The following podcast comes from Radio Free Redoubt.
AmRRON POLICY: AmRRON OPERATIONS ARE LEGAL AND LAWFUL, and when using Amateur Radio bands, FCC rules apply.
We don’t use encryption over radio. There’s no need to. There’s no need to use tactical callsigns. But we do practice with it using the internet and other platforms where it’s perfectly legal.
- More on authentication
- Authentication using PGP key signatures for files
- Tactical Callsigns (COMSEC/PERSEC/OPSEC); the alternative to using FCC callsigns when protecting your identity is necessary.
- ‘Modding’ your radio (aka. Open banding, opening up, MARS modding, your radio to operate outside amateur radio bands)
THE TEN-LETTER WORD AUTHENTICATION
The following is a visual of the one-way authentication example as used in the podcast:
The image below (Figure 2) is an example of a ‘Dryad’, found in military CEOIs, and was used for two-way authentication and enciphering numbers. There is VERY little information available open source (on the internet) discussing or explaining most components of a CEOI. However, American Partisan has a series of articles for the Raspberry Pi enthusiasts, for generating tactical callsigns, dryads, and more. Today, authentication and encryption is loaded into modern military radios, and these soldier comms skills are (were) a dying art. We’re bringing them back.
Instructions on using the dryad will not be covered here, but will be covered in the near future.
The following two links cover NCScout’s postings at AmericanPartisan… an excellent resource for modern patriots, including radio operators.
Note, it is a script for generating dryads, callsigns, etc. on a Raspberry Pi, for those of you savvy with using R-Pi.