The ICOM IC-R9500 (Know What is Going on Around You in the RF Spectrum)

44-501377-2

What a beautiful piece of equipment!

This is a radio receiver.  Properly set up it will scan from .005 MhZ to 3.335 GhZ.  This tool will give you a clear idea as to what is going on in the electromagnetic spectrum around you.  Scans can be set up, and an external speaker can be attached.  Signals that you recognize can be ignored, and you can look for suspicious signals that pop up.

If you have something around you that is transmitting, something that you did not know about, then this might represent an invasion of your privacy.  A device like this can be used for many purposes.  The one pictured here is extremely sophisticated.  Others are simple and cheap.  The purpose of this device is not to do a technical survey of a room or series of rooms.  It would only be able to find rudimentary listening devices.  Its purpose is to see a big chunk of the spectrum as to what kinds of transmissions are going on in your area.  Although it is true that this receiver would pick up a radio signal coming from your computer if that signal was between .005 MhZ and 3.335 GhZ.  If your computer is sending out a radio signal (with your information) that you do not know about, then it is time to get a new computer.

This receiver will pick up all kinds of traffic:  am radio, HF signals, aircraft, push-to-talk radio, commercial radio, digital signals of many kinds, analog television (audio), encrypted signals (they will only be seen and a garbled noise will be heard), UHF radio, emergency beacons such as avalanche or downed-aircraft locating devices, etc.

psk_matrix2.jpg          PSK-31

The next step is learning about the electromagnetic spectrum and knowing how waves propagate and how they can be modulated.  Learning about the spectrum tells you what kinds of signals are possible at certain frequencies.

Also, one needs to be diligent because some signals only transmit at odd intervals or on unusual frequencies.

One needs to be aware of the legal aspects of using such a device.  Laws vary, of course, by country.  This device is passive, but one must be aware of, and follow, legal restrictions.  Hobbyists use such devices all over the world, but they usually have sections of the spectrum blocked off.  Make sure to follow your local laws.

There are many situations where a scanner like this would greatly enhance the security of a business or organization in hostile parts of the world, especially when this equipment is operated by attentive, competent personnel.  Small scanners can also reveal enlightening information.

Brochure for ICOM IC-R9500

FRS (Family Radio Service)

FRS (Family Radio Service) is a walkie talkie system used in the United States. These radios use narrow band FM modulation over low power to communicate half-duplex over short distances. The maximum power allowed is .5 Watts. That is not a lot of power. Reach depends on the presence of obstacles such as trees and buildings. One can expect to maintain communications over a distance of a few hundred meters, to over a kilometer, depending on terrain.

These radios operate in the UHF (300 MhZ to 3 GhZ) band over 14 channels. The first 7 channels are shared with another, much more powerful system, called GMRS (General Mobile Radio Service). The FRS channels themselves start at 467.5625 MhZ and go up to 467.7125 MhZ. The spacing between the channels is 12.5 kilohertz. The channels shared with GMRS start at 462.5625 and go up to 462.7125.

Users do not need a license to use a FRS radio.

The Armored Car Problem

You need to transport something extremely valuable from place A to B here in the sublunary sphere.

You feel confident because you have an armored car.  The walls of the car are incredibly strong.  The builders thought of everything.  The guards, two serious people, know how to drive and how to shoot.  You trust them, and you are correct to do so.

But the stark problem comes when they arrive at the bank and it is not the real bank.

Perfect Intercourse

Alice and Bob never meet, but they have the key to each other’s hearts.

Alice’s message is padded and obfuscated.  The key is symmetric and truly random. No one detects the movement of the message from Alice to Bob.  There is no metadata.

After being used once they destroy the key.

Bob then sends a similar message back to Alice (who waited impatiently, feeling faint in the sticky hot, hot, heat of a limpid summer evening).  A different key was used, also symmetric, truly random, and obfuscated.  It became non-existent after its useful life.

Mr. Schedoni, sitting between them, and jealous of their intimacy, did not even notice this deeply personal exchange.  He slouched in his chair and wondered why it was such a quiet night.