resolution.
Alternate Methods of Incident Reporting
If electronic capabilities (ie. computer connected to internet) do not exist, the information can be
transmitted via voice by following the instructions below:
Transmission Line 1: “Incident Report”
Transmission Line 2: Severity of Incident (Serious, Medium, Low)
Transmission Line 3: Date Time Group (DDHHYY)
Transmission Line 4: Member Reporting Incident (Rank & Name)
Transmission Line 5: Member’s Organization
Transmission Line 6: Member’s Phone #
Transmission Line 7: Member’s Email Address
Transmission Line 8: Description of the Incident
Transmission Line 9: Actions Taken
Meaconing, Intrusion, Jamming, and Interference (MIJI) Reporting
MIJI reporting provides the information needed to adequately inform the Mission
Communication Branch of an incident in a timely manner. It is used to make evaluation of
opposing forces actions or intentions easier, and to provide data to implement appropriate
measures.
Last updated: 23 January 2015
20
MIJI incidents are submitted using the Incident Response form, located in C4 HANDBOOK
TABS – Tab 4. Ensure the term “MIJI” is included in the subject field to alert the receiving
organization of the type of indecent.
Alternate Methods of MIJI Reporting
If electronic capabilities (ie. computer connected to internet) do not exist, the information can be
transmitted via voice by following the instructions below:
Transmission Line 1: “MIJI Report”
Transmission Line 2: Reporting Organization
Transmission Line 3: Location
Transmission Line 4: Start Date Time Group (DDHHYY)
Transmission Line 5: End Date Time Group (DDHHYY) if applicable
Transmission Line 6: Equipment
Transmission Line 7: Frequency/Range (if unclassified)
Transmission Line 8: Interference Details
Mission Execution Gaps
Throughout the authoritative documents, there are procedures that can be improved upon. These
are defined as “gaps” in this document. The information below will help improve the mission
execution for operations and exercises.
Master Station Log (MSL)
An MSL is used to track any actions that occur at a specific station throughout the day. The
MSL can be used to refer back to any time a question arises as to what happened throughout
someone’s shift. It is also a good tool to use during shift turnover to ensure any items requiring
action are turned over to the incoming shift. A sample MSL is located in C4 HANDBOOK
TABS - Tab 8.
“P.A.C.E.” Plan
A “P.A.C.E.” plan outlines the different capabilities that exist and aligns them into four
categories - primary, alternate, contingency, and emergency - based on their ability to meet a
defined requirement. Each is explained in more detail below:
Primary: The normal or expected capability used to achieve the objective.
Alternate: A fully satisfactory capability used to achieve an objective which can be used with
minimal impact to the operation or exercise. This capability will be used when the primary
capability is unavailable.
Contingency: A workable capability used to achieve the objective. This capability may not be as
fast or easy as the Primary or Alternate, but is capable of achieving the objective with an
Last updated: 23 January 2015
21
acceptable amount of time and effort. This capability will be used when the primary and the
alternate capabilities are unavailable.
Emergency: This is the last resort capability and typically may involve significantly more time
an effort than any of the other capabilities. This capability should only be used when the
primary, alternate, and contingency capabilities are unavailable.
In order to effectively use a “P.A.C.E.” plan, a planner must establish, prior to the operation or
exercise, what capability exists in each category. Remember there may not always be four
different capabilities to support one requirement.
An example of a “P.A.C.E.” plan for unsecure voice might look like the example below:
Primary
Commercial Telephone
Unsecure Voice
Alternate
Commercial Cell Phone
Contingency
LMR
Emergency
HF Radio
Radio Procedures
The radio procedures listed below will help operators use transmission times more efficiently
and avoid violations of communications policies:
1) Prior to an operation, ensure equipment is properly configured. The technical manual is a
good place to begin. Examples of items to check include tuning, power settings, and
connections.
2) Change frequencies and call signs IAW unit signal operating instructions.
3) Use varied transmission schedules and lengths.
4) Use established formats to expedite transmissions such as sending reports.
5) Encode messages or use secure voice.
6) Clarity of radio communications varies widely, so use the phonetic alphabet and
numbers.
7) Transmit clear, complete, and concise messages. When possible, write them out
beforehand.
8) Speak clearly, slowly, and in natural phrases as you enunciate each word. If a receiving
operator must write the message down, allow time for them to do so.
9) Listen before transmitting to avoid interfering with other transmissions.
10) Long messages risk becoming garbled and create increased electronic signature. The use
of procedure words, or “prowords” is essential in reducing transmission time and
avoiding confusion (see list below)
11) Minimize transmission time.
Proword Examples
A list of proword examples is below. This list is not all-inclusive, but can be used as a good
reference sheet for radio operators.
Last updated: 23 January 2015
22
PROWORD
ALL AFTER
Explanation
AUTHENTICATE
The portion of the message to which I have reference is all that which follows
______.
The portion of the message to which I have reference is all that which precedes
______.
The station called is to reply to the challenge which follows
AUTHENTICATION IS
The transmission authentication of this message is ______.
BREAK
I hereby indicate the separation of the text from other portions of the message.
BROADCAST YOUR NET
Link the two nets under your control for automatic rebroadcast.
CALL SIGN
The group that follows is a call sign.
CORRECT
You are correct, or what you have transmitted is correct.
CORRECTION
An error has been made in this transmission. Transmission will continue with the
last word correctly transmitted.
An error has been made in this transmission (or message indicated). The correct
version is ______.
That which follows is a corrected version in answer to your request for verification.
DISREGARD THIS
TRANSMISSION -- OUT
EXEMPT
This transmission is in error. Disregard it. This PROWORD shall not be used to
cancel any message that has been completely transmitted and for which receipt or
acknowledgement has been received.
