Browse Definitions :
Definition

SIGINT (signals intelligence)

Contributor(s): Matthew Haughn

SIGINT (signals intelligence) is information gained by the collection and analysis of the electronic signals and communications of a given target.

Intelligence, in this context, is information that provides an organization or individual with support for making decisions and possibly gaining a strategic advantage. The term is often abbreviated as “intel.” Intelligence agencies worldwide use SIGINT in both foreign and domestic data gathering.

Originally SIGINT mostly consisted of communications intelligence (COMINT). SIGINT now has two main fields: COMINT, which is gathered through accessing the communications of individuals, and ELINT (electronic intelligence), which is gathered through the use of electronic sensors. SIGINT has also been extended to encompass information gathered from other types of signal interception and the disruption of these signals. Those activities are not covered by privacy laws. Since the invention of radio, the general consensus has been that radio waves cannot be owned, so interception is legal and as such does not require warrants as wiretap does.

The U.S. intelligence community claims that it only uses SIGINT related to the communications of foreign entities for the purposes of national security. However, documents leaked by Edward Snowden in 2013 and other revelations possibly brought about as a result of the Snowden effect demonstrate that the NSA has used many devices to gather SIGINT of both domestic and foreign targets through a program called Tailored Access Operations (TAO).

Examples include:

  • USB sticks secretly fitted with radio transmitters.
  • iPhone malware used to monitor the communications and activities of users.
  • Portable continuous wave generators that can monitor the keyboard activities of even offline computers through a keyboard vibration attack.
  • “LAMPSTAND” devices that can interfere with wireless connections at distances up to eight miles.

The term SIGINT was coined by the United States Department of Defense.

This was last updated in May 2015

Continue Reading About SIGINT (signals intelligence)

Start the conversation

Send me notifications when other members comment.

Please create a username to comment.

-ADS BY GOOGLE

File Extensions and File Formats

Powered by:

SearchCompliance

  • California Consumer Privacy Act (CCPA)

    The California Consumer Privacy Act (CCPA) is legislation in the state of California that supports an individual's right to ...

  • compliance audit

    A compliance audit is a comprehensive review of an organization's adherence to regulatory guidelines.

  • regulatory compliance

    Regulatory compliance is an organization's adherence to laws, regulations, guidelines and specifications relevant to its business...

SearchSecurity

  • privilege creep

    Privilege creep is the gradual accumulation of access rights beyond what an individual needs to do his job. In IT, a privilege is...

  • BlueKeep (CVE-2019-0708)

    BlueKeep (CVE-2019-0708) is a vulnerability in the Remote Desktop (RDP) protocol that affects Windows 7, Windows XP, Server 2003 ...

  • endpoint detection and response (EDR)

    Endpoint detection and response (EDR) is a category of tools and technology used for protecting computer hardware devices–called ...

SearchHealthIT

SearchDisasterRecovery

  • disaster recovery team

    A disaster recovery team is a group of individuals focused on planning, implementing, maintaining, auditing and testing an ...

  • cloud insurance

    Cloud insurance is any type of financial or data protection obtained by a cloud service provider. 

  • business continuity software

    Business continuity software is an application or suite designed to make business continuity planning/business continuity ...

SearchStorage

  • Hadoop as a service (HaaS)

    Hadoop as a service (HaaS), also known as Hadoop in the cloud, is a big data analytics framework that stores and analyzes data in...

  • blockchain storage

    Blockchain storage is a way of saving data in a decentralized network which utilizes the unused hard disk space of users across ...

  • disk mirroring (RAID 1)

    RAID 1 is one of the most common RAID levels and the most reliable. Data is written to two places simultaneously, so if one disk ...

Close