Admin Note: This is the third and final section of the article submitted by Keypounder. EZNEC, the preferred antenna modelling method, is referenced. I highly suggest familiarizing yourself with EZNEC for building and modelling antennas for both efficiency and directivity. Included are several practical examples of antennas in the field, which I might add, are similar …
Author: ncscout
NVIS Explained, II
Admin Note: This is the second part of the article submitted by Keypounder. Topics covered include the layers of the ionosphere and frequency selection characteristics. ******* The Ionosphere We've mentioned the ionosphere, but understanding the basics of ionospheric composition and characteristics is very important to proper NVIS operation, especially when signal security and DF are …
NVIS Explained, I
Administrative note: The following was sent by Keypounder, the nom de plume that should be familiar to a few readers. A longtime radio amateur and communications specialist in his own right, he's generously submitted this article to me, and in my opinion, is among the best I've read on the topic for public consumption. Due …
Cognitive Infiltration
A long, but important read,especially if you like to hang out on forums. As recent posts have demonstrated, there's great advantage to controlling your own message and being able to quickly identify the patterns used against you. Take some time to read it all.
Silly Trolls.
Now that you're done, it's my turn. 174.109.244.121 IVO/traced to the corner of South Washington and East South Street. Time Warner is the provider, so you're not on a mobile phone. Thank God for your sake. That places you in the heart of Shaw University in Raleigh NC. Or maybe, you're in a nice residential …
A Forgotten History
It came first with a tax and a set of laws. The Ottoman, seeking to further cement its Iron fist from the Sultanate, fearing growing issues in Europe and desiring a means to motivate the growing social revolutionary youth class, found their savior in creating the long thorn in their side- the holdouts of a …
Additional Resources for Field Antennas
FM 23-10 Chapter 7 Also recommended- FM 7-93 USMC Field Antenna Handbook
Someone is always listening, Part II
In the preceding post, I very bluntly pointed out, as a few of us have been trying to do, that the capability to DF and monitor anyone and anything indeed does exist. So now the question becomes 'how do you work against it?' Well, let's examine some options and point out a few truths. The …
Someone is always listening.
H/T Mike Bishop- Source- Cryptome 10 June 2014 DEA/NSA SANDKEY Voice Intercepts A sends: Enclosed are three images that are the heart of the NSA SANDKEY program. SANDKEY is a joint DEA/NSA program that intercepts and exploits unencrypted VHF voice communications of narco-traffickers at sea. SANDKEY targets those communications of and between maritime vessels operating …
SIGINT and the Guerrilla Radio
My note: I originally wrote this article for Spark31's Signal-3, appearing in the SEP-OCT 2015 edition. I don't know if it's still in operation(?), but the 'newsletter' had some decent info while it ran it's course. In any case, the authoring of this article led to the creation of this blog. The 'video' referenced in …
