Abstract
The rationale for intercepting radio signals to and from satellites and of using satellites to monitor terrestrial radio signals is described in this chapter. A distinction is made between voice, data, and radar information and between military and civilian information. Issues of privacy are briefly discussed. Major breaches in the security of these systems during the Cold War are outlined to illustrate some of their weaknesses and the consequences of security failures.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Bamford J (2008) The shadow factory: the ultra-secret NSA from 9/11 to the eavesdropping on America. Anchor Books, New York
Norris P (2010) Military radio surveillance from space and unmanned aircraft. In: Watching earth from space. Springer Praxis, London/New York, pp 233–260, pp 230–232
Pincher C (1984) Too secret too long: the great betrayal of Britain’s crucial secrets and the cover-up. Sidgwick & Jackson, London, p 559
Richelson JT (2002) The wizards of Langley: inside the CIA’s directorate of science & technology. Westview Press, Boulder, p 86
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer Science+Business Media New York
About this entry
Cite this entry
Norris, P. (2015). Eavesdropping. In: Schrogl, KU., Hays, P., Robinson, J., Moura, D., Giannopapa, C. (eds) Handbook of Space Security. Springer, New York, NY. https://doi.org/10.1007/978-1-4614-2029-3_64
Download citation
DOI: https://doi.org/10.1007/978-1-4614-2029-3_64
Published:
Publisher Name: Springer, New York, NY
Print ISBN: 978-1-4614-2028-6
Online ISBN: 978-1-4614-2029-3
eBook Packages: EngineeringReference Module Computer Science and Engineering