Stations called are not to answer this call, receipt for this message, or otherwise to
transmit in connection with this transmission. When this PROWORD is employed,
the transmission shall be ended with the PROWORD "OUT".
Carr out the purpose of the message or signal to which this applies. To be used only
with the executive mode.
Action on the message or signal which follows is to be carried out upon receipt of
the PROWORD "EXECUTE". To be used only with the delayed executive method.
The addressees immediately following are exempted from the collective call.
FIGURES
Numerals or numbers follow.
FLASH
Precedence FLASH
FROM
GROUPS
The originator of this message is indicated by the address designator immediately
following.
This message contains the number of groups indicated by the numeral following.
GROUP NO COUNT
The groups in this message have not been counted.
I AUTHENTICATE
The group that follows is the reply to your challenge to authenticate.
IMMEDIATE
Precedence IMMEDIATE.
IMMEDIATE EXECUTE
INFO
Action on the message or signal following is to be carried out on receipt of the word
EXECUTE. To be sued only with the Immediate Executive Method.
The addresses immediately following are addressed for information.
I READ BACK
The following is my response to your instructions to read back.
I SAY AGAIN
I am repeating transmission or portion indicated.
I SPELL
I shall spell the next word phonetically
I VERIFY
That which follows has been verified at your request and is repeated. To be used
only as a reply to VERIFY.
A message which requires recording is about to follow. Transmitted immediately
after the call. (This PROWORD is not used on nets primarily employed for
conveying messages. It is intended for use when messages are passed on tactical or
reporting nets.)
Transmitting station has additional traffic for the receiving station.
ALL BEFORE
DO NOT ANSWER
EXECUTE
EXECUTE TO FOLLOW
MESSAGE
MORE TO FOLLOW
Last updated: 23 January 2015
23
NET NOW
NUMBER
All stations are to net their radios on the unmodulated carrier wave which I am about
to transmit.
Station Serial Number
OUT
This is the end of my transmission to you and no answer is required or expected.
OVER
PRIORITY
This is the end of my transmission to you and a response is necessary. Go ahead,
transmit
Precedence PRIORITY
READ BACK
Repeat this entire transmission back to me exactly as received.
RELAY (TO)
ROGER
Transmit this message to all addressees (or addressees immediately following this
PROWORD). The address component is mandatory when this PROWORD is used.
I have received your last transmission satisfactorily.
ROUTINE
Precedence ROUTINE
SAY AGAIN
Repeat all of your last transmission. Followed by identification data means "Repeat
_____ (portion indicated)".
The message that follows is a SERVICE message.
SERVICE
SIGNALS
SILENCE
(Repeated three or more
times)
SILENCE LIFTED
The groups which follow are taken from a signal book. (This PROWORD is not
used on nets primarily employed for conveying signals. It is intended for use when
tactical signals are passed on non-technical nets).
Cease transmission on this net immediately. Silence will be maintained until
lifted. (When an authentication system is in force, the transmission imposing silence
is to be authenticated).
SPEAK SLOWER
Silence is lifted. (When an authentication system is in force, the transmission lifting
silence is to be authenticated).
Your transmission is at too fast a speed. Reduce speed of transmission.
STOP
REBROADCASTING
THIS IS
Cut the automatic link between the two nets that are being rebroadcast and revert to
normal working.
This transmission is from the station whose designator immediately follows.
TIME
That which immediately follows is the time or date time-time group of the message.
TO
The addressees immediately following are addressed for action.
UNKNOWN STATION
WAIT
The identity of the station with whom I am attempting to establish communication is
unknown.
Verify entire message (or portion indicated) with the originator and send the correct
version. To be used only at the discretion of or by the addresses to which the
questioned message was directed.
I must pause for a few seconds
WAIT -- OUT
I must pause longer than a few seconds.
WILCO
WORD AFTER
I have received your signal, understand it, and will comply. To be used only by the
addressee. Since the meaning of ROGER is included in that of WILCO, the two
PROWORDS are never used together.
The word of the message to which I have reference is that which follows ______.
WORD BEFORE
The word of the message to which I have reference is that precedes ______.
WORDS TWICE
Communication is difficult. Transmit (transmitting) each phrase (or each code
group) twice. This PROWORD may be used as an order, request, or as information.
Your last transmission was incorrect. The correct version is _____.
VERIFY
WRONG
Types of Radio Networks (“Nets”)
Stations are grouped into nets according to requirements of the tactical situation. A “net” is two
or more stations in communication with each other, operating on the same frequency. Nets can
Last updated: 23 January 2015
24
be for voice and/or data communications. Listed below are some examples of different types of
nets:
Command Net (Command and control the unit's maneuver)
Intelligence Net (Communicate enemy information and develop situational awareness)
Operations and Intelligence Net
Administration and Logistics Net (Coordinate sustainment assets)
Precedence of Transmission
Flash (For initial enemy contact reports)
Immediate (Situations which greatly affect the security of national and allied forces)
Priority (Important message over routine traffic)
Routine (All types of messages that are not priority)
Message Format
Heading--A heading consists of the following information:
1)
2)
3)
4)
Identity of transmitting station and self
Transmission instructions (Relay To, Read Back, Do Not Answer)
Precedence
FROM/TO
Text--Text is used to-1) Separate heading from message with Break\
2) State reason for message.
Ending--An ending consists of-1) Final Instructions (Correction, I Say Again, More to Follow, Standby, Execute, Wait).
2) OVER or OUT (never use both together).
Numerical Pronunciation
1) To distinguish numbers from similarly pronounced words, the proword "FIGURES" may
be used preceding such numbers.
2) When numbers are transmitted by Radio, numbers will be transmitted digit by digit (ex.
135 would be transmitted “1” “3” 5”). Multiples of thousands may be spoken as such.
