Introduction and Goals

Social/Ethical Issues

Background

Project Details

Evaluation and Conclusion

References

Conclusion

The possible use of electronic steganography by terrorist and other ill-intentioned groups is of great concern to various law-enforcement agencies and officials. The zealous seeking of steganographic content used for illegal purposes poses serious threats to the personal privacy and reputations (both personal and professional) of innocent individuals.

One chilling example that recently occurred was the fate of Muzaffar Wandawi, a self taught artist living in the Netherlands. [1][2][3] In October 2001, various news services picked up a story that a "former National Security Agency instructor" had uncovered evidence on the Internet that al-Qaeda terrorists were hiding messages of the September 11th attack within images of paintings and posters on the Internet. The paintings were the work of Mr. Wandawi. Additionally, the "expert" stated that the images proved that they were planning a widespread biological attack against the United States and that Mr. Wandawi had intimate knowledge of these attacks since he had created these paintings with hidden messages. The reports and coverage in various United States newspapers and media outlets caused the United States government to issue a warning of heightened awareness for a potential terrorist attack. Upon further investigation, however, it was shown that Mr. Wandawi had no connections to terrorist groups and that there were no hidden messages within his paintings.

However, steganography cannot be thought of as something inherently evil. The commercial uses that are being developed and the boon to personal privacy and security far outweigh any excuse that it should be controlled and actively scanned for in order to prevent terrorists (or anyone else for that matter) from using it. The effort involved in keeping track of all the ways that a message could be hidden would be astronomical and futile to say the least.

The concepts of computer security are currently in uncharted territories that are being mapped as we proceed. For computer security professionals faced with dealing with potential terrorist threats, the challenge is in understanding the threats, determining which ones are substantiated with evidence and which ones are urban legends or just plain wrong. Unfortunately, with the ever-shifting landscape these threats are changing on an almost daily basis. Urban legends that have been circulating the Internet for years, i.e. envelopes sent through the mail contain deadly biological agents, can suddenly and tragically turn into reality. Although there have yet to be a single steganographic image found on the Internet, one can easily imagine how quickly the landscape will change again if an image is found containing credible evidence of a future terrorist attack. Are terrorists using the Internet for covert communications? Unfortunately, until credible evidence is found that they are, the only answer these days is "maybe, but it's nothing new".

[ Back ] [ Next ]