In some applications, we have some concerns that outweigh bandwidth efficiency. In wireless applications, stations must be able to share this medium without interception by an eavesdropper and without being subject to jamming from a malicious intruder To achieve these goals, spread spectrum techniques add redundancy;