Radio Intrigue with Don Schimmel


Up Front





Glenn Hauser's DX Listening Digest

Glenn Hauser's Continent of Media

Don Schimmel's Radio Intrigue

Joe Carr's Tech Notes

Radio Basics

Frequency vs. Wavelength

Modes and Modulation

Call Sign Prefixes

UTC/GMT Conversion

Radio Terms

Shortwave Radio

Introduction to Shortwave Listening

Tuning 150 kHz to 30 MHz

Selecting a Shortwave Radio

Reporting and QSLs

Receiver Reference

Modern Shortwave Receiver Survey

Favorite Tube-Type Shortwave Receivers

Scanner Monitoring

Introducing the "Action Bands"

The World Above 30 MHz

Selecting a Scanner

National Scanner Frequency Guide

Other Radio Hobbies

Ham Radio

AM Band DXing

Longwave DXing

Clandestine Radio

Pirate Radio

Numbers Stations


Radio Links

Shortwave Listening

Radio Clubs

International Broadcasters

Scanner Listening

Ham Radio

Web-Controlled Radios


Universal Radio

Top of Page

Report #104 10/01/14

This program is a means of decoding Random Digital File Transfer (RDFT)transmissions. The program was written by PY4ZBZ, a Brazilian Ham and it is available on http://www.qsl.net/py4zbz/eni.htm Three are two versions of DIGTRX. One is a download DIGTRX 3.11 for the older type XP computer (this is what I am using) and the other is for a Windows 7 computer (DIGTRX 2.14D).

The signal has been designated by ENIGMA as HM01. This is composed of an audio group followed by RDFT. This occurs for each of the 6 audio groups. The decoding yields enciphered text. Results are best when the signal is of good quality. Connect a recorder to the receiver. Tune in the HM01 signal and adjust for the text tones to coincide with the 110 and 1520 Hz alignment marks. If the bar is dark green the signal level is too low, and if it is red, the level is too high. Record at least 3 repeats of the transmissions. Disconnect the recorder from the receiver and connect it to the computer MIC IN (or AUDIO IN) connection. Play the first audio number and its corresponding RDFT transmission. Upon completion of that stop the recorder. Click on the file number and the enciphered text will appear on the screen. Repeat the above procedure for each of the other voice groups. NOTE: Keep the DIGTRX in STATUS MODE. The program will auto save the file number (plus associated enciphered text) and each file number will have a Date-Time stamp. If hard copy is desired connect a printer to the computer USB connection. There are variations to the above decoding method but that described was found to be most practicable. A huge thanks goes to Joe Pierce and Gary Donnelly who did most of the testing and refinement of procedures.

I mentioned in the report last month that I was trying to find the locations of the four intercept stations built in Nicaragua by the Russians for the Sandanistas. To date I have not had any luck zeroing in on those sites. As previously pointed out, if the facilities were abandoned some time ago they would be difficult to spot as they not doubt would be heavily overgrown by vegetation by now. I have not given up however and continue to carefully scan the surrounding territory near each of the indicated sites.

Freq.  Remarks       Time of Intercept [DDHHMM] kHz Remarks/Date-Time of Intercept
  9044.5 Several stns with brief CW, bad QRN and very weak sigs 230109
10872 Russian Military Beacon D Sevastopol 202301
10872 Russian Military Beacon C Moscow 171819
12788 Fax, prob NMG, USCG, New Orleans, LA 231443
14846.2 4XZ, Haifa Naval, Israel, 5L grps, auto morse 181505
16332 Russian Military Beacon C Moscow 231436

14100 YV5B, Caracas, Ven; 4U1UN, UN New York City, VE8AT Eureka, Nunavut, Canada 181501
18110 YV5B, Caracas, Ven; Zs6DN Pretoria, S. Africa 171841
21150 YV5B, Caracas, Ven; 4U1UN, UN New York City; Z26DN, Pretoria, S. Africa 171834

End of Report

Click here for index of previous editions of Radio Intrigue

2014 Don Schimmel.