Logo The Ruckus Society
AboutActionGalleryNewsManualsSupport


Longwire's Communications Manual

CONTENTS

I- INTRODUCTION

II- ASSESING YOUR NEEDS- A CHECKLIST

III- ORGANIZING COMMUNICATIONS AND MONITORING

  1. NET CONTROL SETUP
  2. RADIO USER TRAINING

IV- MONITORING BASICS

  1. RESEARCHING FREQUENCIES
  2. SCANNER PROGRAMMING
  3. SCANNING and SCANNERS
  4. HINTS FOR SCANNING DURING ACTIONS

V- OTHER EQUIPMENT

  1. USING RADIOS ON SITE
  2. FREQUENCY COUNTERS
  3. NEARFIELD RECEVIERS
  4. SPECTRUM ANALYSERS
  5. TWO-WAY HANDHELD RADIOS

VI- LONG DISTANCE COMMUNICATIONS

  1. SATELLITE COMMUNICATIONS
  2. HF (HIGH FREQUENCY) RADIO
  3. MARINE HF
  4. CB

VII- COMPUTERS

  1. DATABASES, CONNECTING TO CELL, GPS

IIX- POWER SOURCES

IX- RADIO SECURITY AND COUNTERMEASURES

  1. SCRAMBLING, CHANNEL HOPPING, BUGGING COUTERMEASURES

ACTIVIST
COMMUNICATIONS

I. SIMPLE LIVING and ADVANCED TECHNIQUES

Most of us feel ambivalent about technology. For many years technology has been a weapon used by the powerful against the weak. Time has changed things; the technology built around the digital revolution is becoming cheaper and easier to use. Gone are the days when people with advanced degrees and astronomically expensive equipment were the only ones "tuned in".

Our fear of technology is exemplified by George Orwell's vision of Big Brother: an unseen force, constantly monitoring us through a technological "one-way-mirror". Our current reality is even stranger than Orwell could have predicted when he wrote 1984: we now have the tools to turn the "one-way mirror" into a window that looks back at those looking at us.

Tools such as scanners, the worldwide web, cellular phones and new communications satellites give us capabilities once available only to the military-industrial complex. It is our belief that these tools are most effective when used in the Spirit of Peace for a focused purpose. Government security services, the paramilitary right, survivalists, and cop wannabes have been using this stuff for years - since the technology is morally "neutral", it is up to us to give it the power to do good. We focus on what we need and remain respectful of personal privacy…especially our own.

My goal is to introduce the powerful tools of communications and information technology to those in the environmental and social justice movements. I will focus on practical application rather than technical explanations of how things work. There is an interesting mix of time-tested ways and the cutting edge techniques available that could be of great assistance to those planning good deeds.

This technology, used correctly, can:

- Provide a margin of safety in sketchy circumstances 

-Allow widely separated participants to coordinate their activity

-It allows you to listen to public agencies as they react to your situation

-It can give you the tools to get out words and images IMMEDIATELY

 

It should be noted that many effective activities have taken place WITHOUT radios, cell phones, scanners and computers. Not having fancy equipment should NOT keep folks from doing an action or demonstration; mass movements such as the labor struggles of the 30's, the civil rights movement and the anti Viet Nam war demonstrations took place with only motivated participants. As always the passion and commitment of the participants are the most important factors in the success of any undertaking the rest are details.

 

CONTENTS

 

I- INTRODUCTION

II- ASSESING YOUR NEEDS- A CHECKLIST

III- ORGANIZING COMMUNICATIONS AND MONITORING

  1. NET CONTROL SETUP
  2. RADIO USER TRAINING

IV- MONITORING BASICS

  1. RESEARCHING FREQUENCIES
  2. SCANNER PROGRAMMING
  3. SCANNING and SCANNERS
  4. HINTS FOR SCANNING DURING ACTIONS

V- OTHER EQUIPMENT

  1. USING RADIOS ON SITE
  2. FREQUENCY COUNTERS
  3. NEARFIELD RECEVIERS
  4. SPECTRUM ANALYSERS
  5. TWO-WAY HANDHELD RADIOS

VI- LONG DISTANCE COMMUNICATIONS

  1. SATELLITE COMMUNICATIONS
  2. HF (HIGH FREQUENCY) RADIO
  3. MARINE HF
  4. CB

VII- COMPUTERS

  1. DATABASES, CONNECTING TO CELL, GPS

IIX- POWER SOURCES

IX- RADIO SECURITY AND COUNTERMEASURES

  1. SCRAMBLING, CHANNEL HOPPING, BUGGING COUTERMEASURES

 

 

Email: longwire@bigfoot.com