fm24 33
fm24 33
fm24 33
Preface
iii
FM 24-33
Chapter 1
Electronic Counter-Countermeasures in Defense
Planning
1-1. Introduction
a. Since the beginning of this century, we have been developing
electronic devices for military purposes. These purposes include--
Communicating.
Detecting.
Navigating.
Identifying targets.
Countering and monitoring hostile use of the electromagnetic
spectrum.
Retaining friendly use of the spectrum.
b. Electronic warfare (EW) uses electromagnetic energy to determine,
exploit, reduce, or prevent hostile use of the electromagnetic spectrum. It
also involves actions taken to retain friendly use of the electromagnetic
spectrum. Figure 1-1 shows the three categories of EW:
Electronic warfare support measures (ESM).
Electronic countermeasures (ECM).
Electronic counter-countermeasures (ECCM).
3
Command, control, and communications (C CM) integrates
operations security (OPSEC), military deception, jamming, and physical
3
destruction. Using this integration and supported by intelligence, C CM denies3
information to the enemy and influences,
3
degrades or destroys
3
the enemy's C
capabilities. At the same time, C CM protects friendly C . ECCM reduces or3
eliminates the effects of hostile attempts to degrade or disrupt friendly C .
1-1
FM 24-33
1-2
FM 24-33
1-3
FM 24-33
1-4
FM 24-33
Includes ESM and ECM play in all command post and field training
exercises and evaluates ECCM techniques employed.
Includes ECCM training in the unit training program.
(2) The G2/S2--
Advises the commander of enemy capabilities that could be used to
deny the unit the effective use of the electromagnetic spectrum.
Keeps the commander apprised of the unit’s signal security posture.
(3) The signal officer--
Prepares and conducts the unit ECCM training program.
Ensures there are alternate means of communications for those
systems most vulnerable to enemy jamming.
Ensures available COMSEC equipment is distributed to those systems
most vulnerable to enemy information gathering activities.
Ensures measures are taken to protect critical friendly frequencies
from intentional and unintentional interference.
Evaluates interference and prepares follow-up meaconing, intrusion,
jamming, and interference (MIJI) reports.
Enforces proper use of radiotelephone, ECCM, and transmission
security procedures on communications channels.
Performs frequency management duties and issues SOI booklets on a
timely basis.
Prepares and maintains a restricted frequency list of taboo,
protected, and guarded frequencies.
Prepares the ECCM and restricted frequency list appendices to the
signal annex with appropriate cross-references to the other annexes (EW, OPSEC,
deception) and to the SOI for related information.
1-5
FM 24-33
(a) We must analyze the terrain and determine methods to make the
geometry of the battlefield work in our favor. Adhering rigidly to standard
command post deployment makes it easier for the enemy to use the direction
finder (DF) and aim his jamming equipment at us. Our command post vulnerability
to enemy DF efforts can be greatly reduced by incorporating tactical satellite
systems. We also tend to deploy our units and communications systems
perpendicular to the forward line of own troops (FLOT). This greatly enhances
the enemy’s ability to intercept our communications because we aim our
transmissions in the enemy’s direction. As much as possible, we must install
our terrestrial line-of-sight communications parallel to the FLOT. This will
keep the primary strength of our transmissions in friendly terrain. (See Figure
1-2.) Tactical satellite communications systems are relieved of this constraint
because of their inherent resistance to enemy DF efforts. Terrain features
should be used when possible to mask friendly communications from enemy
positions. This may mean moving senior headquarters farther forward and using
more jump or tactical command posts so that commanders can continue to direct
their units effectively.
(b) Locations of command posts must be carefully planned. Command post
locations generally determine antenna locations. The proper installation and
the siting of antennas around command posts are critical. Antennas and emitters
should be dispersed and remoted so that all a unit’s transmissions are not
coming from one central location.
(2) System design.
(a) In designing the communications system, we must establish alternate
routes of communications. This involves establishing enough communications
paths so that the loss of one or more routes will not seriously degrade the
overall system. The commander establishes the priorities of critical
communications links. The higher priority links should be afforded the greatest
number of alternate routes.
1-6
FM 24-33
1-7
FM 24-33
b. Employment.
(1) We must plan to avoid establishing a pattern of communications.