3) The figure "ZERO" is to be written "Ø".
4) Difficult words, abbreviations and isolated letters may be spelled phonetically. This is
identified by using the proword “I SPELL”.
Call Signs
Call signs have two parts (see diagram below):
Last updated: 23 January 2015
25
1) Designation call sign identifies the major unit (corps, division, brigade, or battalion).
2) Suffix and expanders identify individuals by position.
An example of a call sign chart is shown below.
POSITION
Commander
Assist Division Commander
(ADC) (Manuever/Operation)
DESIGNATION
Zebra 6
Zebra 63
6
63
ADC(Sustainment)
Zebra 64
64
Command Sergeant Major
(CSM) / First Sergeant (1SG)
Chief of Staff (CoS) /
Executive Officer (XO)
Deputy Commander
G1 / S1
G2 / S2
G3 / S3
G3 Air
G4 / S4 / Supply
G5 / S5
G6 / S6 / COMMO
Fire Support Officer (FSO)
Engineer
Flight Operations
Battalion Maintenance
Technician (BMT) /
Maintenance
Zebra 7
7
Zebra 5
5
Zebra 8
Zebra 1
Zebra 2
Zebra 3
Zebra 11
Zebra 4
Zebra 10
Zebra 23
Zebra 14
Zebra 34
Zebra 44
Zebra 17
6
1
2
3
11
4
10
23
14
34
44
17
Chaplain
Chemical Officer
Zebra 28
Zebra 30
28
30
Last updated: 23 January 2015
26
SUFFIX
EXPANDER
A
Radio Guard Chart
A radio guard chart identifies the frequencies that are going to be used during an operation or
exercise, what type of transmission (HF, UHF, VHF, etc…), restoration priorities of each
frequency, and the responsibilities held by each unit with respect to each frequency.
Legend
C – Net Control
X – Guard
W – When Directed
A – As Required
M – Monitor
N
E
T
N
E
T
N
E
T
N
E
T
N
E
T
N
E
T
N
E
T
N
E
T
N
E
T
N
E
T
N
E
T
N
E
T
1
2
3
4
5
6
7
8
9
10
11
12
Transmission Type
1 – HF
2 – UHF
3 – VHF
4 – UHF-SATCOM
RESTORATION PRIORITIES
2
3
1
4
5
12
6
9
8
7
11
10
TRANSMISSION TYPE
4
1
3
3
1
3
3
3
3
1
2
1
Regiment
C
C
Battalion
X
X
UNITS
C
C
C
C
C
C
X
X
C
X
X
Echo Co
X
A
X
A
A
A
A
A
A
Fox Co
X
A
X
A
A
A
A
A
A
Golf Co
X
A
X
A
A
A
X
A
A
Weapons Co
X
A
X
A
A
C
A
A
X
Artillery Battery
X
A
X
A
C
A
A
A
X
X
Each organization that is part of the mission has a certain responsibility to listen to the
frequencies on the guard chart. The organization developing the Signal Annex assigns the
appropriate responsibilities to each organization. The developer of the Signal Annex will
delegate the “Net Control” responsibilities to respective organizations. There is only one “Net
Control” for each frequency. The responsibility to “Guard” a frequency is assigned to a single,
or multiple, organization(s). These organizations are required to listen to the frequency 24 hours
a day. “When Directed” indicates an organization is required to listen to a frequency during a
certain period of time.
Cyber Operations and Information Assurance
Cyber Incident Management
Last updated: 23 January 2015
27
Each Regional Working Group should designate a Cyber Operations Officer (COO). The COO
will ensure secure operating practices are observed and conducted within each enclave.
The COO will be the lead for ensuring the minimal-security requirements are fulfilled for their
areas, networks, and systems of responsibility. The COO will identify those requirements that
cannot be met and inform the AE Cyber Working Group. The AE Cyber Working Group will
evaluate the impact and advise the EMB AO on a proposed solution.
The COO will be responsible for informing the AE Cyber Working Group of any relevant
security events and/or incidents. The Cyber Working Group will work with the representatives to
assess the impact of such events and coordinate resolution.
All nations/organizations will ensure a developed, integrated, and coordinated Cyber effort exists
to support the Cyber mission.
AE participants will report security incidents or suspicious activity using any means available.
Users who discover information security incidents will report them using the Incident Response
Form (C4 HANDBOOK TABS - Tab 4). As incidents are resolved, the report will be updated
and closed. The Cyber Working Group will review events, develop responses, and provide
analysis associated with the reported incident.
Below are the type of incidents along with the reporting requirements and processes. AE
security incidents are divided into three categories, based on their severity and possible impact to
the AE infrastructure. Computer Network Defense (CND) cell is located within the Cyber
Working Group.
Timeline (report
received at CND cell)
Category
Reportable Incident/Event
1
- All attacks affecting C4 critical assets
- Denial-of-Service attacks that isolate a critical service or
impede network performance
- Malicious logic (virus) attacks that isolate enclaves
- Root-level access obtained by unauthorized personnel
Within 30 minutes
2
- Significant trends in incidents/events
- Indication of multiple system attacks (successful or not)
- Suspected e-mail spoofing
- Unauthorized probes, strobes, or sweeps on a system
Within 1 hour
3
- Unusual system performance or behavior
- System crashes or component outages of a suspicious
nature
- Suspicious system configuration changes
Within 2 hours
Last updated: 23 January 2015
28
- Suspicious files identified on a server
- Missing data, files, or programs
- Unexplained access privilege changes
- Poor security practices
- Unusual after-hour system activity
- Multiple, simultaneous logins by the same user
- Unauthorized privileged user activity
Malicious logic (virus) attacks
Security Testing
Security testing is the means to verify correct implementation of Cyber IA policies and
procedures and configurations. Security testing will be accomplished on all Operational networks with
the results being analyzed by the units IA representative and provided to the EMB AO.
