Saturday, January 30, 2010

Praxis: Radio Throat Microphone

The Trainer offers these words on a suggested throat mic for radios that he's tested in the field and found excellent.


Here's the throat mic company:

The model in this pic is the serious one. $40, but worth it. After you check out their site, you'll find they have all sorts of goodies including replacement parts, cheap. They ship fast and stand behind what they sell.

And here is the description from the site:

Throat Mic Tactical Headset for Midland (2 Prong Plug)
Manufacturer: Dynamic Designs
Price: $39.99

The new tactical / heavy duty adjustable throat microphone with acoustic tube (FBI style) headset as seen in the actual photos. The dual condenser microphone picks up the user's voice directly from the vocal chords. This drastically cuts down on ambient noise. The clear acoustic tube headset fits snugly in the ear and keeps incoming transmissions clear and private. Excellent for use in loud environments. Features a large heavy duty push to talk button that is easily accessible while wearing heavy gloves and can be clipped almost anywhere. Can also be mounted on your side with the PTT button activated by an elbow without taking your finger off the trigger. Replaces costly original manufacturer's headsets- perfect for tactical and service applications in loud environments. Can be used on either the left or right ear.

Excellent for use in police, military, nightclubs, bars, paintball, security, restaurants, hotels, bouncer, warehouses, and noisy environments.

Headset is for use for all Midland Extra-Talk and G-Series radios and many more requiring a 2 prong Midland plug:

* G Series: G223 G-223, G-225 G225 G-225C2, G226 G-226, G227 G-227, G-227C2 G227C2, G300 G-300 G-300C2 G300C2, G300M G-300M, G300MC2 G-300MC2
* GXT Series: GXT GXT-250, GXT300 GXT-300 GXT300VP3 GXT-300VP3, GXT310 GXT-310 GXT310VP GXT-310VP, GXT325 GXT-325, GXT400 GXT-400, GXT444 GXT-444, GXT450 GXT-450 GXT450VP4 GXT-450VP4, GXT500 GXT-500 GXT500VP4 GXT-500VP4, GXT550 GXT-550 GXT550VP4 GXT-550VP4, GXT555 GXT 555, GXT565 GXT 565, GXT600 GXT-600, GXT635 GXT-635, GXT650 GXT-650, GXT661 GXT-661, GXT700 GXT-700, GXT710 GXT-710 GXT710VP1 GXT-710VP1 GXT710VP3 GXT-710VP3, GXT720 GXT-720 GXT720VP3 GXT-720VP3, GXT735 GXT-735, GXT750 GXT-750 GXT750VP3 GXT-750VP3, GXT 775 GXT-775 GXT775VP3 GXT-775VP3, GXT800 GXT-800 GXT800VP4 GXT-800VP4, GXT808 GXT-808, GXT850 GXT-850 GXT850VP4 GXT-850VP4, GXT900 GXT-900 GXT900VP4 GXT-900VP4, GXT910 GXT-910 GXT910VP3 GXT-910VP3, GXT950 GXT-950 GXT950VP4 GXT-950VP4
* LXT Series: LXT, LXT80 LXT-80, LXT110 LXT-110 LXT110VP LXT-110VP, LXT210 LXT-210 LXT210VP LXT-210VP, LXT216 LXT-216, LXT300 LXT-300 LXT300VP3 LXT-300VP3, LXT303 LXT-303, LXT305 LXT-305, LXT310 LXT-310, LXT315 LXT-315 LXT315VP3 LXT-315VP3, LXT317 LXT-317, LXT320 LXT-320 LXT320VP3 LXT-320VP3, LXT322 LXT-322, LXT330 LXT-330 LXT330VP3 LXT-330VP3, LXT335 LXT-335 LXT335VP3 LXT335-VP3, LXT340 LXT-340 LXT340VP3 LXT-340VP3, LXT345 LXT 345 LXT345VP3 LXT-345VP3, LXT350 LXT-350 LXT350VP LXT-350VP, LXT410 LXT-410, LXT420 LXT-420, LXT435 LXT-435, LXT440 LXT-440 LXT440VP3 LXT-440VP3, LXT460 LXT-460 LXT460VP3 LXT-460VP3


The coiled cable length from the radio connector to the push to talk button is 6 feet (fully extended). The coiled cable length from the button to the throat microphone is 5 feet (fully extended). Push to talk button is 1.75" wide. Throat mic has been tested on neck sizes up to 19".

