Every radio transmission is a beacon. Encryption protects message content, but it does nothing to prevent detection or geolocation of the transmitter. This is the foundational reality of signals intelligence (SIGINT): the act of pressing the push-to-talk button announces your presence to anyone with a receiver, a directional antenna, and the patience to triangulate. Understanding SIGINT — both as a capability to develop and a threat to defend against — is one of the most consequential skills for any practitioner who plans to communicate in a contested environment.
What SIGINT Is
Signals intelligence is the broad discipline of intercepting, analyzing, and exploiting electromagnetic emissions — primarily radio communications, but also radar, data links, and any other RF-radiating device. Within military structures, SIGINT organizations divide labor between collection specialists (who operate receivers and antennas in the field) and analysis/reporting specialists (who interpret raw intercepts and produce intelligence products). The intelligence supply chain from raw collection to finished reporting can pass through dozens of layers, with actionable intelligence in theater typically moving through four to seven layers over one to three days. At each step, human judgment — and human bias — can shape the product, which is why raw collected data is considered inherently apolitical while reporting becomes increasingly vulnerable to institutional and political pressure as it moves up the chain.
For the prepared citizen, the relevant takeaway is not the bureaucratic structure of the NSA/CSS but the operational reality: anyone with modest equipment can collect useful RF intelligence, and anyone who transmits can be collected against.
Radio Direction Finding: The Core Threat
Radio direction finding (RDF) is the technique of determining the bearing and approximate location of a transmitter. The Radio Operators Handbook describes the minimum requirement: a radio receiver, a directional antenna, and a system for recording azimuths. A single azimuth from one station gives general direction. The intersection of two azimuths from separate locations produces a “cut” — an approximate distance. Three or more azimuths produce a “fix” for general location. At 20–25 kilometers from the target, ground-based RDF achieves a typical circular error of probability (CEP) of approximately 1,500 meters — more than sufficient for indirect fire targeting.
This is not theoretical. In Ukraine, Russian electronic warfare units have located Ukrainian fighters and drone operators by their radio emissions and called artillery on their positions, even when the transmissions were encrypted. The encryption prevented the Russians from understanding the content of the messages — it did nothing to prevent detection of the signal itself.
Terrain, weather, propagation conditions, equipment quality, and operator skill all affect RDF accuracy. Airborne direction finding is generally more accurate than ground-based methods because the elevated platform reduces multipath interference and terrain masking. Operators must understand that traffic analysis compounds the threat: even without decrypting a single message, a competent adversary can identify which station is the net control, estimate unit size from traffic volume, and infer operational tempo from transmission patterns.
Frequency Hopping Is Not the Answer
A common misconception is that frequency-hopping spread spectrum (FHSS) radios defeat direction finding because they don’t stay on one frequency long enough to be located. Modern wideband receivers have inverted this assumption. Software-defined radios can observe the entire spectrum simultaneously, which means a hopping pattern is not harder to see — it is actually a distinguishing signature that stands out against the background of fixed-frequency traffic. Burst transmissions, once a strong countermeasure, can similarly be captured in wideband spectrum recordings and replayed at leisure. The correct operational conclusion is not to rely on any single technical countermeasure but to minimize transmit power and duration whenever possible, and to plan radio usage with the assumption that every transmission is potentially locatable.
This reality ties directly into the PACE Planning Framework — a sound PACE plan must account for when and whether RF-based methods are appropriate given the electronic warfare threat, and may need to incorporate non-RF alternatives as primary or alternate means.
Software-Defined Radio: The Democratized SIGINT Tool
Software-defined radio has put basic signals intelligence capability into the hands of anyone willing to learn. An RTL-SDR USB dongle costs approximately $40 and, connected to a laptop or Android device running software like SDR Console or SDR Angel, allows simultaneous monitoring of multiple frequency bands. The Tiny Spectrum Analyzer Ultra (Tiny SA Ultra) is a self-contained handheld unit with roughly eight hours of battery life and coverage extending into the 2.4 GHz and 5.8 GHz bands — the Wi-Fi and drone control frequencies that matter most in current threat environments. The HackRF with PortaPack adds onboard processing capable of decoding ADS-B aircraft transponders, maritime transponders, Bluetooth devices, and LoRa/Meshtastic traffic without a connected computer.
The Terminal Armament SDR Stick represents a field-oriented improvement: an IP67-rated aluminum enclosure with dual independent tuners that enable simultaneous monitoring of two separate frequency ranges. This is particularly useful for tracking crossband repeaters (where input and output frequencies may span from VHF to UHF) and for trunked radio system monitoring, where one tuner tracks the control channel while the other hops dynamically with assigned traffic.
Jammer detection is one of the most accessible SDR applications because jamming manifests as a broad, obvious noise floor across multiple bands — it requires no signal decoding expertise to identify. For more detail on SDR hardware and spectrum monitoring, see Software-Defined Radio and Spectrum Monitoring.
