{"title":"Hacking the airwaves","authors":"C.W. Madsen","doi":"10.1109/CCST.1988.75990","DOIUrl":null,"url":null,"abstract":"Techniques for eavesdropping on radio transmission are discussed, and the types of information transmitted in the various frequency ranges are examined. Three classes of targets are considered: diplomatic, private-corporation, and military. It is concluded that users of the RF spectrum must encrypt their data transmissions to prevent sensitive information from becoming a virtual 'open book' to potential eavesdroppers.<<ETX>>","PeriodicalId":129971,"journal":{"name":"Proceedings. Institute of Electrical and Electronics Engineers 1988 International Carnahan Conference on Security Technology, Crime Countermeasures","volume":"29 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1988-10-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings. Institute of Electrical and Electronics Engineers 1988 International Carnahan Conference on Security Technology, Crime Countermeasures","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CCST.1988.75990","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
Techniques for eavesdropping on radio transmission are discussed, and the types of information transmitted in the various frequency ranges are examined. Three classes of targets are considered: diplomatic, private-corporation, and military. It is concluded that users of the RF spectrum must encrypt their data transmissions to prevent sensitive information from becoming a virtual 'open book' to potential eavesdroppers.<>