More than 2000 satellites will be in orbit by the year 2003. The implications of the coming boom in satellites are revolutionary for those who did not have access to secure data in remote locations around the world. This book will discuss how the new satellites (SubLEOs, LEOs, MEOs and GEOs) will carry encrypted high-speed voice calls from hand-held phones; and, depending on the system, low and high-speed digital data. In addition to satellite encryption use by commercial organizations and governments, this book is a step above any other satellite communication books through its presentation of a secure encrypted wireless environment encompassing direct satellite communications and land-based communications links.
This book will leave little doubt that a new world infrastructure in the area of satellite communications and encryption is about to be constructed. The text will benefit organizations and governments, as well as their advanced citizens. For the disadvantaged regions of the world, however, the coming satellite communications revolution could be one of those rare technological events that enable traditional societies to leap ahead and long-dormant economies to flourish in security.
The first part of this book identifies the role of satellite encryption technology trends with regards to the pace that national cryptography policy must keep up with, the political environment; and the significant changes in the post-Cold War environment that call attention to the need for and the impact a cryptography policy would have domestically and internationally. The second part of the book describes the instruments and goals of the current U.S. satellite encryption policy and some of the issues raised by current policy. The third part of the book covers development, implementation and management of advanced satellite encryption options and strategies that will forever change how organizations do business now and in the foreseeable future. The fourth part of the book discusses the misuse of satellite encryption technology by the government, the international community, international and domestic terrorist organizations, and domestic and international criminal organizations. The fifth part the book evaluates enlarging the space of possible satellite encryption policy options, and offers findings and recommendations. It also evaluates the results of implementing advanced satellite encryption technology strategies presented in previous chapters. In addition, it also covers satellite encryption security threats and solutions on how to prevent them in the future.
* Shows governments and organizations around the world how satellite encryption helps to preserve vital national secrets, limit attacks on a nation's information infrastructure, and eliminate security and authentication obstacles to electronic commerce
* Discusses how, in the wrong hands, satellite encryption can be used to plan or cover up domestic and international crimes or overseas military operations
* Provides a thorough discussion of how the F.B.I. and National Security Agency seek to preserve their ability to intercept and decode domestic and international communications, and thus would like to inhibit the use of PKE (Public Key Exchange) in satellite communications to generate unbreakable codes
* Continues the discussion of how stopping PKE altogether may be technically impossible, and raises constitutional issues
* Practical tips on how satellite encryption will make PCI (Peripheral Component Interconnect) based computers, modems, web browsers and set-top-boxes safer for intellectual property distribution and electronic commerce through the hardware implementation of PCI compatible real-time data encryption/decryption chip solutions
"synopsis" may belong to another edition of this title.
Satellite communication is the fastest way to get digital information from one geographic location to another, and encryption algorithms can help keep prying eyes from deriving any value from intercepted transmissions. Satellite Encryption explains the need for secure satellite communications, including ways of implementing them, and discusses their implications (in business, government, and warfare). Author John Vacca, an excellent writer whose prose is both packed with technical detail and fun to read, focuses on United States satellite encryption policies.
This is far more than a networking or government-policy text, though its contents have bearing upon wide area network (WAN) designers and legislators alike. Vacca explains the physics involved in getting a satellite into the most desirable orbit, the computing techniques used for cracking keys, and various key-escrow strategies (including Clipper).
In addition, there's a lot of background information on national security topics other than satellite encryption, including missile-defense satellites and the purchase of dangerous military surplus by terrorist groups. There's a somewhat breathless warning of year 2000 mayhem, but Vacca's approach is generally very deliberate and informative. --David Wall
Topics covered: The importance of secure satellite communications, government encryption policies, implementation of satellite encryption, information-theft techniques, use and abuse of key-escrow schemes, and the role of satellite encryption in the future of business and government.About the Author:
John Vacca is an information technology consultant and internationally known best-selling author based in Pomeroy, Ohio. Since 1982, John has authored 60 books (some of his most recent books include: "Biometric Technologies and Verification Systems," /Publisher: Elsevier Science & Technology Books (March 16, 2007); "Practical Internet Security" (Hardcover), /Publisher: Springer (October 18, 2006); "Optical Networking Best Practices Handbook" (Hardcover), /Publisher: Wiley-Interscience (November 28, 2006); "Guide to Wireless Network Security,"/Publisher: Springer (August 19, 2006); "Computer Forensics: Computer Crime Scene Investigation (With CD-ROM), 2nd Edition"/Publisher: Charles River Media (May 26, 2005); "Firewalls: Jumpstart For Network And Systems Administrators," Publisher: Elsevier Digital Press (December, 2004); "Public Key Infrastructure: Building Trusted Applications and Web Services,"/Publisher: Auerbach Publications (May 11, 2004); "Identity Theft,"/Publisher: Prentice Hall PTR (September 12, 2002 ("Identity Theft: The Michelle Brown Story," Lifetime Television for Women, Starring Kimberly Williams-Paisley and Annabella Sciorra [Expert Source and Inspiration for: "Quiz: Are You At Risk," by Sara Eckel,Release Date: 11-1-2004.)); "The World's 20 Greatest Unsolved Problems"/Publisher: Pearson Education (was rated by Amazon as number 10 of their Best Books of 2004: Top 10 Editors' Picks: Computers & Internet and, more than 600 articles in the areas of advanced storage, computer security and aerospace technology (copies of articles and books are available upon request). John was also a configuration management specialist, computer specialist, and the computer security official (CSO) for NASA's space station program(Freedom) and the International Space Station Program, from 1988 until his early retirement from NASA in 1995. In addition, John is also an Independent online book reviewer. Finally, John was also one of the security consultants for the MGM
"About this title" may belong to another edition of this title.
Book Description Academic Press, 1999. Paperback. Book Condition: New. Bookseller Inventory # P110127100113
Book Description Academic Press, 1999. Paperback. Book Condition: New. Bookseller Inventory # SONG0127100113