February's speaker will be Buddy WB4OMG. He will both demonstrate and speak on the subject of weak signal propagation.
To get the most out of this event requires a little extra effort on your part. A demo is scheduled twenty minutes before the meeting, so come twenty to thirty minutes or so early so that you can participate. Bring your dual band HT's.
Buddy WB4OMG will park his car outside the entrance. It will be configured with his Contest "Rover" setup, consisting of a Jetta with a IC 7100. This configuration has a drive over mount, that supports a 12 foot mast. On this mast are a dipole for 6M and yagis for 2m and 70 cm.
Don, WA3RGQ, of Winter Haven, a very experienced Weak Signal Op, has agreed to attend the meeting. He will be available to answer questions before and after the meeting.
The superiority of SSB vs FM will be demonstrated prior to the meeting. Radios used in the demo will be equipped with special loop antennas. Before the meeting, Dave will drive far enough away that he can not communicate using FM. Buddy and Dave will then switch to SSB and have a QSO. LARC members are encouraged to bring their 2m/70cm dual band H/Ts so that they can participate in at least the FM portion of the demo.
Lastly, Buddy will demonstrate a 5.7 GHz station during his presentation.
So plan to come early, and bring your HT's. Make this meeting a hands on event.
Friday, January 30, 2015
Saturday, January 24, 2015
Some of the music played at Keith's Service.
The memorial service for Keith Collins, WB1GGJ/SK was held on Thursday, January 29, at 10:00 AM in the Victory Church, 1401 Griffin Rd. Lakeland, Florida. Burial at the Bushnell National Cemetery followed. Keith's remains were interred with full military honors.
Keith was a longtime member of the club, a regular on the Thursday night net, and an avid QRP operator.
Friday, January 23, 2015
Thursday, January 22, 2015
Wednesday, January 21, 2015
Click here for the PDF version of the brochure
Friday, January 16, 2015
Saturday, January 10, 2015
Intelligence can make or break you on the battlefield, as well as in the boardroom. At one time the only option for front line leaders was to gather information, analyze it on the fly, and take their best shot. Over time, as intelligence gathering became more sophisticated, and analysis became more centralized, analysis was often made far from the front lines. This necessitated that decisions, strategies, and plans be transmitted back to commanders in the field, securely and in a timely fashion.
Over the years there have been many ingenious ways of transmitting information securely, some better than others. One method known as steganography hides the message in plain sight. For example, if Cesar needed to get a message to field commanders he may have had it written on a soldiers belt that had first been wrapped about the standard staff, carried by all high ranking officers. A messenger wearing the belt would then travel to the front lines. On arrival his belt would be removed and re-wrapped around the proper diameter staff, revealing the message. If the belt fell into enemy hands, the inscriptions on it would appear to be nonsense. Not very secure, but better than nothing. As children, most of us experimented with invisible ink of one kind or another. In some cases, the misplacement of commas and periods in an otherwise innocent looking letter has been used to carry a coded message. All are ways of hiding a message in plain sight.
By the time of the Civil War the telegraph was used to convey information from central command to officers in the field. With the Great War came the use of wireless, and along with both, the need for some kind of encryption. Encryption methods vary in complexity from the simple shift codes to variations of the box code. Shift codes are implemented by shifting letters up a given number of characters. Shift-one would have you shift each letter up one character in the alphabet to encode, and down one to decode. Perhaps the most famous example of this, according to some, is the name of the computer in Space Odyssey 2001. Shift the letters for HAL up one letter to see what I mean. Box codes are arrays of letters, often five rows of five letters each. Messages are spelled out by giving the row and column of the letters in the box that form the message.
There is a downside to box and shift codes. Any one who has studied Morse code knows that some letters are used more than others. This is the reason the most used letter in the English language, e, is a single dot. The next most used letter is t, a single dash. More popular are the i’s and m’s followed by the s’s and o’s. Given this information, you can see how someone could decode a message using something like the shift or box codes, by replacing the most frequently occurring letter with an e, next most with a t, etc.
A more secure method might be something as simple as a copy of a novel that everyone who needs to code or decode messages has in their possession. This was the basis for the plot of the film “ Three Days of the Condor.” To send a message, randomly pick a page, that contains the first letter and code it with the page number, line number, and the number of characters from the beginning of the line. Repeat for each letter in the message. Only those who know the procedure, and have a copy of the same edition of the novel will be able to decode the message. With this type of encryption, character frequency is not going to be of much help. Mechanical devices have been devised to do something similar. The famous Enigma machine is one example of this. Similar to a typewriter it could be made to scramble letters of a message, in random fashion, and more importantly, could be rewired on a regular basis to be extra sure that letter patterns were not detectable.
Codebooks and machines have the disadvantage that they may fall into the wrong hands. One way around this is a technique used in PGP, which stands for pretty good privacy. Here two keys are needed to unlock a message. One is public, the other private. This eliminates the need for everyone to have the same codebook. If it becomes known that one persons private code has been jeopardized, one simply needs to not send that person any information you would rather not fall into the wrong hands. The private key is only good for decoding messages sent to its holder.
In many instances it is not necessary to know the content of the message to gain intelligence. For example, if it is observed that several stations are all reporting to one station, it is a good bet that the station reported to is headquarters, and by using triangulation it is possible to locate it as well as all reporting to it.
The evolution of encryption and intelligence gathering techniques continues to grow with new technologies, and ever improving methods of data collection and analysis, conducted by large government organizations like the NSA.