Enemy intelligence analysts are highly trained to extract information from the
pattern as well as the text of our transmissions. If easily identifiable
patterns of friendly communications are established, the enemy can gain
valuable information.
(2) The number of friendly transmissions tends to increase or decrease
according to the type of tactical operation being executed. Plans that prevent
enemy intelligence analysts from using these increases and decreases as
intelligence should be included in the battlefield deception plan.
This can be done by using false peaks or traffic leveling. False peaks are
created by preplanning increases in transmission traffic on a random schedule.
Tactically, traffic leveling is done by preplanning messages to be sent when
there is a decrease in transmission traffic. Thus, traffic leveling is used to
keep the transmission traffic fairly constant. False peaks are used to prevent
the enemy from connecting an increase of communications with a tactical
operation. Messages transmitted for traffic leveling or false peaks must be
coordinated to avoid operational security violations, mutual interference, and
confusion among our equipment operators.
1-8
FM 24-33
1-9
FM 24-33
1-10
FM 24-33
1-11
FM 24-33
Chapter 2
Preventive Electronic Counter-Countermeasures
Techniques
2-1. Introduction
a. We must use preventive ECCM techniques to safeguard our
communications from enemy disruption and destruction. ECCM techniques include
all measures taken to avoid enemy detection and to deny enemy intelligence
analysts useful information. There are two categories of preventive ECCM
techniques:
ECCM designed circuits (equipment features).
Radio system installation and operating procedures.
Radio operators have little control over the effectiveness of ECCM designed
circuits; therefore, the primary focus of this manual is radio system
installation and operating procedures.
b. Reducing the vulnerability of our communications to enemy efforts to
disrupt or destroy them is largely a matter of avoiding detection by the enemy.
If the enemy cannot detect our communications, he will have difficulty
disrupting or destroying them. Effective jamming depends on knowing the
frequencies and approximate locations of units to be jammed. We must do all we
can to prevent disclosing this information. Using the techniques in this
chapter will help accomplish this. Table 2-1 lists preventive ECCM techniques.
2-2. Minimal Transmissions
a. The most effective preventive ECCM technique is to minimize radio
transmissions and transmission times. Even though normal day-to-day operations
require radio communications, these communications should be kept to the
minimum needed to accomplish the mission. Using the following preventive ECCM
techniques will minimize transmissions and transmission times.
(1) Ensure all transmissions are necessary. Analysis of US tactical
communications indicates that most communications used in training exercises
are explanatory and not directive. Radio communications must never be used as a
substitute for complete planning. Tactical radio communications should be used
to convey orders and critical information rapidly. Execution of the battle must
be inherent in training, planning, ingenuity, teamwork, and established and
practiced SOPs. The high volume of radio communications that usually precedes a
tactical operation makes the friendly force vulnerable to enemy interception,
direction finding, jamming, and deception.
NOTE: Even when communications are secure, the volume of radio
transmissions can betray an operation and the enemy can still
disrupt or destroy our ability to communicate.
2-1
FM 24-33
2-2
FM 24-33
(2) Preplan messages before transmitting them. The radio operator should
know what he is going to say before beginning a transmission. When the
situation and time permit, the message should be written out before beginning
the transmission. This will minimize the number of pauses in the transmission
and decrease transmission time. It will also help ensure the conciseness of the
message. The Joint Interoperability of Tactical Command and Control Systems
(JINTACCS) voice templates are some of the best tools a RATELO can use to
minimize transmission time.
(3) Transmit quickly and precisely. When a transmission is necessary,
the radio operator should--
Speak in a clear, well-modulated voice.
Use proper radiotelephone procedures.
This is especially critical when the quality of communications is poor. This
minimizes the chances that a radio transmission will have to be repeated.
Unnecessary repetition increases transmission time and the enemy’s opportunity
to intercept our transmissions and thus gain valuable information.
(4) Use equipment capable of data burst transmission. This is one of the
most significant advantages of tactical satellite communications systems. When
messages are encoded on a digital entry device for transmission over satellite
systems, the transmission time is greatly reduced.
(5) Use an alternate means of communications when possible. Alternate
means of communications, such as cable, wire, or organic soldiers performing as
messengers, can be used to convey necessary directives and information. Radio is
a convenient means of communications; however, convenience does not justify
making a radio transmission. Other means of communications must be used when
practical.
b. We must not operate our radios unnecessarily. Minimizing
transmissions will safeguard our radios for critical transmissions. The enemy
cannot effectively disrupt or destroy our communications without first
gathering information from our radio transmissions. This does not advocate
total, continuing radio silence; it advocates minimum transmissions and
transmission times. We must never forget that operating our radios
unnecessarily increases the enemy’s opportunities to gather information.
2-3. Transmission Protection
All radio communications systems consist of antennas, receivers, and
transmitters. A transmitted signal can be received by any radio station with
which it is compatible. However, the receiving and transmitting radio stations
must be set to the same frequency, and the receiving antenna must receive a
strong enough signal to activate the receiver. If these criteria are met, any
2-3
FM 24-33
2-4
FM 24-33
2-5
FM 24-33
2-6
FM 24-33
2-7
FM 24-33
approved operations codes. Manual and electronic encryption need not be used
together. Either method used alone will protect EEFI from enemy exploitation.
2-5. Equipment and Communications Enhancements
In addition to the equipment enhancements and proper RATELO procedures,
other techniques can be used to reduce the vulnerability of friendly
communications to hostile exploitations. Some of these ECCM procedures are
the introduction of frequency hopping modules in radios, null steering and
adaptive antennas, spread spectrum waveforms, automatic adjustable power
output, and fiber optics technology.
a. Frequency hopping is particularly useful in lessening the effects of
enemy communications jamming and in denying the enemy friendly position
location data. This is done by changing the instantaneous frequency of a
narrowband transmission in a psuedo-random manner. The new family of SINCGARS
will employ frequency hopping.
b. Null steering and adaptive antenna techniques are designed to
achieve more survivable communications systems. Null steering masks the
radiation pattern to nullify the effects of jamming and provides an improved
signal-to-jamming ratio. These techniques are typically coupled with spread
spectrum waveforms combining frequency hopping with psuedo-noise coding.
c. Spread spectrum techniques are intended to suppress interference by
other users (hostile or friendly), to provide multiple access (user sharing), ..
and to eliminate multipath interference (self-jamming caused by a delayed
signal). The transmitted intelligence is deliberately spread across a very wide
frequency band in the operating spectrum so that it becomes hard to detect from
normal noise levels. The Enhanced Position Location Reporting System (EPLRS)
and the Joint Tactical Information Distribution System (JTIDS) use this
technique.
d. Adjustable power automatically limits the radiated power to a level
sufficient for effective communications, thereby reducing the electronic
signature of the subscriber. The radios currently planned for use in the Mobile
Subscriber Equipment (MSE), such as the radio access units (RAUs) and the
mobile subscriber radiotelephone terminals (MSRTs), use this feature.
e. Frequency hopping multiplexer (FHMUX) and high-power broadband
vehicular whip antennas (HPBVWA) are currently being developed. The FHMUX is
an antenna multiplexer used with SINCGARS in both stationary and mobile
operations. This multiplexer will allow up to five SINCGARS to transmit and
receive through one VHF-FM broadband antenna (OE-254 or HPBVWA) while operating
in frequency hopping mode, nonhopping mode, or a combination of both. It will
also be capable of operating with the current VRC-12 family of radios. Visual
and electronic profiles of command posts will be reduced by using one antenna
instead of up to five. Also, emplacement and displacement times will be greatly
reduced.
2-8
FM 24-33
Chapter 3
Remedial Electronic Counter-Countermeasures
Techniques
3-1. Introduction
Remedial ECCM techniques (Table 3-1) reduce the effectiveness of enemy
efforts to jam our radio nets. They apply only to enemy jamming efforts or any
unidentified or unintentional interference that disrupts our ability to
communicate. There are no remedial ECCM techniques that apply to other actions
the enemy might use to disrupt or destroy our communications. We must prevent
enemy jamming and interference-- after the enemy has gathered information about
us , we cannot get it back.
