[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ Skip to main content

Advertisement

Log in

Code wars: Steganography, signals intelligence, and terrorism

  • Articles
  • Published:
Knowledge, Technology & Policy

Abstract

This paper discusses the process of secret communication known as steganography. The argument advanced here is that terrorists are unlikely to be employing digital steganography to facilitate secret intra-group communication as has been claimed. This is because terrorist use of digital steganography is both technically and operationally implausible. The position adopted in this paper is that terrorists are likely to employ low-tech steganography such as semagrams and null ciphers instead.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
£29.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price includes VAT (United Kingdom)

Instant access to the full article PDF.

Similar content being viewed by others

References

  • Anderson, Ross (1996), “Stretching the Limits of Steganography,” in Lecture Notes in Computer Science No. 1174, 39–48.

  • Anderson, Ross (2001), “Reply to the Times Article: Secrets Concealed by Software” at 〈http://lists.jammed.com/crime/2001/10/0027.html〉.

  • Anderson, Ross and Petitcolas, Fabien A.P. (1998), “On the Limits of Steganography,” in IEEE Journal of Selected Areas in Communication 16 (4), 474–481 at 〈http://www.cl.cam.ac.uk/~fapp2/publications/jsac98-limsteg.pdf〉.

    Article  Google Scholar 

  • Andrew, Christopher (2001), “Counsel of War,” in The Times: T2 (London), October 4, 2–3.

  • Associated Press (2001), “Bin Laden’s Cybertrail Proves Elusive,” in USA Today, September 20 at 〈http://www.usatoday.com/tech/news/2001/09/20/attacks-cybertrail.htm〉.

  • Ballard, James David, Hornik, Joseph G., and McKenzie, Douglas (2002), “Technological Facilitation of Terrorism: Definitional, Legal, and Policy Issues,” in American Behavioral Scientist 45 (6), 989–1016.

    Article  Google Scholar 

  • Byte, Mr. (1997/8), Privacy Guide at 〈http://www.all-nettools.com/privacy/〉.

  • Caterinicchia, Dan (2003), “Kellogg Describes Cyber Battlefield,” in Federal Computer Week, March 5 at 〈http://www.fcw.com/fcw/articles/2003/0303/web-kellogg-03-05-03.asp〉.

  • Cha, Ariana Eunjung (2001), “To Attacks’ Toll Add a Programmer’s Grief,” in Washington Post, September 21, p. E01.

  • Cochran, Jordon T. (2000), Steganographic Computer Warfare, Wright-Patterson Air Force Base, Ohio: Air Force Institute of Technology at 〈http://www.iwar.org.uk/iwar/resources/usaf/maxwell/students/2000/afit-gcs-eng-00m-03.pdf〉.

    Google Scholar 

  • Cohen, Adam (2001), “When Terror Hides Online,” in Time, November 12.

  • Davern, Paul and Scott, Michael (1996), “Fractal Based Image Steganography,” in Lecture Notes in Computer Science, No. 1174, 278–294.

  • Dembart, Lee (2001), “Hide Your Secrets: Old Art of Concealed Messages Rediscovered on the Internet,” in International Herald Tribune, May 7.

  • Denning, Dorothy and Baugh, William E. (2001), “Hiding Crimes in Cyberspace,” in Ludlow, Peter (ed.), Crypto Anarchy, Cyberstates, and Pirate Utopias, Cambridge MA: MIT Press.

    Google Scholar 

  • Ettinger, J. Mark (1998), “Steganalysis and Game Equilibria,” in Lecture Notes in Computer Science, No. 1525, 319–328.

  • Fallis, David S. and Cha, Ariana Eunjung (2001), “Agents Following Suspects’ Lengthy Electronic Trail,” in Washington Post, October 4, p. A24.

  • Fielding, Nick (2002), “Leaders of Sept 11 Boast of US Attack,” in The Sunday Times, September 8, p. 1.

  • Fouda, Yosri (2002), “The Masterminds,” in The Sunday Times, September 8, 15–17.

  • Friedman, Thomas L. (2002), “Webbed, Wired and Worried,” in The New York Times, May 26 at 〈http://www.nytimes.com/2002/05/26/opinion/26FRIE.html〉.

  • Greene, Thomas C. (2003), “Al-Qaeda Said to be Using Stegged Porn,” in The Register (UK), May 12 at 〈http://www.theregister.co.uk/content/55/30654.html〉.

  • Henderson, Mark (2001), “Secrets Concealed by Software,” in The Times (London), October 6, p. 11.

  • Johnson, Neil (1995), Steganography. Virginia: George Mason University at 〈http://www.jjtc.com/stegdoc/steg1995.html〉.

    Google Scholar 

  • Johnson, Neil F. (2000), “Steganalysis,” in Katzenbeisser, Stefan and Petitcolas, Fabien A. (eds.), Information Hiding: Techniques for Steganography and Digital Watermarking, Boston and London: Artech House, 79–93.

    Google Scholar 

  • Johnson, Neil F. and Jajodia, Sushil (1998), “Steganalysis of Images Using Current Steganography Software,” in Lecture Notes in Computer Science, No. 1525, 273–289.

  • Johnston, David (2003), “Bin Laden Tape may Hint at Attack, CIA Says,” in The New York Times, February 13.

  • Jolish, Barak (2002), “The Encrypted Jihad,” in Salon.com, February 4 at 〈http://www.salon.com/tech/feature/2002/02/04/terror_encryption/〉.

  • Karp, Jack (2002), “A Novice Tries Steganography,” in Tech TV, February 12 at 〈http://www.techtv.com/cybercrime/privacy/story/0,23008,3359041,00.html〉.

  • Katzenbeisser, Stefan C. (2000), “Principles of Steganography,” in Katzenbeisser, Stefan and Petitcolas, Fabien A. (eds.), Information Hiding: Techniques for Steganography and Digital Watermarking, Boston and London: Artech House, 17–41.

    Google Scholar 

  • Kelley, Jack (2001a), “Terrorist Instructions Hidden Online,” in USA Today, February 5 at 〈http://www.usatoday.com/tech/news/2001-02-05-binladen-side.htm〉.

  • Kelley, Jack (2001b), “Terror Groups Hide Behind Web Encryption,” in USA Today, February 6 at 〈http://www.usatoday.com/tech/news/2001-02-05-binladen.htm〉.

  • Kelley, Jack (2001c), “Militants Wire Web with Links to Jihad,” in USA Today, July 10 at 〈http://www.usatoday.com/news/world/2002/07/10/web-terror-cover.htm〉.

  • Lathem, Niles (2003), “9/11 Plot Hidden in E-Porn,” in New York Post, May 9 at 〈http://www.nypost.com/news/worldnews/57502.htm〉.

  • Leyden, John (2001), “Militants Plan Terror in Chat Rooms Shocker,” in The Register (UK), February 6 at 〈http://www.theregister.co.uk/content/archive/16684.html〉.

  • Lyman, Jay (2001), “How Terrorists Use the Internet,” in News Factor Network, September 12 at 〈http://www.newsfactor.com/perl/story/7731.html〉.

  • Manjoo, Farhad (2001), “Hidden Messages: Any There?” in Wired, November 8 at 〈http://www.wired.com/news/technology/0,1282,48235,00.html〉.

  • Marvel, Lisa M., Boncelet, Charles G., and Retter, Charles T. (1998), “Reliable Blind Information Hiding for Images,” in Lecture Notes in Computer Science, No. 1525, 48–61.

  • McCullagh, Declan (2001a), “Bin Laden: Steganography Master?” in Wired, February 7 at 〈http://www.wired.com/news/politics/0,1283,41658,00.html〉.

  • McCullagh, Declan (2001b), “Secret Messages come in Wavs,” in Wired, February 20 at 〈http://www.wired.com/news/politics/0,1283,41861,00.html〉.

  • McGrory, Daniel (2001), “Al-Qaeda Hid Coded Messages on Porn Websites,” in The Times (London), October 6, p. 11.

  • Pfitzmann, Birgit (1996), “Information Hiding Terminology,” in Lecture Notes in Computer Science, No. 1174, 17–28.

  • Provos, Neils and Honeyman, Peter (2001), in CITI Technical Report 01-11: Detecting Steganographic Content on the Internet, University of Michigan: Center for Information Technology Integration at 〈http://www.citi.umich.edu/techreports/reports/citi-tr-01-11.pdf〉.

  • Reuters (2001), “Researchers: No Secret bin Laden Messages on Sites,” in USA Today, October 17 at 〈http://www.usatoday.com/tech/news/2001/10/17/bin-laden-site.htm〉.

  • Rosenheim, Shawn (1997), The Cryptographic Imagination: Secret Writing From Edgar Poe to the Internet, Baltimore and London: Johns Hopkins University Press.

    Google Scholar 

  • Ross, Brian (2001), “A Secret Language: Hijackers May Have Used Secret Internet Messaging Technique,” in ABC News, October 4 at 〈http://abcnews.go.com/sections/primetime/DailyNews/PRIMETIME_011004_steganography.html〉.

  • Schmid, Alex P. and De Graaf, Janny (1982), Violence as Communication: Insurgent Terrorism and the Western News Media, London: Sage.

    Google Scholar 

  • Schwartz, John (2001), “Securing the Lines of a Wired Nation,” in The New York Times, October 4.

  • Sellars, Duncan (1999), An Introduction to Steganography, South Africa: University of Cape Town at 〈http://www.cs.uct.ac.za/courses/CS400W/NIS/papers99/dsellars/stego.html〉.

  • Shin, Natori (2000), “One-Time Hash Steganography,” in Lecture Notes in Computer Science, No. 1768, 17–28.

  • Soloway, Colin, Nordland, Rod, and Nadeau, Barbie (2002), “Hiding (and Seeking) Messages on the Web,” in Newsweek, June 17 at 〈http://cert.uni-stuttgart.de/archive/isn/2002/06/msg00040.html〉.

  • Stallings, William (1998), Cryptography and Network Security: Principles and Practice, New Jersey: Prentice Hall.

    Google Scholar 

  • Wayner, Peter (1996), Disappearing Cryptography: Setting Up Networks with Hidden Communications, Boston: AP Professional.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Additional information

Her research interests are in the area of terrorism and the Internet. She has published in Current History, the Journal of Information Warfare, and elsewhere. Her research has been facilitated by a grant from the Irish Research Council for the Humanities and Social Sciences.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Conway, M. Code wars: Steganography, signals intelligence, and terrorism. Know Techn Pol 16, 45–62 (2003). https://doi.org/10.1007/s12130-003-1026-4

Download citation

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12130-003-1026-4

Keywords

Navigation