Thursday, April 18, 2019

O.I.G.O.T.A. Communication Protocols


PRC 77 w/Digital Authentication




O.I.G.O.T.A. Communication Protocols
CITGO/ 7-eleven
Best Buy
PUBLIX
Walmart
Save A Lot
Walgreens
Johnson and Johnson Growers on route 66 + Growers formerly Winn Dixie
Murphy’s
Raceway
CenturyLink
Duke Energy
Progress Energy


  1. PRC 77 w/Digital Authentication

    Code BLACKOUT - Commo Via Radio
    radio wave scrambled out to radio in to conversion by removal of encryption
    digital authentication
    verbal to make both are on the same page
    i authenticate abc123 i authenticate 456dfg
    from the same page pp. 16 see? out

    Communication Protocols:
    1. Wi-Fi + Multi Wi-Fi + Extenders
    2. Cell Phones – With Talk, Media and Text abilities
    3. Two way Radio Communications. With Weather forcast
    4. Rules & Regulations for Title 47
    Search FCC Rules by:
    Security Levels;
    1. Above Top Secret = the Spirit Code
    2. Top Secret Security Clearance required to enter a Above Top Secret Facility
    Example: Source to Top Secret Delivery Agency to the Door stop of Above Top Secret
    1. Secret Clearance required to enter a Top Secret Facility
    2. Confidential Clearance require to enter the DOD.
    3. Civilian Clearance – Proof of citizenship require to walk the streets or be in any private or government facility or Union Jurisdiction during war time. There can be no tourist. All movement most be of Lawful Nature.

    List of FRS channels compared to GMRS Communications Corps to [edit] G.O.T.A for Use during war time.

    Channel
    Frequency (MHz)
    FRS EIRP Restriction
    GMRS EIRP Restriction
    1
    462.5625
    Up to 2 watt
    Up to 5 watts
    2
    462.5875
    Up to 2 watt
    Up to 5 watts
    3
    462.6125
    Up to 2 watt
    Up to 5 watts
    4
    462.6375
    Up to 2 watt
    Up to 5 watts
    5
    462.6625
    Up to 2 watt
    Up to 5 watts
    6
    462.6875
    Up to 2 watt
    Up to 5 watts
    7
    462.7125
    Up to 2 watt
    Up to 5 watts
    8
    467.5625
    Up to 0.5 watt
    Up to 0.5 watt[6]
    9
    467.5875
    Up to 0.5 watt
    Up to 0.5 watt[6]
    10
    467.6125
    Up to 0.5 watt
    Up to 0.5 watt[6]
    11
    467.6375
    Up to 0.5 watt
    Up to 0.5 watt[6]
    12
    467.6625
    Up to 0.5 watt
    Up to 0.5 watt[6]
    13
    467.6875
    Up to 0.5 watt
    Up to 0.5 watt[6]
    14
    467.7125
    Up to 0.5 watt
    Up to 0.5 watt[6]
    15
    462.5500
    Up to 2 watt
    Up to 50 watts
    16
    462.5750
    Up to 2 watt
    Up to 50 watts
    17
    462.6000
    Up to 2 watt
    Up to 50 watts
    18
    462.6250
    Up to 2 watt
    Up to 50 watts
    19
    462.6500
    Up to 2 watt
    Up to 50 watts
    20
    462.6750
    Up to 2 watt
    Up to 50 watts
    21
    462.7000
    Up to 2 watt
    Up to 50 watts
    22
    462.7250
    Up to 2 watt
    Up to 50 watts
    • GMRS has other exclusive channels
    • FRS channels 8-14 are exclusively FRS with no detachable antenna such as found on GMRS equipment. No FRS unit shall exceed 0.5 watt (EIRP) Effective Isotropic Radiated Power on channels 8-14. FRS Channels 15-22 are shared with GMRS also under 2 watt EIRP limit. However, if the device includes any of the following channels (467.5500, 467.5750, 467.6000, 467.6250, 467.6500, 467.6750, 467.7000, and 467.7250 MHz) a GMRS license is required. Benefits of a GMRS license include the ability to use repeaters, run higher power (up to 50 watts), and utilize external antennas, which result in much greater communication distances. [1][6]
    Music Choice shutdown – Copyrights and royalties infringements – They are giving my media away and charging for the access to steal.




    A Lie: subpoena all Records at Comcast another stolen Business, who must pay back all Royalties and there is no residuals. Look up the damn word. A.S.C.A.P. pay all members being Artist, Composers, actors and Producers and often these are team efforts – Royalties for their contributions to society and might throw a criminal in the pit and throw away the key for intentional detriment to society.


    Residuals: remaining after the greater part or quantity has gone.
    This means you pay the cost to run your presentation in royalties and if you make loot over the top that is the remaining loot. A great way for talented promoters to make a living. A television station, radio, internet stations and cannot operate by payment to actors in leftovers after you gets yours, it is the other way around.


