Terrorist Attack on September 11th essay

Download this essay in word format (.doc)

Note: Sample below may appear distorted but all corresponding word document files contain proper formatting

Excerpt from essay:

He was paraded at the front of the news media, knowing very well that he will not be able to say anything critical about his captors. When he was put to speak, he passed message by blinking his eyes in Morse code which spelled out T-O-R-T-U-R-E.

In computers, images are array of numbers representing light intensities at various pixels or points. Digital pictures have either 8 bit or 24 bit per pixel. Each bit represents an association of palette or color index. In color image of the 8-bit, every pixel that points out to only one of the 256 colors is represented by a single byte (sellars). 0's and 1s are bits whereby 8 bits create a byte. An example, of a byte is the 111 11110. The less significant bit is the position where zero is located. The least Significant bit (LSB) way is the staganography technique that is mostly implemented. When applying techniques of LSB to every byte of a 24-bit image, there are three bits of LSB that can be encoded to every pixel. Any variations in the LSB produce images which can not be distinguished from the original. This kind of technique may work well in 24-bit images but poorly in 8 bit images. (Johnson, 2001)

Modern Steganography

Modern steganography involves the use of computer technology to actively and passively code, convey and subsequently decode the steganographic message. The computer by itself identifies a picture in terms of very tiny picture elements. The picture elements are usually described in terms of various bits. The digital picture format is composed of either 24 bits or 8 bits per pixel. The individual bits are however linked to particular color index.

A perfects example is that in an 8-bit color digital imagery, one of the 256 colors per pixel is denoted as a single byte (Sellars).The 24-bit color imagery also has its own schema. The various bytes that represent the colors can be manipulated to contain certain hidden information. This is done by using one picture to hide a certain message file inside another file. The file which contains the hidden message is referred to as the "container file." The container file is taken through a very manipulative and yet non-destructive process which leaves the original message intact and undetectable by the human eye and ear. The paradox that surrounds the use of this technology is that its original use was targeted towards the prevention of the illegal distribution of sensitive documents electronically. This could have resulted in the various copyright infringers gaining access to the documents without duly paying the original owner of the document (Sellars).

In the past few years, more complex methods of steganography have been devised. These new methods are built with the intention of beating or rather evading detection by the common or rather standard detection techniques. The modern methods include the analysis of the image to be used prior to embedding the information on it. This is in order to determine its statistical properties. The redundant bits of the image are then located and then they get replaced probabilistically with new but redundant information bits. This method helps in beating the common statistical steganographic analyzers. The image is then subsequently modified in certain parts. This makes it very hard to recreate the original statistical footprints of the image.

The previous introductions of various encoding software have made it absolutely easy for anyone to compose a steganographic message. Most of the steganographic tools are also available online as freeware and therefore easily downloadable over the internet. Examples include the "StegFS" which is windows based. The steganograhic tool hide the information in the imagery. The various steganographic tools therefore are developed and then subsequently released in order to detect the existence of steganographic content. An image suspected to contain hidden information is then ran through the software which initiates a dictionary attack on the suspect image in order to determine the various key phrases.

Detection of Steganography

It is very important for various governments and corporations to devise effective and efficient methods of detecting the existence of covertly stored information within the various imagery that are being transmitted across their national borders, be it electronically or otherwise. This is because steganography can be a major source of national insecurity as it may aid rebels and terrorists in easily communicating right under the noses of the authorities.

The recent involvement of the U.S. authorities with Iomart, a Scottish corporate spyware vendor in an effort of tracking down Osama Bin Laden has shed some light into the possible detection of steganographic messages.The firm leaked certain information regarding the use of Key fingerprint = AF19 FA27 2F94 998D FDB5 DE3D F8B5 06E4 A169 4E46

In detecting and identifying several files some of which had Arabic text and dates.

The commissioning of WetStone Technologies by the United States Air Force in order to come up with a set of accurate statistical tests with the ability to detect and isolate secret messages stored or transmitted in computer is one of the major steps that have ever been taken in oerder to combat terrorism communication through steganographs.The firm was also commisiioned to effectively come up and identify the core underlying principles that fueld the steganographic techniques (McCullagh).Their finding a however pointed out categorically that most of the steganography that they discovered were traceable to hacker sites and many more on the high traffic e=-commerce websites such as e-bay and Amazon.com (McCullagh).Other steganographic have been developed and others are under development.An example of a stego-detector is the "Steganography Detection and Recovery Toolkit" (S-DART) which was designed by the WetStone Technologies.


Even though there is lack of concrete exhibit in the form of a stegnographic image to support the alleged use of steganography by terrorists to pass their messages through the internet; it is quite imaginable to idealize the fact that the technology can actually be employed in the process of passing secret messages between various terrorist cells. The fact that various steganographic tools are readily available to create these messages is even more worrying. The technology involved in steganography has in actual fact been upgraded to a point that it is almost impossible to detect its presence on any images.

The utilization of various scanners such as the fingerprint* product has seen the normal workplace placed under the watchful eye of the steganography detection technology. This is in an effort to rid the corporate networks by unmasking the employees who maybe secretly passing out very sensitive information for the purpose of implementing various terrorist intensions.

The role of United States law is evident from the fact that its legislative wing has enacted various legislations as a reaction to the perceived threat that can be caused through the use of steganography.The passed legislation would allow the U.S. government to embark on projects that would result in the coming up with appropriate technologies geared towards the detection of the encoded imagery that is based on the suspected threat. This enactment is fully put into action through the "USA Patriot Act" which got signed in 2006.The Act gives the federal government the powers to monitor all forms of electronic communication that might be emanating from various terrorist groups. In order to illustrate the gravity of the perceived threat that could arise from the use of steganographic images, the United States legislature passed the electronic communication aspect of the act even before substantial evidence was gathered to prove that terrorist really use apply the technology while communicating with each other, both within and without the United States of America.

The idea of having a perfectly secure internet is still a dream. This is despite the fact that various research and studies have been dedicated to the field of internet security. The ever evolving nature of internet threats is however a major blow to the ongoing efforts to the internet security problem. As for now the concept of terrorist applying steganography in their communications is a myth. It is however very possible to predict the kind of reaction and level of preparedness that would result if an actual steganographic imagery with credible details such as the intended target is found with the terrorists. At this moment, therefore, the concept of terrorist using steganography to covertly communicate with each other remain a total myth that will be proved maybe with time.


B.W. Lampson, (1973), a note on the confinement problem, Communications of the ACM, vol.16, no. 10, pp. 613 -- 615.

Declan, McCullagh. (2001) Bin Laden: Steganography Master?

URL: http://www.wired.com/news/politics/0,1283,41658,00.html

Dibbell, Julian. (2001) Pirate Utopia.

URL: http://www.feedmag.com/templates/default.php3?a_id=1624

G.J. Simmons, (1984) the prisoners' problem and the subliminal channel, in Advances in Cryptography: Proceedings of Crypto-83, D. Chaum, Ed. Aug. 1983, pp. 51 -- 67, Plenum

Press, New York and London

N.F. Johnson, (2001) Steganalysis of images created using current steganographic software, in Proceedings of the Second Information Hiding Workshop.

Sellars, Duncan. (2001) an Introduction to Steganography.…[continue]

Cite This Essay:

"Terrorist Attack On September 11th" (2010, March 22) Retrieved November 30, 2016, from http://www.paperdue.com/essay/terrorist-attack-on-september-11th-874

"Terrorist Attack On September 11th" 22 March 2010. Web.30 November. 2016. <http://www.paperdue.com/essay/terrorist-attack-on-september-11th-874>

"Terrorist Attack On September 11th", 22 March 2010, Accessed.30 November. 2016, http://www.paperdue.com/essay/terrorist-attack-on-september-11th-874

Other Documents Pertaining To This Topic

  • Terrorist Attack on September 11 2001 19

    Terrorist Attack On September 11, 2001, 19 Al Qaeda terrorists hijacked four United States commercial airliners travelling from the east coast to California. The hijackers forcibly took control of four planes. Two planes were purposefully crashed into the World Trade Center (WTC) in New York City. The third aircraft was flown into the Pentagon building in Washington DC. The fourth plane landed in a Pennsylvania field. All of the people on

  • Terrorist Attacks of September 11 2001 Whether

    Terrorist attacks of September 11, 2001 [...] whether the government needs to do all it can in order to protect its citizens, even if that means they have to surrender some of their civil liberties. The terrorist attacks of September 11, 2001 changed America forever. The people understood they were vulnerable for the first time in decades, and they understood that security measures would have to increase -- that

  • Terrorist Attacks on September 11 2001 Because

    terrorist attacks on September 11, 2001, because the attacks made us aware of how vulnerable we are as a country. They also helped bring the country together as one people, but this reaction has not lasted, and our country has gone back to "life as usual," with little respect for each other. The terrorist attacks were a terrible thing, but the people seem to have forgotten them. The attacks were

  • Terrorist Groups Since September 11th

    Abu Nidal Organization: The Abu Nidal Organization is also known by several other names, such as: Fatah Revolutionary Council, Arab Revolutionary Brigades, Black September, or Revolutionary Organization of Socialist Muslims. It is an international terrorist organization that was founded by Sabri al-Banna, otherwise known as Abu Nidal. The organization split from PLO in 1974 and is made up of various functional committees. These include: political, military and financial committees. Founder Abu

  • September 11th After Effects September

    It was seen that the Russian security interests were undermined by the Taliban regime. The Taliban regime was also the one that recognized the importance of the Chechen government. It was understood by the Russians that the relationships with the Americans was the main way to enhance security in Russia. Since September 11, it has been seen that there has been a great increase in the international prestige of

  • Attacks of September 11 2001 Spawned a

    attacks of September 11, 2001 spawned a number of dubious government actions, including the intensification of racial profiling to target Arabs and Muslims. This means that a certain section of American society is under immediate suspicion of terrorism simply for being of a particular race or religion. Tolerance and equality are two of the highest principles treasured by the United States and its inhabitants. The fear and suspicion cultivated

  • September 11 and the New Emerging International

    September 11 and the New Emerging International Order America and Europe in the New World Order This is a paper that outlines the international order in American and Europe in the formation of New World Order. It has 11 sources. As the War in Iraq takes place, and people hope for a quick end to all conflicts around them there is deep thought continuously being given to the emergence of a new

Read Full Essay
Copyright 2016 . All Rights Reserved