Abstract
The rationale for intercepting radio signals to and from satellites and of using satellites to monitor terrestrial radio signals is described in this chapter. A distinction is made between voice, data, and radar information and between military and civilian information. Issues of privacy are briefly discussed. Major breaches in the security of these systems during the Cold War are outlined to illustrate some of their weaknesses and the consequences of security failures.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Bamford J (2008) The shadow factory: the ultra-secret NSA from 9/11 to the eavesdropping on America. Anchor Books, New York
Norris P (2010) Military radio surveillance from space and unmanned aircraft. In: Watching earth from space. Springer Praxis, London/New York, pp 233–260, pp 230–232
Pincher C (1984) Too secret too long: the great betrayal of Britain’s crucial secrets and the cover-up. Sidgwick & Jackson, London, p 559
Richelson JT (2002) The wizards of Langley: inside the CIA’s directorate of science & technology. Westview Press, Boulder, p 86
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer Science+Business Media New York
About this entry
Cite this entry
Norris, P. (2015). Eavesdropping. In: Schrogl, KU., Hays, P., Robinson, J., Moura, D., Giannopapa, C. (eds) Handbook of Space Security. Springer, New York, NY. https://doi.org/10.1007/978-1-4614-2029-3_64
Download citation
DOI: https://doi.org/10.1007/978-1-4614-2029-3_64
Published:
Publisher Name: Springer, New York, NY
Print ISBN: 978-1-4614-2028-6
Online ISBN: 978-1-4614-2029-3
eBook Packages: EngineeringReference Module Computer Science and Engineering