ABSTRACT

Communications take place in forms that range from simple voice conversations to complicated

manipulations of light. Each type of communication is based on two basic principles: wave theory

and particle theory. In essence, communication can be established by the use of either, frequently in

concert with a carrier or medium to provide transmission. An example is the human voice. The result of

wave communications using the air as the signal-carrying medium is that two people can talk to each

other. However, the atmosphere is a common medium, and anyone close enough to receive the same

waves can intercept and surreptitiously listen to the discussion. For computer communications, the

process is exponentially more complicated; the medium and type may change several times as the data is

moved from one point to another. Nevertheless, computer communications are vulnerable in the same

way that a conversation can be overheard. As communications are established, several vulnerabilities in

the accessibility of the communication will exist in some form or another. The ability to intercept

communications is governed by the type of communication and the medium that is employed. Given the

proper time, resources, and environmental conditions, any communication-regardless of the type or

medium employed-can be intercepted.