Every radio transmission is a beacon. Encryption protects the content of a message, but it does nothing to hide the electromagnetic event itself — the fact that someone keyed up, from a particular location, on a particular frequency, at a particular time. Understanding this distinction between private communication and secret communication is the foundation of any honest electronic warfare (EW) vulnerability assessment, and it applies equally to a military patrol and a prepared citizen coordinating with neighbors during a crisis.

The Core Problem: Transmission Is Detection

The most actionable intelligence an adversary can extract from radio traffic is not message content but operator location. Any radio transmission, regardless of encryption level, produces a radio-frequency (RF) signal that can be direction-found using commercially available equipment. Direction finding (DF) is the process of using one or more antenna systems to determine the bearing — and, with multiple observation points, the geographic position — of a transmitting station.

Ham radio “fox hunting” demonstrates how accessible DF techniques are. Hobbyists routinely locate hidden transmitters using inexpensive directional antennas and triangulation methods. A basic handheld radio held against the body and slowly rotated can roughly identify the bearing of a nearby transmitter by monitoring signal strength fluctuations. Multi-receiver software-defined radio (SDR) platforms like the KrakenSDR can provide automated turn-by-turn direction-finding toward a transmitting source, and they cost well under a thousand dollars.

The practical implication is blunt: encrypted radios protect the privacy of your conversation, but the metadata of radio communication — when someone keys up, how often, from where, at what power level, on what frequency — is fully visible to any listener with DF capability. Building a communication plan that treats encryption as a comprehensive security solution is a critical planning failure.

Categories of Electronic Warfare Threats

Direction Finding and Signals Intelligence (SIGINT)

Direction finding is the most broadly applicable EW threat. Adversaries operating with multiple antenna sites or EW vehicles can triangulate transmitter positions with high accuracy. Modern spectrum-monitoring tools make even short transmissions locatable across multiple observation points. Military airborne SIGINT platforms are significantly more capable than consumer-grade DF tools, but even low-budget adversaries can field effective DF.

Beyond position location, SIGINT analysts derive intelligence from communication patterns. The volume of transmissions reveals unit size; changes in traffic density indicate operational tempo shifts; scheduled communications expose planning cycles. None of this requires decrypting content.

Spurious Emissions and Radio Fingerprinting

Cheap radios like the Baofeng series produce spurious emissions — harmonics that appear on adjacent frequencies during transmission. A signals intelligence operator with an SDR and frequency analytics software can identify the specific radio type in use based on these emission signatures. This reveals not just that a transmitter is active but what kind of equipment the operator is running, which in turn reveals capability, training level, and organizational profile. Radios with poor spectral hygiene create intercept vulnerabilities that disciplined operators cannot overcome through technique alone. Equipment selection matters for EW survivability, not just for audio quality.

Jamming

Signal jammers are an increasingly common threat in both conflict zones and criminal environments. Jammers produce broad-spectrum noise that overwhelms receivers on targeted frequency bands, effectively denying communication. Documented uses include cartels and criminal elements jamming cellular frequencies to prevent calls to emergency services, GPS jamming to deny navigation, and Wi-Fi jamming to disable wireless security cameras.

The good news is that jammer detection is straightforward: broad-spectrum, high-power noise signals above a defined bandwidth and decibel threshold are a clear indicator and can be flagged automatically with basic SDR tooling and passive spectrum monitoring — no transmission required. Recognizing that communications have been jammed is the first step to activating alternate communication methods within a PACE plan.

Stingray Devices and Cell Network Exploitation

Stingray-type devices simulate legitimate cell towers to intercept mobile communications. Originally a law-enforcement tool, these devices are now appearing in adversarial hands in both foreign conflict zones and domestic criminal operations. Any smartphone connecting to a simulated tower exposes call metadata, text content (if unencrypted), and precise location. This threat directly impacts the assumptions behind using smartphones as a tactical tool and underscores the value of understanding digital OPSEC principles.

Drone-Based ISR

Drone surveillance using analog video transmission, DJI protocols, and Wi-Fi represents a persistent intelligence, surveillance, and reconnaissance (ISR) threat in both urban and rural environments. While not electronic warfare in the traditional jamming/DF sense, drones extend an adversary’s observation envelope and may carry RF detection payloads. Passive detection of drone signals using SDR equipment is feasible and represents a defensive capability worth developing alongside traditional EW awareness.

Countermeasures for the Communicator

Brevity Discipline

The single most effective countermeasure against direction finding is minimizing transmission duration. Recommended transmission windows are two to eight seconds depending on the assessed EW threat level in a given operational environment. Longer transmissions give adversaries more signal time to triangulate a position, making brevity a genuine force-protection measure rather than merely a communication-efficiency preference.

Proper radio procedures — using “Break” to segment long reports, eliminating filler words, pre-formatting messages before keying up, and transmitting only essential information — directly reduce DF exposure. Every second saved on the air is a second denied to the adversary’s DF operator.

