Military radio surveillance from space

  • Pat Norris
Chapter
Part of the Springer Praxis Books book series (PRAXIS)

Abstract

When you make a phone call, the signals that leave your phone travel along copper wires or cables to the local exchange if you are using a land line or by radio link to relay towers if you are using a cell phone or by radio link to a WiFi router, cable or wire if you are using the internet. The signals then are routed by the phone company or internet service provider to their destination through cables, wires, radio links or whatever route is cheapest and least congested. If the caller and receiver are far apart, the signals may travel by microwave radio link or via undersea cables or by radio through satellites. You have no control over what route your call takes and, indeed, you have no idea what that route is – it will vary from time to time, depending on congestion across the phone network.

Keywords

Vortex Microwave Zircon Mercury Shipping 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Richelson J. T. (2008) The US Intelligence Community,5th edn (Boulder, CO: Westview Press).Google Scholar
  2. Schmid G. et al.(2001) Report on the Existence of a Global System for the Interception of Private and Commercial Communications (ECHELON Interception System),European Parliament Report A5-0264/2001, July 11th.Google Scholar
  3. Richelson J. T. (2002) The Wizards of Langley: Inside the CIA's Directorate of Science & Technology(Boulder, CO: Westview Press).Google Scholar
  4. Bamford J. (2001) Body of Secrets: How America’s NSA and Britain’s GCHQ Eavesdrop on the World(London: Century).Google Scholar
  5. Heyman J. (2009) EW, ELINT & Surveillance Satellites, Milsat Magazine,January, 21–32.Google Scholar
  6. Johansen A. (1995) Riesige Lauscher am Himmel, Die Zeit,July 28th.Google Scholar
  7. Kleiner K. (2009) Mind What You Say on your Mobile, New Scientist,December 18th. Langewiesche W. (2005) The Wrath of Khan: How A. Q. Khan Made Pakistan a Nuclear Power and Showed that the Spread of Atomic Weapons Can't Be Stopped, The Atlantic, 296(4), 62–85.Google Scholar
  8. O'Brien K. (2009) Cellphone Encryption Code Is Divulged, New York Times, December 28th.Google Scholar
  9. Vijayan J. (2010) Researchers Use PC to Crack Encryption for Next Gen GSM Networks, Computerworld, available online at www.computerworld.com,January 14th.
  10. Bamford J. (2006) “He’s in the Back Seat”, Atlantic Monthly,April.Google Scholar
  11. Bamford J. (2008) The Shadow Factory: The Ultra-Secret NSA from 9/11 to the Eavesdropping on America(New York: Anchor Books).Google Scholar
  12. Rashid A. (2009) Descent into Chaos: The World's Most Unstable Region and the Threat to Global Security(London: Penguin Books).Google Scholar
  13. Smith M. (2006) Taliban Leader "Killed" after RAF Tracks Phone, Sunday Times,December 24th, available online at www.timesonline.co.uk/tol/news/uk/article1264344.ece.
  14. Hendrickx B. (2005) Snooping on Radars: A History of Soviet/Russian Global Signals Intelligence Satellites, Journal of the British Interplanetary Society, 58(Suppl. 2), 97–133.Google Scholar
  15. Pincher C. (1984) Too Secret Too Long: The Great Betrayal of Britain's Crucial Secrets and the Cover-Up(London: Sidgwick & Jackson).Google Scholar
  16. Urban M. (1996) UK Eyes Alpha: The Inside Story of British Intelligence(London: Faber & Faber).Google Scholar
  17. Lardier C. (2009f) Une Delta-4H pour NRO-26, Air & Cosmos,January 9th, 2154, 35.Google Scholar
  18. Lardier C. (2009d) Succés pour le satellite-espion américain, Air & Cosmos,January 23rd, 2156, 38–39.Google Scholar
  19. Covault C. (2007b) Ocean Recons Readied: NRO Prepares Sea Surveillance Flight, Optical Satellite Procurement, Aviation Week & Space Technology,April 30th, 24–25.Google Scholar
  20. Covault C. (2007c) Secret Maneuvers: Wayward NRO Ocean Surveillance Space-craft Is Shifted into Slightly Higher Orbits, Aviation Week & Space Technology, July 23rd, 38–39.Google Scholar
  21. Covault C. (2008b) Night Fright: NRO Braces for Flight of Eavesdropping Spacecraft on Agency's First Delta IV Heavy, Aviation Week & Space Technology,December 8th, 26.Google Scholar
  22. Hastings M. (2008) Nemesis: The Battle for Japan, 1941–45(London: Harper Perennial).Google Scholar
  23. Siddiqi A. (1999) Staring at the Sea: The Soviet RORSAT and EORSAT Programmes, Journal of the British Interplanetary Society, 52, 397–416.Google Scholar
  24. Lardier C. (2009b) Cosmos-2455, Air & Cosmos,November 27th, 2196, 54.Google Scholar
  25. Lardier C. (2010c) La Russie maintient son avance en 2009, Air & Cosmos,January 8th, 2200, 26–32.Google Scholar
  26. Levy C. J. (2010) Ukraine Woos Russia with Lease Deal, New York Times,April 22nd, New York edition, A8.Google Scholar
  27. Stern D. (2010) Parliamentary Chaos as Ukraine Ratifies Fleet Deal, BBC News Online, http://news.bbc.co.uk/1/hi/8645847.stm.
  28. Lardier C. (2009a) Bientôt, un commandement pour l'espace militaire, Air & osmos,December 11th, 2198, 38–39.Google Scholar
  29. Lardier C. (2008a) Espace militaire français: espoirs et incertitudes, Air & Cosmos, November 7th, 2146, 36–37.Google Scholar
  30. Taverna M. A. and Wall R. (2009) Altogether Now: Despite Cooperation Snags, France Presses Ahead with Ambitious Milspace Agenda, Aviation Week & Space Technology,December 7th, 44–45.Google Scholar
  31. Air & Cosmos (2007a) ELISA sur ARIANE-5, September 14th, 2091,17. Air & Cosmos(2007b) Kobalt-M en orbite, June 15th, 152. Air & Cosmos(2010) Kobalt-M, April 23rd, 2215, 35.Google Scholar
  32. de Selding P. B. (2007a) France Sets its Sights on an Operational Elint System, Space News,June 18th.Google Scholar
  33. Lardier C. (2009e) Un mystérieux satellite chinois, Air & Cosmos, November 20th, 2195, 40.Google Scholar

Copyright information

© Springer Science+Business Media, LLC 2010

Authors and Affiliations

  • Pat Norris
    • 1
  1. 1.ByfleetUK

Personalised recommendations