Brevity Codes
A brevity code is the shortened form of a frequently used phrase, sentence, or group of
sentences, normally consisting entirely of upper case letters. When establishing brevity codes:
1) Use letters that convey the meaning of the language they represent.
2) Do not represent the same word with more than one brevity code.
3) Make the first letter of the brevity code and the first letter of the phrase are the same.
The following are examples of operational brevity words and terms to provide common
understanding and minimize radio transmissions:
1300Z - Base Time
SPIKE - Base Location
1200M - Base elevation
30MIN - Base duration
ABORT - Directive to cease action/attack/event/mission.
BASE (Number) - Reference number used to indicate such information as headings, altitudes,
fuels, etc.
CLEARED - Requested action is authorized
COMSEC - Communications Security
BLIND - No visual contact with friendly aircraft; opposite of term "VISUAL."
MICKEY - Have Quick time-of-day (TOD) signal
REFRAD - Release from Active Duty
SIGINT - Signals Intelligence
SPLASH - Target destroyed (air-to-air); weapons impact (air-to-ground)
Communications Security (COMSEC) Compromise
If a COMSEC keyed radio or COMSEC loading device is lost or captured by enemy, it is
important to report the incident in a timely manner. The greater time between the item being lost
and the report beginning, the greater chance there is for compromising the equipment. The
following steps should be followed in the event of lost COMSEC:
Last updated: 23 January 2015
29
1) Immediate actions by unit:
• Alert units on local net using previously established compromise code word/phrase:
“Code Word”
• Increase unit radio OPSEC procedures
• Contact BDE Communications Officer to alert of a possible compromise.
• Validated that the COMSEC equipment is missing/compromised:
− Confirm incident with subordinate unit
− Direct a 100% accountability inventory
• Once confirmed or denied contact BDE Communications Officer for further
instructions
2) Actions by BDE Communications Officer:
• Determine extent of compromise with BN Communications Officer.
• Coordinate with unit commanders/liaison officers to determine what operations are
affected by compromise.
• If compromise is confirmed continue to Step 2
3) BDE Communications Officer issues order to alert BDE net with “Code Word”
• On Order from BDE Communications Officer, BDE Radio Operator will:
− BDE Radio Operators conducts a Net Call with all Battalion radio operators.
− Only on order issue brevity code: “Code Word”
− Confirm acknowledgement with radio operators and report to BDE BDE.
• Staff Action Checklist
− Brigade Leadership notified
− On order, Command Post sends message through alternate communication.
− Command Post notifies Battalion Command Post to follow battle drill
4) Operations Officer, Intel Officer, and Communications Officer determine affect on
operations.
• Actions by Radio Operators
− On Order, Radio Operators conducts Net call with Battalion Radio Operators.
− Issue previous established code word/phrase: “Code Word 2”
− Radio Operators adjust radios as established in Annex K.
− Radio Operators opens net and reports Acknowledgement to Communications
Officer
• Unit Submits Compromise report
5) BDE Communications Officer notifies Division Communications Officer; determines if
super session is required.
• Actions:
− Communications Officer prepares supersession change to Operations
Order/distributes new COMSEC
− At prescribed time units adjust radios and reestablish their primary means of
communication radios.
− Radio nets reopened
Last updated: 23 January 2015
30
SIGNAL ANNEX
Signal Annex Purpose
The Signal Annex is an annex to an operational or execution order that outlines specific
communication planning concerns. This document should include specific instructions and
information pertaining to an event to ensure coordinated planning and execution occurs amongst
the different participating organizations.
Signal Annex Instructions
COMMAND ISSUING ORDERS
COMMAND ADDRESS
DATE OF ORDERS
SIGNAL ANNEX TO NAME OF OPERATION OR ORDER NUMBER
COMMAND, CONTROL, COMMUNICATION, AND COMPUTER SYSTEMS
References:
a. List documents essential to this annex
b. List documents specifically referred to in this annex. References are complementary
plans, publications, and C4 systems policy documents.
1. Situation
a. Enemy.
(1) Identify enemy counter C2, signal-intercept, and computer system entry
capabilities that may threaten or constrain effective friendly command and
control. Address enemy doctrine and capabilities to gain the initiative, achieve
surprise, bring friendly forces to battle on enemy terms, and disorganize
friendly forces during engagements.
(2) Discuss past enemy uses of OPSEC measures, signal interception, deception,
jamming, and lethal/nonlethal attacks on command, control, communication,
and computer systems.
(3) Identify capabilities that represent a threat to the success of the C4 mission.
(4) List exploitable enemy vulnerabilities.
b. Friendly. Provide an analysis of friendly C4 facilities, resources, and organizations
that affect the planning of subordinate commands. Indicate the manner in which C4
forces not included in the task organization will contribute to the operation. Include
appropriate interoperability considerations for joint, combined, and neutral forces in the
operational area. Place special emphasis on listing applicable international bilateral
arrangements that have been made to obtain or provide C4 support.
c. Assumptions. State the assumptions that establish essential criteria for development of
the C4 annex; for example, availability of mobile or transportable assets and security of
key facilities outside the combat zone.
2. Mission. State clearly and concisely, the “essential” tasks to be accomplished with regard to
the purpose of this ANNEX as it relates to the overall mission stated in the Basic Plan. The
mission statement should address the questions (who, what, when, where and why). Define the
Last updated: 23 January 2015
31
broad tasks and the purpose to establish a basis for “integration” and “coordination” of actions to
be taken. (The C4 mission statement may require several subparagraphs in view of the many
aspects of C4 support.)
3. Execution.
a. Operational Concept. Describe the operation briefly, in narrative form, emphasizing
phasing and aspects of the Basic Plan that establish C4 requirements and that affect C4
capabilities and limitations. Provide OPSEC planning guidance for planning, preparing
for, and executing command and control (C2) functions, particularly guidance for
transmission and LAN/WAN network infrastructure security planning.
b. Tasks. In separate numbered subparagraphs for each subordinate component or other
subdivision of the force, assign individual C4 tasks and responsibilities and include
instructions that apply to that component or subdivision. Cover the entire COA listed in
paragraph 5 of the C4 estimate, giving the task and the unit that is to perform it. Consider
liaison team participation as part of a multinational force to interface C4 operations
during multinational warfare. Use coordinating instructions in the final subparagraph to
frame tasks and considerations common to all forces.
c. Intelligence and Reconnaissance. State intelligence and reconnaissance support
required even if covered in Annexes B and C. If the information is very detailed, prepare
an appendix to the C4 systems annex.
d. Special Measures
(1) Provide a separate lettered subparagraph of information regarding each
special measure or procedure necessary for the support of the mission not
covered in paragraph 3.
(2) Include information on C4 operations that are not part of the main effort.
(Examples of such measures are routing indicator allocations, frequency
plans, electronic identification procedures, and analytical assistance
provisions for electromagnetic compatibility and spectrum planning.)
(3) For Defensive Information Warfare, refer to Appendix 2.
4. Administration and Logistics
a. Logistics
(1) State broad instructions concerning logistic support for C4 operations. Include Annex
D and current logistic instructions in references.
(2) Repeat important logistic coordination matters even if covered in Annex D. (Remarks
in this paragraph will normally pertain to inter-agency C4 supply and maintenance
matters.) If the information is detailed, prepare a logistic appendix to the C4 annex.
(Examples of items that should appear in this paragraph are assignments of logistic or
maintenance responsibilities to a single component or other cross-servicing
arrangements.)
b. Administration. Include requirements for C4 administrative records and reports and
other miscellaneous matters that are significant to joint operations but are not classified
according to any of the subjects above.
5. Command and Control
a. Command. Refer to Annex J for command relationships
b. Command, Control, Communication, and Computer Systems. Refer the appendixes
for C4 requirements.
Last updated: 23 January 2015
32
t/
Major General
Operation Name
Commander in Chief
Appendixes
1 – Command Relationships
2 – Command, Control, Communications, and Computer Planning
3 – Mission diagrams (RF, network, etc…)
OFFICIAL
s/
t/
Colonel
Director, J-6
Note 1: Appendix list is not all-inclusive or specifically required in every OPLAN. Additional
appendixes will be developed as necessary to describe special-purpose networks or systems; e.g.,
meteorological and oceanographic services, air-to-ground, ship-to-shore, air defense.
Signal Annex Appendix Instructions
COMMAND ISSUING ORDERS
COMMAND ADDRESS
DATE OF ORDERS
APPENDIX 1 TO SIGNAL ANNEX TO NAME OF OPERATION OR ORDER NUMBER
REGIONAL COMMAND RELATIONSHIPS
1. Purpose. Define the command relationships and establish reporting requirements to ensure
situational awareness in each region.
2. Execution. Provide status reports to surrounding friendly forces.
3. Tasks and Responsibilities. Identify the command relationships that exist within the region
from the company-level up to AU headquarters. Define supported and supporting
commands/organizations.
4. System Description. None.
5. Planning Considerations. Identify location of surrounding friendly forces to provide
situational awareness of operation. Ensure status reports are provided to, and received from,
surrounding friendly forces and higher headquarters.
Last updated: 23 January 2015
33
COMMAND ISSUING ORDERS
COMMAND ADDRESS
DATE OF ORDERS
APPENDIX 2 TO SIGNAL ANNEX TO NAME OF OPERATION OR ORDER NUMBER
COMMAND, CONTROL, COMMUNICATIONS, AND COMPUTER (C4) PLANNING
1. Purpose. Provide a brief, general statement of the purpose for this appendix referencing the
objectives of Signal Annex.
2. Execution. Provide general procedures for the development and operation of the
communications system.
3. Tasks and Responsibilities. Identify the tasks and responsibilities of the commands and
agencies to provide, install, and/or operate and maintain designated portions of the system.
4. System Description. Describe desired connectivity of the system.
5. Planning Considerations. Provide C4 planners with the minimum mandatory planning items
that must be answered in order to ensure proper C4 planning. The list is by no means definitive.
Each applicable item should be addressed in appropriate appendixes in Signal Annex, or in this
appendix.
a. Common Questions. These questions apply to any mission. They elicit background
information, and each serves as a data point to answer other questions.
(1) Parameters
(a) Are there any satellite landing rights?
(b) When are the operations planning meetings scheduled? How will C4 planning
meetings fit into this schedule?
(c) What are the planning constraints?
(d) What are the special C4 requirements? Who has them? What space-based
assets are required and/or available to support the operation?
(e) What C4 capabilities are available to the joint force; Super-High Frequency
(SHF) and/or Ultra High Frequency (UHF) commercial satellite, high frequency
(HF)/VHF radio, tropospheric and LOS microwave systems, LANs/WANs, land
mobile radio, and personal communications systems?
(f) What frequencies are available for the operations area?
(g) What are the general communications security (COMSEC) requirements?
Which agency will draft the callout message?
(h) Who is the potential adversary? What are their capabilities to conduct
offensive information warfare? Does a plan exist to counter the threat?
(i) What are the releasability requirements for multinational operations? What
procedures and mechanisms exist for screening and releasing information to
participating countries?
(j) What capacity does the joint command center have to monitor, direct, control,
and coordinate US, allied, and HN C4 support throughout the entire operational
area?
