Eavesdropping

0Citations
Citations of this article
27Readers
Mendeley users who have this article in their library.
Get full text

Abstract

The rationale for intercepting radio signals to and from satellites and of using satellites to monitor terrestrial radio signals is described in this chapter. A distinction is made between voice, data, and radar information and between military and civilian information. Issues of privacy are briefly discussed. Major breaches in the security of these systems during the Cold War are outlined to illustrate some of their weaknesses and the consequences ofsecurity failures.

Cite

CITATION STYLE

APA

Norris, P. (2015). Eavesdropping. In Handbook of Space Security (pp. 631–643). Springer New York. https://doi.org/10.1007/978-1-4614-2029-3_64

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free