3-1
FM 24-33
3-2
FM 24-33
(8) Preamble jamming. This type of jamming occurs when a tone resembling
the synchronization preamble of the speech security equipment is broadcast over
the operating frequency of secure radio sets. Preamble jamming results in all
radios being locked in the receive mode. It is especially effective when
employed against radio nets using speech security devices.
b. Subtle jamming. Subtle jamming is not obvious; no sound is heard
from our receivers. They cannot receive an incoming friendly signal, even
though everything appears normal to the radio operator. Subtle jamming takes
advantage of design features of the AN/PRC-77 and AN/VRC-12 series radios. In
order to activate the receiver of an AN/PRC-77 in the SQUELCH mode or an
AN/VRC-12 series radio in the NEW SQUELCH ON mode, a 150-hertz tone must be
transmitted to them along with the carrier signal. In addition to this squelch
feature, the AN/PRC-77 and AN/VRC-12 series radio receivers lock onto the
strongest carrier signal received and eliminate the reception. of all other
signals. For example, if we have an AN/PRC-77 in the SQUELCH mode and an
AN/VRC-12 series radio in the NEW SQUELCH ON mode and they receive a jamming
signal without the 150-hertz tone, the receivers of these radios will not be
activated by any signal as long as the jamming signal is stronger than any
other signal being received. In effect, the threat jammers block out these
radios' ability to receive a friendly transmission without the operator being
aware it is happening. This is called squelch capture and is a subtle jamming
technique. The radio operator can readily detect jamming in all other function
control modes and the other modes must be checked. Often, we assume that our
radios are malfunctioning instead of recognizing subtle jamming for what it is.
3-3. Recognizing Jamming
a. Radio operators must be able to recognize jamming. Again, this is
not always an easy task. Threat jammers may employ obvious or subtle jamming
techniques. Also, interference may be caused by sources having nothing to do
with enemy jamming. Interference may be caused by the following:
Unintentionally by other radios (friendly and enemy).
Other electronic or electric/electromechanical equipment.
Atmospheric conditions.
Malfunction of the radio.
A combination of any of the above.
(1) Internal or external interference. The two sources of interference
are internal and external. If the interference or suspected jamming can be
eliminated or substantially reduced by grounding the radio equipment or
disconnecting the receiver antenna, the source of the disturbance is most
likely external to the radio. If the interference or suspected jamming remains
after grounding or disconnecting the antenna, the disturbance is most likely
3-3
FM 24-33
3-4
FM 24-33
(d) If the above tests indicate there is a high probability the radio is
being jammed, the operator should follow the local SOP to reestablish
communications and initiate a MIJI report informing higher headquarters of the
incident.
(2) AN/VRC-12 series radio.
(a) Turn the squelch control from the NEW SQUELCH ON to the NEW SQUELCH
OFF mode.
(b) Lack of noise and an unlighted call light may indicate that the
radio is being jammed by an unmodulated jamming signal. The operator should
temporarily disconnect the antenna. If normal static noise returns and the call
light goes off when the antenna is disconnected, the radio is most likely being
jammed by an unmodulated signal.
(c) A greater than normal level of noise or an obviously modulated
signal may indicate that the radio is being jammed by a noise-modulated jamming
signal. The operator should temporarily disconnect the antenna. If normal
static noise returns, and the call light goes off when the antenna is
disconnected, there is a high probability that the radio is being jammed by a
noise-modulated signal.
(d) If the above tests indicate that there is a high probability that
the radio is being jammed, the operator should follow the local SOP to
reestablish communications and initiate a MIJI report informing higher
headquarters of the incident.
(3) Other unique organizational radios. Signal officers should
coordinate with organic military intelligence units for assistance in
developing appropriate tests for special capacity radios or radios that are
unique to that specific organization. Examples of these are nonstandard issue,
off-the-shelf commercial, intermediate high frequency radios (IHFR), or
SINCGARS radios. Signal officers should ensure that their unit radio
operators are trained to use these radios.
3-4. Overcoming Jamming
The enemy constantly strives to perfect and use new and more confusing
forms of jamming. Our radio operators must be increasingly alert to the
possibility of jamming. Training and experience are the most important tools
operators have to determine when a particular signal is a jamming signal.
