Glen Hauser's DX Listening Digest
Don Schimmel's Radio Intrigue
Joe Carr's Tech Notes
Frequency vs. Wavelength
Modes and Modulation
Call Sign Prefixes
Introduction to Shortwave Listening
Tuning 150 kHz to 30 MHz
Selecting a Shortwave Radio
Reporting and QSLs
Modern Shortwave Receiver Survey
Favorite Tube-Type Shortwave Receivers
Introducing the "Action Bands"
The World Above 30 MHz
Selecting a Scanner
National Scanner Frequency Guide
Other Radio Hobbies
AM Band DXing
Top of Page
Report #104 10/01/14
DIGTRX COMPUTER PROGRAM
This program is a means of decoding Random Digital File Transfer (RDFT)transmissions. The program was written by PY4ZBZ, a Brazilian Ham and it is available on http://www.qsl.net/py4zbz/eni.htm
Three are two versions of DIGTRX. One is a download DIGTRX 3.11 for the older type XP computer (this is what I am using) and the other is for a Windows 7 computer (DIGTRX 2.14D).
The signal has been designated by ENIGMA as HM01. This is composed of an audio group followed by RDFT. This occurs for each of the 6 audio groups. The decoding yields enciphered text.
Results are best when the signal is of good quality. Connect a recorder to the receiver. Tune in the HM01 signal and adjust for the text tones to coincide with the 110 and 1520 Hz alignment marks. If the bar is dark green the signal level is too low, and if it is red, the level is too high.
Record at least 3 repeats of the transmissions. Disconnect the recorder from the receiver and connect it to the computer MIC IN (or AUDIO IN) connection. Play the first audio number and its corresponding RDFT transmission. Upon completion of that stop the recorder. Click on the file number and the enciphered text will appear on the screen. Repeat the above procedure for each of the other voice groups. NOTE: Keep the DIGTRX in STATUS MODE. The program will auto save the file number (plus associated enciphered text) and each file number will have a Date-Time stamp. If hard copy is desired connect a printer to the computer USB connection.
There are variations to the above decoding method but that described was found to be most practicable.
A huge thanks goes to Joe Pierce and Gary Donnelly who did most of the testing and refinement of procedures.
I mentioned in the report last month that I was trying to find the locations of the four intercept stations built in Nicaragua by the Russians for the Sandanistas. To date I have not had any luck zeroing in on those sites. As previously pointed out, if the facilities were abandoned some time ago they would be difficult to spot as they not doubt would be heavily overgrown by vegetation by now. I have not given up however and continue to carefully scan the surrounding territory near each of the indicated sites.
Freq. Remarks Time of Intercept [DDHHMM]
kHz Remarks/Date-Time of Intercept
9044.5 Several stns with brief CW, bad QRN and very weak sigs 230109
10872 Russian Military Beacon D Sevastopol 202301
10872 Russian Military Beacon C Moscow 171819
12788 Fax, prob NMG, USCG, New Orleans, LA 231443
14846.2 4XZ, Haifa Naval, Israel, 5L grps, auto morse 181505
16332 Russian Military Beacon C Moscow 231436
14100 YV5B, Caracas, Ven; 4U1UN, UN New York City, VE8AT Eureka, Nunavut, Canada 181501
18110 YV5B, Caracas, Ven; Zs6DN Pretoria, S. Africa 171841
21150 YV5B, Caracas, Ven; 4U1UN, UN New York City; Z26DN, Pretoria, S. Africa 171834
End of Report
Click here for index of previous editions of Radio Intrigue