Verified Document

Terrorist Attack On September 11th Thesis

Related Topics:

When he was put to speak, he passed message by blinking his eyes in Morse code which spelled out T-O-R-T-U-R-E. In computers, images are array of numbers representing light intensities at various pixels or points. Digital pictures have either 8 bit or 24 bit per pixel. Each bit represents an association of palette or color index. In color image of the 8-bit, every pixel that points out to only one of the 256 colors is represented by a single byte (sellars). 0's and 1s are bits whereby 8 bits create a byte. An example, of a byte is the 111 11110. The less significant bit is the position where zero is located. The least Significant bit (LSB) way is the staganography technique that is mostly implemented. When applying techniques of LSB to every byte of a 24-bit image, there are three bits of LSB that can be encoded to every pixel. Any variations in the LSB produce images which can not be distinguished from the original. This kind of technique may work well in 24-bit images but poorly in 8 bit images. (Johnson, 2001)

Modern Steganography

Modern steganography involves the use of computer technology to actively and passively code, convey and subsequently decode the steganographic message. The computer by itself identifies a picture in terms of very tiny picture elements. The picture elements are usually described in terms of various bits. The digital picture format is composed of either 24 bits or 8 bits per pixel. The individual bits are however linked to particular color index.

A perfects example is that in an 8-bit color digital imagery, one of the 256 colors per pixel is denoted as a single byte (Sellars).The 24-bit color imagery also has its own schema. The various bytes that represent the colors can be manipulated to contain certain hidden information. This is done by using one picture to hide a certain message file inside another file. The file which contains the hidden message is referred to as the "container file." The container file is taken through a very manipulative and yet non-destructive process which leaves the original message intact and undetectable by the human eye and ear. The paradox that surrounds the use of this technology is that its original use was targeted towards the prevention of the illegal distribution of sensitive documents electronically. This could have resulted in the various copyright infringers gaining access to the documents without duly paying the original owner of the document (Sellars).

In the past few years, more complex methods of steganography have been devised. These new methods are built with the intention of beating or rather evading detection by the common or rather standard detection techniques. The modern methods include the analysis of the image to be used prior to embedding the information on it. This is in order to determine its statistical properties. The redundant bits of the image are then located and then they get replaced probabilistically with new but redundant information bits. This method helps in beating the common statistical steganographic analyzers. The image is then subsequently modified in certain parts. This makes it very hard to recreate the original statistical footprints of the image.

The previous introductions of various encoding software have made it absolutely easy for anyone to compose a steganographic message. Most of the steganographic tools are also available online as freeware and therefore easily downloadable over the internet. Examples include the "StegFS" which is windows based. The steganograhic tool hide the information in the imagery. The various steganographic tools therefore are developed and then subsequently released in order to detect the existence of steganographic content. An image suspected to contain hidden information is then ran through the software which initiates a dictionary attack on the suspect image in order to determine the various key phrases.

Detection of Steganography

It is very important for various governments and corporations to devise effective and efficient methods of detecting the existence of covertly stored information within the various imagery that are being transmitted across their national borders, be it electronically or otherwise. This is because steganography can be a major source of national insecurity as it may aid rebels and terrorists in easily communicating right under the noses of the authorities.

The recent involvement of the U.S. authorities with Iomart, a Scottish corporate spyware vendor in an effort of tracking down Osama Bin Laden has shed some light into the possible detection of steganographic messages.The firm leaked certain information regarding the use of Key fingerprint = AF19 FA27 2F94 998D FDB5 DE3D F8B5 06E4 A169 4E46

In detecting and identifying several...

The fact that various steganographic tools are readily available to create these messages is even more worrying. The technology involved in steganography has in actual fact been upgraded to a point that it is almost impossible to detect its presence on any images.
The utilization of various scanners such as the fingerprint* product has seen the normal workplace placed under the watchful eye of the steganography detection technology. This is in an effort to rid the corporate networks by unmasking the employees who maybe secretly passing out very sensitive information for the purpose of implementing various terrorist intensions.

The role of United States law is evident from the fact that its legislative wing has enacted various legislations as a reaction to the perceived threat that can be caused through the use of steganography.The passed legislation would allow the U.S. government to embark on projects that would result in the coming up with appropriate technologies geared towards the detection of the encoded imagery that is based on the suspected threat. This enactment is fully put into action through the "USA Patriot Act" which got signed in 2006.The Act gives the federal government the powers to monitor all forms of electronic communication that might be emanating from various terrorist groups. In order to illustrate the gravity of the perceived threat that could arise from the use of steganographic images, the United States legislature passed the electronic communication aspect of the act even before substantial evidence was gathered to prove that terrorist really use apply the technology while communicating with each other, both within and without the United States of America.

The idea of having a perfectly secure internet is still a dream. This is despite the fact that various research and studies have been dedicated to the field of internet security. The ever evolving nature of internet threats is however a major blow to the ongoing efforts to the internet security problem. As for now the concept of terrorist applying steganography in their communications is a myth. It is however very possible to predict the kind of reaction and level of preparedness that would result if an actual steganographic imagery with credible details such as the intended target is found with the terrorists. At this moment, therefore, the concept of terrorist using steganography to covertly communicate with each other remain a total myth that will be proved maybe with time.

Bibliography

B.W. Lampson, (1973), a note on the confinement problem, Communications of the ACM, vol.16, no. 10, pp. 613 -- 615.

Declan, McCullagh. (2001) Bin Laden: Steganography Master?

URL: http://www.wired.com/news/politics/0,1283,41658,00.html

Dibbell, Julian. (2001) Pirate Utopia.

URL: http://www.feedmag.com/templates/default.php3?a_id=1624

G.J. Simmons, (1984) the prisoners' problem and the subliminal channel, in Advances in Cryptography: Proceedings of Crypto-83, D. Chaum, Ed. Aug. 1983, pp. 51 -- 67, Plenum

Press, New York and London

N.F. Johnson, (2001) Steganalysis of images created using current steganographic software, in Proceedings of the Second Information Hiding Workshop.

Sellars, Duncan. (2001) an Introduction to Steganography.

URL: http://www.cs.uct.ac.za/courses/CS400W/NIS/papers99/dsellars/stego.html

Sources used in this document:
Bibliography

B.W. Lampson, (1973), a note on the confinement problem, Communications of the ACM, vol.16, no. 10, pp. 613 -- 615.

Declan, McCullagh. (2001) Bin Laden: Steganography Master?

URL: http://www.wired.com/news/politics/0,1283,41658,00.html

Dibbell, Julian. (2001) Pirate Utopia.
URL: http://www.feedmag.com/templates/default.php3?a_id=1624
URL: http://www.cs.uct.ac.za/courses/CS400W/NIS/papers99/dsellars/stego.html
Cite this Document:
Copy Bibliography Citation

Related Documents

Terrorist Attack on September 11, 2001, 19
Words: 1396 Length: 4 Document Type: Essay

Terrorist Attack On September 11, 2001, 19 Al Qaeda terrorists hijacked four United States commercial airliners travelling from the east coast to California. The hijackers forcibly took control of four planes. Two planes were purposefully crashed into the World Trade Center (WTC) in New York City. The third aircraft was flown into the Pentagon building in Washington DC. The fourth plane landed in a Pennsylvania field. All of the people on

Terrorist Attack on the U.S.
Words: 5892 Length: 21 Document Type: Term Paper

The House rejected an effort to require the withdrawal of the Marines by early 1984, on November 2nd, 1983. And, Senate "Democrats were unable to force a vote on a proposal, introduced on Oct. 26 as SRes253, to replace the Marines with a United Nations, or some other "neutral," force." The primary short-term threat was that Marines had become targets in Lebanon. They were no longer the neutral forces that had

September 11 and the New Emerging International
Words: 4078 Length: 15 Document Type: Term Paper

September 11 and the New Emerging International Order America and Europe in the New World Order This is a paper that outlines the international order in American and Europe in the formation of New World Order. It has 11 sources. As the War in Iraq takes place, and people hope for a quick end to all conflicts around them there is deep thought continuously being given to the emergence of a new

September 11th and Transportation Law on the
Words: 671 Length: 2 Document Type: Research Paper

September 11th and Transportation Law On the morning of September 11th, 2011, the United States of America felt the full fury of an enemy which had been lying in wait for decades, planning an attack of spectacularly tragic proportions that would shake the nation to its core. The weapons of choice for Osama bin Laden and his Al-Qaeda terrorist network were not bullets or bombs, but airplanes which were ruthlessly hijacked

Terrorist Groups Since September 11th,
Words: 1230 Length: 4 Document Type: Term Paper

Abu Nidal Organization: The Abu Nidal Organization is also known by several other names, such as: Fatah Revolutionary Council, Arab Revolutionary Brigades, Black September, or Revolutionary Organization of Socialist Muslims. It is an international terrorist organization that was founded by Sabri al-Banna, otherwise known as Abu Nidal. The organization split from PLO in 1974 and is made up of various functional committees. These include: political, military and financial committees. Founder Abu

September 11, 2001, Terrorists Staged an Attack
Words: 1466 Length: 4 Document Type: Research Paper

September 11, 2001, terrorists staged an attack on the United States. There were several areas affected, but the Twin Towers in New York City were - and still remain - the most notable. They are what everyone thinks of, when 9/11 is mentioned. On that day many lives were lost. Among them were 37 officers and one K-9 officer from the Port Authority Police Department (PAPD) (Damico & Quay,

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now