Senate GOP budget bill has little-noticed provision that could hurt your Wi-Fi
-
I call bs on the encryption part too. You just need to publicly post the key for your encryption and say you're not trying to hide what you're saying.
I haven't seen any regulations saying where you need to publicly post the key.
I say license up now and learn it how the shit works. Never know when some "pirate" stations may be needed.
Over here in Germany encryption is most definitely illegal. This includes encoded messages only the intended recipient could decode.
-
This would need like a Canadian or Mexican to help provide the internet from across the border, because if they pull the Iran style blackout there will be zero internet for the entire country.
Meshenger app and mesh networks would still work, back to the BBS times we go
-
I call bs on the encryption part too. You just need to publicly post the key for your encryption and say you're not trying to hide what you're saying.
I haven't seen any regulations saying where you need to publicly post the key.
I say license up now and learn it how the shit works. Never know when some "pirate" stations may be needed.
There's a difference between encryption and encoding, and that difference is intent.
Encoding is the process of imparting a digital message onto the radio carrier. A simple example is Morse code; transmitted by keying a continuous wave on and off in pre-determined patterns of long and short pulses with long and short gaps between. Frequency shift keying and bodot code are the encoding scheme behind RTTY, etc. Hams are permitted to experiment with novel encoding schemes, and have invented a few, PSK31 comes to mind, a phase shift keying standard designed to use commonly available PC sound cards as a modem.
Encryption is the process of obscuring the message for all but the intended recipient. There is one specific case the law calls out when this is permissible in Amateur radio service, and that's control signals of Amateur radio satellites. A novel encoding scheme, like making up your own alphabet instead of the standard Morse one, or ciphers of any kind that are intended to make the message secret, is illegal.
It's not uncommon to hear encrypted communiques on the ham bands; I've picked them up myself. You want a fun rabbit hole to fall down, look up numbers stations. Some serious cold war james bond bullshit.
I don't believe it is legal to send a PGP encrypted message over the air (on ham radio, go ahead and send it over Wi-Fi, you can encrypt the shit out of that) even if you've posted your private key on your website. What would even be the point of that? tilts head It might be legal to send a PGP signed message over ham radio; if I understand correctly that's basically a checksum that can guarantee the sender's possession of a private key.
-
The cell carriers don't need more bandwith. 5G is already quite fast with the existing allocations. The only times I've used 5G and thought it's too slow has been in rural areas where the issue is a lack of nearby cell towers, not a lack of bandwidth. The cell carriers already have loads of millimeter wave bandwidth available for use in densely packed, urban areas where the lower frequency bands are insufficient.
It's WiFi that should be getting more bandwidth. Home internet connections keep getting faster. Multi gigabit speeds are now common in areas with fiber.
and on top of that, 5G afaik is specifically made so that if you need more density, you can turn down the cell power and install more cell sites rather than take more spectrum
it was designed for venues like sports stadiums so you could keep installing more and more cell towers inside stadiums etc to accommodate huge crowds
-
Next they are gonna take away amateur radio frequencies so it would be illegal to communicate outside of the internet.
Then its very easy to do censorship, just turn off power to ISPs and its information blackout.
For what it's worth, I think Cruz's proposal (all of it) was defeated 99-1.
-
I mean, does anyone actually communicate on the ham bands? HF is for contesting and contesting only, 2 meters is for "checking in and out" on ragchew nets, 70cm is 2m again except half the range, 220 is hipster 2 meter, and I've never been given a reason to even think about 33cm and above. You're more likely to find discussion about Icom vs Yaesu's incompatible 2 meter digital things than high UHF.
Most actual communication is illegal on the ham bands one way or another so...I haven't renewed my license.
Most actual communication is illegal on the ham bands one way or another
Except in case of emergency, natural disaster, etc. Before we carried cell phones, I had ham handhelds that we would talk directly to each other on 70cm for the usual "Hi honey, I'm on my way home" or... in the days before cell phone lots existed at airports, I'd call her on the handheld to let her know I was approaching the passenger drop-off/pickup area at the airport after a flight so she could start going there from whatever makeshift staging area she was in.
Anyway, when we would be out in the woods, we could reach each other roughly 1/2 mile like that from handheld to handheld, but if we ever had a serious problem we could switch to 2m and hit the local repeater which would get us more like 12 miles of range and coverage all the way into town where there was usually somebody who could make a 911 call if we needed it.
So, yeah, we have cell phones today, and they work when they work, but I find that when the cell phones don't work (like during / after a hurricane) the ham bands generally are working - or at least are restored quicker, and nobody is going to press charges for emergency communications on the ham bands.
If you want to use the ham band for instacart dispatch coordination, yeah, you're gonna get more than static about that.
-
I thought about getting a ham license so are you telling me there is really no need?
If you intend to practice the hobby, get the license. I let mine lapse after 10 years because I don't practice anymore, but I generally still remember the basic rules and how to operate the gear, so if I ever had an emergency need I'd use what I had access to - but I haven't transmitted anything in years and years.
-
There's a difference between encryption and encoding, and that difference is intent.
Encoding is the process of imparting a digital message onto the radio carrier. A simple example is Morse code; transmitted by keying a continuous wave on and off in pre-determined patterns of long and short pulses with long and short gaps between. Frequency shift keying and bodot code are the encoding scheme behind RTTY, etc. Hams are permitted to experiment with novel encoding schemes, and have invented a few, PSK31 comes to mind, a phase shift keying standard designed to use commonly available PC sound cards as a modem.
Encryption is the process of obscuring the message for all but the intended recipient. There is one specific case the law calls out when this is permissible in Amateur radio service, and that's control signals of Amateur radio satellites. A novel encoding scheme, like making up your own alphabet instead of the standard Morse one, or ciphers of any kind that are intended to make the message secret, is illegal.
It's not uncommon to hear encrypted communiques on the ham bands; I've picked them up myself. You want a fun rabbit hole to fall down, look up numbers stations. Some serious cold war james bond bullshit.
I don't believe it is legal to send a PGP encrypted message over the air (on ham radio, go ahead and send it over Wi-Fi, you can encrypt the shit out of that) even if you've posted your private key on your website. What would even be the point of that? tilts head It might be legal to send a PGP signed message over ham radio; if I understand correctly that's basically a checksum that can guarantee the sender's possession of a private key.
difference is intent.
And intent is functionally impossible to prove, but endlessly arguable and a judge can make a finding based on their judgement - something very different from proof.
send a PGP signed message over ham radio; if I understand correctly that’s basically a checksum that can guarantee the sender’s possession of a private key.
Correct.
-
difference is intent.
And intent is functionally impossible to prove, but endlessly arguable and a judge can make a finding based on their judgement - something very different from proof.
send a PGP signed message over ham radio; if I understand correctly that’s basically a checksum that can guarantee the sender’s possession of a private key.
Correct.
Oh the legal system is pretty good at deciding intent, I mean what's the difference between manslaughter and murder?
Thing is, it's not like there's radio police that are going to pull you over for encrypting. Other hams might turn you in if you're being annoying. If you send an encrypted email over Hamlink once, or say something like "Beefy Burrito this is Enchilada, the tamales are in the basket" on 33cm once, probably nobody's gonna notice.
There's only ~3.7MHz worth of bandwith on the HF bands, another 4MHz on 6m. There's a lot of attention on the bands that propagate. If you want to secretly communicate with people, use Reddit, or the Fediverse.
You know r/kitty? One of a trillion cat subreddits that had a gimmick that the only written word allowed was "kitty." All post titles and comments had to consist only of "Kitty." Arrange with the leaders of the other terrorist cells you're working for that if u/chudmuffin posts a picture of an orange cat, we attack at dawn, and if he posts a picture of a grey cat, lay low they're onto us.
Encryption is legal and standard on the internet, where there's many orders of magnitude more traffic than on the ham bands. I can't send an encrypted email over Hamlink with a license, but I can host a Tor site without one.
-
Most actual communication is illegal on the ham bands one way or another
Except in case of emergency, natural disaster, etc. Before we carried cell phones, I had ham handhelds that we would talk directly to each other on 70cm for the usual "Hi honey, I'm on my way home" or... in the days before cell phone lots existed at airports, I'd call her on the handheld to let her know I was approaching the passenger drop-off/pickup area at the airport after a flight so she could start going there from whatever makeshift staging area she was in.
Anyway, when we would be out in the woods, we could reach each other roughly 1/2 mile like that from handheld to handheld, but if we ever had a serious problem we could switch to 2m and hit the local repeater which would get us more like 12 miles of range and coverage all the way into town where there was usually somebody who could make a 911 call if we needed it.
So, yeah, we have cell phones today, and they work when they work, but I find that when the cell phones don't work (like during / after a hurricane) the ham bands generally are working - or at least are restored quicker, and nobody is going to press charges for emergency communications on the ham bands.
If you want to use the ham band for instacart dispatch coordination, yeah, you're gonna get more than static about that.
I lost power and water for several days following a hurricane. No internet and no cell signal.
A dual band HT was our only way to learn what was happening across the city and in our neighborhood. It was a lifeline. I’ve got a bigger mobile unit set up now with a better antenna. Easy thing to keep on hand for the next zombie attack.
-
Oh the legal system is pretty good at deciding intent, I mean what's the difference between manslaughter and murder?
Thing is, it's not like there's radio police that are going to pull you over for encrypting. Other hams might turn you in if you're being annoying. If you send an encrypted email over Hamlink once, or say something like "Beefy Burrito this is Enchilada, the tamales are in the basket" on 33cm once, probably nobody's gonna notice.
There's only ~3.7MHz worth of bandwith on the HF bands, another 4MHz on 6m. There's a lot of attention on the bands that propagate. If you want to secretly communicate with people, use Reddit, or the Fediverse.
You know r/kitty? One of a trillion cat subreddits that had a gimmick that the only written word allowed was "kitty." All post titles and comments had to consist only of "Kitty." Arrange with the leaders of the other terrorist cells you're working for that if u/chudmuffin posts a picture of an orange cat, we attack at dawn, and if he posts a picture of a grey cat, lay low they're onto us.
Encryption is legal and standard on the internet, where there's many orders of magnitude more traffic than on the ham bands. I can't send an encrypted email over Hamlink with a license, but I can host a Tor site without one.
Oh the legal system is pretty good at deciding intent
I wouldn't say it's good at determining actual intent, just good at deciding what intent is going to be assigned by the system.
If you send an encrypted email over Hamlink once, or say something like “Beefy Burrito this is Enchilada, the tamales are in the basket” on 33cm once, probably nobody’s gonna notice.
I've always wondered how much steganography is in practice - if it's being practiced well, nobody knows. Setup a HAM station that snaps a photo at sunset and a couple of other random times per day. Transmit the photo in a standard, open digital mode, but hide your message in the noisy lower bits of the 3 color channels 0-255 R G and B, you can easily modify 6 bits per pixel without visually distorting the image, drop that to 1 bit per pixel and nobody who doesn't know your scheme could ever find it. To the local hams, it's three chirps a day, with a reliable pretty picture of the sunset and a couple of more varied times. As a utility channel, that's three opportunities per day to secretly communicate something to a listener that nobody can identify. If the picture is just 2MP, that's 250kBytes of bandwidth per image.
If you want to secretly communicate with people, use Reddit, or the Fediverse.
Absolutely, though the "listeners" there are more readily identified, even via Tor.
-
This post did not contain any content.
I’m just glad we live in a country where politicians can also be experts in RF design/engineering and make policies based on their expertise.
-
This post did not contain any content.
How would that work for the people already using 6 GHz routers?
-
Meshenger app and mesh networks would still work, back to the BBS times we go
Who'd have thought WWIV was so prescient as to when it would become re-relevant.
Time to dust off my SysOp skillset lol
-
For what it's worth, I think Cruz's proposal (all of it) was defeated 99-1.
Yes, Rafael suffered a 99-1 loss. Guessing he's the 1, so a total loss.
-
You don't need one if there's an emergency, civil unrest would probably qualify as an emergency so non-licensed people can legally transmit.
The FCC hasn't really punished anyone for not having a license other than those that are really bothersome/disruptive or are doing jamming. But like, if there's civil unrest, the laws probably don't matter anymore so you can just ignore the law.
But if you don't have a license, you don't have a callsign, and thus others will refuse to talk to you during non-emergency peacetime.
The FCC hasn’t really punished anyone for not having a license other than those that are really bothersome/disruptive or are doing jamming. But like, if there’s civil unrest, the laws probably don’t matter anymore so you can just ignore the law.
Thanks for reminding me of this movie.
https://en.wikipedia.org/wiki/Pump_Up_the_Volume_(film) -
Yes, Rafael suffered a 99-1 loss. Guessing he's the 1, so a total loss.
What a way to advertise your impotence.
-
Oh the legal system is pretty good at deciding intent
I wouldn't say it's good at determining actual intent, just good at deciding what intent is going to be assigned by the system.
If you send an encrypted email over Hamlink once, or say something like “Beefy Burrito this is Enchilada, the tamales are in the basket” on 33cm once, probably nobody’s gonna notice.
I've always wondered how much steganography is in practice - if it's being practiced well, nobody knows. Setup a HAM station that snaps a photo at sunset and a couple of other random times per day. Transmit the photo in a standard, open digital mode, but hide your message in the noisy lower bits of the 3 color channels 0-255 R G and B, you can easily modify 6 bits per pixel without visually distorting the image, drop that to 1 bit per pixel and nobody who doesn't know your scheme could ever find it. To the local hams, it's three chirps a day, with a reliable pretty picture of the sunset and a couple of more varied times. As a utility channel, that's three opportunities per day to secretly communicate something to a listener that nobody can identify. If the picture is just 2MP, that's 250kBytes of bandwidth per image.
If you want to secretly communicate with people, use Reddit, or the Fediverse.
Absolutely, though the "listeners" there are more readily identified, even via Tor.
Well on some popular image board like one of the hundreds of cat subs on Reddit, how do you identify a "listener" who is looking for a particular user to upload a picture of an orange cat? Thousands of people will view that post perfectly innocently.
-
Well on some popular image board like one of the hundreds of cat subs on Reddit, how do you identify a "listener" who is looking for a particular user to upload a picture of an orange cat? Thousands of people will view that post perfectly innocently.
The point is: IP addresses that download the content are traceable (and spoofable, but that leaves trails too...) Yeah, you might be one of thousands, but every day you log in you increase your odds of being spotted.
Listening to longwave radio? Yeah, basically anybody anywhere on the planet with a receiver. Even local broadcasts it is nigh impossible to know who is listening where within the broadcast radius and the average person walks around with several radio receivers on them all the time now.
-
The point is: IP addresses that download the content are traceable (and spoofable, but that leaves trails too...) Yeah, you might be one of thousands, but every day you log in you increase your odds of being spotted.
Listening to longwave radio? Yeah, basically anybody anywhere on the planet with a receiver. Even local broadcasts it is nigh impossible to know who is listening where within the broadcast radius and the average person walks around with several radio receivers on them all the time now.
So...let's actually set up a pretend scenario here. Pretend. We are pretend red teaming here; any resemblance to actual terrorist plots living or dead is purely coincidental.
Let's pretend our terrorist cell is going to spit up, travel to 10 places around the United States, and we're going to do a coordinated strike on 10 government buildings. Probably the smartest thing to do is just...do it at a planned time and not communicate after we split up. But for some convoluted Ocean's Umpteen reason we need to communicate and coordinate. I see 3 possible scenarios here:
- Leader just needs to say GO to the rest of the team, expecting no reply. So one, very brief, one-way communique.
- Leader needs to send several detailed instructions over a long period of time, expecting no reply. Repeated, large, one-way communiques.
- The team is going to gather some intelligence and report back, and based on all their observations the leader will say go. Full on two-way communication.
In all three cases, the internet is the better tool for this.
You are correct in that it is difficult or impossible to remotely detect radio receivers, no matter what the BBC tells you. There's no machinery making a log of who accesses what over analog radio. But the realities of radio equipment and propagation are going to eat into that advantage somewhat.
If we're talking truly coast-to-coast, you're going to need HF. MF/longwave won't reach far enough, you need skywave propagation, and you get that on HF...mostly at night mostly during favorable sunspot activity.
I bet you're imagining most of the team using one of those handheld commodity shortwave receivers that does AM/FM and shortwave, about the size of a pencil case with one of those telescoping whip antennas. That might do for 1 and 2, people hear hams on those sometimes.
The bosses transmitter would need to be a reasonably serious bit of kit. At the very least something like an Icom 706 mobile HF rig plus power supply and at least a two element yagi for 20 or 40m. This is an antenna that's 30 to 60 feet wide. Hams do routinely make do with less, but when you're talking to someone with those crappy little antennas, probably inside a building, I'd want to focus my beam at least a bit. A wire in a tree ain't gonna do.
Oh, and, let's say Boss is in Washington DC. It's possible he can make himself heard in Los Angeles but not Wichita, because the "optics" of the ionosphere doesn't bounce his signal down to the ground in the middle of the continent.
One communique of "Baker this is Oven: Preheat complete, insert the bread. Repeat: Insert the bread." might not be noticed. Or some ham somewhere will hear it and go "What the hell, who's horsing around?" If you don't transmit again, you're probably not going to be direction found. But that big radio tower you've got is a weird thing to have.
If you need to make routine transmissions, well now you're going to have to try some steganography crap. They did recently relax the baud restrictions on HF, but you're still talking about 2.8kHz of analog bandwidth that MIGHT get through. It's gonna look really weird if you're repeatedly sending digital pictures to...no one in particular on a regular basis. Now, to blend in, you'll need some genuine callsigns, because the FCC amateur radio license database is a matter of public record. You use a bogus callsign and you'll be found out. If you're transmitting a lot, people will find you, possibly out of curiosity.
Especially if you're talking about everyone in the terrorist cell communicating, well now EVERYONE has to have an amateur radio license from the government, and fairly large, fairly conspicuous radio hardware. There have been spies caught with shortwave radio equipment, and said equipment was used as evidence against them. Entering the US with a smart phone and laptop is utterly normal, entering the US with a shortwave radio is weird.
OR
Get accounts on Reddit, and post cat memes. Compared to sitting around listening to static on an HF set, that looks way more normal these days. Yes, there probably is a log of what IP addresses sent and received what, but it's really easy to make two-way secret communications look like perfectly legitimate traffic. The equipment required doesn't draw as much attention. Keep the steganography subtle or a matter of "which picture I post" and not doctor them at all, well now it's 100% indistinguishable from people having casual fun. Some guy posts a picture of an orange cat, it gets 30,000 views 975 likes and 75 comments, and ten IRS buildings explode. Do you think the authorities make the connection to the cat meme in the first place?