    I-Heart Media and Entertainment owns Clear Channel 
    Jesus Christ, INC owns I-Heart Media and Entertainment
    Sony Catalogs are not owned by any of these corporations nor is Microsoft or Motorola is not a part of this conspiracy to steal Media and pimp the actors and artist.
    Radio Authentication. Prevent and detect unauthorized access into the system. Radio Authentication provides an additional layer of protection, every time a radio registers to the system. The Authentication Center is a central database that stores the authentication keys for all P25 radios in the system.
    Prevent and detect unauthorized access into the system. Radio Authentication provides an additional layer of protection, every time a radio registers to the system. The Authentication Center is a central database that stores the authentication keys for all P25 radios in the system. Any unauthorized radio, without the correct key, will be denied access to the system and an alert will be sent to the system manager.

    Technology to be [edit] by Communications Corps

    IBM/Microsoft – Mobile – Links to CenturyLink + Motorola
    • Mobile computing, a generic term describing one's ability to use technology in mobile environments
    • Mobile device, such as a smartphone, tablet, or computer designed for mobile computing
    • Mobile game, a video game played on a mobile phone, smartphone, PDA or handheld computer
    • Mobile network operator, a company which provides mobile phone network access and services
    • Mobile operating system, the various underlying systems to power and run phones
    • Mobile radio, wireless communications systems and devices which are based on radio frequencies
    • Mobile station, user equipment and software needed for communication with a wireless telephone network
    • Mobile Web, the World Wide Web as accessed from mobile devices using Mobile Web Browser
    • Mobile TV, TV services viewed via a mobile device
    Internet Televising is coming out of BETA
    YouTube owned by Bancorp Bank is owner of Pay Pal and Net Spend;
    BET Internet Television – Linking BET, CNN and Revolution Capital Group: Fraud–Fraud-Fraud however on record the owner is Jesus Christ, INC.
    1. Get you profile account to access Free Internet Television.
    2. In the process you explain what type of things you would like to know about to buy.
    3. Then you Customer Sale Rep. will place suggestions or interest of profile to the send to Marketing.
    4. Marketing has an assortment of ads pending slots.
    5. Then using the Tyra Tool – a PCS-MIS application to setup your ads, based on interest.
    6. Now a guy links to know about the Paul Castellano Studio and you get, what your interest are, no one shoe fit all productions and ads. Internet Televises earns because you will b asking for commercial about product of interest and I tell you a sales rep within say 1,000 clients will earn much more than a person on the floor.
    7. A great opportunity


    Ending unlimited Internet Access to achieve real e-commerce and in all fairness make sure everyone involved gets paid and this begins at ASCAP and not the ISP, With current arrangement the only people getting paid is the ISP. Why? There is no residuals unless you are a professional promoter whose earning is residual based.
    Example of these type of business arrangements are:
    • Private Presentations.
    • Adult markets
    • A major Concert
    Megabytes per second
    Mbps stands for Megabits per second. MBps stands Megabytes per second. The two terms are similar, but Mbps is used to specify Internet connection speeds, whereas MBps is used to specify how much of a file is downloaded/uploaded per second.
    In these cases, the copyrights in all cases get paid off the top directly from the marketing Department and they have to have records of everything being played.
    How it works?
    Mbps exempt Programs or limit Mbps or subsidized Mbps.
    In other words, say you get 50 Mbps per month. On BET Internet T.V. there is a two way street so to speak. To receive a presentation the frequency has to be resonated. This is an indication of your use of the Internet T.V. Now say like in the old days they world run I love Lucy all night long, while nobody is even watching the T.V. It was great entertainment but how many hours of sitcoms ran unwatched? If you are resonated t a station, on BET Internet T.V. at the other end the Technician know basically prime time v. late night viewership.
    Now if you just got to watch your favorite late night show, you may have the option of paying for the view in Mbps, wherefore, during prime most shows will most likely be Mbps Exempt.
    Email, certain researching and this of business or personal needs you pay in Mbps, at say 50G per say 50 bucks. If you used up say 1 G, the cost would be 1 credit $ or Z or whatever.  But why should say Paul Castellano studios pay for you use of email or whatever and there is nothing in it for them.
    Radio Communications authentications systems
    PRC-77 VHF radio with digital voice encryption device
    Communications security is the discipline of preventing unauthorized interceptors from accessing telecommunications in an intelligible form, while still delivering content to the intended recipients.
    In the North Atlantic Treaty Organization culture, including United States Department of Defense culture, it is often referred to by the abbreviation COMSEC. The field includes cryptographic securitytransmission security, emissions security and physical securityof COMSEC equipment and associated keying material.
    COMSEC is used to protect both classified and unclassified traffic on military communications networks, including voice, video, and data. It is used for both analog and digital applications, and both wired and wireless links.
    Voice over secure internet protocol VOSIP has become the de facto standard for securing voice communication, replacing the need for Secure Terminal Equipment (STE) in much of NATO, including the U.S.A. USCENTCOM moved entirely to VOSIP in 2008.[1]

