Home

Space DAO members KE2EAQ and KE2EAX set to speak at Station 3 New York City
- Details
- Written by: KE2EAQ
- Category: Events
- Hits: 120
Join KE2EAQ and KE2EAX pioneers of the Bitcoin Amateur Radio Club (BARK) in a fascinating talk on how Radio Communication and Bitcoins Blockchain can be used for scientific logging and distributed communication that cannot be adulterated, spoofed or manipulated.
KE2EAQ is a founding member of SpaceDAO group and a member of the Association of Old Crows whose main purpose is the study and application of Electronic Warfare, Information Operations and Cyberwarfare.
KE2EAQ is set to speak on ways Bitcoin as timestamped blockchain technology can be used to decentralize radio logs, GPS and other tactical data, sensor data and IOT data, satellite data, earthquake data and radiation log sensors. The benefits are almost unlimited to having access to a decentralized distributed database that is accessible worldwide.
DATA2CHAIN is already using this fascinating technology to harness its decentralized data function for data logging at a fraction of the cost of dedicated servers with the added functionality of a proof of work timestamp. Since broadcasting to a bitcoin node is a one way function data is secure and false data may not be inserted by bad actors without possession of the proper keys, thus mitigating man in the middle attacks.
This holds great potential for military GPS and other one way transmissions. These topics are set to be discussed in great detail.
Event is scheduled for October 29th at 7 PM to 9 PM. Admission is free however we ask that you RSVP here:

Proposal for a Drone Defense Program
- Details
- Written by: KE2EAQ
- Category: Operations
- Hits: 51
Developing a drone defense program for states involves implementing a multi-layered system to detect, identify, and mitigate drone-related threats. Here’s an outline for creating an effective program:
1. Program Goals and Scope
• Public Safety: Protect critical infrastructure, government buildings, events, and airspace.
• Law Enforcement Support: Assist state and local law enforcement in identifying unauthorized drone activity.
• Regulatory Compliance: Align with FAA and federal guidelines to ensure legal drone use.
2. Key Components of the Program
a) Detection and Monitoring Systems
• Radar Systems: Short- and long-range radar to identify low-altitude, small unmanned drones.
• RF (Radio Frequency) Scanners: Detect radio signals and communication between drones and controllers.
• Acoustic Sensors: Recognize drone sound patterns in urban and rural areas.
• Optical Cameras: High-resolution cameras with AI-based tracking for visual confirmation.
b) Identification and Classification
• Use AI and machine learning to differentiate between authorized and unauthorized drones.
• Maintain a real-time drone registry database that includes approved commercial and government drones.
• Integrate geofencing technology to prevent drones from flying in restricted zones.
c) Mitigation Tools
• Electronic Countermeasures: Deploy jamming technologies (RF or GPS jammers) to disrupt drone signals (requires federal clearance).
• Directed Energy Systems: Laser-based systems to disable drones in critical scenarios.
• Kinetic Interception: Drones equipped with nets or other intercept tools to capture rogue UAVs safely.
• Drone Command Takeover: Hacking tools to assume control of unauthorized drones.
d) Legal and Policy Framework
• States must collaborate with the FAA, DHS, and FCC to ensure compliance with federal laws.
• Implement state legislation for drone use, such as licensing, no-fly zones, and penalties for misuse.
3. Implementation Phases
• Phase 1: Pilot programs in high-risk areas (e.g., airports, power plants, and government facilities).
• Phase 2: Scale the program across the state using regional drone defense hubs.
• Phase 3: Integrate with emergency response systems and state cybersecurity programs.
4. Technology Partners and Infrastructure
• Collaborate with drone defense companies specializing in anti-UAV systems like Dedrone, Fortem Technologies, and Anduril Industries.
• Invest in secure communication infrastructure and data analytics tools.
5. Training and Public Awareness
• Train law enforcement and first responders to operate detection/mitigation tools.
• Develop public awareness campaigns about state drone regulations and security protocols.
6. Funding Mechanisms
• Federal Grants: Seek funding through DHS or FAA programs.
• Public-Private Partnerships: Partner with tech companies for cost-sharing initiatives.
• State Budgets: Allocate funds for critical infrastructure protection and public safety.
By combining advanced technologies, policy frameworks, and collaboration with federal agencies, a state-level drone defense program can effectively secure its airspace and protect critical assets.

Operation Skywatch
- Details
- Written by: KE2EAQ
- Category: Operations
- Hits: 82
Operation Skywatch is a project where the SPACE DAO launches weather balloons into the stratosphere with the goal of collecting chemtrail, contrail and other atmospheric anomalies and posting that data into the Bitcoin blockchain as a timestamp storage solution.