Satellite Encryption

Satellite Encryption

4.11 - 1251 ratings - Source

More than 2000 satellites will be in orbit by the year 2003. The implications of the coming boom in satellites are revolutionary for those who did not have access to secure data in remote locations around the world. This book will discuss how the new satellites (SubLEOs, LEOs, MEOs and GEOs) will carry encrypted high-speed voice calls from hand-held phones; and, depending on the system, low and high-speed digital data. In addition to satellite encryption use by commercial organizations and governments, this book is a step above any other satellite communication books through its presentation of a secure encrypted wireless environment encompassing direct satellite communications and land-based communications links. This book will leave little doubt that a new world infrastructure in the area of satellite communications and encryption is about to be constructed. The text will benefit organizations and governments, as well as their advanced citizens. For the disadvantaged regions of the world, however, the coming satellite communications revolution could be one of those rare technological events that enable traditional societies to leap ahead and long-dormant economies to flourish in security. The first part of this book identifies the role of satellite encryption technology trends with regards to the pace that national cryptography policy must keep up with, the political environment; and the significant changes in the post-Cold War environment that call attention to the need for and the impact a cryptography policy would have domestically and internationally. The second part of the book describes the instruments and goals of the current U.S. satellite encryption policy and some of the issues raised by current policy. The third part of the book covers development, implementation and management of advanced satellite encryption options and strategies that will forever change how organizations do business now and in the foreseeable future. The fourth part of the book discusses the misuse of satellite encryption technology by the government, the international community, international and domestic terrorist organizations, and domestic and international criminal organizations. The fifth part the book evaluates enlarging the space of possible satellite encryption policy options, and offers findings and recommendations. It also evaluates the results of implementing advanced satellite encryption technology strategies presented in previous chapters. In addition, it also covers satellite encryption security threats and solutions on how to prevent them in the future. Key Features * Shows governments and organizations around the world how satellite encryption helps to preserve vital national secrets, limit attacks on a nation's information infrastructure, and eliminate security and authentication obstacles to electronic commerce * Discusses how, in the wrong hands, satellite encryption can be used to plan or cover up domestic and international crimes or overseas military operations * Provides a thorough discussion of how the F.B.I. and National Security Agency seek to preserve their ability to intercept and decode domestic and international communications, and thus would like to inhibit the use of PKE (Public Key Exchange) in satellite communications to generate unbreakable codes * Continues the discussion of how stopping PKE altogether may be technically impossible, and raises constitutional issues * Practical tips on how satellite encryption will make PCI (Peripheral Component Interconnect) based computers, modems, web browsers and set-top-boxes safer for intellectual property distribution and electronic commerce through the hardware implementation of PCI compatible real-time data encryption/decryption chip solutionsBelow 600 km, the orbit would decay and the satellite would re-enter the atmosphere too soon for the satellite to have a practical ... For any station on earth, a satellite will move into view overhead, travel across the sky, and move out of view.

Title:Satellite Encryption
Author:John R. Vacca
Publisher: - 1999


You Must CONTINUE and create a free account to access unlimited downloads & streaming