    Specialties[edit]

    • Cryptographic security: The component of communications security that results from the provision of technically sound cryptosystems and their proper use. This includes ensuring message confidentiality and authenticity.
    • Emission security (EMSEC): The protection resulting from all measures taken to deny unauthorized persons information of value that might be derived from communications systems and cryptographic equipment intercepts and the interception and analysis of compromising emanations from cryptographic—equipment, information systems, and telecommunications systems.[2]
    • Physical security: The component of communications security that results from all physical measures necessary to safeguard classified equipment, material, and documents from access thereto or observation thereof by unauthorized persons.

    Related terms[edit]

    • AKMS = the Army Key Management System
    • AEK = Algorithmic Encryption Key
    • CT3 = Common Tier 3
    • CCI = Controlled Cryptographic Item - equipment which contains COMSEC embedded devices
    • ACES = Automated Communications Engineering Software
    • ICOM = Integrated COMSEC, e.g. a radio with built in encryption
    • TEK = Traffic Encryption Key
    • TED = Trunk Encryption Device such as the WALBURN/KG family
    • KEK = Key Encryption Key
    • KPK = Key production key
    • OWK = Over the Wire Key
    • LCMS = Local COMSEC Management Software
    • KYK-13 = Electronic Transfer Device
    • KOI-18 = Tape Reader General Purpose
    • KYX-15 = Electronic Transfer Device
    • KG-30 = family of COMSEC equipment
    • TSEC = Telecommunications Security (sometimes referred to in error transmission security or TRANSEC)
    • STU-III (obsolete secure phone, replaced by STE)
    • STE - Secure Terminal Equipment (secure phone)
    Types of COMSEC equipment:
    • Crypto equipment: Any equipment that embodies cryptographic logic or performs one or more cryptographic functions (key generation, encryption, and authentication).
    • Crypto-ancillary equipment: Equipment designed specifically to facilitate efficient or reliable operation of crypto-equipment, without performing cryptographic functions itself.[3]
    • Crypto-production equipment: Equipment used to produce or load keying material
    • Authentication equipment:

    DoD Electronic Key Management System[edit]

    The Electronic Key Management System (EKMS) is a United States Department of Defense (DoD) key management, COMSEC material distribution, and logistics support system. The National Security Agency (NSA) established the EKMS program to supply electronic key to COMSEC devices in securely and timely manner, and to provide COMSEC managers with an automated system capable of ordering, generation, production, distribution, storage, security accounting, and access control.
    The Army's platform in the four-tiered EKMS, AKMS, automates frequency management and COMSEC management operations. It eliminates paper keying material, hardcopy SOI, and associated time and resource-intensive courier distribution. It has 4 components:
    • LCMS provides automation for the detailed accounting required for every COMSEC account, and electronic key generation and distribution capability.
    • ACES is the frequency management portion of AKMS. ACES has been designated by the Military Communications Electronics Board as the joint standard for use by all services in development of frequency management and cryptonet planning.
    • CT3 with DTD software is in a fielded, ruggedized hand-held device that handles, views, stores, and loads SOI, Key, and electronic protection data. DTD provides an improved net-control device to automate crypto-net control operations for communications networks employing electronically keyed COMSEC equipment.
    • SKL is a hand-held PDA that handles, views, stores, and loads SOI, Key, and electronic protection data.

    Key Management Infrastructure (KMI) Program[edit]

    KMI is intended to replace the legacy Electronic Key Management System to provide a means for securely ordering, generating, producing, distributing, managing, and auditing cryptographic products (e.g., asymmetric keys, symmetric keys, manual cryptographic systems, and cryptographic applications). This system is currently being fielded by Major Commands and variants will be required for non-DoD Agencies with a COMSEC Mission. [4]

    See also[edit]

    References[edit]

    1. ^ USCENTCOM PL 117-02-1.
    2. ^ "AIR FORCE AIR INTELLIGENCE, SURVEILLANCE AND RECONNAISSANCE AGENCY INSTRUCTION 33-203" (PDF). The Air Force ISR Agency Tempest and Emission Security Program. Air Force Intelligence, Surveillance and Reconnaissance Agency. May 25, 2011. Archived (PDF) from the original on October 20, 2013.
    3. ^ INFOSEC-99
    This article includes a list of references, but its sources remain unclear because it has insufficient inline citations. Please help to improve this article by introducingmore precise citations. (July 2010) (Learn how and when to remove this template message)
    G.O.T.A.











No comments:

Post a Comment