Speaker Specs: DIM: φ45±0.5mm Impedance: 8Ω ±15% Sensitivity: 82dB±3dB Frequency Response: 200Hz-3.5KHz

Microphone Specs: Size 9.7 X 6.7mm Frequency Response: 20Hz-16KHz Impedance: 2.2KΩ Sensitivity: -36dB±2dB

Color: Clear silicone ear piece with clear coiled cable with black microphone, cable, button and connector.


Anonymous said...

Where do we get encrypted radios is the question I would like answered. A throat mic is just extra weight if your communications are not secure. Also, what capacity does the OPFOR have in the jamming department? Maybe it is time to learn to speak Navajo.......backwards.

The Trainer said...

Actually, no, a throat mic is not just 'extra weight' if you don't have encrypted comm.

It all depends on the application. Even with encrypted comm, good radio practices require the use of the shortest transmissions as possible. And encrypted comm is available just about anywhere depending on how much you want to pay. Do some research.

And then, this company just may have one that fits your radio. If you go to their web page, you'll see they have many brands and radioes.

OPFOR can DF any radio signal. That's why the application matters. Remember, we're not talking AW here.

Have a great day!

Anonymous said...

You can encrpyt your own Tx with the old fashioned code book. No hardware required, just a few copies of an out-of-print book, and strict discipline on not using repeating cyphers.

Page, para or line, and letter oughta do it. They can try to break the code, but it will require a lot of computing power, and if the books change regularly, nobody will catch on.

Jamming? Well, that left to your creativity, but my setup is to use various bands. Depending on the scenario, we don't use radios anyway. Mouth to ear, nothing written down, and as little said as necessary.

Lastly, hide-in-open. With speech that sounds like normal conversation, it's hard for someone to tell if it's something other than that, and even if they do, they won't know what's going on. Intentional deception would be used against you, so throw it back in their faces.

"Hey Jack."
"We're starting at 5 tonight. Bring the chips."
"Sorry, can't. But I'll bring some soda."
"OK. I'll get them. See you at 5. Brenda can't make it. Sorry dude."

Calling J team....
J here.

Starting = a pre arranged start time to be used with a target set.
5 = target set 5, decided on earlier
chips = specialty ammo, or other load "Jack" safekeeps

"We're starting..." = it's on, and all are needed. Bring the good stuff you stock.
"Sorry..." For some reason we can't, but we'll be there with "soda", (pop, what amm we do have)
"OK..." We have an alternate supply we can access....
"Brenda..." Team B will not be present.

Requires some forethought and creativity, but can be done well. A little talent at both ends helps. Play acting is a great way to develop a set of monikers, and can lead to regular changes in the codes so as to be natural about it.

Phelps said...

Ditto. Good radio discipline is much more secure than crypto that is used indiscriminately.

Matt said...

So what's the utility of a throat mike over a regular one? The advantage lies in what gets picked up. Throat mikes only pick up your voice, being situated next to your voice box. They don't pick up ambient noise, which makes for a clearer transmission. Look up old pictures of the panzers racing through France. If you see a tanker sticking his head out of the turret, you'll likely see him wearing a throat mike.

Matt said...

Looks like they also have a single plug model, the EMP324TALK, if your radio only has one plug.

As for the encrypted/DF problem, that can be solved as well. Code words can be worked out and MEMORIZED in advance, limiting transmission time. Even if your adversary can find your transmission site (which you should have departed once you ended transmission) he would still have to figure out what you meant by the phrase "Sipsey Turbotax".

Brock Townsend said...

Some come with scramblers, although the price at this link is too high.

Anonymous said...


That is "talking around", easily noticed within a few minutes by anyone with basic comm experience. Unless, it is well-buried in similar chatter using similar voices on the same bands at the same time, and has been going on for some time (assume you are being monitored and recorded now, during your movie night chips and soda adventures that actually are chips and soda).

Playing bridge over the radio can encode decent messages in the deck positions. Cryptome dot org may have more detail for you.

Book used as one-time-pad is difficult to break, IF users are diligent to keep messages short enough to use one page and destroy in sequence. Foreign pre-ISBN, non-Google-scanned book helps to confuse efforts at frequency ID but too exotic a book may show up as an inadvertent Amazon search by you or helper. Denying opfor data to work on by short messages is critical, because they have teraflops to throw at the problem and smart analysts to find any weakness that is less than absolutely randomness.

Obscurity is not security. They just haven't targeted you yet.

Real-time user-friendly voice crypto like PGPfone could be added to an iPhone as an app, maybe to a jailbroken phone so that you can keep it instead of loading and re-loading an app likely to be a big red flag to the fed-bull enforcers. Pgpfone v.2 works pretty well on windoze and MacOS 8/9 (cheap vintage G3 desktops and powerbooks).