Advertisement

Knowledge, Technology & Policy

, Volume 16, Issue 2, pp 45–62 | Cite as

Code wars: Steganography, signals intelligence, and terrorism

  • Maura Conway
Articles

Abstract

This paper discusses the process of secret communication known as steganography. The argument advanced here is that terrorists are unlikely to be employing digital steganography to facilitate secret intra-group communication as has been claimed. This is because terrorist use of digital steganography is both technically and operationally implausible. The position adopted in this paper is that terrorists are likely to employ low-tech steganography such as semagrams and null ciphers instead.

Keywords

Discrete Cosine Transformation Cover Image Secret Message Hide Information Digital Steganography 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Anderson, Ross (1996), “Stretching the Limits of Steganography,” in Lecture Notes in Computer Science No. 1174, 39–48.Google Scholar
  2. Anderson, Ross (2001), “Reply to the Times Article: Secrets Concealed by Software” at 〈http://lists.jammed.com/crime/2001/10/0027.html〉.Google Scholar
  3. Anderson, Ross and Petitcolas, Fabien A.P. (1998), “On the Limits of Steganography,” in IEEE Journal of Selected Areas in Communication 16 (4), 474–481 at 〈http://www.cl.cam.ac.uk/~fapp2/publications/jsac98-limsteg.pdf〉.CrossRefGoogle Scholar
  4. Andrew, Christopher (2001), “Counsel of War,” in The Times: T2 (London), October 4, 2–3.Google Scholar
  5. Associated Press (2001), “Bin Laden’s Cybertrail Proves Elusive,” in USA Today, September 20 at 〈http://www.usatoday.com/tech/news/2001/09/20/attacks-cybertrail.htm〉.Google Scholar
  6. Ballard, James David, Hornik, Joseph G., and McKenzie, Douglas (2002), “Technological Facilitation of Terrorism: Definitional, Legal, and Policy Issues,” in American Behavioral Scientist 45 (6), 989–1016.CrossRefGoogle Scholar
  7. Byte, Mr. (1997/8), Privacy Guide at 〈http://www.all-nettools.com/privacy/〉.Google Scholar
  8. Caterinicchia, Dan (2003), “Kellogg Describes Cyber Battlefield,” in Federal Computer Week, March 5 at 〈http://www.fcw.com/fcw/articles/2003/0303/web-kellogg-03-05-03.asp〉.Google Scholar
  9. Cha, Ariana Eunjung (2001), “To Attacks’ Toll Add a Programmer’s Grief,” in Washington Post, September 21, p. E01.Google Scholar
  10. Cochran, Jordon T. (2000), Steganographic Computer Warfare, Wright-Patterson Air Force Base, Ohio: Air Force Institute of Technology at 〈http://www.iwar.org.uk/iwar/resources/usaf/maxwell/students/2000/afit-gcs-eng-00m-03.pdf〉.Google Scholar
  11. Cohen, Adam (2001), “When Terror Hides Online,” in Time, November 12.Google Scholar
  12. Davern, Paul and Scott, Michael (1996), “Fractal Based Image Steganography,” in Lecture Notes in Computer Science, No. 1174, 278–294.Google Scholar
  13. Dembart, Lee (2001), “Hide Your Secrets: Old Art of Concealed Messages Rediscovered on the Internet,” in International Herald Tribune, May 7.Google Scholar
  14. Denning, Dorothy and Baugh, William E. (2001), “Hiding Crimes in Cyberspace,” in Ludlow, Peter (ed.), Crypto Anarchy, Cyberstates, and Pirate Utopias, Cambridge MA: MIT Press.Google Scholar
  15. Ettinger, J. Mark (1998), “Steganalysis and Game Equilibria,” in Lecture Notes in Computer Science, No. 1525, 319–328.Google Scholar
  16. Fallis, David S. and Cha, Ariana Eunjung (2001), “Agents Following Suspects’ Lengthy Electronic Trail,” in Washington Post, October 4, p. A24.Google Scholar
  17. Fielding, Nick (2002), “Leaders of Sept 11 Boast of US Attack,” in The Sunday Times, September 8, p. 1.Google Scholar
  18. Fouda, Yosri (2002), “The Masterminds,” in The Sunday Times, September 8, 15–17.Google Scholar
  19. Friedman, Thomas L. (2002), “Webbed, Wired and Worried,” in The New York Times, May 26 at 〈http://www.nytimes.com/2002/05/26/opinion/26FRIE.html〉.Google Scholar
  20. Greene, Thomas C. (2003), “Al-Qaeda Said to be Using Stegged Porn,” in The Register (UK), May 12 at 〈http://www.theregister.co.uk/content/55/30654.html〉.Google Scholar
  21. Henderson, Mark (2001), “Secrets Concealed by Software,” in The Times (London), October 6, p. 11.Google Scholar
  22. Johnson, Neil (1995), Steganography. Virginia: George Mason University at 〈http://www.jjtc.com/stegdoc/steg1995.html〉.Google Scholar
  23. Johnson, Neil F. (2000), “Steganalysis,” in Katzenbeisser, Stefan and Petitcolas, Fabien A. (eds.), Information Hiding: Techniques for Steganography and Digital Watermarking, Boston and London: Artech House, 79–93.Google Scholar
  24. Johnson, Neil F. and Jajodia, Sushil (1998), “Steganalysis of Images Using Current Steganography Software,” in Lecture Notes in Computer Science, No. 1525, 273–289.Google Scholar
  25. Johnston, David (2003), “Bin Laden Tape may Hint at Attack, CIA Says,” in The New York Times, February 13.Google Scholar
