It is remarkable that there is in modern life “hidden” vital infrastructure that controls a good deal of our daily lives and on which we vitally depend. Yet we are completely unaware of these systems until something goes wrong. In this chapter we discuss two examples of such vital infrastructure. One type of vital infrastructure is a remote control system called supervisory control and data acquisition (SCADA) networks. These electronic digital networks control virtually all of our utilities and transportation systems. The other type of infrastructure are applications satellites. Both of these systems, if attacked by cyber-criminals or cyber-terrorists, could create major problems in our lives and community. The following pages examine the cyber vulnerabilities that exist for both SCADA networks and application satellites and what can be done to better protect this vital infrastructure on which our lives depend.
KeywordsSatellite Network Mobile Satellite Orbital Debris Application Satellite Fiber Optic Network
- 1.Chris Frates and Curt Devine, CNN, December 12, 2014 http://www.cnn.com/2014/12/19/politics/government-hacks-and-security-breaches-skyrocket/index.htm.
- 2.U. S. General Accounting Office Report to Congressional Committees, “Library of Congress: Strong Leadership Needed to Address Serious Information Technology Management Weaknesses,” March 2015. http://www.gao.gov/assets/670/669367.pdf.
- 3.Joseph N. Pelton, Indu Singh and Elena Sitnikova, “Cyber Threats, Extreme Solar Events and EMPs,” Inside Homeland Security, March 2015.Google Scholar
- 4.Indu Singh and Joseph N. Pelton, The Safe City: Living Free in a Dangerous World, (2013). Emerald Planet, Washington, D. C., pp. 199-200.Google Scholar
- 5.Anggoro K. Widiawan, and Rahim Tafazolli, “High Altitude Platform Station (HAPS): A Review of New Infrastructure Development for Future Wireless Communications.” Wireless Personal Communications August 2007, Volume 42, Issue 3 2006. pp 387-404.Google Scholar
- 6.Joseph N. Pelton, Scott Madry and Sergio Comacho-Lara, Handbook of Satellite Applications, (2013) Springer Press, New York, Chapter 1.Google Scholar
- 7.Joseph N. Pelton, “Meteorological Satellites,” in Joseph N. Pelton’s, Scott Madry’s and Sergio Comacho-Lara’s Handbook of Satellite Applications, (2013). Springer Press, New York.Google Scholar
- 8.Siamak Khorram, Frank H. Koch, Cynthia F. van der Wiele, and Stacy Nelson, Remote Sensing (2012). Springer Press, New York.Google Scholar
- 9.Scott Madry, Global Navigation Satellite Systems and Their Applications (2015). Springer Press, New York.Google Scholar
- 10.op cit. Joseph N. Pelton, Indu Singh and Elena Sitnikova, “Cyber Threats, Extreme Solar Events and EMPs,” Inside Homeland Security, March 2015.Google Scholar
- 11.Joel Hruska, “Elon Musk unveils new plan for global satellite Internet, while Google invests a billion in SpaceX,” ExtremeTech, January 20, 2015. www.extremetech.com/extreme/197711-elon-musk-unveils-new-plan-to-circle-to-earth-in-satellites-for-fast-low-latency-internet.
- 12.Elizabeth Palermo, “Google Invests Billions on Satellites to Expand Internet Access,” Live Science, June 4, 2014. http://www.livescience.com/46109-google-satellites-expand-internet-access.html.
- 13.Joseph N. Pelton, Orbital Debris and Other Threats from Space, (2013) Springer Press, New York.Google Scholar
- 14.O3b Networks. www.o3bnetworks.com/welcome-to-o3b.
- 15.Hughes: Broadband Satellite Services, Managed Networks www.hughes.com/.
- 16.The Comsys VSAT Report, 13th edition, “Hughes Market Summary and Company Profile,” London, UK.Google Scholar
- 17.Inmarsat Global Xpress. The first high-speed broadband network to span the world http://www.inmarsat.com/service-group/global-xpress/.
- 18.Ibid.Google Scholar
- 19.Ramesh Gupta and Dan Swearingen, “Mobile Satellite Communications Markets: Dynamics and Trends” in Joseph N. Pelton’s, Scott Madry’s, and Sergio Comacho-Lara’s (eds.) Handbook of Satellite Applications (2013). Springer Press, New York, Chapter 8, pp. 163-186.Google Scholar
- 20.Ibid. Google Scholar
- 21.“U. S. Cyber and Space Security Challenges and Opportunities,” George C. Marshall Institute and Tech American Space Enterprise Council Symposia, April 10, 2015.Google Scholar