signals from the Global Positioning system's worldwide satellite constellation to create a location
signature that is unique to every location on Earth at every instant in time. This signature is used to
verify and certify geodetic location to within a few meters or better. Because the GPS observations
at any given site are unpredictable in advance (at the required accuracy level), constantly changing,
and everywhere unique, it is virtually impossible to spoof the signature.
The CyberLocator technology is not vulnerable to many of the techniques in the attacker's toolkit, in
part, because it does not rely on any secret information and it is not readily forged. In addition, it
counters one of the attacker's most powerful tools, anonymity. Because the exact location of the
intruder is revealed, it defeats looping and masquerading. It would be a strong deterrent to many
potential intruders, who would be unwilling to make their locations known.
Location- based authentication would normally be used in combination with another method of
authentication. its value added is a high level of assurance against intrusion from any unapproved
location regardless of whether the other methods have been compromised. In critical environments,
for example, military command and control, nuclear materials handling, telephone switching, air traffic
control, and large financial transactions, this extra assurance could be extremely valuable. Location-
based authentication also has applications besides access control, for example, implementation of an
electronic notary function or enforcement of transborder data flows (e.g., export controls).
Cryptography. Various cryptographic techniques provide confidentiality protection (encryption) and
authentication, which includes data integrity; user, host and message authentication; and digital
signatures. They are used to protect both communications transmitted over open networks and data
stored in computer files. Cryptographic systems can be implemented as stand-alone products or
they can be Integrated into applications and network services, where they may be transparent to the
user. They are potentially vulnerable to weaknesses in algorithms, protocols, key generation, and key
management.
The encryption conflict. Encryption is essential for protecting classified national security information,
unclassified but sensitive business and government information, and individual privacy. At the same
time, in the hands of foreign adversaries, it interferes with signals intelligence. Terrorists, drug
dealers, and computer intruders can use it to conceal their activities and stored records. Law
enforcement agencies are concerned that as encryption proliferates worldwide, it could seriously
imperil their ability to counter domestic and international organized crime and terrorism. It could cut
off valuable sources of foreign intelligence. Even within an organization, encryption can cause
problems. If keys are lost or damaged, valuable data may become inaccessible.
Access controls.
These technologies are used to control access to networks, computers,
applications, transactions, and information according to a security policy. Policies can be based on
individual users, groups, or roles and on time of day or location. Access controls rely on
authentication mechanisms to confirm the identity of users attempting access. They are typically
integrated into both applications and
4-5
IT0772