The annual Military Radio Collectors Group meeting at Camp San Luis Obispo is almost here! This year, I’m pleased to announce that we’ll be conducting a joint crypto-related operation with the Maritime Radio Historical Society’s Coast Station KSM. Here’s their announcement of the operation.
As a commercially-licensed station, KSM is not bound by the restrictions on use of cryptography that ham radio operators are. They’ll be transmitting two different messages, both enciphered with a WW-2 era M-209 Converter. MRCG participants will, in turn, attempt to receive those messages and decipher them.
From the MRHS announcement, here’s the broadcast schedule:
KSM will broadcast a prepared message consisting of 26 groups encrypted with the M-209 at 15wpm on all its CW frequencies beginning at 1100 Pacific time (1800Z) on Saturday 4 May.
These frequencies are (in kc):
426 (after an announcement on 500)
The message will be sent twice.
The usual KSM press transmission will begin at 1000 Pacific time (1700Z) at 25wpm and continue until the announcement for the crypto broadcast to give listeners a chance to tune to the strongest signal in their area.
Upon completion of the CW transmissions a longer message will be sent on all KSM RTTY frequencies, also encrypted with the M-209. These frequencies are (in kc):
The RTTY transmission will be 170cps shift Baudot, 45 baud.
Both the CW and RTTY messages will be encrypted with the same M-209 key settings.
Anybody capable of receiving KSM’s transmissions is welcome to participate, too! If you don’t have access to a real M-209, then you can use this free Windows-based M-209 simulator, or any of the other M-209 simulators out there.
If you don’t know how to operate an M-209 yet, then you might like to read my series of posts on practical use of the M-209. It’s not yet complete, but the existing chapters cover the basics of operating the machine.
Finally, you will need the proper key in order to decipher the messages: