Almost swamped by a sea of electromagnetic signals, national security agencies are using a variety of means to capture signals intelligence (Sigint). Popular methods include tapping fiber-optic cables, bugging, exploitation of software flaws, and bribery, blackmail, and burglary.

As part of a special report on "Intelligence & Technology" in the April issue of IEEE Spectrum, Associate Editor Stephen Cass writes about the "Listening In" done by various agencies. Echelon, the worldwide surveillance system begun by the United States and partner countries in 1947, is still used; it is also feared as a possible Big Brother hearing and seeing every message passed. In reality, the Internet and wireless communications technologies have made it far more difficult to obtain access to private messages, while increasing the quantity of such messages enormously.

From a network of antennas to the fine points of tapping a fiber-optic cable, there are many ways to intercept electronic communications. People employed in the work range from Navy Seals (the U.S. Navy's special operations warfare personnel) to mathematicians at the National Security Agency and recruits in targeted governments. If ciphers cannot be broken, they may be bought. Cell- and satellite phones can be tracked by satellites or other listening stations. As the article explains, all these efforts are most efficient when coordinated in an integrated intelligence strategy.

Contact: Stephen Cass, 212 419 7754, [email protected].For a faxed copy of the complete article ("Listening In" by Stephen Cass, Associate Editor, IEEE Spectrum, April 2003, pp. 32-37) or to arrange an interview, contact: Nancy T. Hantman, 212 419 7561, [email protected].