Terrorists unlikely to hide secret codes in web images
Terrorists are probably not hiding messages in web images according to research from the University of Michigan. The FBI has suggested recent terrorist atrocities could even have been coordinated using steganography the science of obfuscating communications in images uploaded to ordinary Internet sites.
There are several methods available for hiding messages in Internet images:
Messages can be hidden within redundant parts of the digital information used to generate images in formats such as JPEG.
Because the message itself disappears, this offers advantages over encryption, which only hides the meaning of a message.
More advanced methods involve using active, as well as redundant parts, of the underlying code.
As an extra layer of security, a message might also be encrypted before hiding it.
Writing in their paper, "Detecting Steganographic Content on the Internet," Provos and Honeyman employed a bank of distributed computers to check millions of images. They also ran computer programmes to analyse image alterations and verify if changes could be explained by normal copying errors. Yet, weeks of analysis revealed no hidden messages.
The technique may not be infallible. Sushil Jajodia of the Centre for Secure Information Systems at George Mason University in Virginia stresses that there are far simpler methods for hiding communications. Using a code word in a telephone conversation or a radio broadcast would be far easier way to communicate in secret.
Another expert, Magnus Ranstorp, agrees that groups do use encryption, but often the most important information is relayed by human couriers using non-technology means.
Source: Will Knight Massive search reveals no secret code in web images, New Scientist, September 25, 2001.
For text http://www.newscientist.com/news/news.jsp?id=ns99991340
For more on Terrorism http://www.ncpa.org/pi/congress/cong9.html
FMF\3 October 2001
Publish date: 09 October 2001
Views: 307
The views expressed in the article are the author’s and are not necessarily shared by the members of the Foundation. This article may be republished without prior consent but with acknowledgement to the author.