Trending Topics

Terrorists and Steganography - “Hidden Communications”

Guess what: Al-Qaeda may use steganography.

(From the Informed Source Newsletter, published by Profiles Threat Countermeasures Group.)

According to nameless “U.S. officials and experts” and “U.S. and foreign officials,” terrorist groups are “hiding maps and photographs of terrorist targets and posting instructions for terrorist activities on sports chat rooms, pornographic bulletin boards and other Web sites.”

I’ve written about steganography in the past, and I don’t want to spend much time retracing old ground. Simply, steganography is the science of hiding messages in messages. Typically, a message (either plaintext or, more cleverly, ciphertext) is encoded as tiny changes to the color of the pixels of a digital photograph. Or in imperceptible noise in an audio file. To the uninitiated observer, it’s just

a picture. But to the sender and receiver, there’s a message hiding in there.

It doesn’t surprise me that terrorists are using this trick. The very aspects of steganography that make it unsuitable for normal corporate use makes it ideally suited for terrorist use. Most importantly, it can be used in an electronic dead drop.

If you read the FBI affidavit against Robert
Hanssen, you learn how Hanssen communicated with
his Russian handlers. They never met, but would leave
messages, money, and documents for one another in plastic
bags under a bridge. Hanssen’s handler would leave a
signal in a public place -- a chalk mark on a mailbox -- to
indicate a waiting package. Hanssen would later collect the
package.

That’s a dead drop. It has many advantages over a face-to-face meeting. One, the two parties are never seen together. Two, the two parties don’t have to coordinate a rendezvous. Three, and most importantly, one party doesn’t even have to know who the other one is (a definite advantage if one of them is arrested). Dead drops can be used to facilitate completely anonymous, asynchronous communications.

Using steganography to embed a message in a pornographic image and posting it to a Usenet newsgroup is the cyberspace equivalent of a dead drop. To everyone else, it’s just a picture. But to the receiver, there’s a message in there waiting to be extracted.

To make it work in practice, the terrorists would need to set up some sort of code. Just as Hanssen knew to collect his package when he saw the chalk mark, a virtual terrorist will need to know to look for his message. (He can’t be expected to search every picture.)

There are lots of ways to communicate a signal: timestamp on the message, an uncommon word in the subject line, etc. Use your imagination here; the possibilities are limitless. The effect is that the sender can transmit a message without ever communicating directly with the receiver. There is no e-mail between them, no remote logins, no instant messages. All that exists is a picture posted to a public forum, and then downloaded by anyone sufficiently enticed by the subject line (both third parties and the intended receiver of the secret message).

So, what’s a counter-espionage agency to do?

There are the standard ways of finding steganographic messages, most of which involve looking for changes in traffic patterns. If Bin Laden is using pornographic images to embed his secret messages, it is unlikely these pictures are being taken in Afghanistan. They’re probably downloaded from the Web. If the NSA can keep a database of images (wouldn’t that be something?), then they can find ones with subtle changes in the low-order bits.

If Bin Laden uses the same image to transmit multiple messages, the NSA could notice that. Otherwise, there’s probably nothing the NSA can do. Dead drops, both real and virtual, can’t be prevented.

Why can’t businesses use this? The primary reason is that legitimate businesses don’t need dead drops. I remember hearing one company talk about a corporation embedding a steganographic message to its salespeople in a photo on the corporate Web page. Why not just send an encrypted e-mail? Because someone might notice the e-mail and know that the salespeople all got an encrypted message.

So send a message every day: a real message when you need to, and a dummy message otherwise. This is a traffic analysis problem, and there are other techniques to solve it. Steganography just doesn’t apply here. Steganography is good way for terrorist cells to communicate, allowing communication without any group knowing the identity of the other.

There are other ways to build a dead drop in cyberspace. A spy can sign up for a free, anonymous e-mail account, for example. Bin Laden probably uses those too.

Bruce Schneier is founder and CTO of Counterpane Internet Security Inc., the author of “Secrets and Lies” and “Applied Cryptography,” and an inventor of the Blowfish, Twofish, and Yarrow algorithms. He is a member of the Advisory Board of the Electronic Privacy Information Center (EPIC). He is a frequent writer and lecturer on computer security and cryptography. Our thanks to the Lubrinco Group for sharing this report with Informed Source.


This article is reprinted with permission from Informed Source Newsletter at www.profiles-threat.com.

Profiles Threat CounterMeasures Group serves clients both nationally and internationally with protective services, training and educational seminars, products, threat assessment evaluations and educational information - from small start up companies to Fortune 500 and 100 companies, to Professional Consulting and Investigative firms, Executive, Dignitary and Tactical Protection Teams, Law Enforcement, Local, State and Federal Governments both domestic and foreign.

Not to be reprinted or published without the express consent of www.profiles-threat.com. Contact newsletter@profiles-threat.com for subscription information.


Read Other Recent Articles from the Informed Source:

  • A Commentary on Recent Events

  • Discouraged Sometimes? Meet Private Investigator, Jay J. Armes

  • Corporate Advisory: Why Executives and Corporations Are Vulnerable to Terrorism

  • How Terrorists Plan An Attack

  • A Comparison of Islamic Terrorist Training; Why Professionals Need To worry