Exposure to the effects of jamming in training or actual situations is
invaluable. The ability to recognize jamming is important, because jamming is a
problem that requires action. Once it is determined that jamming is being used
against our radios, the following actions must be taken. If any of the actions
taken alleviate the jamming problem, we simply continue normal operations and
make a MIJI report to higher headquarters.
a. Continue to operate. Stop for a moment and consider what the enemy
is doing during his typical jamming operation. Usually, enemy jamming involves
3-5
FM 24-33
3-6
FM 24-33
3-7
FM 24-33
Chapter 4
Meaconing, Intrusion, Jamming, and Interference
Reporting
4-1. Introduction
a. Meaconing, intrusion, and jamming are deliberate actions intended to
deny an enemy the effective use of the electromagnetic spectrum. Interference
is the unintentional disruption of the effective use of the electromagnetic
spectrum by friendly, enemy, or atmospheric sources. Collectively, meaconing,
intrusion, jamming, and interference incidents are referred to as MIJI
incidents.
b. MIJI reports document all disruptions of--
Radios.
Radars.
Navigational aids (NAVAIDS).
Satellites.
Electro-optics.
Disruptions caused by equipment malfunctions or destruction are exceptions. The
MIJI report serves two purposes. First, it provides information to the tactical
commander allowing timely decisions to be made to overcome the MIJI problem.
Second, it provides a historical record of MIJI incidents from which
appropriate ECCM techniques and measures can be developed. This helps us to
counter future attempts by the enemy to deny us the effective use of the
electromagnetic spectrum.
c. This chapter gives instructions for completing MIJI reports for
communications and noncommunications emitters. To fulfill the two purposes
stated above, there are two kinds of MIJI reports. The MIJIFEEDER voice
template message is a brief report of a MIJI incident. It serves as a
decision-making tool for the command. The MIJIFEEDER record message is a
complete report of a MIJI incident. This provides a historical record from
which appropriate ECCM techniques and measures can be developed. DA Pam 25-7
gives instructions for completing the MIJI reports.
4-1
FM 24-33
4-2. Terms
a. Meaconing. Meaconing is a system of receiving radio beacon signals
from NAVAIDs and rebroadcasting them on the same frequency to confuse
navigation. The enemy conducts meaconing operations against us to prevent our
aircraft and ships from arriving at their intended targets or destinations.
Successful enemy meaconing causes--
Aircraft to be lured into hot landing zones or enemy airspace.
Ships to be diverted from their intended routes.
Bombers to expend ordnance on false targets.
Ground stations to receive inaccurate bearings or position locations.
b. Intrusion. Intrusion is intentionally inserting electromagnetic
energy into transmission paths in any manner. The object is to deceive
equipment operators or cause confusion. The enemy conducts intrusion operations
against us by inserting false information into our receiver paths. This false
information may consist of voice instructions, ghost targets, coordinates for
fire missions, or even rebroadcasting of prerecorded data transmissions.
c. Jamming. Jamming is deliberately radiating, reradiating, or
reflecting electromagnetic energy to impair the use of electronic devices,
equipment, or systems. The enemy conducts jamming operations against us to
prevent us from effectively employing our radios, radars, NAVAIDs, satellites,
and electro-optics.
d. Interference. Interference is any electrical disturbance that causes
undesirable responses in electronic equipment. As a MIJI term, interference
refers to the unintentional disruption of the use of radios, radars, NAVAIDs,
satellites , and electro-optics. This interference may be of friendly, enemy, or
atmospheric origin. For example, a civilian radio broadcast may interfere with
military communications.
4-3. MIJIFEEDER Voice Template
a. Purpose and use. The MIJIFEEDER voice template has only the
information needed to adequately inform the tactical commander of the incident
in a timely manner. It is used to make evaluation of enemy actions or
intentions easier and to provide data to implement appropriate counter-
countermeasures.
b. Reporting procedure.
(1) The MIJIFEEDER voice template is forwarded through the chain of
command to the unit operations center by the equipment operator experiencing
the MIJI incident. The report should be forwarded using the most expeditious
secure communications means available.
4-2
FM 24-33
(2) Upon receiving the MIJIFEEDER voice template, the signal officer--
(a) Coordinates the unit response to the MIJI incident with the unit
operations officer, intelligence officer, fire support officer, and unit
commander(s), as applicable and appropriate.
(b) Consolidates the voice templates referring to the same MIJI
incident.
(c) Forwards one MIJIFEEDER voice template report for each MIJI incident
through operations channels to the corps operations center or as appropriate.
This report should be accompanied by any requests for support the command needs
to overcome the MIJI problem.
(d) Initiates staff action to complete the MIJIFEEDER record message as
quickly as possible. (Coordination will not delay reporting the incident within
24 hours.)
(3) Upon receiving the MIJIFEEDER voice template, in the process of
forwarding it through operations channels, the signal officer at each
operations center takes the following actions:
(a) Provides support as requested by the unit submitting the voice
template report, if possible and deemed appropriate by the command.
(b) Informs the operations officer and intelligence officer of the
details of the MIJI incident.
c. Report format and contents. The MIJIFEEDER voice template has been
developed for use under the JINTACCS program. It is designed to ensure
interoperability on the battlefield during combined, joint, and intra-Army
operations. The standardized, simple format permits the expeditious
notification of appropriate action elements in time-critical situations. Only
the completed and underlined areas (as appropriate) of the format are
transmitted. As shown in Figure 4-1, MIJIFEEDER voice templates are self-
explanatory and contain ten items of information. When the message is
transmitted over nonsecure means , each line number is stated and the completed
information must be encrypted. When a secure means is used, the title of each
line is transmitted along with the completed information. The operator of the
affected system fills out the MIJIFEEDER voice template as shown below.
Line 1 - Enter the unit designation.
Line 2 - Enter the type of interference encountered:
Meaconing
Jamming
Intrusion
Interference
Chaff
4-3
FM 24-33
4-4
FM 24-33
4-5
FM 24-33
4-6
FM 24-33
4-7
FM 24-33
4-8
FM 24-33
4-9
FM 24-33
4-10
FM 24-33
4-11
FM 24-33
4-12
FM 24-33
4-13
FM 24-33
4-14
FM 24-33
4-15
FM 24-33
4-16
FM 24-33
4-17
FM 24-33
4-18
FM 24-33
4-19
FM 24-33
Appendix A
Entry List 11
Location
There are several different ways of giving a location in JINTACCS messages.
This entry list shows you how to write locations in the following ways:
UTM coordinates
Abbreviated UTM coordinates
Latitude and longitude (Lat/Long)
Verified latitude and longitude
Geographic reference (GEOREF)
Bearing and range (meters)
Bearing and range (nautical miles)
Basic Encyclopedia number (BE number)
When you use this entry list make sure to use the section called for by the
Chapter 3 message instructions. Also make sure to write your location to the
accuracy called for by the message instructions.
UTM
Follow the directions below to enter UTM coordinates.
(l). Enter the grid zone designator in first 3 spaces (2 numbers, 1 letter).
(2) . Enter 100,000 meter grid square (2 letters).
(3) . The next spaces (up to 5) are for casting.
(4). The next spaces (up to 5) are for northing.
A-1
FM 24-33
NOTE : Make sure to write UTM coordinates to the accuracy required by Chapter 3
directions. If you do not have the location to the required accuracy put zeros
in the spaces for the unknown values. For example, if you must write
coordinates to the nearest 1 meter, but you only know them to the nearest 100
meters enter:
ABBREVIATED UTM
Enter abbreviated UTM coordinates by following the same steps as above for UTM
coordinates EXCEPT start with step 2. (Do not enter in the grid zone
designator.) You can write abbreviated UTM coordinates to the accuracies shown
in the examples below.
LAT/LONG
Follow the directions below to enter Latitude and Longitude coordinates.
(1). Enter latitude in degrees (00-90), minutes (00-59), seconds (00-59). If
message instructions call for it, you may enter minutes or seconds to
the nearest tenth (.1).
(2) . Enter N for North latitude or S for South latitude.
(3) . Enter longitude in degrees (000-180), minutes (00-59), seconds (00-59).
If a message instructions call for it, you may enter minutes or seconds
to the nearest tenth (.1).
(4) . Enter E for East latitude or W for West latitude.
A-2
FM 24-33
VERIFIED LAT/LONG
Follow the directions below to enter verified Latitude and Longitude
coordinates.
(l). Enter latitude in degrees (00-90), minutes (00-59), and seconds (00-59).
(2). Enter N for North latitude or S for South latitude.
