Date   

FW: NJCCIC Weekly Bulletin | September 13, 2018

Rowland
 

I am forwarding this to you only as an FYI.  It is a Cyber Security site in New Jersey but many of the issues they cover would apply here also for both personal and business.  Take a look and decide for yourself if it is of any value too you.

 

Thanks,

 

Rowland

 

From: NJCCIC <njccic@...>
Sent: Thursday, September 13, 2018 10:00 AM
To: k7rwb@...
Subject: NJCCIC Weekly Bulletin | September 13, 2018

 

To view this email as a web page, go here.

 

THE WEEKLY BULLETIN

September 13, 2018

TLP: WHITE

 

Garden State Cyber Threat Highlight

Providing our members with a weekly insight into the threats and malicious activity directly targeting New Jersey networks.

 

Business Email Compromise Scams Targeting NJ Organizations

 

 

Recently, the NJCCIC has received several reports related to social engineering campaigns targeting victims throughout the State via business email compromise (BEC) and CEO impersonation scams. Social engineering, which refers to a range of methods used to convince victims into divulging sensitive information, takes many forms and unlike generic phishing campaigns, BEC and CEO impersonation scams are highly targeted. To make messages appear more legitimate, attackers commonly spoof the source name to display the name of a familiar contact and often use email domains that mimic a trusted source. If threat actors compromise a legitimate business account, that account can then be used to send additional phishing messages that are unlikely to raise suspicion. The body of these messages often instructs the recipient to transfer funds or other sensitive information to the threat actor posing as a trusted associate. According to the FBI Internet Crime Complaint Center (IC3) 2017 Internet Crime Report, BEC was the top crime type with the highest reported loss. The NJCCIC recommends all organizations educate their employees on how to identify social engineering schemes to prevent them from taking action on these scams. We also recommend organizations have a clear policy and procedure in place to handle requests for sensitive information and financial transactions designed to thwart these types of scams. Make sure any requests for sensitive information or financial transactions require the authorization and approval of more than just the sender and recipient of the request. If an employee within your organization falls victim to a BEC or CEO impersonation scam, alert your local law enforcement immediately. Reports may also be submitted to the NJCCIC via the Cyber Incident Report form on our website.
 

 


Announcement

 

Free Cybersecurity Conference

 

 

Alice in Cyberspace

Last Week for Registration

 

OPEN CALL FOR RECRUITERS

Conference attendees will have the opportunity to meet with representatives from local businesses and organizations with open or prospective cybersecurity positions. If your organization would like to staff a table at the conference, please contact the NJCCIC at njccic@.... There is no cost to staff a table. 

The NJCCIC Alice in Cyberspace conference will be hosted at Kean University in Union, NJ on September 28, 2018 from 8:00 AM through 4:30 PM. The intent of the conference is to attract women to the cybersecurity profession and encourage more women to pursue leadership roles in the field. Speakers will cover a range of topics, including highlighting different disciplines within cybersecurity, moving into management and CISO roles, and overcoming obstacles, particularly those e  xperienced by women. Our goal is to provide attendees with increased knowledge of the cybersecurity industry and the many opportunities it offers, empower women to pursue leadership roles in the industry, and provide a venue to network with industry professionals and potential employers. Additional details including agenda, speaker information, and directions can be found here.

There is no cost to attend this conference; however, seating is limited and registration is required.

 

Complimentary breakfast and lunch will be provided.


Please Note: Those who register for this event and are not currently NJCCIC members will be required to sign up for free membership.
 

Please use the appropriate registration form to register for this event.
If you are a professional, please register here.
If you are a student, please register here.
 

 

 


Threat Alerts
 

 

New Mirai and Gafgyt Botnet Variants
Target Apache Struts and SonicWall GMS
 
 

 

 

Image source: How-to Geek

 

Researchers at Palo Alto Network’s Unit 42 have identified new variants of the Mirai and Gafgyt internet-of-things (IoT) botnets. The newest Mirai botnet is targeting the same Apache Struts vulnerability, CVE-2017-5638, exploited in the 2017 Equifax breach, while the new Gafgyt botnet is targeting a recently disclosed vulnerability, CVE-2018-9866 , in older, unsupported versions of the SonicWall Global Management System (GMS). These botnet variants have been used in major distributed denial-of-service (DDoS) attacks since at least September 2016. The NJCCIC recommends administrators of Apache Struts and SonicWall GMS, as well as IoT devices, review the Unit 42 report and ensure the aforementioned products are kept up-to-date with the latest patch levels.
 

 

Mongo Lock Attack Targeting Vulnerable Databases

 

 

Security researcher Bob Diachenko discovered a new attack targeting remotely accessible MongoDB databases, dubbed Mongo Lock. In this campaign, threat actors scan the internet for vulnerable servers and, once located, export the databases, delete them, and generate a ransom note demanding payment in return for the servers’ contents. Using a publicly available internet-of-things (IoT) search engine, NJCCIC analysts determined that New Jersey has over 1,000 MongoDB servers open and exposed to the internet that may be vulnerable to this and similar attacks. Last year, the NJCCIC released several alerts warning members about cyber extortion campaigns that were actively targeting vulnerable MongoDB servers. We recommend that administrators of MongoDB servers review our previous NJCCIC Cyber Alert, audit their security settings, and implement the mitigation strategies provided as soon as possible. Additionally, review MongoDB’s recommendations and checklist for securing databases here and here.
 

 

Schneider Electric May Have Shipped Malware-Laden
USB Drives to Customers

 

 

Schneider Electric notified customers that they may have received USB drives infected with malware in recent product shipments. In an August 24 security advisory, the company stated that these USB drives held support documentation for the company's Conext Combox and Conext Battery Monitor solar-power products and did not contain any operational software, leaving operational security unaffected. The impacted USB drives were infected with malware during manufacturing by one of their suppliers. Schneider Electric advised customers to discard any USB drives that have shipped with their products and those who used a potentially infected USB drive are encouraged to perform a full system scan to identify and remove any malware found. This incident highlights the risks associated with the supply chain and the use of removable media. The NJCCIC recommends organizations who have purchased the impacted Schneider Electric equipment follow the recommendations provided in their security advisory, scan all USB drives prior to connecting them to any device on their network, and consider discontinuing the use of removable media.
 

 


Vulnerability Advisories
 

 

Vulnerability in Safari Web Browser Allows Address Bar to be Spoofed

 

 

A security researcher discovered an unpatched vulnerability, CVE-2018-8383, in the Safari web browser that allows an attacker to control the content displayed in the browser's address bar. The flaw can be exploited for phishing attacks, making them much more difficult to identify. The vulnerability also existed in Microsoft’s Edge browser but was patched on August 14 as part of their regular security updates; Apple has yet to release a patch.  The NJCCIC recommends Safari users and administrators review security researcher Rafay Baloch’s blog post for more information and apply the necessary patch if and when it becomes available. Users and administrators of the Edge browser are advised to ensure they have applied the most current patch levels.
 

 

Keybase Browser Extension May Expose Communications

 

 

The browser extension for Keybase, a communication and collaboration platform whose function is securing traffic between the source and destination via public-key cryptography, contains a flaw that leaves Keybase Chat messages unencrypted from the extension to their local copy of Keybase, possibly allowing sites to view these messages. The flaw was discovered by Wladimir Palant, maker of the AdBlock Plus tool. The NJCCIC recommends Keybase users review Palant's article and discontinue use of the extension, particularly if it is used for sensitive communications.
 

 


Breach Notifications
 

 

 

British Airways

British Airways announced that customer data was stolen between August 21, 2018 and September 5, 2018. The data retrieved includes the personal and financial details of approximately 380,000 customers who made bookings and changes on ba[.]com and on the airline’s app; travel and passport details were not revealed. According to a report by digital threat management company RiskIQ, the known adversary group Magecart is believed to be responsible for the breach. The NJCCIC recommends impacted British Airways customers closely monitor their credit profiles and financial accounts and immediately report any suspicious activity.
 

 

Veeam

Security researcher Bob Diachenko discovered about 445 million customer records on a server left unprotected and open to the internet belonging to Veeam, a Swiss-based company that provides intelligent data management services for virtual, physical, and cloud infrastructures. The 200 GB MongoDB database was discovered on September 5 and removed four days later. The information exposed includes customers' first and last name, email, email recipient type, country, attributes values, some IP addresses, and customer organization size. The NJCCIC recommends organizations using MongoDB servers review their security guidelines and advises impacted customers to be on alert for targeted social engineering campaigns.
 

 


Threat Profiles

 

 

Android: No new or updated variants were added.
Botnet: No new or updated variants were added.
Cryptocurrency-Mining: No new or updated variants were added.
Exploit Kit: One new exploit kit: Fallout.
Industrial Control Systems: No new or updated variants were added.
iOS: No new or updated variants were added.
macOS: No new or updated variants were added.
Point-of-Sale: No new or updated variants were added.
Ransomware: One
updated variant: Matrix.
Trojan: No new or updated variants were added. 

 


 

ICS-CERT Advisories
 

 

Throwback Thursday
 

 

Threat Analysis

 

Be Sure to Secure

Don't Take the Bait! Phishing and Other Social Engineering Attacks (June 4, 2018)

How to Configure and Secure a Home Wi-Fi Router (April 5, 2018)

Patch Alerts
 

Adobe: Flash Player, ColdFusion | Chrome | Microsoft | VMware
 

 


Social Engineering Awareness

 

Yikes: 1 in 5 Employees Share Their Email Passwords With Coworkers
Comment: A survey of 600 small and medium-sized businesses, completed by IT consultant agency Switchfast, revealed that 19 percent of employees share their passwords with coworkers or assistants. While sharing passwords is risky and highly discouraged for a number of reasons, it can also leave you more vulnerable to social engineering campaigns. Additionally, these shared passwords are more likely to be weak and easy-to-guess. To keep yourself “cyber safe,” review the NJCCIC Best Practices and  Be Sure to Secure resources.

 

 

Microsoft Purges 3,000 Tech Support Scams Hiding On TechNet
Comment: The NJCCIC often reports on various tech-support scams that have impacted individuals and business throughout the State. These schemes commonly involve threat actors masquerading as Microsoft tech-support staff via phone calls, spam emails, or pop-up messages on malicious sites, with the goal of collecting payments from victims for fraudulent services or gaining remote access to their device. Fortunately, Microsoft is taking steps to help mitigate the problem by taking down thousands of ads for tech-support scams that were on the company’s TechNet support domain. It is important to remember, Microsoft will not personally contact you to alert you of malware on your device and it is advised to never install remote access software onto systems at the request of an unsolicited phone call or pop-up message on your computer. If you have installed remote access software onto your system at the request of these malicious actors, it is recommended to uninstall it immediately and performing a full system scan using a reputable and up-to-date anti-virus or anti-malware solution.

 

 


Cyber at a Glance

 

Browser Extensions: Are They Worth the Risk?
Comment: While adding convenience and functionality to web browsers, legitimate browser extensions can be compromised to deliver malware or collect personal information. Just last week, the MEGA Chrome extension was hacked to steal account login credentials and cryptocurrency keys. Previously, several other extensions were also compromised to harvest personal information associated with users’ social media accounts and to mine cryptocurrency through the use of an infected machine’s computing resources. To reduce the risks associated with malicious browser extensions, pay close attention to the permissions requested prior to installing the extension and discontinue the use of browser extensions that are no longer maintained by the developers or actively used.

 

 

TLP: WHITE

 


Questions?

Email a Cyber Liaison Officer at njccic@....
 

The Weekly Bulletin aggregates information about cyber threats, vulnerabilities, and other resources to promote shared awareness and the adoption of best practices. Designed for a general audience, the Bulletin aims to bridge the information sharing gaps between all levels of government, the private sector, and our citizens.

 


Connect

 

Twitter

Instagram

Facebook

LinkedIn


Share

 

Forward

Tweet

Share

Share


This email was sent by:
New Jersey Cybersecurity & Communications Integration Cell

DISCLAIMER: This product is provided as is for informational purposes only. The New Jersey Cybersecurity & Communications Integration Cell (NJCCIC) does not provide any warranties of any kind regarding any information contained within. The NJCCIC does not endorse any commercial product or service, referenced in this product or otherwise. Further dissemination of this product is governed by the Traffic Light Protocol (TLP). For more information about TLP, see https://www.us-cert.gov/tlp.

Privacy Policy

Manage Subscriptions       Unsubscribe From All Mailings

 


FW: [evergreenintertie] Digest Number 309

Rowland
 

The email forwarded out this week about some high end rigs for sale may be a scam.  Please be aware.

 

Thanks,

 

Rowland

 

From: evergreenintertie@... <evergreenintertie@...>
Sent: Wednesday, September 12, 2018 10:32 PM
To: evergreenintertie@...
Subject: [evergreenintertie] Digest Number 309

 

1 Message

Digest #309

Message
Wed Sep 12, 2018 9:04 am (PDT) . Posted by: wchulley

The probability that this is a scam is about ninety-five percent. A message like this, listing a pile of high end equipment, a call sign that is difficult to verify, and an un-named "ham club" re-appears every few months, posted to a wide group of email lists from a just-joined email address. The prices will be unbelievably low, you will be asked to use Paypal family and friends, and the email addresses for various parts of the transaction will not match.

If you look up KE5MKG on QRZ, you will find no email or phone contact information. The area code for Kermit, TX is 432. The area code listed in the ad is for Los Angeles. If you want to have some fun, ask for photos of the gear along with the prices. For bonus points, ask for photos that include a call sign or QSL card. Then do a quick search and discover that the photos have been lifted from ads on QRZ, eham.net, or another swap site.

If its too good to be true, well...

73 de bill K7WXW


FW: [evergreenintertie] Digest Number 307

Rowland
 

Please note below

 

Thanks,

 

Rowland

 

From: evergreenintertie@... <evergreenintertie@...>
Sent: Monday, September 10, 2018 10:39 PM
To: evergreenintertie@...
Subject: [evergreenintertie] Digest Number 307

 

1 Message

Digest #307

1

Message
Mon Sep 10, 2018 3:30 pm (PDT) . Posted by: hzuiflqar

This is a list of gears from few Silent keys from our HAM CLUB.


Elecraft Elecraft KPA500, Elecraft K3, Elecraft KX3
Icom IC-7800, Icom 7600
Yaesu FTDX-5000MP, Yaesu FTDX-3000
Kenwood ts 990s, kenwood ts 2000.
Flex 5000A, Flex 6500, Flex 6700.


Amps:
Icom PW-1
Acom 2000
Ameritron AL82.
Alpha 87A




Email me for more pics and prices.




Email: ruby73garcia@...
Phone: 818 538 5017

KE5MKG




Ruby...


Re: Armed Robbery Duvall Family Drugs during last night's meeting

 

Maybe even let police review minutes leading up to and after they may catch something u may not or maybe vehicle that was used in crime is somewhere on video as u drove up to meeting 


On Sep 7, 2018, at 6:09 PM, Ken Koch <Ken@...> wrote:

I do have a camera mounted on my car. I arrived at 6:52ish.  However the camera is very wide angle.  Still I will review the footage.

On Sep 7, 2018, at 4:28 AM, Robin Amundson <wa7cpa@...> wrote:

All,
I just read on the Duvall Police Department Facebook page there was an armed robbery last night about 6:50 p.m. at Duvall Family Drugs across from the fire station during our business meeting. Three men fled the crime to get into a vehicle on another street. If anyone arriving for the 7 p.m. portion of our meeting saw anything, the PD would be like to know about it. I find this very shocking in Duvall.

73,
Robin, WA7CPA


Re: Armed Robbery Duvall Family Drugs during last night's meeting

Ken Koch
 

I do have a camera mounted on my car. I arrived at 6:52ish.  However the camera is very wide angle.  Still I will review the footage.

On Sep 7, 2018, at 4:28 AM, Robin Amundson <wa7cpa@...> wrote:

All,
I just read on the Duvall Police Department Facebook page there was an armed robbery last night about 6:50 p.m. at Duvall Family Drugs across from the fire station during our business meeting. Three men fled the crime to get into a vehicle on another street. If anyone arriving for the 7 p.m. portion of our meeting saw anything, the PD would be like to know about it. I find this very shocking in Duvall.

73,
Robin, WA7CPA


FW: NW APRS Summer Gathering 2018 - Bulletin 03

Rowland
 

 

 

Tgis is what we were referring to for this weekend.  Very informative event and just fun!

 

From: NW APRS Summer Gathering <summergathering@...>
Sent: Saturday, August 11, 2018 4:51 PM
To: K7RWB@...
Subject: NW APRS Summer Gathering 2018 - Bulletin 03

 

Back for the 21st year it is once again time for the Annual NWAPRS Summer Gathering
This year September 7-9 (always the weekend after Labor Day) at Valley Camp  6 miles east of North Bend Washington.
For us location precision nuts the GPS coordinates for a point near the center of camp are:
47.4662216  -121.6804046  (Highly accurate GPS control point)
(The first to find what's at this location and show a picture of it to K7FZO wins a special door prize)

Directions to camp for those needing actual pictures, maps and words can be found here: Directions to Valley Camp or the bottom of the Summer Gathering webpage.

The Summer Gathering is an event for everyone involved in Amatuer Radio that wants to learn about what's new in the hobby, meet people involved in the newest technologies that create the opportunities to experiment and advance the hobby.
Because the Summer Gathering has always been a very social event, we suggest taking advantage of all the opportunities we provide to spend time with other Hams involved in the hobby.

Friday evening social time, ice cream anyone? Or share a beverage with friends, this usually goes until around 10PM, later if you don't need sleep, but quiet time in camp is 10PM to 7AM.

Saturday morning Breakfast, provided by the West Seattle Amatuer Radio Club, starts at 7AM with coffee and a full breakfast prepared by our chef Curt WR5J and his helpers.

The event officially begins at 8:45AM with the first presentation at 9AM
Lunch at noon will be provided, as to what it will be and the cost is being worked on right now, so stay tuned.
Afternoon sessions begin at 1PM with a wrap-up session at 5PM
Dinner plans are currently being discussed, once again stay tuned.
After Dinner open time for discussions, Q&A with presenters, and project show-n-tell.

Sunday starts with coffee available at 7AM followed by a full breakfast once again prepared for you by Curt WR5J.
Sunday presentations will begin at 9AM.
Lunch and the afternoon program are still in discussion. If you have ideas please send them to Thom at
summergathering@...

Saturday presentation slots have been filled, we are working on some great ideas for Sunday. We are looking to you for ideas that you feel should be discussed and volunteer presenters.
Once again, if you want to facilitate, share a project, or know someone we should contact let us know by emailing  summergathering@...

The current presentation schedule is available on the WA7VC website which will be updated as changes are made.
Presentations are held in the large picnic shelter, you can improve your seating experience by bringing your own comfy folding camp chair, coffee and hot water for tea will be available all day.

With just a month to go, it would be a great idea to make your reservations soon for Friday and or Saturday nights accommodations. 
Full Service RV sites, parking for RV's not needing services, tent sites, and bunk space in the Teneriffe Lodge are currently available. Please contact Teena at Valley Camp to reserve your space at   info@... 
Discuss with Teena at Valley Camp the cost for these overnight 
accommodations.

It is time to make sure the SUMMER GATHERING is on your calendar!

Weekly updates will follow.

73,
Thom | K7FZO
 

 


RTTY slides? Mel?

Robin WA7CPA
 

I want to learn RTTY ASAP! Mel, I read on FB there was a very good RTTY presentation last night in Spokane. Will the presenter share the slides? Can you help obtaining them and sharing them here, please?

73,
Robin, WA7CPA


Armed Robbery Duvall Family Drugs during last night's meeting

Robin WA7CPA
 

All,
I just read on the Duvall Police Department Facebook page there was an armed robbery last night about 6:50 p.m. at Duvall Family Drugs across from the fire station during our business meeting. Three men fled the crime to get into a vehicle on another street. If anyone arriving for the 7 p.m. portion of our meeting saw anything, the PD would be like to know about it. I find this very shocking in Duvall.

73,
Robin, WA7CPA


Re: FT8 Doubters

Gerry O'Brien
 

Awesome, I’ll look that one up.

 

— Thanks,

 

Gerry

 

 

From: <snovarc@groups.io> on behalf of W7ABD <w7abd1@...>
Reply-To: <snovarc@groups.io>
Date: Sunday, September 2, 2018 at 9:48 AM
To: <snovarc@groups.io>
Subject: Re: [snovarc] FT8 Doubters

 

I use the LDG Z-11ProII Antenna Tuner with my Icom 7100.  With the Icom cable the radio powers and controls the tuner.  Works really nicely.  Been very happy with it!

Jim

W7ABD

 

 

 

On 09/02/18 07:47, Gerry O'Brien wrote:

I think it’s time I looked at a tuner or perhaps a vertical for my HF needs.

 

Just not able to get much working on HF with my off-center dipole.

 

Anybody have a good tuner recommendation for dipole and an ICOM IC-7100?

 

— Thanks,

 

Gerry

 

 


Re: FT8 Doubters

W7ABD
 

I use the LDG Z-11ProII Antenna Tuner with my Icom 7100.  With the Icom cable the radio powers and controls the tuner.  Works really nicely.  Been very happy with it!

Jim

W7ABD




On 09/02/18 07:47, Gerry O'Brien wrote:

I think it’s time I looked at a tuner or perhaps a vertical for my HF needs.

 

Just not able to get much working on HF with my off-center dipole.

 

Anybody have a good tuner recommendation for dipole and an ICOM IC-7100?

 

— Thanks,

 

Gerry

 



Re: FT8 Doubters

Gerry O'Brien
 

I think it’s time I looked at a tuner or perhaps a vertical for my HF needs.

 

Just not able to get much working on HF with my off-center dipole.

 

Anybody have a good tuner recommendation for dipole and an ICOM IC-7100?

 

— Thanks,

 

Gerry

 


FT8 Doubters

Robin WA7CPA
 

I worked Samoa, Fiji, and Paraguay on 30m before going to bed last night. This morning I woke up, turned on 30 m and worked Kazakhstan, UN7LZ. Think that is shooting fish in a barrel? A lot of hard work went into the antenna and station to get to the point I could do that. It would not have happened in any other mode right now. And, yes, I am working on my CW speed for when conditions improve. FT8 is amazing fishing. Ham radio is fun, not just for disasters.  

Robin, WA7CPA


Re: Looking for image from Cougar work party day

Shawn / K7ATA
 

Robin, all,


I don't know how I missed this e-mail originally, but here are all of the images that I took, or were sent to me, from up on Cougar, including pics from AFTER the move.


https://www.busymarvin.net/owncloud/index.php/s/l3dzttJMqJmGmni

--Shawn
--K7ATA

On 8/26/2018 9:14 AM, Robin Amundson wrote:
Hi Work Party Crew,

I am looking for an image of the new server rack with K7AJG, W7DM, and Kirt, K7KDW polishing it and painting it. And, an image of the finished product in its shiny new blue glory.

Thank you.

Robin, WA7CPA


Re: Windstorm Exercise September 22nd

Lindy KG7IFA
 

No problem.  People only need to respond to the link if able to participate.  We'll assume a no response is an inability to participate.


-----Original Message-----
From: Lori KE7KXN <layoungs@...>
To: snovarc <snovarc@groups.io>
Sent: Thu, Aug 30, 2018 12:01 am
Subject: Re: [snovarc] Windstorm Exercise September 22nd

Unable to attend and don't see a way to respond accordingly at the link.

Lori Youngs
CERT
KE7KXN



Sent from my Verizon, Samsung Galaxy smartphone


-------- Original message --------
From: "Lindy KG7IFA via Groups.Io" <lindyforbarclays=aol.com@groups.io>
Date: 8/29/18 22:18 (GMT-08:00)
Subject: [snovarc] Windstorm Exercise September 22nd

Please read the following message from Gene Laughlin regarding the upcoming exercise involving our CERTs, CDMRC, and SnoVARC Hams.

More details at the September 6th SnoVARC meeting.

Lindy, KG7IFA

From: Gene Laughlin [mailto:genelaughlin@...]
Sent: Wednesday, August 29, 2018 9:21 PM
To: Lindy Friedlander
Subject: Drill
Importance: High
 
Lindy:  Please forward to members of SnoVARC. 
 
Exercise! Exercise! Exercise!
 
The strong windstorm that hit our community last night has resulted in widespread damage and power is out to many areas across the region; emergency services are busy managing responses all across the valley. Our CERT team including CDMRC and SnoVARC Hams, has been activated to help lead the efforts at Tolt-MacDonold Park in Carnation, WA where there are reports of numerous survivors around one of the buildings.
 
Our mission is to assess damage and to rescue and treat survivors. Please respond to the Park Office next to the parking lots on NE 40th St. Bring your full CERT kit, MRC first aid kit, and/or amateur/FRS radio equipment. Wear your badge (not required to participate) and dress for the weather.
 
Please be at the park and ready to participate at 9:30 am. CDCCC will be providing light refreshments during the morning. The Exercise will conclude with a debriefing over lunch.
 
 
Please RSVP through the Eventbrite link above. There is both a participant and a volunteer “ticket” so you can choose one or the other; Both will connect you with the event.
 
 
 


Re: Windstorm Exercise September 22nd

Lori KE7KXN
 

Unable to attend and don't see a way to respond accordingly at the link.

Lori Youngs
CERT
KE7KXN



Sent from my Verizon, Samsung Galaxy smartphone


-------- Original message --------
From: "Lindy KG7IFA via Groups.Io" <lindyforbarclays@...>
Date: 8/29/18 22:18 (GMT-08:00)
To: snovarc@groups.io
Subject: [snovarc] Windstorm Exercise September 22nd

Please read the following message from Gene Laughlin regarding the upcoming exercise involving our CERTs, CDMRC, and SnoVARC Hams.

More details at the September 6th SnoVARC meeting.

Lindy, KG7IFA

From: Gene Laughlin [mailto:genelaughlin@...]
Sent: Wednesday, August 29, 2018 9:21 PM
To: Lindy Friedlander
Subject: Drill
Importance: High

 

Lindy:  Please forward to members of SnoVARC. 

 

Exercise! Exercise! Exercise!

 

The strong windstorm that hit our community last night has resulted in widespread damage and power is out to many areas across the region; emergency services are busy managing responses all across the valley. Our CERT team including CDMRC and SnoVARC Hams, has been activated to help lead the efforts at Tolt-MacDonold Park in Carnation, WA where there are reports of numerous survivors around one of the buildings.

 

Our mission is to assess damage and to rescue and treat survivors. Please respond to the Park Office next to the parking lots on NE 40th St. Bring your full CERT kit, MRC first aid kit, and/or amateur/FRS radio equipment. Wear your badge (not required to participate) and dress for the weather.

 

Please be at the park and ready to participate at 9:30 am. CDCCC will be providing light refreshments during the morning. The Exercise will conclude with a debriefing over lunch.

 

Here is the Eventbrite page for the September 22nd drill: https://www.eventbrite.com/e/cdccc-disaster-readiness-exercise-tickets-49653042587?aff=utm_source%S3Deb_email%26utm_medium%3Demail%26utm_campaign%3Dnew_event_email&utm_term=eventurl_text

 

Please RSVP through the Eventbrite link above. There is both a participant and a volunteer “ticket” so you can choose one or the other; Both will connect you with the event.

 

 

 


Windstorm Exercise September 22nd

Lindy KG7IFA
 

Please read the following message from Gene Laughlin regarding the upcoming exercise involving our CERTs, CDMRC, and SnoVARC Hams.

More details at the September 6th SnoVARC meeting.

Lindy, KG7IFA

From: Gene Laughlin [mailto:genelaughlin@...]
Sent: Wednesday, August 29, 2018 9:21 PM
To: Lindy Friedlander
Subject: Drill
Importance: High

 

Lindy:  Please forward to members of SnoVARC. 

 

Exercise! Exercise! Exercise!

 

The strong windstorm that hit our community last night has resulted in widespread damage and power is out to many areas across the region; emergency services are busy managing responses all across the valley. Our CERT team including CDMRC and SnoVARC Hams, has been activated to help lead the efforts at Tolt-MacDonold Park in Carnation, WA where there are reports of numerous survivors around one of the buildings.

