Mobile HAM radio in the truck

I’d noticed that as the summer had come on and the trees had leafed out, my ability to reach some local 2M repeaters was impacted, using my 5W HT and a roof mounted magnetic antenna. For example I was having significant issues accessing the Durham “TV Hill” repeater (fine in the winter), though the newly reinstalled OCRA 70cm was fine, albeit configured much higher and sitting much closer to Chapel Hill. So I decided to install a standard mobile rig. I’d wanted a Kenwood 710G but they are just too pricey, so I opted for a Yaesu FT-7900R. Basically, no fancy APRS stuff, but I’m less enamored of that as time goes on.

The 7900R is the basic “workhorse” dual band, 50W on 2M and 40W on 70cm. One thing I liked about it though was the fact that it came with the transceiver/head separation kit, which was good as I didn’t really know how I wanted to mount it, as my truck has a full complement of electronics and no room for other devices. I didn’t want to drill any holes, but I wanted a nice looking install. A tall order!

So where to put things and how to run the wires?

The transceiver is tucked up under the crew cab back seat, behind the driver’s seat. It’s about the size of a small paperback book, and just sits on the carpet out of the way. I had to pick up some extra 12 guage DC power wire (12′) since the battery in the Silverado is on the passenger side. I ran the power wire via a technique I found googling, going thru the fender, not the firewall, and then thru a small rubber grommet near the emergency brake to get into the cab. I reinforced the fender passage with copious electrical tape. Then pop up the plastic trim along the cab edge to run the cables. I soldered and taped my extension to the supplied power cable, running to the transceiver, and in the opposite direction, the head separation cable toward the dash. For the head (like a small cell phone), I got a clamp mount that sits nicely on the corner of the dash on the left of the driver. Left enough cable there to easily move it around, and unplug and put out of the way when needed.

So what about an antenna? I decided on a Larsen thru-the-glass mount on the cab window behind the driver, after reading about successes there. I was concerned about its efficacy but it seems to work great! Dropped the RG58 down behind the seat.

I ran the speaker extension cable from the transceiver to coil it under the driver’s seat, where I could, if desired, plug into the infotainment system. However, the built in speaker is actually pretty effective.

Have programmed repeaters into the radio and done some tests, reports indicate good audio, and I’m happy with the way it all looks. So far so good, and no holes in the truck 😉

The only issue? Somewhere under the hood of the truck is an small socket wrench adapter that “got dropped” during the process…

Panama Papers breach

The Panama Papers data leak has already snared many rich and powerful folks who have been using questionable means to hide wealth beyond taxation and scrutiny. However, that’s not what I want to write about here. I certainly find the abuse of wealth and power to be an issue, and much ink is being spilled on this. I want to focus instead on information security, and in particular, the vectors likely used to extract the data from the law firm Mossack Fonseca. What happened here was not some sort of uber-secret hacking, but was a simple process of exploiting well known vulnerabilities in WordPress plugins and in a particular version of Drupal core that was found to have severe vulnerabilities in October 2014.

wordpress-logo-notext-rgb

WordPress and Drupal are both extremely popular content management systems (CMS). Your correspondent runs several websites using both these systems, and this blog runs on WordPress. Both systems are robust, reliable, and have huge ecosystems of “plugins” or “modules” that can be used to extend basic functionality of the system in a myriad of ways. These extensions provide visual appeal (image sliders and other tools), spam control, and even database functions for storing information about the user community.  If you can imagine it, someone out there has probably written a WordPress Plugin or Drupal Module that can help you bring that functionality to your site. However, with great power comes great responsibility 🙂 .

One of the banes of any technology system is maintenance and patching. This can be to fix bugs, to add functionality, or, increasingly, to patch the seemingly never-ending list of security holes. WordPress and Drupal are no exception, and in fact, both are big targets. Of the two, WordPress is far more prevalent, with over 75 million sites and growing rapidly. Drupal runs one million sites. From a security exposure perspective, WordPress is in my opinion a bigger problem. WordPress is extremely easy to install, and takes much less study to create interesting sites than does Drupal, and as such, many sites are set up by individuals and groups who don’t appreciate the rigor of site maintenance.  I’m not writing this post to favor WordPress or Drupal.  I like both, and both have strengths and weaknesses. This brings us back full circle to what happened with Mossack Fonseca.

In a word, the problem was maintenance. The likely vector that lead the Panama Papers hackers to Mossack Fonseca’s email servers was thru unpatched and well-known vulnerabilities in WordPress plugins. The Drupal exposure likely led to client documents, and could have been a bit more forgivable from an IT perspective, as the exposure was from the core weakness in Drupal versions prior to 7.31, a part of the “Drupalgeddon” exposure of huge numbers of Drupal sites…except that Mossack Fonseca is still (at the time of this writing) running Drupal 7.23 from August 2013!

