Synopses & Reviews
More than 2000 satellites will be in orbit by the year 2003. The implications of the coming boom in satellites are revolutionary for those who did not have access to secure data in remote locations around the world. This book will discuss how the new satellites (SubLEOs, LEOs, MEOs and GEOs) will carry encrypted high-speed voice calls from hand-held phones; and, depending on the system, low and high-speed digital data. In addition to satellite encryption use by commercial organizations and governments, this book is a step above any other satellite communication books through its presentation of a secure encrypted wireless environment encompassing direct satellite communications and land-based communications links. This book will leave little doubt that a new world infrastructure in the area of satellite communications and encryption is about to be constructed. The text will benefit organizations and governments, as well as their advanced citizens. For the disadvantaged regions of the world, however, the coming satellite communications revolution could be one of those rare technological events that enable traditional societies to leap ahead and long-dormant economies to flourish in security.The first part of this book identifies the role of satellite encryption technology trends with regards to the pace that national cryptography policy must keep up with, the political environment; and the significant changes in the post-Cold War environment that call attention to the need for and the impact a cryptography policy would have domestically and internationally. The second part of the book describes the instruments and goals of the current U.S. satellite encryption policy and some of the issues raised by current policy. The third part of the book covers development, implementation and management of advanced satellite encryption options and strategies that will forever change how organizations do business now and in the foreseeable future. The fourth part of the book discusses the misuse of satellite encryption technology by the government, the international community, international and domestic terrorist organizations, and domestic and international criminal organizations. The fifth part the book evaluates enlarging the space of possible satellite encryption policy options, and offers findings and recommendations. It also evaluates the results of implementing advanced satellite encryption technology strategies presented in previous chapters. In addition, it also covers satellite encryption security threats and solutions on how to prevent them in the future. Key Featuresx Shows governments and organizations around the world how satellite encryption helps to preserve vital national secrets, limit attacks on a nation's information infrastructure, and eliminate security and authentication obstacles to electronic commercex Discusses how, in the wrong hands, satellite encryption can be used to plan or cover up domestic and international crimes or overseas military operationsx Provides a thorough discussion of how the F.B.I. and National Security Agency seek to preserve their ability to intercept and decode domestic and international communications, and thus would like to inhibit the use of PKE (Public Key Exchange) in satellite communications to generate unbreakable codesx Continues the discussion of how stopping PKE altogether may be technically impossible, and raises constitutional issuesx Practical tips on how satellite encryption will make PCI (Peripheral Component Interconnect) based computers, modems, web browsers and set-top-boxes safer for intellectual property distribution and electronic commerce through the hardware implementation of PCI compatible real-time data encryption/decryption chip solutions
About the Author
John R. Vacca is an information technology consultant and writer. The author of twenty-one books and more than 330 articles, his most recent titles include Internet Security, VRML; Bringing Virtual Reality to the Internet, Official Netscape LiveWire Pro Book,
and Intranet Security
. John was also the configuration management specialist, computer specialist, and the computer security official for NASAs space station program (Freedom) and the Alpha until his early retirement from NASA in 1995.
Formerly of NASAs International Space Station in Houston, Texas, U.S.A.
Table of Contents
Preface. Acknowledgments. Foreword. Introduction. Satellite Encryptions Role in Securing the Information Society: Satellite Data Encryption Security Nightmare. Growing Vulnerability in the Information Age. Encryption: Roles, Market and Infrastructure. Needs for Access to Satellite Encrypted Information. Satellite Encryption Policy Instruments: Export Controls. Controlling Encryption of Surveillance Satellites. Managing Global Navigation Encryption Systems. Collecting Encrypted Signals of Intelligence. Encrypting U.S. Commercial Space Launch Capabilities. Coping with the National Security Dimensions of Civilian Communications Satellites. Improving Communications Encryption in Multinational Coalitions. Managing Satellite Encryption Dimensions Over the Longer Run. Escrowed Satellite Encryption and Related Issues. Other Dimensions of National Satellite Encryption Policy. Implementing Satellite Encryption: End-to-End Encrypted Data Flow--The Uplink Part. End-to-End Encrypted Data Flow--The Downlink Part. Satellite Voice and Data Communications Encryption. Satellite Video and Audio Encryption. Encrypting Intellectual Property Distribution and Electronic Commerce. Satellite Encryption with Emphasis on Mobile Applications. Satellite Encryption for the Electronic Battlefield of Today. Misuse of Satellite Encryption Technology: U.S. Government: Big Brother Is Watching. International Community: Americas Allies Are Grabbing U.S. Satellite Encryption Technology. International and Domestic Terrorist Organizations. Domestic and International Criminal Organizations. Results and Future Direction: Satellite Encryption Technology Policy Options, Analysis and Forecasts. Future Trends in Mobile Technology for the Human Race: Secure GPSs for Everyone! Satellite Encryption for the Electronic Battlefield of Tomorrow: Warfare 2030. Armageddon: Year 2000 Satellite Encryption Crises! Summary, Conclusions and Recommendations. Appendices. Glossary.