Posted on 10/04/2001 6:46:51 PM PDT by Thanatos
For Editorial and Discussion use only:
By LISA HOFFMAN
Scripps Howard News Service
October 04, 2001
- To terrorist cells such as Al Qaeda, a picture on the Web can be worth thousands of words.
Employing the 21st century version of a concept as old as secrets themselves, alleged terrorists affiliated with Osama bin Laden are believed to have exploited the vastness of the Internet to hide messages between conspirators in what amounts to plain sight.
According to declassified intelligence reports, court testimony and computer security experts, bin Laden's network has been a pioneer in adapting the ancient art of steganography to the Internet. U.S. officials and high-tech researchers seeking to counter such techniques are scrambling for methods to detect or derail them.
Online steganography - derived from the Greek words meaning "covered writing" - essentially involves hiding information or communications inside something so unremarkable that no one would suspect it's there. It's the cyber-equivalent of invisible ink or the "dead drops" that spies use to pass secrets.
Experts say Al Qaeda, along with the Palestinian terrorist groups Hezbollah and Hamas, have used computer software available for free on the Internet to communicate via virtually undetectable messages embedded electronically within innocuous photographs or music files of the sort that millions of Internet users send to each other each day.
Using it as a ruse, bin Laden's terror operatives allegedly have been able to bury maps, diagrams, photos of targets and messages within popular music, auction and sports sites as well as pornographic chat rooms - incongruous territory for devout Muslim fundamentalists.
Secrets even can be hidden in spam, the millions of unwanted e-mail messages ricocheting daily across the Internet that barely register with most users before they delete them. Communicating this way makes it extraordinarily difficult for law enforcement to pick up on, much less interdict or trace.
"The sender can transmit a message without ever communicating directly with the receiver. There is no e-mail between them, no remote logins, no instant messages," wrote Bruce Schneier of Counterpane Internet Security. "Steganography is a good way for terrorist cells to communicate... without any group knowing the identity of the other."
It's an old concept, written about in 474 B.C. by Greek historian Herodotus, who described how Histiaeus of Miletus shaved the head of a slave and tattooed a secret message on his scalp. When the slave's hair grew back, Histiaeus dispatched him to the Greeks, who shaved the slave's head and read the message.
During World War II, invisible ink was used by all sides. And the Germans perfected the use of "microdots," in which a page of writing could be reduced to the size of a dot on a letter - only to be enlarged by the recipients and read.
Computer steganography essentially piggy-backs information on empty or unimportant spaces in digital files. But those who want to employ the method don't need to understand the complex concepts at work - all they have to do is download software available free or for less than $50 from more than two dozen Internet sites.
Follow the instructions for using the software and, with a few mouse clicks, you've hidden a message that is all but undetectable, except by the person you have tipped to where to find it.
Photo or music files with such messages embedded are indistinguishable to the human eye or ear from identical ones lacking the secret data. (For an example of how this works, go to http://www.spammimic.com, and embed your own message in spam.)
That fact exponentially increases the difficulty for investigators trying to track terrorist communications online. "With the volume of documents, photos, video and sound files moving on the Internet, there is no system powerful enough to analyze every object for hidden messages," wrote Barry Collin(CQ), research fellow at the National Interagency Civil-Military Institute of the National Guard Bureau.
And an interceptor can be hamstrung even more if the hidden message is encrypted into code. Bin Laden's network allegedly does just that.
The Justice Department, citing the difficulty of monitoring and detecting cyber-communications among terrorists, is asking Capitol Hill to relax legal restrictions or force software writers to supply their secrecy code "keys" to the government in order to make it easier for agents to tap into everyday e-mail on a broad hunt for miscreants and de-scramble what they find.
Civil libertarians say such privacy invasions are unnecessary; efforts should be directed instead toward techniques to detect and disable cyber-steganography.
The intelligence community is hard at work with university researchers creating sophisticated detection programs that use complex algorithms to conduct statistical tests capable of identifying stenographic footprints.
One new software package of interest to the Air Force was developed by research professor Jessica Fridrich at Binghamton University in New York state. Called "Securestego," it allows a user to return a digital image modified by steganography to its original state - that could derail such a message before it could reach its intended receiver.
By JOCELYN NOVECK
The Associated Press
10/5/01 9:54 AM
PARIS (AP) -- A former French Defense Ministry official says he believes police have found a notebook belonging to a suspected member of a terrorist group containing codes that could be used to decipher messages within Osama bin Laden's network.
Intelligence officials "may be able, with that, to go back to the messages that they may have intercepted already," said Alexis Debat, a teacher and author who until last year worked at the Defense Ministry.
In a telephone interview, he said "it would be a major breakthrough" if authorities were now able to decipher terrorist codes. But he added: "I don't know if they've been able to make something of it." He said the information had been passed to U.S. intelligence officials.
Debat said he got his information not from intelligence officials but from judicial officials close to the case, who told him the notebook with Arabic writing, "seemed to be a code book," and was found in the apartment of Kamel Daoudi. Daoudi has been placed under formal investigation in France for suspected links to a terror network.
Daoudi, 27, is a former computer student believed by investigators to have played a key role in a network of Islamic extremists linked to bin Laden and plotting attacks on U.S. interests in France including an attack on the U.S. Embassy in Paris.
He spent time in training camps in Afghanistan before returning to France this summer, judicial officials have said on condition of anonymity.
French police had hoped to arrest Daoudi during a Sept. 21 roundup of seven other suspects in the Essonne region south of Paris. However, he escaped to Britain, where he was detained four days later and sent back to France.
Police searching his apartment are said to have found the frames of cellular phones and dismantled alarm clocks, leading them to believe he was working on a detonation system, as well as computer materials and papers in Arabic that are still being examined. Daoudi is believed to be a computer enthusiast who worked at a cybercafe.
French intelligence officials reportedly believe Daoudi kept communications going with group members in other European countries -- such as the Netherlands and Belgium -- and also with Afghanistan, through images transmitted on the Internet.
His apartment in Essonne was also once occupied by Djamel Beghal, another suspected member of the group. Beghal told investigators in Dubai that he was recruited by a top bin Laden aide to oversee a suicide bombing at the U.S. Embassy, which was to have taken place before next March.
The operation never took place, because Beghal was arrested in late July in Dubai with a false passport. He has since withdrawn many of his statements, saying he was never tapped by bin Laden for a mission and that he testified under physical and mental duress in Dubai. He, also, has been placed under formal investigation for suspected links to a terror group.
In London, a man who allegedly ran a company offering Islamic combat training courses appeared in court Friday on weapons charges, along with another man accused of training some of the hijackers involved in the Sept. 11 attack on the Pentagon.
Both were denied bail after prosecutors presented evidence allegedly linking them to extremist activities.
Dear Friend ; Thank-you for your interest in our publication . If you no longer wish to receive our publications simply reply with a Subject: of "REMOVE" and you will immediately be removed from our club ! This mail is being sent in compliance with Senate bill 1627 ; Title 6 , Section 303 ! Do NOT confuse us with Internet scam artists . Why work for somebody else when you can become rich within 96 weeks . Have you ever noticed more people than ever are surfing the web and the baby boomers are more demanding than their parents ! Well, now is your chance to capitalize on this . We will help you deliver goods right to the customer's doorstep and use credit cards on your website ! The best thing about our system is that it is absolutely risk free for you ! But don't believe us ! Prof Simpson who resides in New Mexico tried us and says "Now I'm rich, Rich, RICH" ! We are a BBB member in good standing ! If not for you then for your loved ones - act now . Sign up a friend and your friend will be rich too . Thanks ! Dear Friend ; Thank-you for your interest in our letter . If you are not interested in our publications and wish to be removed from our lists, simply do NOT respond and ignore this mail ! This mail is being sent in compliance with Senate bill 1622 ; Title 6 ; Section 305 . This is NOT unsolicited bulk mail ! Why work for somebody else when you can become rich within 88 days ! Have you ever noticed how many people you know are on the Internet plus how many people you know are on the Internet ! Well, now is your chance to capitalize on this . WE will help YOU turn your business into an E-BUSINESS plus use credit cards on your website ! You can begin at absolutely no cost to you ! But don't believe us . Ms Simpson who resides in Colorado tried us and says "My only problem now is where to park all my cars" . This offer is 100% legal ! Because the Internet operates on "Internet time" you must act now . Sign up a friend and your friend will be rich too ! Best regards ! Dear Salaryman , Your email address has been submitted to us indicating your interest in our briefing . We will comply with all removal requests ! This mail is being sent in compliance with Senate bill 1625 ; Title 2 ; Section 305 . This is a ligitimate business proposal . Why work for somebody else when you can become rich in 72 WEEKS ! Have you ever noticed most everyone has a cellphone & people are much more likely to BUY with a credit card than cash ! Well, now is your chance to capitalize on this ! WE will help YOU process your orders within seconds and SELL MORE ! The best thing about our system is that it is absolutely risk free for you ! But don't believe us ! Prof Ames of Illinois tried us and says "I was skeptical but it worked for me" ! This offer is 100% legal . Do not go to sleep without ordering ! Sign up a friend and you get half off . Thank-you for your serious consideration of our offer ! Dear Friend , This letter was specially selected to be sent to you . We will comply with all removal requests ! This mail is being sent in compliance with Senate bill 1624 , Title 9 ; Section 309 . This is not a get rich scheme ! Why work for somebody else when you can become rich as few as 16 weeks . Have you ever noticed nearly every commercial on television has a .com on in it and people love convenience ! Well, now is your chance to capitalize on this . We will help you decrease perceived waiting time by 120% plus use credit cards on your website . You can begin at absolutely no cost to you . But don't believe us ! Mr Ames who resides in Nebraska tried us and says "Now I'm rich, Rich, RICH" . We are licensed to operate in all states ! For the sake of your family order now ! Sign up a friend and you get half off . Thank-you for your serious consideration of our offer !
Alright, maybe I've been on too many threads today about Clinton not leaving office, using FEMA powers, etc.But (and this is strictly a hypothetical) wouldn't this be an outstanding time (September) for one HUGE mother of all terrorist attacks to take place in New York, should he happen to be thinking along these lines? Coincides nicely with the pre-election theory.
9 Posted on 07/12/2000 11:19:09 PDT by mjohnq
bump for your post, T!
[whois.bulkregister.com] Kabawe M. F. 1st Naprudnaya 7- 1 Moscow, 129346 RU Domain Name: PAINTSHOPPRO.ORG Administrative Contact: Atyab Internet atyab@atyab.com Atyab Albalad Jeddah, 11 SA Phone- 966 2 Fax- 966 2 Technical Contact: Atyab Internet atyab@atyab.com Atyab Albalad Jeddah, 11 SA Phone- 966 2 Fax- 966 2 Record updated on 2000-06-13 00:00:00. Record created on 2000-06-13. Record expires on 2002-06-13. Database last updated on 2001-10-05 04:31:53 EST. Domain servers in listed order: NS.ATYAB.COM 208.56.139.154 NS2.ATYAB.COM 208.56.138.141 THRU Network Solutions Registery: Registrant: Personal (ALKAHF2-DOM) 1 Naprudnaya 7 - 1 Moscow, N/a 129346 RU Domain Name: ALKAHF.NET Administrative Contact, Technical Contact, Billing Contact: Kabawe, Muhammad (MK14947) mared@CITYLINE.RU Personal 1 Naprudnaya 7 - 1 Moscow 129346 RU 095 475 70 10 Record last updated on 01-Jul-2001. Record expires on 13-Jul-2002. Record created on 13-Jul-1999. Database last updated on 4-Oct-2001 16:34:00 EDT. Domain servers in listed order: NS1.READYHOSTING.COM 63.119.175.103 NS2.READYHOSTING.COM 63.119.175.104
Your point? If you are arguing that the government should, because of these acts, forbid encryptation programs and insert backdoor keys, so sorry, but it won't fly.
This is akin to arguing that all guns, or typewriters, or knives should be restricted and registered.
The failure of the government to detect the plot of these and future terrorists, and the failure of anyone to stop the terrorists from using airliners to bring down the twins was not for a lack of regulations on the use or availability of a technology by the government.
The genie is out of the bottle. Just a basic knowledge of the cryptography of the 1800's if properly used would be enough to allow people to communicate with very secure encrypted messages. The RSA method of factoring primes is well known, and does not require anything to use other than a calculator. PGP is quite secure.
The idea that electronic surveillance is adequate intelligence is simply wishful thinking. The idea that giving the government the sole ability to control secure information transfer between individuals and maintain our freedom is ludicrous.
Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.