This work shows governments and organizations around the world how satellite encryption helps to preserve vital national secrets, limit attacks on a nation's information structure, and eliminate security and authentication obstacles to electronic commerce. It also discusses how, in the wrong hands, satellite encryption can be used to plan or cover up domestic and international crimes or overseas military operations. An insight is also provided on how the Federal Bureau of Investigation and the National Security Agency seek to preserve their ability to intercept and decode domestic and international communications.
- Paperback | 800 pages
- 190 x 234.2 x 43.9mm | 1,851.24g
- 01 Jun 1999
- Elsevier Science Publishing Co Inc
- Academic Press Inc
- San Diego, United States
- b&w illustrations
Table of contents
Preface. Acknowledgments. Foreword. Introduction. Satellite Encryption's Role in Securing the Information Society: Satellite Data Encryption Security Nightmare. Growing Vulnerability in the Information Age. Encryption: Roles, Market and Infrastructure. Needs for Access to Satellite Encrypted Information. Satellite Encryption Policy Instruments: Export Controls. Controlling Encryption of Surveillance Satellites. Managing Global Navigation Encryption Systems. Collecting Encrypted Signals of Intelligence. Encrypting U.S. Commercial Space Launch Capabilities. Coping with the National Security Dimensions of Civilian Communications Satellites. Improving Communications Encryption in Multinational Coalitions. Managing Satellite Encryption Dimensions Over the Longer Run. Escrowed Satellite Encryption and Related Issues. Other Dimensions of National Satellite Encryption Policy. Implementing Satellite Encryption: End-To-End Encrypted Data Flow--The Uplink Part. End-To-End Encrypted Data Flow--The Downlink Part. Satellite Voice and Data Communications Encryption. Satellite Video and Audio Encryption. Encrypting Intellectual Property Distribution and Electronic Commerce. Satellite Encryption with Emphasis on Mobile Applications. Satellite Encryption for the Electronic Battlefield of Today. Misuse of Satellite Encryption Technology: U.S. Government: Big Brother Is Watching. International Community: America's Allies Are Grabbing U.S. Satellite Encryption Technology. International and Domestic Terrorist Organizations. Domestic and International Criminal Organizations. Results and Future Direction: Satellite Encryption Technology Policy Options, Analysis and Forecasts. Future Trends in Mobile Technology for the Human Race: Secure Gpss for Everyone! Satellite Encryption for the Electronic Battlefield of Tomorrow: Warfare 2030. Armageddon: Year 2000 Satellite Encryption Crises! Summary, Conclusions and Recommendations. Appendices. Glossary.
About John R. Vacca
John Vacca is an information technology consultant and writer based in Pomeroy, Ohio. Since 1982, John has authored 23 books and more than 330 articles in the areas of Internet and Intranet security, programming, systems development, rapid application development, multimedia and the Internet. His articles have appeared in hundreds of magazines including Byte, Internet World, Information Week, Network World, Computer World, and Datamation. Vacca was also a configuration management specialist, computer specialist, and the computer security official for NASA's space station program (Freedom) and the International Space Station Program, from 1988 until his early retirement from NASA in 1995.