Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Using encryption on ham bands is illegal yes. You can use it on commercial bands if you buy a license from the FCC and ISM (common 2.4ghz/5Ghz) is mostly fair game as well. The practical reality is people are probably getting away with abusing it because the FCC is not omniscient and has limited resources. For an individual to draw the ire of the FCC they need to make a nuisance of themselves. Occasionally you hear of people getting arrested for using illegal cell jammers and the like. I can't recall hearing of someone getting caught using encryption.

For something like this to really get a crackdown you would need a watershed event like RC aircraft had with cheap drones. The point where very capable hardware became extremely cheap and accessible to people who know nothing about the hobby. The RC aircraft community effectively self policed for decades because the bar for entry was high enough that anyone getting involved had to engage with the community. Drones changed that. And the FAA had to step in and regulate. I think we are getting close with cheap Chinese radios. But even Baofengs still require programming and educating yourself. Devices like the flipper zero are far more damaging. Even though they are limited in their capabilities, they make it trivial for the user to make a nuisance of themselves in ways that are hard to ignore. Its probably a matter of time until a cheap radio hits Amazon that does everything for you and permits non hobbyists to ruin everything. Imagine something as capable as a HackRF but as easy to use as an iPhone. Then we have problems.



I think there's one more intrinsic safeguard for these radios vs. drones.

Handheld radios are mostly not useful in an urban setting (compared with a cell phone), and only other radio users can even be bothered by them.

Unlike "drone spotted in posh neighborhood looking into windows" as a headline, "Baofeng user briefly interferes with garage door opener" just doesn't have any edge.


That's a fair point but I've seen for a few years now Baofeng Ham radios resold as walkie talkies for recreational use. Often advertised as for powersports like ATVs and boating. This is completely illegal but these resellers have been doing it for awhile now without any consequences. Still, the real world impact is limited and mostly contained to annoying Hams. And its a meme in the community that the FCC doesn't care about Hams.

I think the flipper zero/hack rf side of things is the bigger problem. Its very useful to whitehats but they also lower the bar for a lot of disruptive attacks. Get a flipper zero and war drive any neighborhood built in the 80's and its prime hunting ground for forcing garage doors. I'm surprised we haven't heard more of that actually.


> I'm surprised we haven't heard more of that actually.

It’s a bit of an information hazard. E.g. what if someone made sewer pumps run backwards. Meanwhile the level of exploit capabilities is on the level of Spectre. There is such a wide gulf between what is and what should be that we can’t properly discuss it.


> Imagine something as capable as a HackRF but as easy to use as an iPhone.

This is literally just a UX overhaul away for the HackRF Portapak system. As-is the UX is slightly too awkward for the casual user, but these things trend towards becoming more user friendly over time.

Honestly a Portapak with Bluetooth module and a phone app to control it would be pretty fucking cool, now that I think about it.


https://github.com/htotoo/ESP32-Portapack

Looks like this may be in the works!


Question from a non-ham: how does the fcc define encryption?

Is it ok to speak in code, like a numbers station?

What about speaking in Navajo, like the Americans did in ww2?

What if it was a made-up tonal language with lots of clicks that sounded similar to a modem transmitting a bitstream?


"messages encoded for the purpose of obscuring their meaning"

https://www.ecfr.gov/current/title-47/part-97#p-97.113(a)(4)

It's intentionally broad, and gives exceptions for controlling satellites as the only real exception.

People try to fight that publishing encryption keys would mean that you are within the intent of the law, I struggled decades ago trying to create a digital voice mode while every OM told me I was trying to encrypt things. sigh.


Awesome, thanks


What threeio said is right. Technically, encoding data digitally isn't encryption and is fine, and there are digital modes used by Hams. But if you were to come up with your own scheme I could see some sweaty old timers try to accuse you of encryption just because their $3k Yaesu can't decode it. There's a good reason why a lot of recent innovation in the hacker and maker spaces has been in unlicensed bands. The rules for the Ham bands were written decades ago when just trying to talk to people around the world was considered experimental. Now its trivial to do that with HF with the right equipment and a bit of reading. The FCC tends to neglect the ham space which is both a good and bad thing. Lack of attention means people are probably getting away with doing a lot of harmless things they technically shouldn't be. But it also means we are stuck with rules from the 1930's.


Define ‘trivial’.

It is not trivial to set up an HF antenna that can send a signal (halfway) around the world and be used to hear a response, and it is often not repeatable without the right sun / weather conditions. It is the nature of HF, which hasn’t changed since the 1930s (and will not).

Radios have become arguably cheaper, but electrons vibrating at 3-30MHz have not changed their behavior much.


Its trivial in that anyone with minimal reading online and inexpensive equipment can do it. There's also no new science or industry development coming from doing it. HAM analog HF is mature and established.

>which hasn’t changed since the 1930s (and will not).

And that's the crux of my point. It got about as good as it was going to get nearly 100 years ago. I have a ham training/reference book from the 30's. And long range HF was a much more impressive feat back then. But if you go to youtube today basically every Ham channel has at least one video on how to do it "cheap and easy" now. One of the stated purposes for Ham from the FCC's pov was to foster innovation and development of radio technology. If that's true then it needs to evolve with the times because that is a moving target.


> Is it ok to speak in code, like a numbers station?

Good question. Probably yes but don't pin me on it.

> What about speaking in Navajo, like the Americans did in ww2?

Definitely 100% ok as long as you transmit your callsign in NATO english or send it in morse code. A language is not encryption. The ham community is super international. It's not a US English only thing.

It might cause some grumbling in your local area but it's not illegal. Especially now that repeaters are often connected to the whole world.


You mean like the portapack, which is based on a HackRF and allows transmission on a broad range of frequencies.. https://github.com/portapack-mayhem/mayhem-firmware

At least the normal layperson would need to understand RF to cause any damage.


Assuming there was aggressive enforcement against it, could someone “get away” with encrypted transmission sent in low-power alongside high-power unencrypted transmissions?

Like would a well-encrypted stream look indistinguishable to a bit of noise from a low-quality transceiver?


That depends entirely on what they are listening with. One sub set of ham radio is called fox hunting which is a gameified form of radio direction finding. Some guys are really good at it. If you annoy one of them and they are persistent they can potentially track you down. The Feds of course have very sophisticated tools far and above what's available to you but if you've drawn that kind of attention you are already in deep trouble and looking at jail time. Powerful software defined radios like the RTL-SDR are inexpensive and with a PC can be used to scan broad swathes of spectrum and even decode and store transmissions. People can setup their own DIY listening posts this way. For someone with the right setup and looking at the right time they would notice you are using an encrypted transmission. To figure out where you are would involve repeated detections from multiple points. An adjacent topic is pirate radio stations. The Youtube channel Ringway Manchester has a series of videos about historical UK pirate stations and their stories. You might find it interesting.


I think you maybe answered a different question than what I intended to ask. I meant to ask - if I only transmit encrypted communications while I’m legitimately transmitting legal content … how would anyone differentiate illegal high-entropy encryption from legal high-entropy noise?

Obviously anyone can track my transmissions with “fox-hunting”. But my transmissions would superficially be valid and legal. How would they notice the well-encrypted communications which theoretically should look like random noise?


To put this in different words, you're basically asking about steganography applied to a radio transmission. I think the answer is: unlikely to be noticed unless you were receiving particular attention for some reason. Though your noise might inadvertently violate bandwidth constraints.

If you search for radio steganography or acoustic steganography you'll find a bunch of papers on the topic.


Ah, so if you are using encryption on a digital mode like DMR or P25 for example, they have very distinct sound and appearance over the air. Its pretty unmistakable as common digital modes can be identified by ear by experienced Hams. So if I am listening on my SDR and pickup a digital transmission on a ham band I can try to identify and decode it. If I am confident I've correctly identified the mode being used and I can't decode it then its probably encrypted. Some modes like DMR even carry some information unencrypted when the transmission is. So its still possible for someone without the key to correctly identify the transmission even if they can't hear what's been said.

Trying to hide a transmission as background noise would be very difficult. I wouldn't say impossible but it wouldn't be easy. The modern technique is low probability of intercept, LPI. Which uses a combination of techniques including very rapid and complex frequency hopping as well as well as beam forming and making the transmission as efficient as possible to limit the required power. The lower power, and more more directional your transmission, the less likely someone unwanted will be able to pick it up unless they are between you and the intended recipient.


If it is above the S/N ratio, it won’t look like noise. If it is below, it’s hard to make useful.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: