An Improvised Synthetic Aperture Radar

[Henrik] is at it again. Another thoroughly detailed radar project has shown up on his blog. This time [Henrik] is making some significant improvements to his previous homemade radar with the addition of Synthetic Aperture Radar (SAR) to his previous Frequency Modulated Continuous Wave (FMCW) system.

[Henrik’s] new design uses an NXP LPC4320 which uniquely combines an ARM Cortex-M4 MCU along with a Cortex-M0 co-processor. The HackRF also uses this micro as it has some specific features that can be taken advantage of here like the Serial GPIO (SGPIO) which can be tediously configured and high-speed USB all for ~$8 in single quantity. The mixed signal design is done in two boards, a 4 layer RF board and 2 layer digital board.

Like the gentleman he is, [Henrik] has included schematics, board files, and his modified source from the HackRF project in his github repo. There is simply too much information in his post to attempt to summarize here, if you need instant gratification check out the pictures after the break.

The write-up on his personal blog is impressive and worth look if you didn’t catch our coverage of his single board Linux computer, or his previous radar design.

Continue reading “An Improvised Synthetic Aperture Radar”

Hacklet 80 – Gigahertz Projects

Somewhere between the HF projects many of us have worked on, and the visible light spectrum lies the UHF, EHF, SHF, and THF. That’s Ultra, Extremely, Super, and Tremendously High Frequency for those who aren’t in the know. All of them involve frequencies in the gigahertz and terahertz range. While modern computers have made gigahertz a household term, actually working with signals in the gigahertz frequency range is still a daunting prospect. There have always been an elite group of hackers, makers, and engineers who tinker with projects using GHz frequencies. This week’s Hacklet is about some of the best GHz projects on!

radar1We start with [Luke Weston] and Simple, low-cost FMCW radar. For years people like Hackaday’s own [Gregory L. Charvat] have been building simplified radar systems and documenting them for the rest of us. [Luke’s] goal is to make radar systems like this even more accessible for the average hacker. He’s put all the specialized parts on one board. Rather than large Mini Circuits modules, [Luke] went with Hittite microwave parts in chip scale packages. Modulation comes from a Microchip MCP4921 mixed signal DAC. The system works, and has demonstrated transmission and reception 5 GHz to 6 GHz bands. [Luke] has even demonstrated detection of objects at close range using a scope.

Continue reading “Hacklet 80 – Gigahertz Projects”

Arduino Masters Ham Radio Digital Mode

[jmilldrum] really gets a lot of use out of his Si5351A breakout board. He’s a ham [NT7S], and the Si5351A can generate multiple square waves ranging from 8 kHz to 160 MHz, so it only stands to reason that it is going to be a useful tool for any RF hacker. His most recent exploit is to use the I2C-controllable chip to implement a Fast Simple QSO (FSQ) beacon with an Arduino.

FSQ is a relatively new digital mode that uses a form of low rate FSK to send text and images in a way that is robust under difficult RF propagation. There are 32 different tones used for symbols so common characters only require a single tone. No character takes more than two tones.

Continue reading “Arduino Masters Ham Radio Digital Mode”

Hams Talk Digital

Morse code qualifies as a digital mode, although organic brains are somewhat better at copying it than electronic ones. Ham radio operators that did “phone” (ham-talk for voice) started out with AM modulation. Sometime after World War II, there was widespread adoption of single side band or SSB. SSB takes up less bandwidth and is more reliable than AM modulation. On the digital side, hams turned to different and more sophisticated digital transmission types with computers pushing bandwidth down and reliability up. However, a recent trend has been to encode voice over ham radio–sort of VoIP with radio instead of Ethernet–using an open source program called freedv.

[AA6E] made a very informative video where he carries on a QSO (a conversation) with a distant station using freedv. What makes it interesting, is towards the end when the two stations switch to regular SSB. The difference is dramatic and really points out how even with less bandwidth (roughly 3 kHz for SSB vs 1.25 kHz), the digital mode is superior. The freedv software (available for Windows or Linux) compresses audio to 700-1600 bits per second and spreads it over 16 QPSK signals.

Continue reading “Hams Talk Digital”

Saving an Alarm System Remote and $100

[Simon] has been using his home alarm system for over six years now. The system originally came with a small RF remote control, but after years of use and abuse it was finally falling apart. After searching for replacement parts online, he found that his alarm system is the “old” model and remotes are no longer available for purchase. The new system had similar RF remotes, but supposedly they were not compatible. He decided to dig in and fix his remote himself.

He cracked open the remote’s case and found an 8-pin chip labeled HCS300. This chip handles all of the remote’s functions, including reading the buttons, flashing the LED, and providing encoded output to the 433MHz transmitter. The HCS300 also uses KeeLoq technology to protect the data transmission with a rolling code. [Simon] did some research online and found the thew new alarm system’s remotes also use the same KeeLoq technology. On a hunch, he went ahead and ordered two of the newer model remotes.

He tried pairing them up with his receiver but of course it couldn’t be that simple. After opening up the new remote he found that it also used the HCS300 chip. That was a good sign. The manufacturer states that each remote is programmed with a secret 64-bit manufacturer’s code. This acts as the encryption key, so [Simon] would have to somehow crack the key on his original chip and re-program the new chip with the old key. Or he could take the simpler path and swap chips.

A hot air gun made short work of the de-soldering and soon enough the chips were in place. Unfortunately, the chips have different pinouts, so [Simon] had to cut a few traces and fix them with jumper wire. With the case back together and the buttons in place, he gave it a test. It worked. Who needs to upgrade their entire alarm system when you can just hack the remote?

LED Sign Brightens Up The Beach After Dark

[Warrior_Rocker’s] family bought a fancy new sign for their beach house. The sign has the word “BEACH” spelled vertically. It originally came with blue LEDs to light up each letter. The problem was that the LEDs had a narrow beam that would blind people on the other side of the room. Also, there was no way to change the color of the LEDs, which would increase the fun factor. That’s why [Warrior] decided to upgrade the sign with multi-colored LEDs.

After removing the cardboard backing of the sign, [Warrior] removed the original LEDs by gently tapping on a stick with a hammer. He decided to use WS2811 LED pixels to replace the original LEDs. These pixel modules support multiple colors and are individually addressable. This would allow for a wide variety of colors and animations. The pixels came covered in a weatherproof resin material. [Warrior] baked the resin with a heat gun until it became brittle. He was then able to remove it entirely using some pliers and a utility knife. Finally, the pixels were held in place with some hot glue.

Rather then build a remote control from scratch, [Warrior] found a compatible RF remote under ten dollars. The LED controller was removed from its housing and soldered to the string of LEDs. It was then hot glued to a piece of cardboard and placed into the sign’s original battery compartment. Check out the video below for a demonstration. Continue reading “LED Sign Brightens Up The Beach After Dark”

Retrotechtacular: Radar Jamming

It’s been said that the best defense is a good offense. When aloft and en route to deliver a harmful payload to the enemy, the best defense is to plan your approach and your exit carefully, and to interfere with their methods of detection. If they can’t find you, they can’t shoot you.

As of May 1962, the United States military was using three major classifications of radar jamming technology as described in this week’s film: the AN/ALQ-35 multiple target repeater, the AN/ALQ-55 communications link disrupter, and the AN/ALQ-41 and -51 track breakers. The most important role of these pieces of equipment is to buy time, a precious resource in all kinds of warfare.

The AN/ALQ-35 target repeater consists of a tuner, pulse generator, transmitter, and control panel working in concert to display multiple false positives on the enemy’s PPI scopes. The unit receives the incoming enemy pulse, amplifies it greatly, repeats it, and sends them back with random delays.

The AN/ALQ-55 comm disrupter operates in the 100-210MHz band. It distinguishes the threatening enemy communication bands from those of beacons and civilians, evaluates them, and jams them with a signal that’s non-continuous, which helps avoid detection.

Finally, the AN/ALQ-41 and -51 track breakers are designed to break enemy lock-on and to give false information. It provides simultaneous protection against pulse ranging, FM-CW, conical, and monopulse radar in different ways, based on each method’s angle and range.

Continue reading “Retrotechtacular: Radar Jamming”