ABSTRACT
Communications take place in forms that range from simple voice conversations to complicated
manipulations of light. Each type of communication is based on two basic principles: wave theory
and particle theory. In essence, communication can be established by the use of either, frequently in
concert with a carrier or medium to provide transmission. An example is the human voice. The result of
wave communications using the air as the signal-carrying medium is that two people can talk to each
other. However, the atmosphere is a common medium, and anyone close enough to receive the same
waves can intercept and surreptitiously listen to the discussion. For computer communications, the
process is exponentially more complicated; the medium and type may change several times as the data is
moved from one point to another. Nevertheless, computer communications are vulnerable in the same
way that a conversation can be overheard. As communications are established, several vulnerabilities in
the accessibility of the communication will exist in some form or another. The ability to intercept
communications is governed by the type of communication and the medium that is employed. Given the
proper time, resources, and environmental conditions, any communication-regardless of the type or
medium employed-can be intercepted.