(k) What are the handling procedures for the air task order to meet all mission
requirements?
(l) What is the call sign and combat identification process established to improve
friendly coordination and minimize the possibility of fratricide?
Last updated: 23 January 2015
34
(m) What portion of the total asset and in-transit visibility system be established?
(2) Subordinate Component Forces
(a) Where will their C4 nodes be located?
(b) What are their C4 requirements?
(c) What are their C4 capabilities?
(d) What type of C4 systems do they have (power, frequency availability,
bandwidth capabilities, interoperability and compatibility with other subordinate
components’ equipment, and mobility)?
(e) Which agency is the component C4 staff point of contact for planning and
technical management and direction?
(f) What are the special C4 requirements resulting from the mission and the
Commander’s estimate, intent, and concept of operations?
(g) Are subordinate and supporting C4 plans consistent with the supported
Commander’s C4 plan?
(3) Supporting Forces and Activities
(a) What is the mission of the supporting forces and/or activities (this includes
allies and coalitions)?
(b) What are their C4 capabilities?
(c) What information does the supported command need from the supporting
forces and/or activities (intelligence, weather, imagery, mapping, deployment)
and how will it be accessed?
(d) What C4 support will the supporting forces or activities require from the
supported command?
(4) Nonorganic C4
(a) Commercial Networks
1. Are commercial networks available for use? Who can approve access
to them? Are funds available? Has the approving authority been contacted
to ensure required lead times for normal allocations? (1) Satellite (2) Data
(3) Voice (4) Video?
2. What special interfaces are required to access the commercial network
and where are the access points?
3. What are the locations and types of switches in the commercial
network? What are their technical parameters?
4. Where are the locations and types of systems providing the backbone
transmission network?
5. What type of power is used; voltage, current, commercial grid, or
generator?
6. Does the operational area have a cellular network? What are the
transmission media, frequency band, and interface requirements? What are
the system standards? Is the system available for use?
(b) Other C4 Support
1. Is C4 support needed from specialized communications units?
2. Who are the points of contact (POCs), and what are the request
procedures?
3. What are the units’ C4 capabilities and limitations?
Last updated: 23 January 2015
35
b. Planning Activities. This paragraph assumes that the basic questions have been
answered and covers high-level and detailed C4 planning. Although these functions are
listed separately, they are concurrent rather than sequential actions. The planners interact
to refine the planning products, C4 estimates, Signal Annex, and communicationselectronics operating instructions.
(1) High-Level Planning
(a) What nodes will be necessary to provide a global C4 network and where will
they be located?
(b) Which nodes will have to be connected?
(c) What transmission media will be used to interconnect the nodes?
(d) What types of C4 equipment will be located at each node (equipment strings,
interoperability of the equipment)?
(e) What are the frequency requirements for each node? How will the frequencies
be allotted (multinational, and subordinate components)? Are there potential
frequency conflicts?
(f) What are the call signs and/or words for each node?
(g) What units will provide, install, operate, and maintain the equipment for each
node? What is their operational readiness status?
(h) What lift assets are available to deploy these units? When will the units
deploy and activate the nodes or network?
(i) Is the deployment schedule of C4 assets consistent with the phases of the
plan? Will it permit the provision of C4 support when and where needed?
(j) What is the phased buildup of C4I in the operational area?
(k) Has C4 scheduling information been added to the time-phased force and
deployment data and/or time-phased force and deployment list?
(l) Has the Higher Headquarters and J-3 been informed of potential C4 shortfalls
and recommended solutions?
(m) How will keying material be managed (identification of Controlling
Authorities, ordering, generation, storing, distribution, transfer, crypto periods,
and destruction)? What are the procedures for handling compromises and CCI
incidents? Is a COMSEC logistics management activity needed in the joint
operations area? What access will partner nations have to COMSEC?
(n) Are network and node diagrams available?
(o) Have special C4 requirements been addressed (search and rescue, SOF, en
route C4, embarkation and debarkation connectivity)?
(p) How will the subordinate component and supporting forces networks
interface with nonorganic networks?
(q) When and where will the Communications Control Center be established?
(r) Are the subordinate component, special operations task force, and supporting
C4 plans consistent with the joint C4 plan?
(2) Detailed Planning
(a) Circuit Switches
1. Does a circuit switched network diagram exist that shows information
about the switch and circuit switched network connectivity (switch type,
area code, trunk groups, capacity)?
Last updated: 23 January 2015
36
2. How does the switch route calls: flood, deterministic, or circuit switch
routing task execution plan?
3. Where do circuit switches need to be located? How will they be
connected?
4. What special features or restrictions will be imposed on subscribers?
Who will authorize and enforce these restrictions?
5. How will subscriber assistance be handled?
6. Where is the greatest anticipated traffic load? Does sufficient capacity
exist to handle it?
7. What types of status reports are required, and when
and to whom will they be submitted?
8. How will traffic metering and network loading be measured, modeled,
and managed?
9. What agency will publish telephone directories and how will they be
distributed?
(b) Data Networking
1. What are the anticipated organizational component data requirements?
2. Has automation been planned and/or engineered into the network (x.25,
IEEE 802.3, TCP/IP)?
3. What and/or where are the network identifications and gateways?
4. Will data of various classifications "ride" a secure tactical backbone?
How will traffic of various classifications be controlled and managed? Are
multilevel information systems security initiative devices needed and are
resources available?
5. What is the joint architecture topology?
6. Who is the data networks manager?
7. What are the unclassified and classified connectivity requirements?
8. What data networking points of presence will be used? Has a gateway
access request been coordinated?
9. What is the addressing scheme?
(c) Transmission Systems
1. Are the circuit requirements, routing, channelization, and other
parameters identified in high level planning valid? Have satellite access
requests been submitted? Have frequency requests been approved and
published?
