Talk With an Expert

An Analysis of Terrorist Groups Potential Use of Electronic Steganography

An Analysis of Terrorist Groups Potential Use of Electronic Steganography (PDF, 1.71MB)Published: 19 Dec, 2001
Created by
Stephen Lau

The events of September 11th, 2001 have irrevocably altered the landscape of computer security. In the aftermath of these events, various urban legends and rumors have developed surrounding terrorists' online activities. One such topic has been in the alleged use of electronic steganography, a method to covertly hide messages within another, by terrorist groups. This paper provides an overview of steganography, its historical use during times of war, and how modern day electronic steganography can be accomplished. An overview is provided of current techniques to detect steganography on the Internet, which have so far failed to uncover any evidence of steganography on the Internet, and possible future avenues of research in detecting online steganography using techniques similar to the Federal Bureau of Investigation's Carnivore system. The paper concludes with examples of the dangers of unsubstantiated steganography claims and privacy considerations in detecting online electronic steganography.