(3) . Enter the checksum digit for latitude (righthand digit of the sum of all
the digits in latitude).
(4) . Enter a hyphen (-).
(5). Enter longitude in degrees (000-180), minutes (00-59), and seconds
(00-59).
(6) . Enter E for East longitude or W for West longitude.
(7). Enter the checksum digit for longitude (righthand digit of the sum of
all the digits in longitude).
NOTE: Make sure to write verified LAT/LONG coordinates to the accuracy required
by Chapter 3 directions. If you do not have the location to the required
accuracy put zeros in the spaces for the unknown values. For example, if you
must write coordinates to the nearest second, but you only know them to the
nearest minute enter:
A-3
FM 24-33
GEOREF
Follow the directions below to enter GEOREF coordinates.
(l). Enter 2 letters for the 15-degree segment of the Earth defined by the
GEOREF system.
(2) . Enter 2 letters for the l-degree segment of the Earth defined by the
GEOREF system.
(3) . Enter 2 digits (00-59) to show the casting coordinate to the nearest
minute.
(4) . Enter 2 digits (00-99) to show the casting coordinate to the nearest
hundredth of a minute.
(5). Enter 2 digits (00-59) to show the northing coordinate to the nearest
minute.
(6). Enter 2 digits (00-99) to show the northing coordinate to the nearest
hundredth of a minute.
A-4
FM 24-33
NOTE: You can use bearing and range in meters to outline an area in set
"MINEFIELD" of the MINEOPS message or sets "MCMACT, MOA, and SAFELANE" of the
MCMOPS message. Use the repeatable field "location" as shown below:
(l). In the first field give the location of the first reference point. (Use
LAT/LONG, UTM, or location name.)
(2). In the next fields use bearing and range in meters to give the relative
location of each point from the point before it.
EXAMPLE: The example below shows an area where:
Point A is at 22° 15’ north latitude and 30° 9’ east longitude.
Point B is 5000 meters from the Point A in a direction of 45°
magnetic.
Point C is 3000 meters from Point B in a direction of 325° magnetic
A-5
FM 24-33
A-6
FM 24-33
A-7
FM 24-33
A-8
FM 24-33
A-9
FM 24-33
Appendix B
Entry List 97
Organization Type
ORGANIZATION TYPE CODE
Unknown UNK
Administrative ADMIN
Airborne Commando ABNCMDO
Airborne Infantry ABNINF
Air Cavalry AIRCAV
Air Defense Artillery AAA
Airmobile Infantry AMBLINF
Air-to-Air Missile AAM
Air-to-Surface Missile ASM
Amphibious Assault AMPHASLT
Amphibious Engineers AMPHENG
Amphibious Tank AMPHTK
Antiair Warfare AAW
Antiarmor Missile AARMMSL
Antisubmarine Warfare ASW
Armor ARMOR
Armored Cavalry ARMDCAV
Army Aviation ARMYAVN
Artillery Unit ARTY
Assault Engineers ASLTENG
Assault Landing ASLTLAND
Biological Ordnance BIO
Capable Unit
Bomber BMBR
Cavalry CAV
Chemical CHEM
Combat Engineers CMBTENG
Combat Service Support CMBTSPT
Combat Type Unknown CMBT
Combined Arms CMBARM
Commando CMDO
Composite Warfare CWC
Commander
Dismounted Cavalry DMTDCAV
B-1
FM 24-33
Electronic ECM
Countermeasures
Electronic Support ESM
Measures
Engineer ENG
EW Coordinator EWC
B-2
FM 24-33
Weather WX
B-3
FM 24-33
Appendix C
Entry List 98
Echelon Level
ECHELON LEVEL CODES
Unknown UNK
Battalion BN
Battery BTY
Border District BRDHQ
Headquarters
Brigade BDE
Detachment DET
Division DIV
Divisional Artillery DAG
Group
Field Army ARMY
Fleet F
Front FRNT
Group GP
Group of Forces GPFRCS
Group of Fronts GPFRNT
C-1
FM 24-33
Komendatura KMDTR
Major Fleet FLT
Otryad OTRYD
Patrol PTRL
Platoon PLT
Regiment RGT
Regimental Artillery RAG
Group
Section SEC
Squad SQD
Squadron SQ
Zastrova ZASTRV
C-2
FM 24-33
Appendix D
D-1
FM 24-33
D-2. Procedures
a. The following may indicate that your systems are being interfered
with either intentionally or unintentionally:
Subscribers report that trunks are noisy, or that the speech of the
other party is fuzzy or unintelligible.