2. What are the characteristics and connectivity of multiplexers in the
network? Are they compatible?
3. What are the timing requirements for the network components? How
will timing be accomplished?
4. What types of status reports are required and when and to whom will
they be submitted?
c. Technical Management and Direction
(1) Communications Control Center
(a) What are the operational procedures for the CCC?
(b) How will the CCC be manned?
Last updated: 23 January 2015
37
(c) What reports will be required, how often will they be required, and when will
they be submitted?
(d) How will network reconfiguration be accomplished?
(e) Who are the POCs at the subordinate control centers?
(f) Who will submit the Telecommunications Service Request and
Telecommunications Service Order?
(g) Who will coordinate changes to connectivity with the commercial networks?
(h) What kind of statistics will be kept? Who will analyze them? What will be
done with them?
(i) How will changes caused by the evolving tactical situation be handled?
(j) How does the JCCC direct changes within subordinate component networks to
optimize C4 within the joint operations area?
(k) Where is the boundary between technical direction and operational direction?
(l) How will frequency de-confliction be managed? How can potential conflicts
be anticipated?
(m) Who will control frequency spares and authorize their use?
d. Other Planning Functions
(1) Spectrum Management
(a) What are the provisions and procedures for frequency planning and use for
opposed and/or unopposed entry operations into an operational area?
(b) What frequency allotments and assignments are available for the operational
area?
(c) Can the allotted and assigned frequencies support the equipment deployed to
the operational area (communications, computer LANs and/or WANs, GPS,
airspace control radars)?
(d) Will the frequencies work (propagation and topographic analyses)?
(e) Does the allocation and assignment of frequencies to subordinate component
commands contribute to mission accomplishment?
(f) What are the enemy capabilities to interfere with allotted and assigned
frequencies? Does a plan exist to counter the threat?
(g) How will interference reports be reported?
(h) Will the CCC resolve electromagnetic interference issues?
(i) Will support be required to resolve interference issues?
(j) Are sufficient spare frequencies available?
(k) What emission control measures will be applied?
(l) Is there an electronic deception plan? Are sufficient frequencies available to
support this plan?
(2) Security
(a) Will the cryptographic equipment interoperate?
(b) What are the keying material requirements?
(c) Does a key management plan exist?
(d) How will cryptographic compromises be detected, reported, evaluated, and
corrected?
(e) What computer security measures will be employed on the LANs and WANs
in the operational area?
Last updated: 23 January 2015
38
(f) How will access to the various networks be controlled (electronic and
physical)?
(g) What are the COMSEC emergency destruction procedures?
(h) What is the logistics plan for the cryptographic equipment?
(i) Are equipment and key materials sufficient to support planned and unplanned
operations?
(j) What are the key change times and have they been promulgated?
(k) What are the provisions for over-the-air rekeying, when applicable?
(l) What will we transition to and when?
(m) What is the foreign information warfare threat facing the C4I systems?
(n) Are virus detection software applications installed and operational? Are
passwords issued and in use? Has a contingency plan been developed to guide
recovery actions should data be modified or destroyed by unauthorized
intrusions?
(o) Do remotely accessed computer systems possess features to identify users and
substantiate their identification before allowing information to be processed?
e. Summary. This list of questions is not all-inclusive. These questions should be asked
repeatedly throughout the planning process as C4 planners adapt to an evolving
operational and tactical situation. They provide a framework for supporting C4 planning
for each phase of an operation, focusing C4 planners on the mission, and how the
command intends to accomplish it.
Last updated: 23 January 2015
39
C4 HANDBOOK TABS
Tab 1 – CIS Connection Process
1.0 – Purpose: This document describes the policy under which participating organizations will
connect to Africa Endeavor networks for the purpose of conducting exercise related activities.
2.0 – Scope: Connections between participants fall under this policy, regardless of whether a
commercial circuit, military circuit or VPN technology is used for the connection. Connectivity
to third parties such as the Internet Service Providers (ISPs) that provide Internet access or to the
Public Switched Telephone Network does NOT fall under this policy.
3.0 – Policy
3.1 – Security Review
3.1.1 All new connectivity will go through a security review with the Cyber Working Group. The
reviews are to ensure that all access matches the requirements in a best possible way, and that the
principle of least access is followed.
3.1.2 The security review will be documented by completion of the AE Connection Approval
Checklist and will be kept on file with the Cyber Working Group for the duration of the exercise.
(See Attached Checklist)
3.2 – System Architectural Description
All requests for connection will be accompanied by a System Architectural Description in the
format provided in the attachment.
3.3 – Connection Agreement
All new connection requests require participating Nation representatives agree to and
sign the Africa Endeavor Statement of Security Compliance. This agreement must be
signed by the Security Accreditation Authority or Delegation Chief. The signed
memorandum will be kept on file with the Cyber Working Group for the duration of the
exercise. (See attached example memorandum)
3.4 – Modifying or Changing Connectivity
All significant changes must be accompanied by an updated Connection Approval Checklist
and System Architectural Description and are subject to security review. Changes are to be
implemented via the change management process. The participating Nation is responsible for
notifying the Cyber Working Group when there is a material change in their originally provided
information so that security and connectivity evolve accordingly.
4.0 – Enforcement: Any participants found to have violated this policy may be subject to
disconnection from the network and denial of access to Africa Endeavor information resources.
Last updated: 23 January 2015
40
Tab 2 – Connection Authority Memorandum
Date: [enter date memorandum is signed by SAA or Delegation Chief]
From: [name of National or Organizational Security Accreditation Authority (SAA)
or the Delegation Chief]
Security Accreditation Authority
To:
Exercise Director
Subj: Statement of Security Compliance
Ref: Cyber Policy and Implementation Plan (CPIP)
1. This letter of compliance affirms that our system, [name of system], meets all the
requirements outlined in the Cyber Policy for connection to the operational network for
use during [Name of Exercise or Operation]. [Name of system] is equipped
with security devices to safeguard information stored, processed and transmitted on the
system. The system(s) have up-to-date anti-virus definitions, operating system and
application patches.
2. List any shortfalls with the equipment that may exist and reference the requirements
outlined in the System Architectural Description (C4 HANDBOOK TABS – Tab 3)
3. We affirm that authorized users are aware of the security requirements for
safeguarding information on the network during the duration of Africa Endeavor. Users
who perform unauthorized or illegal acts may be subject to disciplinary action in
accordance with their nation's laws.
4. The Security Point of Contact for [choose one: [Nation] or [Organization]] is:
Rank and Name:
Commercial Phone:
Internet e-mail address:
// Signature //
[name of signatory]
[title of signatory]
Security Accreditation Authority or
Delegation Chief
Last updated: 23 January 2015
41
Tab 3 – System Architectural Description
The steps below are required to ensure the AO/Cyber 7HDP understands how your system(s) will be
connected to the operational network. DO NOT provide/include IP addresses. The information below
should be included in the Connection Authority Memo (C4+ANDBOOK – Tab 2) when submitted to the
AO and/or Cyber 7HDP.
1) Provide a written description of the system. The description should include:
• Purpose or function of the system
• The Operating System and all applications
• Description of Hardware (make, model, technical features)
• Hardware and Software network security controls used by the system (to include
Anti-Virus used)
• Configuration and interconnection of the system (hardware and software) including
radio interfaces
• List IP ports and protocols used by the system and specify whether it is inbound or
outbound
2) Provide a detailed network diagram which provides a corresponding picture of the
system and interconnections described above
Last updated: 23 January 2015
42
Last updated: 23 July 2013
44
Last updated: 23 July 2013
45
a
a
a
a
a
a
a
/a
Last updated: 23 July 2013
46
Last updated: 23 July 2013
47
MASTER STATION LOG
Date/Time
Mission Impacted
Last updated: 23 July 2013
Description of Call
Action Taken
48
Operator’s
Initials
LOG STAT
Unit 1
PAX
Unit 2
Unit 3
Location 1
Location 2
Location 3
Location 4
Location 5
QUANITY ON HAND
Class I
MRE
WTR
QUANITY ON HAND
Class II
QUANITY ON HAND
Class III
FUEL
OIL
QUANITY ON HAND
Class IV
QUANITY ON HAND
Class V
QUANTITY ON HAND
Class VI
EQUIPMENT READINESS
Total
Class VII
Deadlined
%
QUANITY ON HAND
Class VIII
QUANITY ON HAND
Class IX
>24 Hrs
>48 Hrs
>72 Hrs
<72Hrs
Legend
PAX
Class I
Class II
Class III
Class IV
Class V
Class VI
Class VII
Class VIII
Class IX
People
Food, rations, and water
Individual equipment, clothing
Petroleum, oils, and lubricants (fuel)
Construction/Barrier Materials
Ammunition
Personal Demand Items
Major End Items (Equipment)
Medical Material/Medical Repair
Repair Parts
Unit 4
Unit 5
LOG STAT TRACKER
Class I
Class II
Class III
ClassIV
Class V
Class VI
Class VII
Eng
Health Serv
Class VIII Class IX
Unit 1
Unit 2
Unit 3
Unit 4
Unit 4
Legend
PAX
Class I
Class II
Class III
Class IV
Class V
Class VI
Class VII
Class VIII
Class IX
People
Food, rations, and water
Individual equipment, clothing
Petroleum, oils, and lubricants (fuel)
Construction/Barrier Materials
Ammunition
Personal Demand Items
Major End Items (Equipment)
Medical Material/Medical Repair
Repair Parts
LOG STAT TRACKER
Dep & Dist
Supply
Maint
Log Serv
Unit 1
Unit 2
Unit 3
Unit 4
Unit 4
Legend
Dep & Dist
Supply
Maint
Eng
Log Serv
OCS
Health Serv
Deployment and Distribution
Supply
Maintenance
Engineering
Logistic Services
Operational Contract Support
Health Services
OCS
>24 Hrs
>48 Hrs
>72 Hrs
<72Hrs
>24 Hrs
>48 Hrs
>72 Hrs
<72Hrs
USA
USN
Active Military Deployed
USMC USAF USCG Total
Prior
Delta
USAR
USNR
Reserve Military Deployed
USMCR USAFR USCGR Total
Prior
Delta
ARNG
Guard Deployed
ANG
Total Prior
Country 1
Location 1
Location 2
Location 3
Location 4
Country 2
Location 1
Location 2
Location 3
Location 4
Country 3
Location 1
Location 2
Location 3
Location 4
Total
Column A
Column B-F
Column G
Column H
Column I
Column J-Q
Column R-V
Column W
Column X
Column Y
=
=
=
=
=
=
=
=
=
=
Insert name of country and name of cities/town deployed below for each country.
Number of Active Duty Military Personnel. USA (U.S. Army) / USN (U.S. Navy) / USMC (U.S. Marine Corp) / USAF (U.S. Air Force) / USCG (U.S. Coast Guard)
Total number for each row
Prior number from day before
Number difference between Total and Prior. Identify if difference is + or -.
Same as Column B-I but for Reserve Duty Military
Same as Column B-I but for National Guard Duty Military. ARNG (Army National Guard) / ANG (Air National Guard).
Add column G,O and T
Add column H,P and U
Add column I, Q and V
Last row should be total numbers added for each column.
Delta
Total
Total Military
Prior
Delta