An attacker can collect and have access to data transmitted by TT&C if the communication doesn't rely on encryption. [1]
Standard/references: [2] [3] [4] [5]