Episode 22-41 is Part 4 of a series, covering non-permissive radio operations environments and ‘when ham radio is banned’.

The Part 4 ‘When Ham Radio is Banned’ portion begins at about the 14:45 minute mark:

This discussion is focused on a future potential scenario when operators must use tactics, techniques, and procedures, which might not be within current FCC regulations.  AmRRON policy is clear that all its members operate on the airwaves in a lawful manner.  We do not use encryption or otherwise intentionally obscure transmissions over the amateur radio bands.  If you see it, report it: johnjacob at amrron dot com.  It would be easy, and conceivable, for a malicious actor to ‘spoof’ a ham radio operator’s callsign and transmit illegally in order to bring scrutiny against an individual ham operator, whatever the motive might be.  This is why we emphasize and practice authentication measures.  

  • More on Direction Finding and other Considerations (radio fingerprinting)
  • TTPs — Making it difficult for the bad guys
  • TTPs — When you are being hunted

  1. Minimize Positive Identity
  2. Avoid predictability
  3. Use digital modes as opposed to voice, when it’s practical or feasible.
  4. DMR two-way radios: Digital Mobile Radio for local tactical comms (digitalized voice, with encryption options)

For the Anytone DMR HT radio mentioned in this podcast, Click Here

Alt methods of communicating (locally)

  1. GMRS
  2. Gotenna/Beartooth
  3. Meshtastic  LoRa devices for mesh networking, Texting (Android/iOS), etc.
  4. Wifi/Broadband Mesh networks (and intranet):  Ubiquity BRIDGE (up to 10 miles) 


Remote operations:  Don’t stand there.

Minimize getting vaporized — Don’t be standing at the same place your signal is emitting from.  In extreme danger tactical environments, wherever your radio and antenna is… don’t be there.