Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

The boy who hacked Al-Qaeda
Hindustan Times ^ | New Delhi, May 18 | Sudhi Ranjan Sen

Posted on 05/17/2003 8:20:35 PM PDT by DeaconBenjamin

The Americans had tried almost everything, but they just couldn't crack an encrypted message they came across while investigating the 9/11 attacks. Finally, they approached a 17-year-old boy in Delhi about whom The New York Times had done a feature.

Over the next 10 days, Ankit Fardia hunkered down in his room in Delhi and came up with the key to crack the message.

The worst fears of American investigators came true — Al-Qaeda was using a sophisticated technology, called steganography, to communicate. It involved sending encrypted messages concealed in a photograph or series of photographs.

“I was lucky in some ways but I am still proud that I was the only one in the world to be able to crack the code,” Fardia told the Hindustan Times from Pune, where he is lecturing students and corporate employees on cyber security. Fardia is the author of Guide to Ethical Hacking.

Fardia was understandably cagey about revealing the contents of the message or the name of the US agency that approached him. “In January 2002, I received an e-mail asking me whether I would like to help the US in breaking open a message which was of great importance to national security. I did not believe it was actually from a US agency so I asked them to send me their digital signature. They immediately sent it back,” he said.

“I would not like to discuss the message. But yes, what I cracked was a message from Al-Qaeda,” he added. The US government sent him letters of appreciation.

US embassy officials said they knew nothing about this. But they said it was possible for a US agency to make such an approach without keeping them in the picture.

Fardia said the Al-Qaeda message he cracked had been encrypted thrice over to make sure it could not be read, even if it was intercepted.

The US is considered one of the leaders in encryption technology, but the technology used by Al-Qaeda was as good if not better, Fardia added.


TOPICS: Front Page News
KEYWORDS: alqaeda; ankitfardia; code; encryptiontechnology; ethicalhacking; hacking; internet; steganography
Navigation: use the links below to view more comments.
first 1-2021-4041-43 next last

1 posted on 05/17/2003 8:20:36 PM PDT by DeaconBenjamin
[ Post Reply | Private Reply | View Replies]

To: DeaconBenjamin
This sounds like that story that appeared here recently claiming that some al Qaeda messages were encoded in pornographic images by means of steganography.
2 posted on 05/17/2003 8:22:49 PM PDT by Cicero (Marcus Tullius)
[ Post Reply | Private Reply | To 1 | View Replies]

To: DeaconBenjamin
In general, it's far from obvious to me that an encrypted message hidden in an image file could be cracked. It sounds like the kid got lucky, as he claims, and managed to limit the possibilities for an encryption key to the point that a brute force attack worked. If is ALWAYS better to be lucky than good.
3 posted on 05/17/2003 8:27:34 PM PDT by merak
[ Post Reply | Private Reply | To 1 | View Replies]

To: DeaconBenjamin
bttttttttttttttttt
4 posted on 05/17/2003 8:29:47 PM PDT by dennisw
[ Post Reply | Private Reply | To 1 | View Replies]

To: DeaconBenjamin
This is way over my head, but I always look for some computer savvy youngster to help when I have a problem with my computer technology.
5 posted on 05/17/2003 8:32:08 PM PDT by yoe
[ Post Reply | Private Reply | To 1 | View Replies]

To: merak
This brings "outsourcing" to a new level.
6 posted on 05/17/2003 8:35:38 PM PDT by widowithfoursons
[ Post Reply | Private Reply | To 3 | View Replies]

To: DeaconBenjamin
Steganography is nothing new, and is also a method of watermarking.
There are various programs to create and detect/extract stenographic content.
FYI it's also possible to conceal content in MP3 files.
7 posted on 05/17/2003 8:35:42 PM PDT by visualops (It's the cream of the crap, it's the top of the slime, it's the Democratic Agenda!)
[ Post Reply | Private Reply | To 1 | View Replies]

To: DeaconBenjamin
"The US government sent him letters of appreciation."