  26. Jolish, Barak (2002), “The Encrypted Jihad,” in Salon.com, February 4 at 〈http://www.salon.com/tech/feature/2002/02/04/terror_encryption/〉.Google Scholar
  27. Karp, Jack (2002), “A Novice Tries Steganography,” in Tech TV, February 12 at 〈http://www.techtv.com/cybercrime/privacy/story/0,23008,3359041,00.html〉.Google Scholar
  28. Katzenbeisser, Stefan C. (2000), “Principles of Steganography,” in Katzenbeisser, Stefan and Petitcolas, Fabien A. (eds.), Information Hiding: Techniques for Steganography and Digital Watermarking, Boston and London: Artech House, 17–41.Google Scholar
  29. Kelley, Jack (2001a), “Terrorist Instructions Hidden Online,” in USA Today, February 5 at 〈http://www.usatoday.com/tech/news/2001-02-05-binladen-side.htm〉.Google Scholar
  30. Kelley, Jack (2001b), “Terror Groups Hide Behind Web Encryption,” in USA Today, February 6 at 〈http://www.usatoday.com/tech/news/2001-02-05-binladen.htm〉.Google Scholar
  31. Kelley, Jack (2001c), “Militants Wire Web with Links to Jihad,” in USA Today, July 10 at 〈http://www.usatoday.com/news/world/2002/07/10/web-terror-cover.htm〉.Google Scholar
  32. Lathem, Niles (2003), “9/11 Plot Hidden in E-Porn,” in New York Post, May 9 at 〈http://www.nypost.com/news/worldnews/57502.htm〉.Google Scholar
  33. Leyden, John (2001), “Militants Plan Terror in Chat Rooms Shocker,” in The Register (UK), February 6 at 〈http://www.theregister.co.uk/content/archive/16684.html〉.Google Scholar
  34. Lyman, Jay (2001), “How Terrorists Use the Internet,” in News Factor Network, September 12 at 〈http://www.newsfactor.com/perl/story/7731.html〉.Google Scholar
  35. Manjoo, Farhad (2001), “Hidden Messages: Any There?” in Wired, November 8 at 〈http://www.wired.com/news/technology/0,1282,48235,00.html〉.Google Scholar
  36. Marvel, Lisa M., Boncelet, Charles G., and Retter, Charles T. (1998), “Reliable Blind Information Hiding for Images,” in Lecture Notes in Computer Science, No. 1525, 48–61.Google Scholar
  37. McCullagh, Declan (2001a), “Bin Laden: Steganography Master?” in Wired, February 7 at 〈http://www.wired.com/news/politics/0,1283,41658,00.html〉.Google Scholar
  38. McCullagh, Declan (2001b), “Secret Messages come in Wavs,” in Wired, February 20 at 〈http://www.wired.com/news/politics/0,1283,41861,00.html〉.Google Scholar
  39. McGrory, Daniel (2001), “Al-Qaeda Hid Coded Messages on Porn Websites,” in The Times (London), October 6, p. 11.Google Scholar
  40. Pfitzmann, Birgit (1996), “Information Hiding Terminology,” in Lecture Notes in Computer Science, No. 1174, 17–28.Google Scholar
  41. Provos, Neils and Honeyman, Peter (2001), in CITI Technical Report 01-11: Detecting Steganographic Content on the Internet, University of Michigan: Center for Information Technology Integration at 〈http://www.citi.umich.edu/techreports/reports/citi-tr-01-11.pdf〉.Google Scholar
  42. Reuters (2001), “Researchers: No Secret bin Laden Messages on Sites,” in USA Today, October 17 at 〈http://www.usatoday.com/tech/news/2001/10/17/bin-laden-site.htm〉.Google Scholar
  43. Rosenheim, Shawn (1997), The Cryptographic Imagination: Secret Writing From Edgar Poe to the Internet, Baltimore and London: Johns Hopkins University Press.Google Scholar
  44. Ross, Brian (2001), “A Secret Language: Hijackers May Have Used Secret Internet Messaging Technique,” in ABC News, October 4 at 〈http://abcnews.go.com/sections/primetime/DailyNews/PRIMETIME_011004_steganography.html〉.Google Scholar
  45. Schmid, Alex P. and De Graaf, Janny (1982), Violence as Communication: Insurgent Terrorism and the Western News Media, London: Sage.Google Scholar
  46. Schwartz, John (2001), “Securing the Lines of a Wired Nation,” in The New York Times, October 4.Google Scholar
  47. Sellars, Duncan (1999), An Introduction to Steganography, South Africa: University of Cape Town at 〈http://www.cs.uct.ac.za/courses/CS400W/NIS/papers99/dsellars/stego.html〉.Google Scholar
  48. Shin, Natori (2000), “One-Time Hash Steganography,” in Lecture Notes in Computer Science, No. 1768, 17–28.Google Scholar
  49. Soloway, Colin, Nordland, Rod, and Nadeau, Barbie (2002), “Hiding (and Seeking) Messages on the Web,” in Newsweek, June 17 at 〈http://cert.uni-stuttgart.de/archive/isn/2002/06/msg00040.html〉.Google Scholar
  50. Stallings, William (1998), Cryptography and Network Security: Principles and Practice, New Jersey: Prentice Hall.Google Scholar
  51. Wayner, Peter (1996), Disappearing Cryptography: Setting Up Networks with Hidden Communications, Boston: AP Professional.Google Scholar

Copyright information

© Transaction Publishers 2003

Authors and Affiliations

  • Maura Conway
    • 1
    • 2
  1. 1.the Department of Political ScienceTrinity College DublinIreland
  2. 2.the University of St. AndrewsScotland

Personalised recommendations