Custom Search
 
  

 
FIELD MESSAGE FORMAT AND PREPARATION

The field message book, NAVMC 694, is primarily and extensively used in a tactical environment. Each book contains a hundred message forms that are self-carboning for easy duplication. A sample message and instructions for preparing field messages are depicted in figure 11-27. Spaces are provided at the bottom of the form to record the time of receipt (TOR) and time of delivery (TOD). The form is also a convenient reference when records are necessary.

TACTICAL MESSAGE FORMATS

The different types of reports and their content are published in the battalion's operations order (OPORD). On a patrol or in an emergency, you cannot always readily refer to the OPORD. Providing inadequate information, or even worse no information, about tactical situations can be harmful and can prevent a proper response. Always depict who, what, when, where, and how, if known; then, follow it up later as more information becomes available. The rule of thumb for reporting tactical information is to remember the following acronym SALUTE.

Size of enemy unit

Activity of enemy unit

Location of enemy unit(s)

Uniform worn by the enemy

Time of each activity noted

Equipment used or carried by the enemy

SECURITY

An important rule of communication is to remember that the enemy is always listening; therefore, we must always use correct security procedures when communicating classified information. Even seemingly unimportant unclassified information can be a valuable source of intelligence to the enemy. So certain information is prohibited from being transmitted in the clear. This type of information is known as Essential Elements of Friendly Information (EEFI).

The EEFI system is actually a code that allows us to notify one another of a security breach that has occurred over a circuit. The term used to identify a violation of this type is BEADWINDOW (example: BEADWINDOW THREE). This indicates to the

Figure 11-27.--Sample message and instructions.

transmitting station that he has violated security. The only response to a BEADWINDOW is ROGER OUT. All violations must be reported. BEADWINDOW procedures are incorporated into the OPORD. They are given below. Others can be added at the discretion of the commander.







Western Governors University
 


Privacy Statement - Copyright Information. - Contact Us

Integrated Publishing, Inc. - A (SDVOSB) Service Disabled Veteran Owned Small Business