Wordfence, an organization that provides security plugins and services for WordPress, has done an excellent writeup of how the Panama Papers hacks unfolded, and it’s well worth a read, especially if you are responsible for either doing website maintenance or if you are concerned about the security of the sites you or your organization run.

The sad fact is that it’s just so easy to do maintenance on both WordPress and Drupal that not maintaining sites is highly unprofessional. Wordfence provides an excellent plugin  that notifies you when a monitored site needs a core update or plugin update. Many updates can be configured to run automatically. Running manually is a simple matter of logging in and then doing a couple of clicks! Drupal is just about as easy, though a Drupal core update is a bit more involved than a WordPress core update, currently needing a separate program (Drush) to handle the core update.

Maintenance of websites is a necessary job, just as is maintenance of any other technology asset. Think of it as changing the oil and checking the tire pressure in your car. If you know how, do it yourself. If you need to hire someone else to do it, then do so…but ensure that it is done, or you and your company may wind up in the news one day…

HF Ham!

I’ve neglected my blog for the past couple of months, with no posting since January.  We had a great time on our cruise to the eastern Caribbean in February, so my excuse it that I was having so much fun I had no time for blogging 😉 .

However, I did want to chronicle my success with moving to the world of 6M and HF Ham radio. I posted here in January that I’d upgraded my antennae for my 2M/70CM radio, and I’ve been doing a lot of communication on the 2M band, including becoming a regular participating member of the Possum Trot Net, Possum number 3571! I wanted to add the capability to use high frequency (long distance) bands to communicate to more and different communities.  I added a Yaesu FT-450D radio with a 7-band Buckmaster OCF dipole antennae to my “shack.” I plugged it in Monday of last week and tried to communicate with the local 10M net, but did not have any success in transmitting though I could hear the net traffic. Don’t know if there was just a pileup, or something with local conditions. I reached out to a local Ham to give me some assistance and coaching. KM4MDR came over today and spent a couple hours with me, validating the SWR of my antenna with his MFJ analyzer (it did very well on the supported bands, ranging from 1.2 to 1.8), and showing me a few tuning tricks. I’m very appreciative of John’s help! We participated in the 40M 7.772 Ragchew and talked to Net Control in Maryland, and talked to the 20M 14.300 Mobile Maritime Net (you don’t have to be a boat to participate!) Net Control near Houston TX.  Signal reports were good. So, great success, and now I can operate with the confidence that I can hear and be heard.

More Ham fun

I wanted to be able to reliably reach the local VHF/UHF repeaters, so I bought a 2 meter 1/2 wave antenna to mount outside the house and hook up to my handheld radio. It came over the weekend, and I installed it this afternoon. The antenna itself is a set of wires of specific lengths and impedances that you mount in 5 feet of PVC pipe. I hooked it up with a large diameter low loss cable, and used an adapter to connect to the SMA plug on my handheld. Works like a champ! I’m now able to reliably key repeaters 15 miles away with the 5 watt handheld.  I talked to a fellow Ham this evening via the repeater (W4AGC 2M on TV Hill in Durham), and he said I had excellent sound quality with no distortion. Also, was able to successfully test out an IRLP connection via the W4AGC 70cm repeater to my “beach” repeater in Newport, though my new Ham friend from Harker’s Island, KM4NRZ, didn’t answer. Also did a test of an IRLP reflector node, and heard my voice come back. Cool!

Clearwater 2016, v1

As my (one or two?) regular readers know, I like to visit a local “lake” that the TU chapter stocks with trout for a winter fishery. Let’s see, trout, hanging out with a few fellow anglers I don’t see often enough, only 15 minutes from my house, what’s not to like?

Joel netting trout

First fish of the day

On January 9th, I had one of my two seasonal visits to Clearwater. The fishing was slow, as recent rains had muddied the lake, but all the 8 anglers there each caught a handful of nice fish.  I caught mine on egg patterns, a fly that I’ve historically used in the winter with great success, but not at Clearwater. Great fellowship, and always fun to hang with my fishing buddy, Sam. Already looking forward to the next trip there!

Joel releasing a big trout

This one put a nice bend in the rod

TU said that they put a lot of browns in the lake this year, but I didn’t see any. Maybe next time.