Advanced Direction Finding: From Fox Hunting to Passive Radar
Traditional “fox hunting” — the ham radio direction-finding method — uses a directional antenna rotated through multiple azimuths, with signal strength readings at each bearing used to narrow progressively toward the transmitter. This works but is slow and requires physical movement.
The SDR Kraken system represents a significant capability jump: five RTL-SDR receivers synchronized to a shared clock, with equidistantly spaced antennas, compute time-of-arrival offsets between receivers to calculate precise direction of arrival. The result displays in real time on an Android application. When the Silvus Technologies dedicated SIGINT receiver — a purpose-built device emerging from their Streamcaster product family — is paired with a second unit via Streamcaster data radios, the two receivers share data and triangulate emitter positions with greater accuracy. The Silvus device processes data at twice the speed of competing products at equivalent price points and supports raw metadata output for custom analysis workflows.
Researchers have also demonstrated passive radar using existing Wi-Fi infrastructure combined with AI processing to estimate occupant count and positions within rooms — effectively a low-cost, three-dimensional passive radar system. Arrays of ESP32 Wi-Fi modules have shown the ability to visualize signal origin locations within a camera-like frame. These techniques enable locating enemy transmitters, identifying drone operators, and mapping RF-active threats within an area of operations without any active transmission that would compromise your own position.
Defeating SIGINT: Wired Communication and RF Discipline
The most effective counter to signals intelligence is not better encryption or more sophisticated waveforms — it is the complete absence of RF emissions. During the Battle of the Bulge, German forces defending Bastogne reverted to World War I-era field telephones laid over pre-positioned copper wire, denying American signals analysts the radio intercepts they had relied upon throughout the campaign. The lesson remains valid: wired communication — whether copper or modern fiber optic cable — eliminates the RF signature that enables SIGINT collection and direction finding entirely.
Fiber optic cables extend this principle further by being immune to electromagnetic interference, EMP, and electrical crosstalk, in addition to being undetectable by RF collection. A field telephone or data link running over the same fiber strand used for seismic perimeter detection creates a completely undetectable two-way communication channel. The trade-off is physical vulnerability to terrain disruption, storms, and deliberate cutting — radio remains available regardless of physical infrastructure.
Integrating wired or optical communication as a primary or alternate means in a PACE plan provides resilience against jamming and signals exploitation that purely RF-based communication cannot match. This is especially relevant in high-threat electronic warfare environments where adversary SIGINT capability is assumed.
For radio communications that must occur, the Radio Operators Handbook emphasizes fundamental RF discipline: minimize transmit power to the lowest level that maintains reliable communication, keep transmissions as brief as possible, vary transmission locations when feasible, and never assume encryption alone provides adequate protection. These practices directly inform the Electronic Warfare, OPSEC, and Signal Security principles that every communicator should internalize.
Traffic Analysis and Pattern-of-Life Exploitation
Even when message content is completely unreadable, the metadata surrounding transmissions provides intelligence value that is often underestimated. Traffic analysis — the study of who transmits, when, how often, for how long, and to whom — can reveal operational patterns without decrypting a single byte. A sudden increase in transmission volume from a previously quiet station suggests preparation for movement or action. A station that consistently initiates communication and receives acknowledgments from multiple subordinate stations is likely a command post. Predictable transmission schedules reveal patrol cycles, shift changes, and operational rhythms.
This is why the concept of “radio silence” exists as a tactical posture — not because silence prevents an adversary from breaking your encryption, but because the mere absence of expected traffic denies the adversary the pattern data they need to anticipate your actions. Conversely, a deliberate spike in meaningless transmissions from a diversionary location can create false pattern-of-life signatures, drawing adversary attention and targeting away from actual operations.
The prepared communicator should assume that every transmission contributes to a mosaic of information about their location, organizational structure, operational tempo, and intent — regardless of whether the content is encrypted, hopped, or otherwise technically protected.
Practical Recommendations
For anyone operating radios in an environment where adversary SIGINT is a possibility — which includes essentially any contested scenario — the following principles apply:
- Assume every transmission is intercepted and locatable. Plan accordingly.
- Use the minimum power necessary for reliable communication. Excessive power extends your detection radius without improving link quality.
- Keep transmissions short. Prepare messages before keying up. Dead air on a hot mic is a gift to direction-finding operators.
- Incorporate non-RF communication into your PACE plan — wired, optical, or physical courier methods that generate no electromagnetic signature.
- Develop your own collection capability. Even a basic SDR setup provides situational awareness about what RF activity exists in your area of operations, who is transmitting, and whether jamming is occurring.
- Practice RF discipline as a team standard, not an individual preference. One undisciplined operator compromises the entire element.
- Vary locations and timing of transmissions when operationally feasible to deny pattern-of-life analysis.
The electromagnetic spectrum is both a tool and a threat surface. Mastering signals intelligence — understanding what your transmissions reveal, what your adversary’s transmissions reveal, and how to exploit the difference — is not an optional specialization. It is a fundamental competency for anyone who intends to communicate effectively while surviving in a contested environment.