Odds ‘n Sods:

Eric Holder To Step Down As Attorney General. JWR’s Comments: Only National Pravda Radio (NPR) could couch Holder’s departure in such glowing terms and avoid any specific mention of the many impeachable scandals that the man got himself into, including the Fast and Furious gunrunning plot. Holder should be serving a long stretch in a federal pen, rather than collecting a federal retirement check.

o o o

Miss a Payment? Good Luck Moving That Car – T.P.

o o o

11-Year-Old Girl Saves Mother’s Life By Shooting Violent Intruder Multiple Times. – J.W.

o o o

For Gun Shop Owners, It’s No Longer Hip to Be ‘Square’. – G.G.

HJL Comments: I’d be interested to hear from any who have experience in this matter. I have used PayPal’s “Here”, which is a similar competitor to the “Square”. While PayPal has Ebay’s online hoplophobic bent, I was unable to find anything in their terms of service against using it in a brick and mortar store or at a gun show.

o o o

Self-Defense Tip: Don’t Keep Your Gun in the Glove Box. – J.W.

o o o

Last, but not least, SurvivalBlog reader RBS sent in this link to a video that proves that the U.S. does not have a monopoly on redneck sports. While not strictly survival related, it was too good to pass up. Three-Car-Train-of-Death Racing



Hughs Quote of the Day:

“Five-hundred channels and there ain’t much on tonight
Except reality shows about some folk’s so-called lives
A pretty girl cries ’cause she don’t get a rose
But she’ll find love next year on her own show

And they call that real

Real is a hand you hold fifty-seven years
Real is a band of gold tremblin’ with fear
It’s the first long tear down an old man’s face, watchin’ his angel slippin’ away
His heart’s so broke, it’s never gonna heal

I call that real

Where I live, housewives don’t act like that
And the survivors are farmers in John Deere hats
Our amazin’ race is beatin’ the check
Prayin’ that the bank ain’t ran it through yet

Real, like too much rain fallin’ from the sky
Real, like the drought that came around here last July
It’s the damn boll weevils and the market and the weeds, the prayer they’re sayin’ when they plant the seeds
And the chance they take to bring us our next meal

I call that real

Real, like a job you lose ’cause it moves to Mexico
Like a mama and a baby with no safe place to go
Like a little dream-house with a big old foreclosed sign
Like a flag-draped coffin and a twenty-one gun goodbye

I call that real
Man, I call that real
Oh, I call that real.”

– Lyrics to the song Real, written by Neal Coty and Jimmy Melton and sung by James Wesley (Prosser)



Notes for Thursday – September 25, 2014

Today, we present another entry for Round 54 of the SurvivalBlog non-fiction writing contest. The $12,100+ worth of prizes for this round include:

First Prize:

  1. A Gunsite Academy Three Day Course Certificate, good for any one, two, or three course (a $1,195 value),
  2. A course certificate from onPoint Tactical. This certificate will be for the prize winner’s choice of three-day civilian courses. (Excluding those restricted for military or government teams.) Three day onPoint courses normally cost $795,
  3. DRD Tactical is providing a 5.56 NATO QD Billet upper with a hammer forged, chromlined barrel and a hardcase to go with your own AR lower. It will allow any standard AR type rifle to have quick change barrel which can be assembled in less then 1 minute without the use of any tools and a compact carry capability in a hard case or 3-day pack (an $1,100 value),
  4. Gun Mag Warehouseis providing 30 DMPS AR-15 .223/5.56 30 Round Gray Mil Spec w/ Magpul Follower Magazines (a value of $448.95) and a Gun Mag Warehouse T-Shirt. An equivalent prize will be awarded for residents in states with magazine restrictions.
  5. Two cases of Mountain House freeze dried assorted entrees in #10 cans, courtesy of Ready Made Resources (a $350 value),
  6. A $300 gift certificate from CJL Enterprize, for any of their military surplus gear,
  7. A 9-Tray Excalibur Food Dehydrator from Safecastle.com (a $300 value),
  8. A $300 gift certificate from Freeze Dry Guy,
  9. A $250 gift certificate from Sunflower Ammo,
  10. A roll of $10 face value in pre-1965 U.S. 90% silver quarters, courtesy of GoldAndSilverOnline.com, (currently valued at around $180 postpaid),
  11. Both VPN tunnel and DigitalSafe annual subscriptions from Privacy Abroad (a combined value of $195),
  12. KellyKettleUSA.com is donating both an AquaBrick water filtration kit and a Stainless Medium Scout Kelly Kettle Complete Kit with a combined retail value of $304,
  13. TexasgiBrass.com is providing a $300 gift certificate.

Second Prize:

  1. A Glock form factor SIRT laser training pistol and a SIRT AR-15/M4 Laser Training Bolt, courtesy of Next Level Training, which have a combined retail value of $589,
  2. A FloJak EarthStraw “Code Red” 100-foot well pump system (a $500 value), courtesy of FloJak.com,
  3. Acorn Supplies is donating a Deluxe Food Storage Survival Kit with a retail value of $350,
  4. The Ark Instituteis donating a non-GMO, non-hybrid vegetable seed package–enough for two families of four, seed storage materials, a CD-ROM of Geri Guidetti’s book “Build Your Ark! How to Prepare for Self Reliance in Uncertain Times”, and two bottles of Potassium Iodate– a $325 retail value,
  5. $300 worth of ammo from Patriot Firearms and Munitions. (They also offer a 10% discount for all SurvivalBlog readers with coupon code SVB10P),
  6. A $250 gift card from Emergency Essentials,
  7. Twenty Five books, of the winners choice, of any books published by PrepperPress.com (a $270 value),
  8. Two cases of meals, Ready to Eat (MREs), courtesy of CampingSurvival.com (a $180 value),
  9. TexasgiBrass.com is providing a $150 gift certificate,
  10. Organized Prepper is providing a $500 gift certificate, and
  11. RepackBoxis providing a $300 gift certificate to their site.

Third Prize:

  1. A Royal Berkey water filter, courtesy of Directive 21 (a $275 value),
  2. A large handmade clothes drying rack, a washboard, and a Homesteading for Beginners DVD, all courtesy of The Homestead Store, with a combined value of $206,
  3. Expanded sets of both washable feminine pads and liners, donated by Naturally Cozy (a $185 retail value),
  4. Two Super Survival Pack seed collections, a $150 value, courtesy of Seed for Security,
  5. Mayflower Trading is donating a $200 gift certificate for homesteading appliances,
  6. Ambra Le Roy Medical Products in North Carolina is donating a bundle of their traditional wound care and first aid supplies, with a value of $208, and
  7. APEX Gun Parts is donating a $250 purchase credit, and
  8. SurvivalBased.com is donating a $500 gift certificate to their store.
  9. Montie Gearis donating a Y-Shot Slingshot and a Locking Rifle Rack. (a $379 value).

Round 54 ends on September 30st, so get busy writing and e-mail us your entry. Remember that there is a 1,500-word minimum, and that articles on practical “how to” skills for survival have an advantage in the judging.



Communications for When SHTF, by N.M.

Communications is a key element in our everyday lives. If you don’t believe me, try going a whole day with no cell phone, Internet, television, or any other means of communications (COMMS). So it stands to reason that having COMMS, when SHTF, is essential to gaining intelligence (COMINT), the safety and security of your family, keeping informed, and keeping at least one step ahead of anybody with bad intentions. Like any skill, it is essential to practice; that means practicing before SHTF, so that you have the necessary skills. While most of the communications methods discussed in this article are in plain language, rather than in code or encrypted, because the day-today rules do not allow the use of codes, there are some methods for disguising the meaning that can be practiced. This article will provide information on various means, methods, and devices for COMMS, as well as communications security (COMSEC), for SHTF scenarios. This article cites the various rules that apply to the different radio services. The application of the rules in normal times is strongly encouraged so that you do not draw attention to yourself from the authorities. Application of the rules when SHTF, well …

Some Basic Terms

Frequencies

First, let’s understand a little about frequencies, their uses, and their availability to the average person. The use of frequencies in the U.S. is governed by the Federal Communications Commission (FCC). Some frequencies require a license, and some are licensed by rule, meaning that the rules provide the allowable use without an individual license, such as Citizens Band (CB) and Family Radio Service (FRS). Other services, such as Amateur Radio (HAM) and General Mobile Radio Service (GMRS), require an individual to have a license. Each licensed service has specific rules for use, and radios designed for use within a specific service have to be type accepted for use in that service. A channel is a “common” name for a frequency, or pair of frequencies, pre-assigned, such as CB channel 19, which is a single frequency. Where a single frequency is used, it is called simplex. When a pair of frequencies is used, one is used for transmitting and one for receiving; this is called duplex.

Bands

Radio frequencies cover a whole spectrum. They are broken down into bands, with each band having different characteristics. Low bands, (high frequency “HF”) are also known as short wave. They tend to bounce off the atmosphere and, therefore, are good for long transmissions around the world. Because they bounce, places between the transmission point and reception point cannot hear the transmissions very well, if at all. This has obvious advantages to COMSEC, but it can be a disadvantage when attempting to communicate locally. The time of day and even time of year change the characteristics of HF bands. The low bands, 160 meters (1.8-2khz) are good at night but are almost unusable during the day. This band is similar to the long distance AM stations and is better during the winter, with transmissions possible over thousands of miles. Whereas 10 meters (28Mhz-30Mhz) is best during the day. Some bands between these (such as 17, 20, and 40 meters) are good during the day and into the evenings. Transmissions in the VHF and UHF bands are considered “line-of-sight”, as they travel in almost straight lines and, therefore, do not follow the curve of the earth. We usually refer to these as tactical COMMS. Terrain, like hills, can block transmissions in the UHF and VHF range. Tactical COMMS equipment tends to be smaller and lower in power. “Line of sight” transmissions can be easily intercepted with direction finding equipment. (“DF’d” or “DF’ing” is the art of direction finding.) For a good description of band characteristics, go to http://www.hamuniverse.com or http://www.w5yi.org/downloads/FreqChart.pdf, which shows the Amateur Radio band plan as well as which HF band is best during different times of the day.

Selecting the most appropriate band for the type of COMMS is essential. Selecting the lowest possible power to get the message through and making transmissions very short helps prevent “DF’ing”.

To convert frequency (in Mhz) to band (in meters) divide 300 by frequency (in Mhz) i.e., 300/440Mhz = 0.68meters, usually called the 70cm band in Amateur Radio. To convert the band (in meters) to frequency (in Mhz) divide 300 by the frequency i.e., 300/2 meters = 150Mhz

Continuous Tone-Coded Squelch System (CTCSS)

CTCSS is a sub-audible tone that can be added to a frequency to help reduce interference from other users of the frequency. In most cases, it is used to eliminate interference getting into a repeater system. CTCSS is also know by vendor names such as Private Line or PL tone by Motorola, Channel Guard by both Bendix King and GE, Quiet Talk by Kenwood, and Tone Guard (TG) or CallGuard (CG) by EF Johnson. Generally, in “radio speak”, the generic term “tone” is used.

There is an industry standard list of tones. In most cases the actual number of the frequency is listed, i.e., 127.3, or a two-character code utilized by Motorola, such as 3Z (for 127.3). The use of tones does not provide any security on a channel. In “bubble-pack” radios– typically FRS radios– the vendors assign a number (not the actual frequency) to a tone; these are not consistent between different manufacturers.

Digital Coded Squelch (DCS)

DCS is a digital version of CTCSS that puts a continuous stream of digital data on the transmitted signal. As with CTSCC the different vendors have their own names. Motorola calls it Digital Private Line (DPL); GE uses Digital Channel Guard (DCG); and Icom uses Digital Tone Squelch (DCS).

Repeater

A repeater is basically two radios– one on a receiving frequency and one on a transmitting frequency. The user radio transmits on the repeater’s receive, or input, frequency, and the repeater re-transmits on the output frequency. Typically a repeater is located on a hill top or a high building. A low-power radio is then “repeated” on the higher power, or at least higher antenna, of the repeater and can be heard over a considerable distance. Depending on the location and frequency, this can be as much as 50 miles.

Spread Spectrum

This is a technique where the signal is spread over a wider bandwidth. This reduces interference from jamming, which is the ability to be intercepted or the transmitter to be DF’d.

Frequency Hopping

This is where the radio signal “hops” between different frequencies in a pseudo-random pattern, known only to the radios. Again this makes the signal difficult to intercept (or DF) and is, therefore, good COMSEC. Some equipment incorporates spread spectrum frequency hopping techniques. Unfortunately, this equipment can be expensive.

Automatic Link Establishment (ALE)

ALE is a feature of some radios that enables them to automatically find the best frequency for the transmission. The radio can be programmed to scan a number of different frequencies in different HF bands. When one user wishes to communicate with another, the user selects the ID for the other radio; the radio then determines the best frequencies and “calls” the other radio. Many Federal agencies share the Customs Over the Horizon Enforcement Network (COTHEN), using radios with ALE built-in to the radio. Meanwhile, the Amateur Radio service operates ALE with both voice and data channels, using computer software interfaced with HF radios. (See hflink.com for more information.)

Licensed By Rule Services

Licensed by rule services do not require the individual user to have a FCC-issued license.

Family Radio Service (FRS)

The Family Radio Service is a “licensed by rule” service, under Title 47 Code of Federal Regulations (CRF) Part 95 subsection B. The FRS is 14 frequencies in the UHF range with a power limit of 500mW and 11.25khz spacing of the frequencies. This limits their range to about ¼ mile or possibly up to one mile, depending on terrain. A more unobstructed terrain permits greater distance. FRS radios list the channels by channel number, and all vendors follow the standard labeling of the channels. Different manufactures make their radios available in differing CTCSS capabilities, usually listing them by a number that does not correspond to the actual tone. Unfortunately, the vendors do not all use the same tones or numbering system, which can make communicating between different vendors’ radios a little difficult. FRS radios are sometimes referred to as “bubble-pack” radios, due to their packaging in stores. One of the rules for type acceptance of FRS radios is that they cannot have detachable antennas, thus they cannot be connected to an external antenna, such as one mounted up high, to increase the range. Most FRS radios run on AA or AAA batteries. The FRS channels and frequencies are:

FRS 1 462.5625
FRS 2 462.5875
FRS 3 462.6125
FRS 4 462.6375
FRS 5 462.6625
FRS 6 462.6875
FRS 7 462.7125
FRS 8 467.5625
FRS 9 467.5875
FRS 10 467.6125
FRS 11 467.6375
FRS 12 467.6625
FRS 13 467.6875
FRS 14 467.7125

Channels 1-7 are the same as GMRS channels 9-15. GMRS radios are permitted to use higher power, but an operator can only use the higher power GMRS channels if they hold a GMRS license. (See GMRS below.) In Europe, a similar service to the FRS service is called PMR 446. It should be noted that these frequencies are in the U.S. Amateur Radio service band.

Multi-Use Radio Service (MURS)

MURS is another “licensed by rule” service, which does not require an operator to have a license. The FCC rules for MURS are contained in 47 CFR Part 95 Subpart J. MURS is five VHF channels with 11.25khz spacing or 20khz spacing and 2 watts of power. Range can be up to 10 miles, in ideal conditions. Businesses may use the MURS frequencies, and these are commonly seen as a colored dot on the radio to delineate the frequency. All of the MURS frequencies are simplex only, so a repeater is not permitted. MURS channels are not assigned a channel numbering system, so generally the frequency is used to identify the MURS channel. Most commercial MURS radios use rechargeable battery packs. The MURS frequencies are:

MURS 151.8200
MURS 151.8800
MURS 151.9400
MURS 154.5700
MURS 154.6000 

154.470 is also referred to as Blue Dot and 154.600 is Green Dot. These frequencies are also part of a business frequency pool.

Citizens Band (CB)

I would assume that almost everyone has heard of CB radio. If not, go watch Smokey and the Bandit or Convoy. CB radio has 40 channels in the 27Mhz range (11 meter band). Power is 4-watts AM and 12-watts for single side band (SSB). Not all CB radios are capable of SSB transmissions. SSB transmissions cannot be picked up by a scanner. Being in the 11-meter band and close to short wave, radio signals can travel considerable distances, especially overnight. Of all the radio services available to the public, CB is probably the most common, with truckers providing traffic information along the nation’s highways. It is also probably the most abused radio service, with people running illegal amplifiers, jamming, and using profanity. There are a large amount of slang terms used on CB. CB mobile radios require 12v DC, and antennas tend to be long– around 9 feet. Portable CB radios are available, but their range is limited due to the practical length of the antenna needed for good communications. The CB frequencies are:

CB Ch 01 26.96500
CB Ch 02 26.97500
CB Ch 03 26.98500
CB Ch 04 27.00500
CB Ch 05 27.01500
CB Ch 06 27.02500
CB Ch 07 27.03500
CB Ch 08 27.05500
CB Ch 09 27.06500
CB Ch 10 27.07500
CB Ch 11 27.08500
CB Ch 12 27.10500
CB Ch 13 27.11500
CB Ch 14 27.12500
CB Ch 15 27.13500
CB Ch 16 27.15500
CB Ch 17 27.16500
CB Ch 18 27.17500
CB Ch 19 27.18500
CB Ch 20 27.20500
CB Ch 21 27.21500
CB Ch 22 27.22500
CB Ch 23 27.25500
CB Ch 24 27.23500
CB Ch 25 27.24500
CB Ch 26 27.26500
CB Ch 27 27.27500
CB Ch 28 27.28500
CB Ch 29 27.29500
CB Ch 30 27.30500
CB Ch 31 27.31500
CB Ch 32 27.32500
CB Ch 33 27.33500
CB Ch 34 27.34500
CB Ch 35 27.35500
CB Ch 36 27.36500
CB Ch 37 27.37500
CB Ch 38 27.38500
CB Ch 39 27.39500
CB Ch 40 27.40500 

Licensed Radio Services

In order to use frequencies in the services below, the user must have a licensed issued by the FCC within that service. A license in one service does not permit use in another service. In some cases, a license applies to all family members, while others apply to the individual only.

General Mobile Radio Service (GMRS)

GMRS is regulated by 47 CFR Part Part 95 Subpart A. GMRS is assigned 15 channels in the UHF band with 8 being assigned in pairs, for repeater use. The other seven are shared with channels 1-7 in the FRS service. A user is required to have a FCC license, usually issued upon completion of an application, and a fee is currently set at $85. The license is valid for five years, and a single license entitles the license holder and immediate family members to use GMRS frequencies. Power on the non-shared frequencies is 50-watts and limited to 5 watts on the frequencies shared with FRS. Repeaters are authorized on the GMRS paired frequencies and can increase the effective range to 20 or more miles, depending on the location of the repeater and antenna. Type approved mobile and portable radios are available for use in the GMRS service. A search of www.radioreference.com or www.mygmrs.com will usually reveal local GMRS repeaters. It is customary to contact the owner and get permission, prior to using a GMRS repeater. When programming a radio, low power should be used on any simplex channel you plan on using for tactical comms.

When accessing a repeater, it will usually be necessary to program a CTCSS tone with the transmit frequency. Sometimes a tone is transmitted by the repeater and can be used to reduce interference on the signal coming into the radio. Most modern radios have the ability to scan the frequency to detect the tone, however, it requires a transmission in order to detect the tone. Some “bubble-pack” radios are now available with both FRS and GMRS frequencies. These use AA or AAA batteries. Unfortunately, the use of FRS and GMRS channels in a single radio, tends to result in the use of the GMRS frequencies by people without a license.

When programming radios with the ability to label the memory channel, a customary naming convention uses “R” for the programming of a repeater pair of frequencies, and “S” is used to indicate simplex. Standard nomenclature is to list the programming for the user radio; therefore, the repeater inputs are the user radios transmit (TX) frequencies. GMRS frequencies are listed below showing the repeater and simplex labeling:

LABEL     Rx     Tx
GMRS 1 S 462.5500 462.5500
GMRS 1 R 462.5500 467.5500
GMRS 2 S 462.5750 462.5750
GMRS 2 R 462.5750 467.5750
GMRS 3 S 462.6000 462.6000
GMRS 3 R 462.6000 467.6000
GMRS 4 S 462.6250 462.6250
GMRS 4 R 462.6250 467.6250
GMRS 5 S 462.6500 462.6500
GMRS 5 R 462.6500 467.6500
GMRS 6 S 462.6750 462.6750
GMRS 6 R 462.6750 467.6750
GMRS 7 S 462.7000 462.7000
GMRS 7 R 462.7000 467.7000
GMRS 8 S 462.7250 462.7250
GMRS 8 R 462.7250 467.7250
GMRS 9 462.5625 462.5625
GMRS 10 462.5875 462.5875
GMRS 11 462.6125 462.6125
GMRS 12 462.6375 462.6375
GMRS 13 462.6625 462.6625
GMRS 14 462.6875 462.6875
GMRS 15 462.7125 462.7125

Amateur Radio Service

The Amateur Radio Service (aka “Ham” radio) is regulated by 47 CFR Part 97 rules. Individuals must possess a license issued by the FCC. The Amateur Radio Service has more frequencies, in more bands, than any other service available to the general public. There are three “levels” of Ham license, with each one giving progressively more operating privileges in more of the radio spectrum assigned to the Amateur Radio Service. The “entry” level is called Technician; the next is General, and the highest is Amateur Extra, which is commonly referred to as “Extra”. The most common frequencies used by those with a Technician license are in the UHF and VHF bands. Dual band (UHF & VHF) radios type (Part 97) approved are readily available, with some including a third band, such as 6 meters or 1.2 meters (“220” band). Note: Many people are purchasing the Baofeng UV5 series, or similar, radios, which cost as low as $35. While these radios are capable of being programmed to transmit in the VHF & UHF Amateur bands, as well as FRS, GMRS, MURS, and Marine, the radios are only labeled as Part 90 (Public Service) approved. However, having tested one of these radios, they seem to work well on the Amateur bands.

Radios type approved for use in the Amateur Radio Service allow the user to directly enter the frequencies on which the user wishes to operate. Hams can utilize many modes of voice transmission, including AM, FM, SSB, and a digital voice mode called D-STAR (Digital Smart Technologies for Amateur Radio). D-STAR, which utilize UHF & VHF frequencies, as well as the 23 centimeter (1.2GHz), cannot be received by any commercial scanners at this time. (See http://www.dstarinfo.com for more information.) In addition to voice modes, Amateur Radio utilizes many different forms of data transmissions, from morse code to fax and video. There are agreed band plans, designating what frequencies are used for certain transmissions within each band, i.e., only morse code can be operated in some parts of the HF bands, while some frequencies are reserved for digital communications and some for satellite. Hams continue to experiment and utilize a huge variety of communication modes, in addition to “basic” voice communications. Most of these other modes cannot be picked up on a scanner or other conventional equipment, unless you have the same equipment. While voice is best for tactical comms, these other modes provide the users lots of different ways to communicate, including spread spectrum, frequency hopping, and ALE, without being easily intercepted; although you should never assume communications are secure, and the use of encryption or other codes designed to disguise the message are prohibited by the FCC rules. Most portable Ham radios are equipped with NiCad or nickel-metal hydride (NiMH) batteries. Some manufacturers make “clam shell” packs available that are the same size as the NiMH packs but take AA or AAA batteries. It is strongly suggested that you determine if a clam-shell is available for any portable radio you intend to purchase, as rechargeable AA or AAA batteries are going to be easier to use and recharge with a solar panel when SHTF. Mobile radios, including those capable of HF transmissions, operate on 12v DC.

Other Radio Services

Marine Radio

Marine radio operates under 47 CFR Part 80. Recent changes no longer require boats to have a FCC license. Marine radio operates in the VHF band and with an internationally agreed plan of about 80 channels most of which are simplex. FCC rules explicitly prohibit use of a Marine radio while on land. In the U.S., the Coast Guard monitors channel 16 and other channels, and they have considerable direction-finding capabilities to locate ships in distress.

Signals Intelligence (SIGINT)

Signals intelligence is the gathering of intelligence from communications. It includes interception of the communications between individuals or groups (Communications Intelligence) or from analysis of the signal, such as direction finding, to determine who is communicating with whom, the volume (especially changes) of traffic, and the type of traffic. This can be valuable intelligence, even if the actual message is encrypted or coded. It is important to have a basic understanding of SIGINT, so that you can minimize the amount of SIGINT you may give an adversary, as well as enabling you to gather intelligence.

Communications Intelligence (COMINT)

COMINT is the interception and interpretation of the communications message, whether voice or some form of digital message, such as morse code, packet (a Ham radio method), or other digital modes. During World War 2, “code talkers” were used to pass messages in Native American languages that the Japanese could not understand. In addition to their native language, they also used code words to represent something; “tiger” might mean a specific type of boat or weapon. COMINT can also be used to monitor friendly transmission to make sure that information is not accidentally given out that might compromise operations, locations, codes, etc. Some countries, including the U.S., United Kingdom, and Australia used the code word BEADWINDOW followed by a number to indicate the type of inappropriate transmission, if bringing attention to the transmission would not cause further compromise. (Google “BEADWINDOW” for the list of the procedure codes.)

Direction Finding (DF)

Direction finding (“DF’ing”) is the ability to determine the direction that a radio signal is coming from. With a direction from two different locations, triangulation can be used to pin point the location of the transmitter. For this reason, the lowest possible power should be used when communicating, especially on VHF and UHF, or “line-of-sight” frequencies. Using HF signals that bounce off the atmosphere makes DF’ing almost impossible. Other signal methods, such as spread spectrum and frequency hopping make DF’ing impossible; however, the cost of equipment can make availability of equipment difficult. See below for techniques to provide a low probability of detection (LPI).

Low Probability of Intercept (LPI)

LPI is the utilization of techniques to reduce the chance that communications can be intercepted and the use of direction finding to locate the transmitter. These techniques can include:

  • Regularly changing frequencies,
  • Using split frequencies (This is transmitting on one and receiving on the other, sometimes on different bands; while this doesn’t eliminate DF’ing, it makes intercept of both sides of the communication very difficult, especially when combined with some of the other methods.),
  • Making “scheduled” transmissions at irregularly-scheduled intervals,
  • Assigning code words for locations, call signs, and specific actions that might be taken and changing regularly (See “code words” below),
  • Regularly changing call signs (daily or for each mission),
  • Using lowest power possible to pass message,
  • Not transmitting from fixed-bases/camps,
  • Using directional antennas (which makes it difficult to intercept, unless you are in direct line of the antenna), and
  • Keeping transmissions as short as possible.

As noted, use as many of these techniques as possible to reduce the possibility of transmissions being intercepted, understood, or locations being compromised.

Communications Security (COMSEC)

COMSEC is the art of keeping communications from being intercepted in a usable form. This includes physical security of equipment, code books, and encryption keys. Only those with a strict need to know should have access to communications items. This is especially the case with techniques used to code messages, authentication methods, code words, et cetera.

Message Authentication

Message authentication is a process whereby you validate that the sender of the message is who you think they are, or they claim to be. Obviously, this is easier if you recognize the voice of the operator; however, you need a method that could be used by the sender to indicate they are sending under duress. One method is to use a challenge, with a corresponding response. It can be a word that is added at the beginning or end of a transmission. Alternatively, it can be a challenge/response, where the receiver issues a challenge from a list, and the other person has to respond with the corresponding response. No matter what the method, the code word should only be used once. A more subtle authentication uses a phrase that could possibly be part of a normal conversation or message that both parties know is an authentication. There should always be a word or phrase that is used to indicate that the sender is sending under duress but would appear to be an approved authentication.

Encryption

Modern voice encryption uses Advanced Encryption Standard (AES), approved in 2001 and now mandated for use by all Federal agencies. It replaced the Data Encryption Standard (DES) standards that had been used prior to that. Even though AES in the accepted standard, there are many local law enforcement agencies who either don’t use any encryption, or still use the DES standard, due to the costs associated with upgrading. A device called a key loader is needed to generate the encryption keys and to put them into the radios. Radio equipment with DES encryption can be found on a popular bidding site for around $400, with a corresponding key loader for about $400. AES standard radios can be found for between $800 and $1,000, with compatible key loaders around $1,000 to $2,000. Obviously, these costs are outside the budget of most of us. Without knowing the encryption key, it is almost impossible to decrypt the transmission, if AES encryption is being used. If DES encryption is used, it is possible to break it with modern computers. As with other basic COMSEC procedures, regular changing the encryption key reduces the chance that communications can be compromised. However, because of the logistics required to coordinate changing encryption keys in a fleet of radios, poor COMSEC procedures often compromise the encryption.

Code Words

As previously mentioned, code words are used to identify people, units, locations, actions, and a number of other uses. Code words should be changed regularly, such as for each mission, or daily. A master list of words should be created and then the word crossed off when used, so there is no risk that it is used again. A good way to generate words is to search lists for names, planets, ships, et cetera used in TV shows, especially science fiction shows or movies. Using lists like this reduce the possibility of using a word that might be needed in a normal message. Obviously, COMSEC needs to be strictly followed, so ensure that the list of words being used for the specific mission is not compromised.

One-Time Pad Cipher

There are a number of techniques to encode a message without the use of modern equipment, such as a computer or sophisticated encryption programs. A number of these techniques were used during World War 2 with great success. Probably one of the most widely known is a book code; however, these can be broken fairly easily with modern computers. Still, a one-time pad cypher is impossible to break IF IT IS USED CORRECTLY. One-time pad uses a plaintext of random letters or numbers. This is then paired with the text to be sent. The resulting encrypted message, with apparently random letters or numbers, is then sent. The receiver reverses the process to decrypt the message. “Pad” comes from the original use where a small note pad contained the random letters. The page of the pad is used once and then destroyed. So if the top line is the pad of random letters and the line below is the desired message:

AUIQWKDHGUWPKMBVJCUQYTROTNXNDJTHQKOQ

Convey leaves 0600 with commander on board

The sent message is (usually sent in 4 or 5 letter groups):

AUIQW KDHGU WPKMB VJCUQ YTROT NXNDJ THQK OQ

The receiver then reverses to decipher. Both parties then destroy the page with the used cypher.

One potential problem can occur if you have different parties trying to communicate. You have to make sure everyone on the net uses the same page at the same time. One way to prevent this is to have one pad for ”sent” or “outbound” messages and one for “inbound” messages. An additional technique is that the first letter group is the pad page number.

Other versions of a one-time pad cypher use numbers. With a table of characters, numbers, letters, and characters such as space and period, converted to numbers. A similar table of common words is converted to a group of three- or five-digit numbers, with a prefix of 0 added at the beginning to indicate it is a word from the table. In all cases, true randomness is required to generate the pad. Computer programs should be used with caution, as they usually use some pseudo-random calculation. Using numbers has an advantage in that code or commonly used words can be further encrypted by assigning them a number group, i.e., rendezvous can be 2345. Zero can be used as an indicator that the numbers after are a word assignment, i.e., 02345. This give a possible 9999 possible commonly used words and code words. Alpha characters are assigned digits: 1-6 are used for the most common characters, then double digits starting with 7 or 8 and characters, such as . , – + and space are assigned a two-digit character starting with 9. i.e., 99 is a space.

So, if we assigned the following code words a number group as below:

Convoy – 0548

Commander – 0590

Leaves – 0691

0600 – 0858

And the following letter/number assignments (from “The Complete Guide to Secure Communications with the One Time Pad Cypher,” by Dirk Rumenants)

CODE-0 B-70 P-80 FIG-90

A-1 C-71 Q-81 (.)-91

E-2 D-72 R-82 (:)-92

I-3 F-73 S-83 (‘)-93

N-4 G-74 U-84 ( )-94

O-5 H-75 V-85 (+)-95

T-6 J-76 W-86 (-)-96

K-77 X-87 (=)-97

L-78 Y-88 REQ-98

M-79 Z-89 SPC-99

(You should make your own letter-number table, or tables, up for your code. If you make several and assign each a number, you can make the first two digits of your one-time pad # the letter-number conversion table, then the next three digits are the one-time pad number. You have now exponentially increased your encryption complexity. To add additional OPSEC, you should transmit the letter-number table and the one-time pads by different means.)

Then our message:

“Convey leaves 0600 with commander on board” becomes:

69154 (one time pad #) 0(code)0548(convoy) 0(code)0691(leaves) 0(code)0858(0600) 0(code)0590(commander) 5(O) 4(N) 99(space) 70(B) 5(O) 1(A) 82(R) 72(D) 91(.)

So written out in blocks of 5 numbers this becomes:

69154 00548 00691 00858 00590 54997 05182 7291

Note in this example we have assigned a code number for times. If we had not done this, then each digit is sent as: 90(figure) 0000 (the digit is sent 3 times) 90666 90000 90000. This adds 3×5 characters to the message being sent.

If our one time pad #69154 is:

54789 15765 12354 35748 45879 37617 63579 59746 26346 16873 16845

Our encrypted message becomes:

Original Message: 69154 00548 00691 00858 00590 54997 05182 7291

Message Out: 69154 54789 15765 12354 35748 45879 37617 6357

Note the pad number is not encrypted. Otherwise the receiver would not know which pad to use to decrypt the message. For a more detailed explanation of one-time pad cypher, search the Internet for an article “The Complete Guide to Secure Communications with the One Time Pad Cypher,” by Dirk Rumenants.

As with all coded messages, code words, and one time pad cypher’s the “code book” has to be shared with all parties to start with. Ideally, this should be done face to face, because any transmission method to send it presents a COMSEC risk that it could be compromised. You should have a “send” pad and a “receive” pad, so there is no chance of sending using a pad that has already been used. This works especially well when you have multiple groups you need to send messages to.

Transmitting numbers by voice is one way to transmit over the air. However, using digital methods can add another layer of security. Morse code is a very good way to transmit messages, as the equipment is fairly simple. In addition, the number of people who can “read” morse code is relatively small. However, in morse code, numbers are five characters. Another technique is to assign shorter morse characters to each digit, i.e., 0 in morse is —– (5 dashes, or ‘dah’s’); by assigning a . (dit) we have shortened the time to send but also added another level of encryption as in “normal” morse code a ‘dit’ is E. So our morse code for numbers could look something like (brackets indicate normal morse character):

0 -? (T)
1 . (E)
2 . – (A)
3 – . (N)
4 . . (I)
5 – – (M)
6 . – – (W)
7 . . – (U)
8 . – . (R)
9 – -? . (G)

So if we take our message from earlier:

69154 54789 15765 12354 35748 45879 37617 6357

when sent in morse code becomes:

WGEMI MIURG EMUWM EANMI NMUIR IMRUG NUWEU WNMU

Without knowing the one-time pad code, the word code table and the morse code conversation this message would be impossible to understand.

Regardless of the methods used to pass coded messages, the radio operators must follow good COMSEC procedures. The only way a one-time pad cypher can be broken is if the pad is not destroyed after a single use or the original pad is compromised, such as not stored securely or passed to the other operators by a secure method.

As with all skills, you should practice communications skills regularly. Regular participation in scheduled traffic nets done by Amateur Radio operators gives you the skills to copy a message as it is passed and how to pass a message so that others can copy it.

Additional sources of information:

Amateur Redoubt Radio Operators Network

The American Preparedness Radio Network

The Amateur Radio Relay League



Two Letters Re: Covert Communications

Hugh,

Reading H.R.’s correction on the Covert Communication article I must correct him. He cites 146.00MHz as the National Calling Frequency. That is incorrect. The generally agreed upon simplex frequency (there is no law or regulation requiring the use of any frequency as a National Calling Frequency) for calling others known and/or unknown is 146.52MHz. Do a Google search for “amateur radio national simplex frequency” and navigate to any of the top five or ten citations and you will find that 146.52 is listed in each as the 2 meter national simplex frequency. (There are many National Simplex Frequencies on different bands.) The ARRL’s site is among those that list 146.52 as a “National Calling Frequency”. In fact, H.R.’s frequency of 146.00MHz is listed by the ARRL as in the range of frequencies used for the OSCAR satellite. It wouldn’t be good to have a pile-up of callers there, especially during a period of national or worldwide emergency. – Anonymous

HJL Adds: There are a number of standard simplex radio frequencies that are used in Amateur Radio. Some are standard worldwide, some nationwide, and some are simply local standards. For the most compatibility, I would stick with those listed by the ARRL. The Band Plan published by the ARRL is not binding, but it is a generally accepted practice and an excellent place to start.

o o o

JWR,

That is a great list. Thank you for publishing. I’ve written a few of these on my emergency Yaesu ft 270r radio (that has been unlocked to cover commercial and marine channels). I have found that writing the channels and a brief description on the battery case in sharpie and covering it with clear coat provides a durable way to keep these handy for when needed the most.

The question that I have not found a good answer to: Do any government agencies (outside of the Coast Guard) monitor these frequencies 24/7?

Specifically, I ask because my radio exists solely for emergencies when my cell phone cannot call for help. Specifically, I’m wondering about a medical issue while backpacking or camping. Usually I am within radio range of the great lakes, so marine coast guard channels typically are within range and Rx well.

When further inland, I find that there is very little radio traffic with the exception of the weather broadcasts. A dependable emergency frequency could prove valuable indeed under these circumstances.

Do you or your readers have any knowledge they could share? I typically am in Northern lower Michigan

FYI- I do intend to get my Ham license, and I respect the hobby enough to not illegally use my radio. However, when faced with a significant medical issue in the “back country” (like a heart attack, stroke, or severe trauma) minutes could be significant indeed! -TV

Hugh Replies: It is virtually impossible for any government agency to listen to every possible frequency, even if you just limit it to well known emergency use frequencies. The main problem is that many frequencies are limited by propagation and geography, and the government just doesn’t have the resources to focus on that. (Of course, they definitely seem to have the resources to spy on your everyday life.) Many individuals make it their hobby to monitor the common emergency channels, like CB 19 or Ham 146.52, but even so there are many areas where contact just can’t be raised. I have had reasonable success in placing a copy of the ARRL Repeater Directory in my glove box. Practically every Ham club or Ham repeater has a group of enthusiasts or at least an individual who monitors 24/7 on their favorite repeater. As you travel across the country, there are very few places where you can’t raise a local repeater. In most cases, there may not be general chat in progress, but someone is usually listening. I highly encourage EVERY person to get their Ham ticket.





Odds ‘n Sods:

The Burning Platform blog recently posted a cogent letter clipping about U.S. intervention in Syria (from what appears to be Navy Times), titled Clear As Mud.

o o o

Seattle mandates residents separate food waste from trash or pay $1 fine – T.P.

o o o

Forest Service says media needs photography permit in wilderness areas, alarming First Amendment advocates

o o o

Apparently there really are zombies (other than those found at *Mart on Black Friday): Liberia: Dead Ebola Patients Resurrect?. It is stories like this that make me really question the level of medical care available in some of these third world countries.

o o o

FBI forces police departments across the US to keep quiet about cellphone spying gear





Notes for Wednesday – September 24, 2014

In 1493AD, Columbus set sail with 17 ships on his 2nd voyage to the Americas. Also on this date in 1775, Ethan Allen was captured by the British.

o o o

Yesterday, SurvivalBlog ran an article that had a list of Emergency Frequencies that might be important to know. At the time, we did not have a source for attribution and stated such. Thanks to our readers, the original link has been found at Graywolf Survival, and it contains much more useful information. Check out How to communicate when the world goes silent.

o o o

Today, we present another entry for Round 54 of the SurvivalBlog non-fiction writing contest. The $12,100+ worth of prizes for this round include:

First Prize:

  1. A Gunsite Academy Three Day Course Certificate, good for any one, two, or three course (a $1,195 value),
  2. A course certificate from onPoint Tactical. This certificate will be for the prize winner’s choice of three-day civilian courses. (Excluding those restricted for military or government teams.) Three day onPoint courses normally cost $795,
  3. DRD Tactical is providing a 5.56 NATO QD Billet upper with a hammer forged, chromlined barrel and a hardcase to go with your own AR lower. It will allow any standard AR type rifle to have quick change barrel which can be assembled in less then 1 minute without the use of any tools and a compact carry capability in a hard case or 3-day pack (an $1,100 value),
  4. Gun Mag Warehouseis providing 30 DMPS AR-15 .223/5.56 30 Round Gray Mil Spec w/ Magpul Follower Magazines (a value of $448.95) and a Gun Mag Warehouse T-Shirt. An equivalent prize will be awarded for residents in states with magazine restrictions.
  5. Two cases of Mountain House freeze dried assorted entrees in #10 cans, courtesy of Ready Made Resources (a $350 value),
  6. A $300 gift certificate from CJL Enterprize, for any of their military surplus gear,
  7. A 9-Tray Excalibur Food Dehydrator from Safecastle.com (a $300 value),
  8. A $300 gift certificate from Freeze Dry Guy,
  9. A $250 gift certificate from Sunflower Ammo,
  10. A roll of $10 face value in pre-1965 U.S. 90% silver quarters, courtesy of GoldAndSilverOnline.com, (currently valued at around $180 postpaid),
  11. Both VPN tunnel and DigitalSafe annual subscriptions from Privacy Abroad (a combined value of $195),
  12. KellyKettleUSA.com is donating both an AquaBrick water filtration kit and a Stainless Medium Scout Kelly Kettle Complete Kit with a combined retail value of $304,
  13. TexasgiBrass.com is providing a $300 gift certificate.

Second Prize:

  1. A Glock form factor SIRT laser training pistol and a SIRT AR-15/M4 Laser Training Bolt, courtesy of Next Level Training, which have a combined retail value of $589,
  2. A FloJak EarthStraw “Code Red” 100-foot well pump system (a $500 value), courtesy of FloJak.com,
  3. Acorn Supplies is donating a Deluxe Food Storage Survival Kit with a retail value of $350,
  4. The Ark Instituteis donating a non-GMO, non-hybrid vegetable seed package–enough for two families of four, seed storage materials, a CD-ROM of Geri Guidetti’s book “Build Your Ark! How to Prepare for Self Reliance in Uncertain Times”, and two bottles of Potassium Iodate– a $325 retail value,
  5. $300 worth of ammo from Patriot Firearms and Munitions. (They also offer a 10% discount for all SurvivalBlog readers with coupon code SVB10P),
  6. A $250 gift card from Emergency Essentials,
  7. Twenty Five books, of the winners choice, of any books published by PrepperPress.com (a $270 value),
  8. Two cases of meals, Ready to Eat (MREs), courtesy of CampingSurvival.com (a $180 value),
  9. TexasgiBrass.com is providing a $150 gift certificate,
  10. Organized Prepper is providing a $500 gift certificate, and
  11. RepackBoxis providing a $300 gift certificate to their site.

Third Prize:

  1. A Royal Berkey water filter, courtesy of Directive 21 (a $275 value),
  2. A large handmade clothes drying rack, a washboard, and a Homesteading for Beginners DVD, all courtesy of The Homestead Store, with a combined value of $206,
  3. Expanded sets of both washable feminine pads and liners, donated by Naturally Cozy (a $185 retail value),
  4. Two Super Survival Pack seed collections, a $150 value, courtesy of Seed for Security,
  5. Mayflower Trading is donating a $200 gift certificate for homesteading appliances,
  6. Ambra Le Roy Medical Products in North Carolina is donating a bundle of their traditional wound care and first aid supplies, with a value of $208, and
  7. APEX Gun Parts is donating a $250 purchase credit, and
  8. SurvivalBased.com is donating a $500 gift certificate to their store.
  9. Montie Gearis donating a Y-Shot Slingshot and a Locking Rifle Rack. (a $379 value).

Round 54 ends on September 30st, so get busy writing and e-mail us your entry. Remember that there is a 1,500-word minimum, and that articles on practical “how to” skills for survival have an advantage in the judging.



The Mindset and Experience of a Single Competent Female Prepper, by Skylar

For the majority of my adult life– 34 years– I have taught, lived, worked, and recreated in wilderness settings. I appreciated JMS’s call for articles from single female preppers, as it has been a frustration of mine for many years. My early years were spent trying to prove that women can be effective and competent in a survival setting without having to become “one of the guys” or Rambo-esque. It took me a couple of tries before I found an organization to work for that shared this view. I spent the next 10 years working for Outward Bound, and I have loved the experience it brought. Both genders need to be able to step in and out of whatever role is needed, at any given time. I think it is a huge, possibly detrimental, mistake to get stuck in gender-driven roles.

So, one of my first pieces of advice I would give any woman is to lose the gender bias and develop an authentic “can-do” mindset. Notice I said “authentic”. Reading and gathering information isn’t it. Nor is a vacation into the wilderness. Granted, they are good starts, and you can learn a lot, but it is just that– a start. You need tons of practice in all sorts of conditions. You may have ten different ways of starting a fire, but can you start and sustain a fire after it has been raining for days? Can you set up a tarp or tent in windy and/or rainy weather? Can you navigate without electronic techno gadgets and gizmos? HoweverSo forth and so on. Go through all the different categories and ask yourself these type of questions. There have been a ton of books and articles written about all the various aspects of TEOTWAWKI and components of “surviving”, so I won’t rehash it here. I will try to provide some insight into the experience I have gained from being in survival situations and equipment my life has depended upon.

Over the years I have gleamed a lot of hands-on experience in “survival”. Sometimes I felt that I had too much experience because I saw myself becoming complacent in my abilities. A recent health “crisis” has caused me to go back and revamp a lot of my thinking in the area. Very unexpectedly, I landed in the hospital and underwent open heart surgery. I had to have an artificial mitral heart valve replacement surgery due to catching rheumatic fever in one of my bouts with strep as a child. I didn’t even know I had a heart problem until I went into heart and respiratory failure.

Fortunately, a person should be able to fully recover from this type of heart problem, but it has made me stop and rethink things. “It” can shake your sense of self confidence and cause you to reexamine your abilities. The recent health scare has taught me the importance of running all the “what if” scenarios. What if I don’t recover my previous strength, health, and abilities? What then? I still have A to Z in the equipment area and have tried to prep for all possible circumstances, regardless of whether I find myself at a nice safe retreat, trying to get to a retreat, bugging-in, or bugging out. Because I do not know the timing of TSHTF or the exact circumstance therein or what degree of health recovery I will be at, I started the process of going back through everything, which is always a good thing.

Cookware

I found myself taking it one category at a time and using a scale to determine weight, size, and volume. I will use several of the categories to exemplify my thought process. I gathered up all my various ways of cooking over an open fire and started labeling each with their weight and volume. Over the years, I had accumulated various pieces in aluminum, stainless steel, cast iron, copper, brass, and titanium. An important aspect is the melting point of each type of metal. The approximate melting point of aluminum is 1221 degrees F, stainless steel is 2440 degrees, copper is 1984, brass is 1700, cast iron is 2200 (depending upon thickness), and titanium is 3,034 degrees. Aluminum and titanium are the lightest, and most cast iron and brass are the heaviest. I don’t want to have to depend upon having a grill to set the cookware on, so a lot of my thinking revolves around putting the pot into the coals or next to it, so I look for a metal that can handle high temperatures.

I then tried to create a set for all the different possible scenarios of TSHTF. If I were at a retreat and cooking, I would go with the cast iron. If I were trying to get to a retreat and had a vehicle, I would take several sets in aluminum, stainless steel, copper, or titanium. If I was going to bug out with a pack, I would take the stainless steel and/or titanium. I would love to have everything in titanium, because it has the highest melting point and is the lightest, but for me it is cost prohibitive; so I only have a few pieces.

To further break down the process, I took these sub-categories and broke it into sets of heaviest to lightest with size in mind. An example is in the bug out cooking ware. Remembering the adage of one is none, two is one, three is two, and so forth, I found I have six different stainless steel combinations that I have used under various circumstances. They are:

  1. MSR (17.4 Oz/487 ml) SS pot and lid; weighs 9.4 ounces.
  2. Stanley SS cooker set, holds 24 Oz/708 ml. and weighs 7.9 ounces (no cups).
  3. MSR SS pot and lid (37 Oz/1100 ml.) and weighs 15.3 ounces.
  4. MSR SS (60 Oz/1650 ml.) and weighs 13.6 ounces.
  5. Klean SS bottle (64 Oz/1900 ml.) and weighs 11.5 ounces.
  6. Military SS canteen and cup (48 oz. combined) and weighs 15.1 ounces.

I no longer carry things like plates, bowls or cups. I can use the lid of a pot for a plate and my water bottle as a cup.

Packs

These items can then go into the different size bug out bags (packs) that I have. Again, I have multiples, depending upon the circumstances. The first three are various sizes of Mountainsmith lumbar (fanny) packs that can be added onto my packs or carried independently. They are the Knockabout that is 435 cubic inches and weighs 14 ounces. The second is 600 cu and weighs 1.3 lb. The third is the Tour pack that holds 824 cu and weighs 1.64 lb..

The next “pack” sub-category are the “day packs”. The first is a North Face Mako that holds 730 cu and weighs 1.9 lb. (26 Oz). The next is a Camelbak that holds 1200 cu and weighs 1.14 lb. (30 oz.). The next is a North Face Big shot that holds 2015 cu and weighs 2.9 lbs. If you combine any of the lumbar packs with a day pack, you have a wide array of combinations available to you.

You can then combine any of the lumbar or daypacks with a backpack and come up with even more possible combinations. Some of my favorite backpacks are the Gregory Z40, which holds 2441 cu (med.) and weighs 2.14 pounds. I also use The North Face Terra 30, which holds 1850 cu and weighs 3.8 lbs. Another favorite is the Kelty Moraine 3600; it holds 3600 cu and weighs 4.2 lbs. All my gear is based on weight, size, durability, and versatility. I would much rather have gear that is durable than an ultralight that has to have special attention paid to it. Some of the ultralight packs are not that durable and will get tears and holes in them if they are handled roughly, such as dropped on a sharp rock. Some of the new ultralight clothing used for layering do not hold up to heat and will melt if they get a spark from the fire on them.

Sleeping Systems

Versatility is another important aspect when putting your gear together. Again, I have multiple combinations of sleeping systems and shelters that I can use separately or together to cover the wide possible range of environments and weather in which I may find myself. Some of the components that I can combine with a sleeping bag to increase its temperature rating are:

  • a silk liner bag that adds 10-15 degrees of warmth and weighs 4.5 ounces,
  • a Thermo lite bag liner, adding 15 degrees at 9 ounces,
  • an extreme Thermo lite bag that adds 25 degrees and weighs 14 ounces,
  • a fleece sleeping bag rated at 50 degrees and weighs 1.38 pounds, and
  • a GTX Bivy bag to put your sleeping bag in that weighs 1.3 lb. and can add up to 20 degrees. (You could also use an all-weather blanket to wrap your bag in that weighs 12 ounces.)

I have three main sleeping bags that I have used for years and rely on. The first is high-end and pricey but well worth it. It is a Feathered Friends goose down, which is rated to -10 degrees and weighs 3.2 pounds. It has a Gore-Tex shell instead of the normal nylon type. I have slept out in the open with it and found myself warm and dry with several inches of snow on top of my bag in the past. The next is a North Face Cat’s Meow that is rated to 20 degrees and weighs 2.14 ounces. For wet or conditions where your gear might get wet ,such as traveling down a river, I use a synthetic bag. The North Face Bigfoot is an extremely durable bag with a rating of 15 degrees and weighs 3.10 ounces. If you add any of the above components with your sleeping bag you come up with a lot of combinations that should cover all your needs.

Shelters

For shelters I have mainly used rip-stop nylon high quality tarps. An example of one of my favorites is a 6 X 8 that weighs two pounds. The others go up in size and weight from there. A super lightweight alternative is a military rip-stop nylon poncho that weighs in at 10 ounces. The above mentioned all-weather blanket can also be used as a tarp. I also have used, and depended upon, a Black Diamond mega mid, which is a floorless tarp shelter that can fit four people and only weighs 2.5 pounds. Additionally, I have a Kelty Noah’s tarp that is 9 X 9 and weighs 1.8 pounds and a Gore-Tex bivy tent that weighs around two pounds that is a good addition. There are numerous lightweight tents on the market, and I won’t go into them here. Some of the things you want to look for are lightweight and size. Also a must is one with a full fly that goes almost to the ground. Check the quality of stitching and pole strength.

Multi-use Items

You might be able to tell by now that I do not depend upon one type of anything but have tried to come up with a combination of a lot of something’s. If I were to give advice to people, it would be to have something in all the various categories, because it is a whole lot better than having nothing. One also needs to practice with what they have and gain the valuable experience of using it before you have to depend upon it in a survival situation. I also like gear that has multiple uses, such as the military nylon poncho that can be used as protection from the rain for you and your pack as well as a waterproof shelter. My 64-ounce Klean, uninsulated, stainless steel water bottle also doubles as a cooking pot. The all-weather emergency blanket can be a ground cloth, a wrap around bivy bag for your sleeping bag, and also a tarp.

Summary

Don’t get complacent in your current abilities, skills, health, tools, and assorted prepped stuff and allow yourself to stop thinking and reevaluating all aspects of surviving TSHTF. You never really know what is going to happen or what curve ball life might throw at you. You need to prepare yourself to be versatile and adaptable to whatever might happen. A strong, well-earned sense of confidence, know-how, and a can-do mindset can get you through the majority of circumstances. I never thought I would have a problem with my heart, and I always counted on being healthy and athletic. Life threw me a curve ball, and I found myself having to rethink things. When I went back through my gear, I found that I had prepped for a variety of circumstances and built a lot of combinations into the various categories. This has allowed me to regain some of the confidence I once had, now knowing that even if I don’t have all the physical strength I once had, I still have the experience and know-how that has sustained me for many years in less than ideal circumstances. So much of surviving is the mental aspect.

Take care. Keep your powder and socks dry.



Three Letters Re: Covert Communications

Dear Hugh:

Regarding the captioned article posted 23 September 2014, I call your attention to the following quote, pulled from near the middle of the second paragraph:

“These radios do have ‘Privacy Codes’, but anyone can switch around until they find the code you are on, as they all use the same codes and scanners will hear them, coded or not. Switching codes every hour or time you decide will help not being discovered by other FRS/GMRS radio users, but others will scan the codes. It may help but will get you found if others find which code channel you are on”

Please take note of the fact that, when you enable the “privacy codes” on your murs/frs/gmrs/ham/other radio, you are ONLY suppressing YOUR ability to hear other folks, on the same frequency, but employing a different “privacy code”. Anybody listening to the frequency you are utilizing, and who has disabled the “privacy code”, will hear your signal clearly, if they are in range. Do not in any way think for a second that YOUR COMMUNICATIONS have any “privacy”, when you employ “privacy codes”. – Skyrat

o o o

Hello,

A very important 2 meter freq. left off your list is 146.00. It is the national simplex, which will most likely be used quite a bit

with grid down scenario when all the backup power for repeaters dwindle out. – H.R.

o o o

Hugh,

JK has a good grasp of some types of covert communications. However I would avoid the “CB” type radios and to also avoid the GMRS/FRS at all costs for sending communications. These types are way too easy to triangulate and spot during a fox and hound type situation. Not even for squad type operations or inter-squad operations. It has been discussed before, and I will not beat that dead horse.

The ideology for Post-SHTF communications is to be able to “hear” first, plain and simple. My shack consists of the following:

  • HF (Shortwave), all ham bands with auxiliary 1.6-30 MHz. coverage
  • 6 meter ham band, with auxiliary VHF-Low band (30-50 MHz.) coverage
  • 2 meter ham band, with auxiliary VHF-High band (138-174 MHz.) coverage
  • 27 MHz. Citizens Band (CB), with auxiliary “freeband” (25-28 MHz.) coverage
  • MURS
  • FRS/GMRS

Like I said this is my shack, and I have the sufficient antenna’s for these, but I also have an antenna set up for NVIS. It’s nearly impossible to track, due to its “near vertical” take off angle. The rest I can use to listen in from anywhere on the globe, or even talk to anywhere on the globe.

Additionally, I also have another person in our group that operates the Listening post for COMINT. They monitor local and nearby radio emmisions for certain indicator freqs associated with those less desireable types. We have done an assessment and know for certain who is operating in our retreat area AO, and we know their patterns and their schedule, not to mention their location, because we can fox and hound as well.

I sat for my tech, general, and amateur extra at one sitting, and for $14, I passed all three one after the other. Yes, it was hard; yes, it took studying, and it was worth it. Trust me, if I can do this, so can you.

Good luck in the future. I believe someone is making a giant garbage sandwich that we are all going to have to take a bite out of shortly. – W.B.



Economics and Investing:

The Ponzi Economy. – J.W.

o o o

Why Are The Ultra-Rich Rushing To Buy Gold

o o o

Items from Mr. Econocobas:

The Dow And S&P 500 Soar To Irrational Heights – Meanwhile The Ultra-Wealthy Rush To Buy Gold Bars

Minimum-Wage Blowback; The De-Humanization Of Fast-Food Has Begun

Billionaires Are Hoarding Piles of Cash – Disagree with the authors analysis but the facts of how much cash is being withheld is interesting







Hugh’s Quote of the Day:

“Here are my questions to you: Why do people and organizations cough up billions of dollars to line political coffers? One might answer that these groups and individuals are simply extraordinarily civic-minded Americans who have a deep and abiding interest in encouraging elected officials to live up to their oath of office to uphold and defend the U.S. Constitution.

Another possible answer is that the people who spend these billions of dollars on politicians just love participating in the political process. If you believe either of these explanations for coughing up billions for politicians, you’re probably a candidate for psychiatric attention, a straitjacket and a padded cell.

A far better explanation for the billions going to the campaign coffers of Washington politicians and lobbyists lies in the awesome government power and control over business, property, employment and other areas of our lives. Having such power, Washington politicians are in the position to grant special privileges, extend favors, change laws and do other things that if done by a private person would land him in jail. The major component of congressional power is the use of the IRS to take the earnings of one American to give to another.” – Dr. Walter Williams