Information in transit from one place to another is never completely safe from interception.
Having accepted that fundamental fact, it becomes clear that the goal is to make it so difficult to intercept and decipher data in transit that nobody will make the effort. That presupposes that it’s easy in the first place, which it is!
Tempest
According to the : “In 1985, Wim van Eck published the first unclassified technical analysis of the security risks of emanations from computer monitors. This paper caused some consternation in the security community, which had previously believed that such monitoring was a highly sophisticated attack available only to governments; van Eck successfully eavesdropped on a real system, at a range of hundreds of meters, using just $15 worth of equipment plus a television set.”