 

Our mission is to assess damage and to rescue and treat survivors. Please respond to the Park Office next to the parking lots on NE 40th St. Bring your full CERT kit, MRC first aid kit, and/or amateur/FRS radio equipment. Wear your badge (not required to participate) and dress for the weather.

 

Please be at the park and ready to participate at 9:30 am. CDCCC will be providing light refreshments during the morning. The Exercise will conclude with a debriefing over lunch.

 

Here is the Eventbrite page for the September 22nd drill: https://www.eventbrite.com/e/cdccc-disaster-readiness-exercise-tickets-49653042587?aff=utm_source%S3Deb_email%26utm_medium%3Demail%26utm_campaign%3Dnew_event_email&utm_term=eventurl_text

 

Please RSVP through the Eventbrite link above. There is both a participant and a volunteer “ticket” so you can choose one or the other; Both will connect you with the event.

 

 

 


Re: Carnation HF Loop Antenna non-functional

Paul Butzi (W7PFB)
 

It’s certainly true that if the configuration is radio->feedline->tuner->ladderline->loop, turning on the tuner results in hearing more noise at the receiver.

What is not certain is that the tuner is creating noise, as opposed to doing a better job of getting the noise onto the coax when it is turned on compared to when it is turned off.

-p W7PFB
73, Don’t forget to smile and have fun!

On Aug 28, 2018, at 4:44 PM, Rowland <k7rwb@...> wrote:

But when it was hooked to the loop antenna and turned on it did create noise.
 
Thanks,
 
Rowland 
 
From: snovarc@groups.io <snovarc@groups.io> On Behalf Of Paul Butzi (W7PFB)
Sent: Monday, August 27, 2018 10:14 AM
To: snovarc@groups.io
Subject: Re: [snovarc] Carnation HF Loop Antenna non-functional
 
It is not true that switching on the tuner introduces noise.  If we have the tuner on the bench in the shack, connected to the radio via a short feedline, we get no difference in noise when we power cycle the tuner.
 
-p W7PFB
73, Don’t forget to smile and have fun! 
 
On Aug 27, 2018, at 9:56 AM, Rowland <k7rwb@...> wrote:
 
Dan,
 
There was a definite noise introduced when you turned the tuner on.  But it did tune the antenna.
 
Thank You,
 



FW: Nevada QSO Party

Rowland
 

This was sent to me today.  Participate if you wish.

 

Rowland

 

Hi,

   Enclosed is an article for your newsletter announcing the Nevada QSO Party to be held October 12-14, 2018. We hope some of your members will be interested in participating in this event.

 

73

 

Jim Shepherd  W6US

Vice President, Sierra Nevada Amateur Radio Society

 

enc

 


Re: Carnation HF Loop Antenna non-functional

Rowland
 

But when it was hooked to the loop antenna and turned on it did create noise.

 

Thanks,

 

Rowland

 

From: snovarc@groups.io <snovarc@groups.io> On Behalf Of Paul Butzi (W7PFB)
Sent: Monday, August 27, 2018 10:14 AM
To: snovarc@groups.io
Subject: Re: [snovarc] Carnation HF Loop Antenna non-functional

 

It is not true that switching on the tuner introduces noise.  If we have the tuner on the bench in the shack, connected to the radio via a short feedline, we get no difference in noise when we power cycle the tuner.

 

-p W7PFB
73, Don’t forget to smile and have fun!

 

On Aug 27, 2018, at 9:56 AM, Rowland <k7rwb@...> wrote:

 

Dan,

 

There was a definite noise introduced when you turned the tuner on.  But it did tune the antenna.

 

Thank You,

 


Re: Carnation HF Loop Antenna non-functional

Paul Butzi (W7PFB)
 

It is not true that switching on the tuner introduces noise.  If we have the tuner on the bench in the shack, connected to the radio via a short feedline, we get no difference in noise when we power cycle the tuner.

-p W7PFB
73, Don’t forget to smile and have fun!

On Aug 27, 2018, at 9:56 AM, Rowland <k7rwb@...> wrote:

Dan,
 
There was a definite noise introduced when you turned the tuner on.  But it did tune the antenna.
 
Thank You,

2641 - 2660 of 6890