They should have sent him money, and enough of it to put him on the payroll for the long haul. Hell, they should have sent him the combined salaries of those who couldn't do the job he did.

He was obviously dealing with one of the intel networks, hence the secrecy.

8 posted on 05/17/2003 8:40:52 PM PDT by yooper
[ Post Reply | Private Reply | To 1 | View Replies]

To: visualops
Possible, but not reliable.
9 posted on 05/17/2003 8:41:27 PM PDT by Pyrion
[ Post Reply | Private Reply | To 7 | View Replies]

To: DeaconBenjamin
I'll bet that young Mr. Fardia has an all expenses paid ride at college if he should choose to go to work for our friends in Langley.
10 posted on 05/17/2003 8:44:03 PM PDT by WorkingClassFilth (Defund NPR, PBS and the LSC.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: visualops
I often look to see what is behind pictures using a product readily available on a photo software product out now, that is actually designed for another purpose, but can be used effectively to see what is hiding behind the picture.
11 posted on 05/17/2003 9:01:28 PM PDT by Gabrielle Reilly
[ Post Reply | Private Reply | To 7 | View Replies]

To: DeaconBenjamin
The Indians have a great aptitude for mathematics and computer science. Ross Perot once said they have an "extra gene" for it.
12 posted on 05/17/2003 9:14:07 PM PDT by Malesherbes
[ Post Reply | Private Reply | To 1 | View Replies]

To: DeaconBenjamin
When you crack a code it seems like the last thing you would want to do is make it public.
13 posted on 05/17/2003 9:16:11 PM PDT by Reagan is King
[ Post Reply | Private Reply | To 1 | View Replies]

To: WorkingClassFilth
I'll bet that young Mr. Fardia has an all expenses paid ride at college if he should choose to go to work for our friends in Langley.

And then a job with some high-tech firm as an H-1B no doubt.

14 posted on 05/17/2003 9:19:20 PM PDT by Euro-American Scum
[ Post Reply | Private Reply | To 10 | View Replies]

To: widowithfoursons
Good point, like we are now outsourcing NSA, CIA functions?
15 posted on 05/17/2003 9:23:04 PM PDT by The_Media_never_lie
[ Post Reply | Private Reply | To 6 | View Replies]

To: DeaconBenjamin
He's lying. I cracked the code with my Dick Tracy decoder ring.
16 posted on 05/17/2003 9:29:31 PM PDT by philetus (Keep doing what you always do and you'll keep getting what you always get)
[ Post Reply | Private Reply | To 1 | View Replies]

To: The_Media_never_lie
We always outsource CIA functions. Our CIA operators contact foreign nationals to gain information that they have. There is no chance that a US citizen could pass as a foreigner, with the wide ranging family connections that would be necessary.

The clever thing the kid probably did us use quotations from selected verses of the Qu'ran as the keylist. Although the US does have some Arabic linguists, we probably have few arabic linguists who are also trained as cryptographers.

"Give me your tired, your poor, your huddle masses, yearning to breath free: and if they are brilliant, that is ok too.
17 posted on 05/17/2003 9:38:45 PM PDT by donmeaker (Time is Relative, at least in my family.)
[ Post Reply | Private Reply | To 15 | View Replies]

To: Nightshift
ping
18 posted on 05/17/2003 9:40:44 PM PDT by tutstar
[ Post Reply | Private Reply | To 1 | View Replies]

To: Euro-American Scum
...............and a team of bodyguards.
19 posted on 05/17/2003 9:42:29 PM PDT by breakem
[ Post Reply | Private Reply | To 14 | View Replies]

To: DeaconBenjamin

Bin Laden: Steganography Master? 

By Declan McCullagh

Story location: http://www.wired.com/news/politics/0,1283,41658,00.html

02:00 AM Feb. 07, 2001 PT

WASHINGTON -- If there's one thing the FBI hates more than Osama bin Laden, it's when Osama bin Laden starts using the Internet.

So it should be no surprise that the feds are getting unusually jittery about what they claim is evidence that bin Laden and his terrorist allies are using message-scrambling techniques to evade law enforcement.

