Below is a sneak peek of this content!
This article is ‘part 2’ of the article on Operations Security (OPSEC). In this article we are going to look at gathering intelligence from communications, as well as things you can do to limit what information others can gain from your communications. In the article Signals Intelligence (SIGINT) – the basics I covered some information on how encryption and trunked radio systems work and recommendations on scanners and scanner apps. I also discussed what kind of information you should try and capture. If you haven’t read that article, I suggest you do before going further. Communications Intelligence (COMINT) is a sub-set of Signals Intelligence (SIGINT). SIGINT also includes electronic intelligence (ELEINT) however that is beyond the scope of most people’s capabilities and therefore we will not cover it in this article. COMINT involves gathering information from, mostly, radio communications, but can also involve intercept of other forms of communication, such as text messages, emails, etc. This article will focus on intercepting radio transmissions. How is Encryption Used While current intel suggests that adversary groups are using encrypted apps like Signal and Telegram there are also reports that indicate they are also using radios. In the present situation the adversary...