Offbeat

Legal

Hams try to re-carve the amateur radio spectrum in fight over open or encoded transmissions

Radio enthusiasts argue signals must travel in the open, for the sake of national security


Some people have been using ham radio frequencies for communication that's encrypted or difficult to decipher and others argue that's a threat to national security and a violation of the spirit and rules of amateur radio. Really, it's a fight over whether the amateur radio spectrum remains a hobbyist space or develops as a medium for data traffic.

In a letter [PDF] submitted earlier this week to the US Federal Communications Commission, NYU professor Theodore Rappaport, who runs the NYU Wireless research center at the NYU Tandon School of Engineering, voiced support for RM-11831 [PDF], a proposed radio rule revision that, among other things, would require radio transmissions be open to public scrutiny.

"RM-11831 allows ACDS [Automatically Controlled Digital Stations] to continue to operate in ham radio, but simply requires them to use openly decodable transmissions in compliance with FCC rules," Rappaport says.

That means difficult-to-decipher, proprietary automatic repeat query (ARQ) traffic, using radio signal modulation modes like Pactor 3, WINMOR, STANAG, and ARDOP would have to be open source or make easy decoding available to ham radio operators who wish to examine the traffic.

Federal rules ban amateur radio stations from transmitting "messages encoded for the purpose of obscuring their meaning," with some exceptions. Despite this, evolving technology has given rise to a number of services that, some argue, violate these rules, such as Winlink and D-Star.

If the rule change is adopted, it might mean the end of these services, or reduced functionality, and might make it harder for innovative services like New Packet Radio to emerge.

RM-1183, argues Rappaport, "assures national security by providing transparency and self-monitoring by the public of all amateur radio transmissions in the HF spectrum that routinely cross international borders."

At the same time, Rappaport urges the FCC to reject other proposed rules, NPRM 16-239, RM-11828, RM-11759, and RM-11708, that he claims would allow more obscure or effectively encrypted communications over public radio spectrum.

Others offering their opinions to the FCC disagree. "RM-11831 is yet another effort by a small circle of US amateur radio operators wanting to cripple the use of data modes on the amateur radio bands," writes Stephen Williams of Bakersville, North Carolina, in a comment submitted to the agency.

"If enacted, the changes proposed will NOT promote transparency and will NOT prevent the use of the bands by commercial interests. There are no proven cases of commercial use of modes like Pactor on the amateur bands. This RM-11831 effort is simply an attempt to kill the use of Pactor in the US as a communications mode supporting emergency communications operations."

In a letter [PDF] to FCC chairman Ajit Pai last December, Loring Kutchins, president of the Amateur Radio Safety Foundation (ARSFI), which oversees Winlink, pushed back against Rappaport's characterization of the service.

Ruh-roh! Rick Ruhl rolled out of Ham Radio Deluxe in software kill-switch aftermath

READ MORE

"Theodore Rappaport and the opponents he informs offer an emotional, layman's conjecture in their assertions that hard-to-monitor, advanced digital protocols used in the amateur radio service will encourage crime, terrorism, and are a threat to national security," said Kutchins. "They clearly do not know or appreciate what monitoring and inspection routinely occurs, and are thus not qualified to judge."

Kutchins claims Winlink sysops inspect system traffic. "All communications are logged in detail and messages are archived, and available to the FCC and anyone else on request," he insists, pointing to a separate set of comments intended to rebut Rappaport's claims.

Dan White, of Granbury, Texas, is both an American Radio Relay League (ARRL) member and critic. He claims the organization is backing proposed rules like RM-11708 "to provide free encrypted email and bypass commercial maritime services under the guise of 'emergency communications' while exhibiting total disregard for incumbent spectrum users."

The FCC will consider input on RM-11831 until April 29 this year. ®

Send us news
56 Comments

Cisco creates architecture to improve security and sell you new switches

Hypershield detects bad behavior and automagically reconfigures networks to snuff out threats

Zero-day exploited right now in Palo Alto Networks' GlobalProtect gateways

Out of the PAN-OS and into the firewall, a Python backdoor this way comes

Microsoft squashes SmartScreen security bypass bug exploited in the wild

Plus: Adobe, SAP, Fortinet, VMware, Cisco issue pressing updates

US government excoriates Microsoft for 'avoidable errors' but keeps paying for its products

In what other sphere does a bad supplier not feel pain for its foulups?

OpenAI's GPT-4 can exploit real vulnerabilities by reading security advisories

While some other LLMs appear to flat-out suck

Alibaba Cloud reveals network telemetry tool that helped cut number of engineers needed by 86%

Zoonet employs 'elegant generalization of ping and traceroute' among other tricks

FYI: This site claims to have harvested 4B+ Discord chats, today all yours for a price

Of course there's an enterprise plan for the Feds and AI trainers

French issue <em>alerte rouge</em> after local governments knocked offline by cyber attack

Embarrassing, as its officials are in the US to discuss Olympics cyber threats

It's 2024 and Intel silicon is still haunted by data-spilling Spectre

Go, go InSpectre Gadget

Grafana Labs updates observability line-up with query-less visualization

CTO Tom Wilkie gives an optimistic take on AI without climbing on the bandwagon

H-1B visa fraud alive and well amid efforts to crack down on abuse

It's the gold ticket favored by foreign techies – and IT giants suspected of gaming the system

Feds probe alleged classified US govt data theft and leak

State Dept keeps schtum 'for security reasons'