Reducing Electromagnetic Signature

Beyond brevity, several techniques reduce the probability of intercept or detection:

  • Low transmit power: Use the minimum power necessary for reliable communication. Reducing power from 5 watts to 0.5 watts dramatically shrinks the detection radius.
  • Directional antennas: Concentrating RF energy toward the intended receiver rather than broadcasting omnidirectionally reduces the signal footprint available to adversarial intercept stations. Antenna selection is a critical EW survivability decision.
  • Terrain masking: Placing terrain features between your position and likely adversary DF assets blocks line-of-sight RF propagation. Mountainous terrain may naturally degrade enemy jamming effectiveness while simultaneously masking friendly transmissions.
  • Frequency management: Operating within high-traffic frequency bands where signals can blend into background noise reduces the probability of identification. Conversely, transmitting on unusual or empty frequencies makes any signal immediately conspicuous.
  • Message-passing protocols: Store-and-forward protocols like JS8Call’s message relay are preferable to continuous beacon transmissions, as they produce discrete, brief RF events rather than persistent signals.

Honest Threat Modeling

The common myth that any radio transmission results in immediate location and targeting is overstated, particularly for sporadic transmissions in austere terrain. Field experiments with consumer DF equipment in rural back-country terrain have shown that vehicle-based DF teams face significant limitations when the target operates off established trails. However, more sophisticated military airborne systems are acknowledged as significantly more capable than consumer DF tools.

The key is to assess the specific threat environment honestly. What is effectively secret against a civilian or criminal adversary may be fully transparent to a peer or near-peer state actor with dedicated SIGINT capability. A prepared citizen coordinating neighborhood watch does not face the same DF threat as a military patrol operating against a nation-state adversary — but a citizen operating in a civil-unrest or grid-down scenario where organized criminal elements have procured jammers and SDRs faces a non-trivial threat that demands basic discipline.

Treating Unencrypted Radio as a Public Medium

Simplex personal radio (FRS, CB, MURS) must be treated as an entirely public medium. Everything transmitted in the clear is audible to any receiver within range. A useful rule of thumb is to never say anything on any airwave you would not want the entire world to hear. Code words and euphemisms provide marginal obscurity but should not be confused with security. The ham radio community actively monitors frequencies and reports suspicious or illegal transmissions to the FCC, adding another layer of exposure on amateur bands where encryption is prohibited.

For groups requiring content protection, 40-bit encryption on DMR radios provides sufficient protection against casual interception, while AES 256-bit encryption on properly licensed business-band or P25 radios addresses more serious adversaries. Concerns about nation-state-level cryptanalysis are largely irrelevant to the communication security needs of civilian preparedness groups — the practical threat is local interception by unsophisticated actors, and even moderate encryption defeats that comprehensively.

Integrating EW Awareness into PACE Planning

A robust PACE plan inherently accounts for EW threats by establishing multiple communication pathways across different technologies and frequency bands. If a Primary communication method is jammed or compromised, the team transitions to an Alternate method that operates on a different band, using different equipment, or through an entirely different medium (e.g., shifting from VHF radio to a mesh networking device, or from digital to physical messenger).

The PACE framework also provides natural resilience against SIGINT analysis. If a group’s communication pattern shifts unpredictably between methods — radio on one occasion, cellular on another, physical courier on a third — the adversary’s ability to build a coherent traffic-analysis picture degrades significantly. Predictability is the enemy; structured flexibility is the countermeasure.

When building a PACE plan with EW considerations, each tier should be evaluated against the specific threats outlined above:

  1. Is this method vulnerable to DF? (All RF methods are; non-RF methods like landline or courier are not.)
  2. Is this method vulnerable to jamming? (Spread-spectrum and frequency-hopping systems are more resistant; single-frequency simplex is most vulnerable.)
  3. Is this method vulnerable to content interception? (Unencrypted analog is fully exposed; end-to-end encrypted digital is functionally secure against non-state actors.)
  4. Does this method produce metadata that reveals operational patterns? (Scheduled radio nets on fixed frequencies are highly predictable; randomized contact windows on varied frequencies are less so.)

No single communication method is immune to all four threat categories. The strength of PACE planning is that it forces the user to acknowledge this reality and build redundancy accordingly.

The Bottom Line

Electronic warfare is not an exotic military discipline irrelevant to civilian communicators. The tools of DF, jamming, and signals interception are commercially available, increasingly affordable, and already in use by criminal and non-state actors. The fundamental vulnerability is not a solvable engineering problem — it is inherent to the physics of radio transmission. Every transmission is a detectable event.

The communicator’s response is not to avoid radio use entirely but to use it intelligently: transmit briefly, at low power, through directional antennas, with terrain masking, using encrypted modes when legally permitted, and always within a PACE framework that provides fallback options when any single method is compromised. Encryption protects content. Discipline protects the communicator. Understanding the difference between private and secret communication — and planning accordingly — is what separates a competent radio operator from a detectable one.