The rationale for intercepting radio signals to and from satellites and of using satellites to monitor terrestrial radio signals is described in this chapter. A distinction is made between voice, data, and radar information and between military and civilian information. Issues of privacy are briefly discussed. Major breaches in the security of these systems during the Cold War are outlined to illustrate some of their weaknesses and the consequences ofsecurity failures.
CITATION STYLE
Norris, P. (2015). Eavesdropping. In Handbook of Space Security (pp. 631–643). Springer New York. https://doi.org/10.1007/978-1-4614-2029-3_64
Mendeley helps you to discover research relevant for your work.