APRS antenna update

As I wrote here previously, I’ve been exploring the APRS (Automatic Packet Reporting System) Ham Radio system. I noted that while I had the Kenwood TH-D72 radio configured correctly, it was not reliably getting its packets to the nearest digipeater to be ingested into the APRS/APRS-IS world. I suspected it was an antenna issue, as I was using the “rubber duck” that came with the radio. I replaced that with a Diamond SRH77CA and that’s made a huge difference. I’ve used it to have a “chat” with another local APRS user several miles away, though via the digipeaters, it’s possible to have a digital chat with an APRS user much further away (depending on mutual routing settings). Additionally, I noted that when the radio was inside a vehicle, it was unlikely to successfully send a packet unless the digipeater was just a couple miles away. So, I also got a Diamond MR73S, a small magnetic-mount external antenna with an SMA connector. With that on top of my truck, the APRS “smart beaconing” works perfectly, sending status packets with information that reliably shows position and turns. Interesting stuff.

APRS radio

I’ve been experimenting with APRS (Automatic Packet Reporting System) on HAM Radio. Interesting stuff! Essentially, it is a system that provides situational awareness and context for radio-enabled devices by capturing “beacons” from devices such as mobile radios, fixed point radios, weather stations, satellites, antennas, and creating a data stream that’s used to create a geo-enabled map of devices in real time…an organic “Internet of Things” (IoT) joined in the radio spectrum. As Bob Bruninga, the father of APRS says:

“Since the primary objective is consistent exchange of information between everyone, APRS established standard formats not only for the transmission of POSITION, STATUS, MESSAGES, and QUERIES, it also establishes guidelines for display so that users of different systems will still see the same consistent information displayed in a consistent manner (independent of the particular display or maping system in use)”

There are gateways to the traditional Internet for email, but the value of APRS is in the dynamic resource map it populates to RF contacts in the local area (and through data added to the APRS-IS, the Internet system, and thus generally available), and its ability to send messages between participants. It’s a peer-to-peer network that can grow organically with the addition of “digipeaters” to relay traffic, but still provides station to station information. As the APRS Wikipedia article states, “Anyone may place any object or information on his or her map, and it is distributed to all maps of all users in the local RF network or monitoring the area via the Internet.”

It does depend on access to a digipeater, and one thing I’ve found in a couple days of testing is that my HT 5w Kenwood TH-D72 transmits to the nearest repeater from Emerald Isle with sketchy regularity. It’s 10 air miles, and the standard antenna on the TH-D72 is reliably receives APRS packets from KD4KTO-4, but seems to get them there irregularly. Next week, I’ll be back in the Chapel Hill area, and it will be interesting to see how things fare there. I’ve ordered a better antenna for the radio as well, and that should help considerably with transmit range.

 

Finally have Apple Pay working again on Watch

As my faithful readers know 😉 , I really like the Apple Watch. I wrote in September about getting the wrist detection working again, and it’s been great since then…with one exception. Without wrist detection enabled, you can’t use Apple Pay (it won’t let you store cards without wrist detection enabled). When I turned wrist detection off, before that fix with OS 2, my Apple Pay configuration went away; that’s the way it works. This doesn’t sound so bad, but then when wrist detection was back, I couldn’t add cards to Apple Pay. They would be stuck being “activated.”

I did a fair bit of Googling on it, and it appeared to be an issue with some bit of iPhone storage not getting completely cleared out with card removal. Supposedly a restore of the phone fixed things for many folks.  However, I didn’t want to go to the trouble to do that, so I just ignored that one missing feature.  After December’s Watch and iOS updates, I decided to try again and lo and behold, it worked! I loaded up some cards and went Christmas shopping on Friday. Woohoo! I’m a happy camper.

Encryption, backdoors and spies, oh my!

Since the Paris terrorist attack and then the San Bernardino shootings (which now are confirmed to be an internationally inspired terrorist attack by a US lifetime resident and citizen) there has been much discussion among talking heads on screen and in print about needing to be able to eavesdrop on all communications. Many pundits, candidates, and congressmen have jumped all over this bandwagon, calling for more surveillance and calling for means to access any encrypted communication. Many of these same advocates for eavesdropping are ardent supporters of the 2nd Amendment, but forget about the rights for the people to communicate, assemble, and be protected from unreasonable searches and seizures (1st and 4th Amendments). However, putting aside the legal issues and politics that are wrapped up in the issue, this is technically a very bad idea.

First, let’s consider encryption alone, without considering some sort of backdoor or key escrow. Encrypted communication has been with us as long as there has been writing, and really, it’s been with us as long as there has been spoken language. Fundamentally, it’s communication that can’t be deciphered due to some sort of obfuscation. This can manifest itself as something intelligible only to the communicating parties such as a jumble of letters or symbols, or some common words (spoken or written) to which is ascribed a common, secret meaning known only to the communicating parties. The common thread here is that there is some shared knowledge that can be used by the communicating parties to extract the hidden meaning, either a shared secret or knowledge of the location of a message. Cryptography is an old art, dating back several thousand years (see also this article for more history). There are a myriad of non-digital ways to hide information, and a quick overview of the Wikipedia article on Steganography can be quite illuminating to the uninitiated, although computers have opened up many new avenues for the practices. Classic encryption took the form of a shared secret (a word, phrase, words on pages of a book, etc.) that could be used to encrypt and decrypt the coded message. Innovative ways of doing this, and in particular changing the shared key, made such messages very secure. In the digital world, this is called symmetric key cryptography.

