February's speaker will be Buddy WB4OMG. He will both demonstrate and speak on the subject of weak signal propagation.
To get the most out of this event requires a little extra effort on your part. A demo is scheduled twenty minutes before the meeting, so come twenty to thirty minutes or so early so that you can participate. Bring your dual band HT's.
Buddy WB4OMG will park his car outside the entrance. It will be configured with his Contest "Rover" setup, consisting of a Jetta with a IC 7100. This configuration has a drive over mount, that supports a 12 foot mast. On this mast are a dipole for 6M and yagis for 2m and 70 cm.
Don, WA3RGQ, of Winter Haven, a very experienced Weak Signal Op, has agreed to attend the meeting. He will be available to answer questions before and after the meeting.
The superiority of SSB vs FM will be demonstrated prior to the meeting. Radios used in the demo will be equipped with special loop antennas. Before the meeting, Dave will drive far enough away that he can not communicate using FM. Buddy and Dave will then switch to SSB and have a QSO. LARC members are encouraged to bring their 2m/70cm dual band H/Ts so that they can participate in at least the FM portion of the demo.
Lastly, Buddy will demonstrate a 5.7 GHz station during his presentation.
So plan to come early, and bring your HT's. Make this meeting a hands on event.
Friday, January 30, 2015
Saturday, January 24, 2015
Memorial Service for Keith Collins January 29, 2015
Some of the music played at Keith's Service.
The memorial service for Keith Collins, WB1GGJ/SK was
held on Thursday, January 29, at 10:00 AM in the Victory Church, 1401 Griffin Rd.
Lakeland, Florida. Burial at the Bushnell National Cemetery followed. Keith's remains
were interred with full military honors.
Keith was a longtime member of the club, a regular on the
Thursday night net, and an avid QRP operator.
Friday, January 23, 2015
Thursday, January 22, 2015
Southcars Fifth Annual Tailgate Party
February 24, 2015 - Lakeland Florida
The Golden Corral, US 98 North, Lakeland
The Fifth Annual Lakeland, Florida. Tailgate party/Luncheon get together.
Where: The Golden Corral Buffet & Grill , 4705 US Route 98 North, Lakeland, Florida 33810
When: January. 24, 2015 Tail gate starts at 9:00 am followed by lunch at 12:00 noon
Wednesday, January 21, 2015
Brooksville Hamfest February 21st 2015
The Brooksville Hamfest is only a few weeks away on February 21st. We are planning on the biggest, best Hamfest in memory. I hope you have made plans to attend. Attached you will find a flyer with details and a $1.00 discount coupon for entrance. Print it out and bring it with you.
Click here for the PDF version of the brochure
Click here for the PDF version of the brochure
Friday, January 16, 2015
Saturday, January 10, 2015
Mark Haskell WB9UJS On Cryptography
Intelligence can make or break you on the battlefield, as
well as in the boardroom. At one time the only option for front line leaders
was to gather information, analyze it on the fly, and take their best shot.
Over time, as intelligence gathering became more sophisticated, and analysis
became more centralized, analysis was often made far from the front lines. This necessitated that decisions,
strategies, and plans be transmitted back to commanders in the field, securely
and in a timely fashion.
Over the years there have been many ingenious ways of
transmitting information securely, some better than others. One method known as
steganography hides the message in plain sight. For example, if Cesar needed to
get a message to field commanders he may have had it written on a soldiers belt
that had first been wrapped about the standard staff, carried by all high
ranking officers. A messenger wearing the belt would then travel to the front
lines. On arrival his belt would be removed and re-wrapped around the proper
diameter staff, revealing the message. If the belt fell into enemy hands, the
inscriptions on it would appear to be nonsense. Not very secure, but better
than nothing. As children, most of us experimented with invisible ink of one
kind or another. In some cases, the misplacement of commas and periods in an
otherwise innocent looking letter has been used to carry a coded message. All
are ways of hiding a message in plain sight.
By the time of the Civil War the telegraph was used to
convey information from central command to officers in the field. With the
Great War came the use of wireless, and along with both, the need for some kind
of encryption. Encryption methods vary in complexity from the simple shift
codes to variations of the box code. Shift codes are implemented by shifting
letters up a given number of characters. Shift-one would have you shift each
letter up one character in the alphabet to encode, and down one to decode.
Perhaps the most famous example of this, according to some, is the name of the
computer in Space Odyssey 2001. Shift the letters for HAL up one letter to see
what I mean. Box codes are arrays of letters, often five rows of five letters
each. Messages are spelled out by giving the row and column of the letters in
the box that form the message.
There is a downside to box and shift codes. Any one who has
studied Morse code knows that some letters are used more than others. This is
the reason the most used letter in the English language, e, is a single dot.
The next most used letter is t, a single dash. More popular are the i’s and m’s
followed by the s’s and o’s. Given this information, you can see how someone
could decode a message using something like the shift or box codes, by
replacing the most frequently occurring letter with an e, next most with a t,
etc.
A more secure method might be something as simple as a copy
of a novel that everyone who needs to code or decode messages has in their
possession. This was the basis for the plot of the film “ Three Days of the
Condor.” To send a message, randomly pick a page, that contains the first
letter and code it with the page number, line number, and the number of
characters from the beginning of the line.
Repeat for each letter in the message. Only those who know the
procedure, and have a copy of the same edition of the novel will be able to
decode the message. With this type of encryption, character frequency is not
going to be of much help. Mechanical devices have been devised to do something
similar. The famous Enigma machine is one example of this. Similar to a
typewriter it could be made to scramble letters of a message, in random
fashion, and more importantly, could be rewired on a regular basis to be extra
sure that letter patterns were not detectable.
Codebooks and machines have the disadvantage that they may
fall into the wrong hands. One way around this is a technique used in PGP,
which stands for pretty good privacy. Here two keys are needed to unlock a
message. One is public, the other private. This eliminates the need for
everyone to have the same codebook. If it becomes known that one persons
private code has been jeopardized, one simply needs to not send that person any
information you would rather not fall into the wrong hands. The private key is
only good for decoding messages sent to its holder.
In many instances it is not necessary to know the content of
the message to gain intelligence. For example, if it is observed that several
stations are all reporting to one station, it is a good bet that the station
reported to is headquarters, and by using triangulation it is possible to
locate it as well as all reporting to it.
The evolution of encryption and intelligence gathering
techniques continues to grow with new technologies, and ever improving methods
of data collection and analysis, conducted by large government organizations
like the NSA.
Supplying The Airwaves With New Hams
As SpaceX Lifts off to supply the International Space Station, new hams begin and or advance in their careers in Amateur Radio. Starting from left to right, Rich club President, Evan KM4HAG Technician, Jim KG4PWF General, John KM4FOS General, Peggy Mission Control, Vincent KM4EAW Extra, Richard, Ron, and last but not least Ernie.
Click Here For Images
Click Here For Images
Friday, January 9, 2015
Subscribe to:
Posts (Atom)