ACP-125 Radiotelephone Procedures for Tactical Networks

ACP-125: Radiotelephone Procedure

Purpose

The ACP-125 radiotelephone procedure is prescribed for use by allied nations in tactical networks, both safe and unsafe. Its purpose is to provide standardized rules for clear, concise, and unambiguous traffic, ensuring accurate data and efficient command and control. It must be assumed that all transmissions are intercepted and can reveal the location of radio signals.

Enemy Threat and EW

This standardized procedure protects against enemy electronic warfare (EW) threats. Discipline is crucial to prevent overlapping transmissions, which can lead to chaos. ACP-125 is required for all allied military tactical networks, whether safe or unsafe.

Fonia Procedure

Protocol: Rules governing how to start and end calls.

Station Identification: Numbers, letters, and combinations identify stations, organizations, or individuals within the network.

Networking and Codes: Cryptography is used to secure networks.

Intercepted Information

Intercepted information can be valuable to the enemy, potentially revealing operational or battle orders, locations, intentions, and combat effectiveness.

Essential Information

Mandatory code includes positions, locations, and identification of friendly and enemy forces after an exchange of fire. Contact information with the enemy can be sent in clear. Key information includes starting points, defeats, ports, anchorages, and future intentions. Each transmission’s risk should be carefully considered.

COMSEC

COMSEC (Communications Security) protects all aspects of communications. It includes measures to prevent interception and analysis of allied transmissions, as well as deception techniques.

Protection Measures

  • Radio Silence: The most effective defense against interception.
  • Silence Orders: Electronic silencing orders can be communicated using keywords.
  • Avoid Unnecessary Transmissions: Consider alternatives to radio communication.
  • Minimize Testing: Keep tuning and testing to an absolute minimum.
  • Transmission Duration: Longer transmissions are more vulnerable to interception. Pause and release the carrier according to procedure.
  • Proper Procedure: Poor procedure can increase transmission time and lead to unnecessary clarification.
  • Frequent Changes: Changing frequencies disrupts interception. Frequencies should never be transmitted in clear over unsafe circuits.
  • Alternative Communication Methods: Explore alternatives to radio when possible.

Discipline

Poor communication discipline can compromise safety.

Rules

  • Always: Use correct procedure, monitor circuits, use the correct frequency, answer calls promptly, listen before transmitting, and release the carrier promptly.
  • Never: Break radio silence, transmit classified information in clear without permission, make unnecessary or long transmissions, engage in private conversations, identify ships or units by name or personal information, talk fast, use obscene language.

Radio Logs

Maintain complete records of all transmitted and received messages, network information, tactical details, station openings and closings, frequency changes, interference information, and any security violations or suspected forgeries.

Message Formats

  • Plaindress: Clear, direct communication.
  • Abbreviated: Shortened format for speed.
  • Codress: Encrypted text for secure communication.

Message Contents

  • Operational: Tactical signals.
  • Management: Administrative messages.
  • Service: Between communication heads.
  • Abbreviated Service: Between operators.

Message Addressing

  • Single Address: One intended recipient.
  • Multiple Address: Multiple recipients.
  • Multiple Undisclosed: Nominal distribution.

Message Types

  • Training: Drills and exercises.
  • Exercise: Practice scenarios.
  • Royal: Formal messages.

Message Structure

Messages consist of three parts: Header, Text, and Termination. Each part contains specific components and elements.