An Analysis of Terrorist Groups Potential Use of Electronic Steganography
نویسنده
چکیده
The events of September 11, 2001 have irrevocably altered the landscape of computer security. In the aftermath of these events, various urban legends and rumors have developed surrounding terrorists’ online activities. One such topic has been in the alleged use of electronic steganography, a method to covertly hide messages within another, by terror st groups. This paper provides an overview of steganography, its historical use during times of war, and how modern day electronic steganography can be accomplished. An overview is provided of current techniques to detect steganography on the Internet, which have so far failed to uncover any evidence of steganography on the Internet, and possible future avenues of research in detecting online steganography using techniques similar to the Federal Bureau of Investigation’s Carnivore system. The paper concludes with examples of the dangers of unsubstantiated steganography claims and privacy considerations in detecting online electronic steganography. Introduction The tragic events of September 11, 2001 have caused a major reevaluation of security procedures within the United States. Overnight, seemingly normal events have become suspect. Potential terrorists and terrorist activity lurk in every aspect of United States life and culture. Although much of this increased awareness for security and of potentially suspicious activity is most likely an adverse short-term reaction to the September 11 events, it is obvious that many changes that have been set in motion since that date will be permanent. Fundamental changes in the approach to security both online and in real life are underway and will forever change our perceptions of both real life security and computer security. Online criminal activity such as distributed denial of service attacks, web page defacements, cracker intrusions, are now perceived in a different light, especially by the mainstream American public. Long dismissed as being the online equivalent of teenage delinquency, they are now viewed as potential terrorist activity. An anti-terrorism bill, “USA Patriot Act”[24] recently enacted within the United States lists computer crimes such as web defacement and denial of service attacks as potential terrorist activity and subject to far more punitive damages than in the past. Government organizations, educational institutions and corporations are reviewing and removing or limiting access to information available on the Internet that can potentially be used for terrorist activity. The capability of the Internet as a means of mass instant communication has helped to spread news and, unfortunately, rumors far and wide quite quickly. Instant urban legends appear almost daily. Not wanting to miss out on potential news stories, some of these © S A N S In st itu te 2 00 1, A ut ho r r et ai ns fu ll ri gh ts Key fingerprint = AF19 FA27 2F94 998D FDB5 DE3D F8B5 06E4 A169 4E46 Key fingerprint = AF19 FA27 2F94 998D FDB5 DE3D F8B5 06E4 A169 4E46 © SANS Institute 2001, As part of the Information Security Reading Room. Author retains full rights. rumors have been picked up by the United States mainstream media, giving it more “credibility” in the eyes of a large majority of the American public. This has lead to a confusing mix of both information and disinformation. Have you heard the story of the man who “surfed” the debris down from the 86 floor of the World Trade Center? A false story reported on many mainstream media sources.[25] How about the school kid in New York City who looked out the window in his classroom a week before September 11 and told his teachers that they wouldn’t be there next week? Strangely enough, this “urban legend” was actually true. [26][1][1] For computer security professionals and law enforcement dedicated toward online activities, how does this affect our professions and how can we determine what is “true” and what is not? With limited resources available to combat potent al terrorist threats, it is essential now more than ever that these limited resources be applied efficiently and effectively. News stories began appearing in mainstream United States media in the days following September 11 reporting that Osama bin Laden and the al-Qaeda were using the Internet to covertly communicate between various terrorist cells to plan and relay information. Although news of the potential for the Internet to be used for terrorist activity has been percolating in the ocean of online criminal activity even before September 11th, [11][9] recent events have brought this potential to the forefront of attention. [8][3][22] One interesting aspect of the media reports was that the al-Qaeda were supposedly using a technique known as steganography to covertly communicate.[22] Assuming that terrorists are using the Internet to covertly communicate, several questions arise. Is it possible to determine if there is actually covert communications occurring? What type of techniques could they be using? Are the rumors that covert communications actually true?
منابع مشابه
Image Analysis for Online Dynamic Steganography Detection
In recent years there has been a noticeable growth in the quantity of available Steganography tools on the World Wide Web. Steganography may be used to hide messages within images and it is widely believed that terrorist organizations may be communicating through the use of steganography. With this in mind there is a need to detect hidden data using Steganalysis – the art of detecting messages ...
متن کاملA New Hybrid Method for Colored Image Steganography Based On DWT
Data transmission security has become an extremely important field of research. Steganography is an art of hiding information in image, audio and video files in a way that would meet the security requirements in the form of overt or covert. In this study, we propose a new hybrid steganography technique for color images that hide secret messages in the frequency domain of a cover image's blu...
متن کاملThe Idea Of Using The Steganography As Encryption Tool
the increasing use of computers and the widespread use of networks, Social networking and use applications through the use of the Internet to make the spread images, which make it easy to be penetrated from the attacker and from everyone who try to change the information. So, the need arises to transmit the information securely through a secure manner . Steganography is the best solution to sol...
متن کاملCode Wars : Steganography , Signals Intelligence , and
This paper describes and discusses the process of secret communication known as steganography. The argument advanced here is that terrorists are unlikely to be employing digital steganography to facilitate secret intra-group communication as has been claimed. This is because terrorist use of digital steganography is both technically and operationally implausible. The position adopted in this pa...
متن کاملارزیابی دفاع مشروع پیشگیرانه علیه تروریسم
Abstract Scholars rightly believe that prohibiting the threat to or use of force is the most important achievement of the UN charter. Eventhough Article 51 offers an exception in this regard, the letters and substance of this article are clear about an ‘armed attack’ as a precondition to trigger the right to self-defense. Beside this legal fact, a Preemptive use of force against an imminent ...
متن کامل