Subscribers and switchboard operators report no contact with a
particular unit(s).
You are unable to make contact with the distant end on the
orderwire.
b. The following steps reduce or eliminate the effects of ECM or mutual
interference:
Checking equipment for proper alignment and frequency.
Increasing power if possible.
Checking antenna for correct azimuth and polarization.
Varying antenna height or relocating antenna.
Requesting a new frequency if the above fails to work.
Initiating a MIJI report.
D-2
FM 24-33
Glossary
Abbreviations and Acronyms
AM amplitude modulated
AR Army regulation
ARTEP Army Training and Evaluation Program
attn attention
AUTOVON automatic voice network
BE basic encyclopedia
BFO beat frequency oscillator
bn battalion
c CONFIDENTIAL
CEOI communications-electronics operation instructions (see
SOI)
CEWI combat electronic warfare and intelligence
COMINT communications intelligence
COMSEC communications security
CPT captain
CW continuous wave
3
C command, control, and communications
3
C CM command, control, and communications countermeasures
DA Department of the Army
DF direction finder
ECCM electronic counter-countermeasures
ECM electronic countermeasures
Glossary-1
FM 24-33
E-O electro-optics
EEFI essential elements of friendly information
EPLRS Enhanced Position Location Reporting System
ESM electronic warfare support measures
EW electronic warfare
FHMUX frequency hopping multiplexer
FLOT forward line of own troops
FM frequency modulated/field manual (when used with a
number)
G2 Assistant Chief of Staff, G2 (Intelligence)
G3 Assistant Chief of Staff, G3 (Operations and Plans)
GEOREF geographic reference
GHz gigahertz
HF high frequency
hi high
HPBVWA high-power broadband vehicular whip antenna
HQ headquarters
IAW in accordance with
IED imitative electronic deception
inf infantry
IHFR intermediate high frequency radio
JEWC Joint Electronic Warfare Center
JINTACCS Joint Interoperability of Tactical Command and Control
Systems
JTF joint task force
JTIDS Joint Tactical Information Distribution System
Glossary-2
FM 24-38
Glossary-3
FM 24-33
Terms
AUTHENTICATION. A security measure designed to protect a communications
system against acceptance of a fraudulent transmission or simulation by
establishing the validity of a transmission, message, or originator.
BREVITY CODE. A code which provides no security but which has as its
sole purpose the shortening of messages rather than the concealment of their
content.
COMMUNICATIONS-ELECTRONICS OPERATION INSTRUCTIONS (CEOI). (See signal
operation instructions.)
COMMUNICATIONS INTELLIGENCE (COMINT). Intelligence and technical
information derived from foreign communications by other than the intended
recipients.
COMMUNICATIONS SECURITY (COMSEC). The protection resulting from all
measures designed to deny unauthorized persons information of value which
might be derived from the possession and study of telecommunications, or to
mislead unauthorized persons in their interpretation of the results of such
possession and study.
Glossary-4
FM 24-83
Glossary-5
FM 24-33
Glossary-6
FM 24-33
.
Glossary-7
FM 24-33
References
Required Publications
References-1
FM 24-33
Forms
DA Form 2028 Recommended Changes to Publications and Blank Forms
Related Publications
Projected Publications
Projected publications are sources of additional information that
are scheduled for printing but are not yet available. Upon print, they will
be distributed automatically via pinpoint distribution. They may not be
obtained from the USA AG Publications Center until indexed in DA Pamphlet
25-30.
Field Manual (FM)
24-35 (0) Signal Operation Instructions
“The SOI”
*Allied Restricted
References-2
FM 24-33
Index
Index-1
FM 24-33
Index-2
FM 24-33
Index-3
FM 24-33
17 JULY 1990
CARL E. VUONO
General, United States Army
Chief of Staff
Official:
WILLIAM J. MEEHAN, II
Brigadier General, United States Army
The Adjutant General
DISTRIBUTION: