More than 2000 satellites will be in orbit by the year 2003. The implications of the coming boom in satellites are revolutionary for those who did not have access to secure data in remote locations around the world. This book will discuss how the new satellites (SubLEOs, LEOs, MEOs and GEOs) will carry encrypted high-speed voice calls from hand-held phones; and, depending on the system, low and high-speed digital data. In addition to satellite encryption use by commercial organizations and governments, this book is a step above any other satellite communication books through its presentation of a secure encrypted wireless environment encompassing direct satellite communications and land-based communications links. This book will leave little doubt that a new world infrastructure in the area of satellite communications and encryption is about to be constructed. The text will benefit organizations and governments, as well as their advanced citizens. For the disadvantaged regions of the world, however, the coming satellite communications revolution could be one of those rare technological events that enable traditional societies to leap ahead and long-dormant economies to flourish in security.The first part of this book identifies the role of satellite encryption technology trends with regards to the pace that national cryptography policy must keep up with, the political environment; and the significant changes in the post-Cold War environment that call attention to the need for and the impact a cryptography policy would have domestically and internationally. The second part of the book describes the instruments and goals of the current U.S. satellite encryption policy and some of the issues raised by current policy. The third part of the book covers development, implementation and management of advanced satellite encryption options and strategies that will forever change how organizations do business now and in the foreseeable future. The fourth part of the book discusses the misuse of satellite encryption technology by the government, the international community, international and domestic terrorist organizations, and domestic and international criminal organizations. The fifth part the book evaluates enlarging the space of possible satellite encryption policy options, and offers findings and recommendations. It also evaluates the results of implementing advanced satellite encryption technology strategies presented in previous chapters. In addition, it also covers satellite encryption security threats and solutions on how to prevent them in the future.
What people are saying - Write a review
We haven't found any reviews in the usual places.
Growing Vulnerability In The Information Age
Roles Market and Infrastructure
Endnotes for Access to Satellite Encrypted Information
27 other sections not shown
agencies algorithm applications attack ballistic missile beam bytes Chapter chip Clipper Clipper chip confidentiality criminal cryptographic decrypt deployed devices digital signature downlink electronic encrypted data encrypted satellite encryption capabilities encryption products escrow agents escrowed encryption escrowed satellite encryption example exceptional access export controls foreign hardware implemented information security information technology infrastructure integrity intelligence intercept interceptor Internet intranet intranet and satellite key escrow laser launch law enforcement license ment military missile defense National Missile Defense national security National Security Agency operations orbit parties pass phrase products with encryption protection public key radar rocket satellite communications satellite communications security satellite encryption policy Sea Launch Sidebar SIGINT space surveillance target Teledesic telephone Thaad threat tion U.S. government United uplink users USML vendors Videocrypt vulnerabilities warhead weapons wiretaps XXXX XXXX XXXX