Milcom Monitoring Post Profiles

Friday, August 24, 2018

Mil/Gov Field report - Jack in KY: 22-23 August 2018



Our good friend Jack in Kentucky checks in with another excellent set of intercepts from the Blue Grass state. Thanks Jack.

7669.0 RED THUNDER (USN vessel) with a EAM of 36 characters. Guessing this is another practice EAM circuit, 7661.0 USB has carried similar EAMs, usually from multiple onboard operators, in the past, as has 11850.0 USB: 1420 UTC in USB voice (2018AUG22) (JLM)

5397.0 AR National Guard stations LRF0 & SJD attempting to link: 1457 UTC in USB ALE (2018AUG22) (JLM)

5303.5 SWAMP FOX, AL National Guard, one of the few AL NG stations checking into this week's voice net. BULLDOG MAJOR was net control. Receive conditions weren't very good on this frequency today: 1400 UTC in USB voice (2018AUG23) (JLM)

11175.0 Airborne Command Post aircraft IMPLICATE entering the net via USAF ground station TRAIN MAN after challenge/authentication process: 1522 UTC in USB voice (2018AUG23) (JLM)

11143.0 USMC station CACTUSTACCHAT calling FALCONTACCHAT: 1555 UTC in USB ALE (2018AUG23) (JLM)

5760.0 & 7391.5 NIL5AA, Illinois Emergency Management station calling KGD34, NCC, Arlington, VA: 1755 UTC in USB ALE (2018AUG23) (JLM)
--
__________________________________________________________
Jack L. Metcalfe - Stanford, KY
RFSpace Cloud-IQ SDR (x2) & Icom IC-R75 (x2) HF receivers
Icom IC-R8500 HF/VHF/UHF receiver & Icom IC-R5 VHF/UHF receiver
Uniden BCD996T, Uniden BCD996XT & AOR-8200 VHF/UHF receivers
342' random wire & Wellbrook ALA1530LNP HF antennas
SAMCO SAM-360 Yagi, Kreco D-150AN & GP-151AN VHF/UHF antennas
__________________________________________________________