Widespread use of computers has created many types of communications where information needs to be shared, but also protected, and this brought about the rise of public key cryptography (a pair of algorithmically related keys) and digital signatures as a means of solving the shared secret conundrum. A fundamental point that you should take away, however, is that in the digital world, encryption, whether with a shared secret or a public keys, it boils down to algorithms implemented in computer code. This is embedded in tools you use every day on your computer. Whenever you see a “lock” or other security symbol in the URL display of your browser, you are seeing the results of these algorithms implementing public key encryption. There are many algorithms for cryptography throughout cyberspace that are in the public domain and can be used by anyone. A quick trip to Google will show you this. Likewise, many derivative works exist that are not cataloged. Herein lies the first lesson. The US does not “own” cryptography, or algorithms, and there are many freely available algorithms and code implementations of those algorithms that are beyond the reach of US laws. Efforts to constrain or to weaken encryption will not affect those who want to hide their communications. Just as toolkits are available for the propagation of computer malware (another interesting story!), toolkits for encryption are available and will remain available regardless of legislation. To paraphrase a saying of supporters of 2nd Amendment rights, “when encryption is outlawed, only outlaws will have encryption.”

We have seen this week a revelation that Juniper Networks found at least one “backdoor” in their router/firewall operating system, that had been there since at least 2012. What was the source of this intrusion? Probably nation-state hackers. Who?  Good question. Why? Putting such code in network appliances gives, as the article says, the ability for the owner of the exploit to access resources behind the firewall, the ultimate target. So, how are these thoughts connected? If there is a backdoor in a network appliance, it can allow someone to bypass controls. The fact that this exploit went unnoticed for years speaks to the difficulty of checking for such intrusions. Likewise, if there was a backdoor engineered into an encryption system, as is promulgated on various fronts today, it would be vulnerable to misuse and unauthorized access.  This would impact the security and privacy of legitimate users who are using the encryption system. Would it improve security? I think not, as those who are really concerned about eavesdropping on their conversations will take additional measures, such as using internationally sourced tools (or tools written by a trusted colleague), or by simply obfuscating the messages that are carried by the communication system.  We have a backdoor to access the communications path, but we can’t see anything (at least prospectively) other than innocuous communication (remember steganography?). The value of a backdoor in encryption systems in preventing terrorist attacks is thus minimal, and the breakdown in the privacy of communications for others is significant.

Conversely, focusing not on the content, but rather the patterns of communication (the so-called metadata) or observing other external phenomena does have value. If someone is communicating with known terrorists or in places frequented by such individuals, that can and should raise a red flag. Then, traditional methods of surveillance can then be employed, including bypassing the encryption challenge by placing “taps” (malware) on a suspect’s devices and thus viewing the decrypted messages. That still leaves the challenge of obfuscated messages, but it is more useful. Much can be learned by observations of patterns and metadata. A classic example is determining the likelihood of imminent military action by observing the number of evening pizza deliveries to the Pentagon.

In summary, encryption has been with us since the beginning of communication. Computers are tools used in encrypting messages, but have not changed the fact that those planning activities where they want secret communications have many channels available to them. Sophisticated actors will layer protections on their communications, and simple backdoors to our personal devices or encryption tools will not pierce that veil. If backdoors are in place, we run the very significant risk that those backdoors will be used by actors other than the intended “official” users, and we have thus compromised the security of all and gained little or none in return.

 

Watch OS 2 fixes fixes my wrist detection error

I’ve been a happy Apple Watch user since I got mine on June 1st. While there were limitations in the apps, the promise of exciting functionality was there. It quickly became indispensable. I found texting to be a killer app, and I used the fitness tracker daily. I found a tide table app that’s perfect for helping with coastal fishing and boating. However, three weeks ago, the wrist detection process stopped working. I tried all the  “home remedies” I could Google up, to no avail. I wiped and reloaded, I stood on my head while putting it on my wrist–not really, but you get the idea. I had to turn off wrist detection as one thing it did was stop workout tracking when it locked after 15 seconds. Turning off wrist detection also turned off Apple Pay (not that I’ve used it more than twice, to buy coffee at McDonald’s). I thought about sending it in for replacement (the hive mind was split between software errors and sensor errors) but decided to wait for the OS 2 update, betting that it was a software error (or a deep config setting that the wipe did not update). So, after a nearly 2 week delay in the release of the OS, it was available today, and I’m pleased to say wrist detection is working perfectly again.

Now I’m looking forward to OS 2 apps!