a normal call-up. The calling station then says the word
BEADWINDOW followed by the number of the
EEFI the violator disclosed.
The only authorized reply to the BEADWINDOW
message is ROGER-OUT. This method allows the
reported unit to take immediate action to correct the
insecure practice. In this particular situation, if the call
sign of the net control is Control and the call sign of
the violator is USS Frances Scott Key, Controls report
The EEFI list should be posted in clear sight of the
operator at all nonsecure voice positions for quick
reference. You should remember that procedural
violations are not security violations; therefore, they
dont fall in the BEADWINDOW category.
IMPORTANCE OF RADIOTELEPHONE
Poor voice communications can create confusion,
reduce reliability and speed, and nullify security
precautions. Poor procedures can ultimately have an
adverse effect on the mission of a ship.
A commanding officer, regardless of the mission of
the ship, has only one real-time means of
communicating with his commander and other units of
a forceradiotelephone. Your ship maybe required to
guard (monitor) 10 or more voice circuits, each having a
specific purpose and specific procedures. Few of these
circuits are operated from communications spaces
except on small ships, such as submarines or destroyers.
On larger ships, the circuits are handled from the bridge
and the combat information center (CIC).
As an operator, you are responsible for providing
reliable transmitter and receiver services to these
remote operating positions. This entails establishing
communications on a net or circuit before making that
net or circuit available to the remote operators. If you do
not know the various nets that are guarded by your ship
and the purpose of these nets, the overall
communications of the ship can be degraded. This
could impede the progress of the entire operation.
Modern, high-speed naval operations make the
elimination of confused R/T operations an absolute
necessity. For example, a hunter-killer force searching
for an enemy submarine is not permitted the luxury of a
5- or 10-minute delay in executing a screening signal.
An unnecessary delay such as this could defeat the
purpose (speed) of the officer in tactical command
(OTC) when using R/T. A 1-minute delay by an aircraft
carrier pilot in executing a vectoring signal because he
did not understand the message could easily result in the
During shakedown operations, a submarine could
risk collision with its escort vessel during emergency
surfacing procedures if voice communications are not
When possible, you must use only standard
phraseology, authorized prowords, and brevity code
words. Standard procedures enhance reliability and
clarity. Moreover, variations from standard circuit
procedures provide an ideal situation for enemy
BASIC RADIOTELEPHONE MESSAGE
Radiotelephone uses a 16-line message format
(table 2-4) that is comparable to formats in teleprinter
communications. Radiotelephone messages also have
the same three military message forms: plaindress,
abbreviated plaindress, and codress.
By far, the most common message form in R/T
traffic is the abbreviated plaindress. In fact, the
abbreviated plaindress message is sometimes so
abbreviated that it closely resembles the basic message
format. The three major message parts-heading, text,
and endingare there, however. Each of these major
parts is reduced to components and elements.
All format lines do not necessarily appear in every
message. When a line is used, it must be placed in the
message in the order shown in table 2-4. An
abbreviated plaindress message may omit any or all of
the following: precedence, date, date-time group
(DTG), and/or group count. A codress message is one in
which the entire address is encrypted within the text.
The heading of a codress message contains only
information necessary to enable communications
personnel to handle it properly.
Notice that prowords, not prosigns, are used in
voice communications. Because prowords are spoken,
it is important that you, as the operator, be completely
familiar with them. Refer to table 2-2 for a list of many
of the commonly used prowords, their explanations,
and their equivalent prosigns. Throughout this chapter,
prowords are shown in all capital letters.