USA Today reported on Tuesday that bin Laden and others "are hiding maps and photographs of terrorist targets and posting instructions for terrorist activities on sports chat rooms, pornographic bulletin boards and other websites, U.S. and foreign officials say."

The technique, known as steganography, is the practice of embedding secret messages in other messages -- in a way that prevents an observer from learning that anything unusual is taking place. Encryption, by contrast, relies on ciphers or codes to scramble a message.

The practice of steganography has a distinguished history: The Greek historian Herodotus describes how one of his cunning countrymen sent a secret message warning of an invasion by scrawling it on the wood underneath a wax tablet. To casual observers, the tablet appeared blank.

Both Axis and Allied spies during World War II used such measures as invisible inks -- using milk, fruit juice or urine which darken when heated, or tiny punctures above key characters in a document that form a message when combined.

Modern steganographers have far-more-powerful tools. Software like White Noise Storm and S-Tools allow a paranoid sender to embed messages in digitized information, typically audio, video or still image files, that are sent to a recipient.

The software usually works by storing information in the least significant bits of a digitized file -- those bits can be changed without in ways that aren't dramatic enough for a human eye or ear to detect. One review, of a graphical image of Shakespeare before and after a message was inserted, showed JPEG files that appeared to have no substantial differences.

Steghide embeds a message in .bmp, .wav and .au files, and MP3Stego does it for MP3 files. One program, called snow, hides a message by adding extra whitespace at the end of each line of a text file or e-mail message.

Perhaps the strangest example of steganography is a program called Spam Mimic, based on a set of rules, called a mimic engine, by Disappearing Cryptography author Peter Wayner. It encodes your message into -- no kidding -- what looks just like your typical, quickly deleted spam message.

Some administration critics think the FBI and CIA are using potential terrorist attacks as an attempt to justify expensive new proposals such as the National Homeland Security Agency -- or further restrictions on encryption and steganography programs.

The Clinton administration substantially relaxed -- but did not remove -- regulations controlling the overseas shipments of encryption hardware and software, such as Web browsers or Eudora PGP plug-ins.
One thing's for certain: All of a sudden, the debate in Washington seems to be heading back to where it was in 1998, before the liberalization.

"I think it's baloney," says Wayne Madsen, a former NSA analyst and author. "They come out with this stuff. I think it's all contrived -- it's perception management."

Three years ago, FBI Director Louis Freeh spent much of his time telling anyone who would listen that terrorists were using encryption -- and Congress should approve restrictions on domestic use.

"We are very concerned, as this committee is, about the encryption situation, particularly as it relates to fighting crime and fighting terrorism," Freeh said to the Senate Judiciary committee in September 1998. "Not just bin Laden, but many other people who work against us in the area of terrorism, are becoming sophisticated enough to equip themselves with encryption devices."

He added: "We believe that an unrestricted proliferation of products without any kind of court access and law enforcement access, will harm us, and make the fight against terrorism much more difficult."

But Freeh never complained about steganography -- at least when the committee met in open session.

Some of the more hawkish senators seemed to agree with the FBI director, a former field agent. "I think the terrorist attacks against United States citizens really heighten your concern that commercial encryption products will be misused for terrorist purposes," said Sen. Dianne Feinstein (D-Calif).

Sen. Jon Kyl (R-Ariz) added he was concerned about "the sophistication of the terrorists, the amount of money they have available (and) their use of technology like encryption."

In March 2000, Freeh said much the same thing to a Senate Judiciary subcommittee headed by Kyl. He echoed CIA Director George Tenet's earlier remarks, saying: "Hizbollah, HAMAS, the Abu Nidal organization and Bin Laden's al Qa'ida organization are using computerized files, e-mail and encryption to support their operations."

End of story


20 posted on 05/17/2003 9:44:02 PM PDT by Gorons
[ Post Reply | Private Reply | To 1 | View Replies]


Navigation: use the links below to view more comments.
first 1-2021-4041-43 next last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson