Terrorist Attack On September 11th Thesis

Length: 12 pages Sources: 4 Subject: Terrorism Type: Thesis Paper: #46157556 Related Topics: Hezbollah, Hamas, Patriot Act, Utopia
Excerpt from Thesis :

He was paraded at the front of the news media, knowing very well that he will not be able to say anything critical about his captors. When he was put to speak, he passed message by blinking his eyes in Morse code which spelled out T-O-R-T-U-R-E.

In computers, images are array of numbers representing light intensities at various pixels or points. Digital pictures have either 8 bit or 24 bit per pixel. Each bit represents an association of palette or color index. In color image of the 8-bit, every pixel that points out to only one of the 256 colors is represented by a single byte (sellars). 0's and 1s are bits whereby 8 bits create a byte. An example, of a byte is the 111 11110. The less significant bit is the position where zero is located. The least Significant bit (LSB) way is the staganography technique that is mostly implemented. When applying techniques of LSB to every byte of a 24-bit image, there are three bits of LSB that can be encoded to every pixel. Any variations in the LSB produce images which can not be distinguished from the original. This kind of technique may work well in 24-bit images but poorly in 8 bit images. (Johnson, 2001)

Modern Steganography

Modern steganography involves the use of computer technology to actively and passively code, convey and subsequently decode the steganographic message. The computer by itself identifies a picture in terms of very tiny picture elements. The picture elements are usually described in terms of various bits. The digital picture format is composed of either 24 bits or 8 bits per pixel. The individual bits are however linked to particular color index.

A perfects example is that in an 8-bit color digital imagery, one of the 256 colors per pixel is denoted as a single byte (Sellars).The 24-bit color imagery also has its own schema. The various bytes that represent the colors can be manipulated to contain certain hidden information. This is done by using one picture to hide a certain message file inside another file. The file which contains the hidden message is referred to as the "container file." The container file is taken through a very manipulative and yet non-destructive process which leaves the original message intact and undetectable by the human eye and ear. The paradox that surrounds the use of this technology is that its original use was targeted towards the prevention of the illegal distribution of sensitive documents electronically. This could have resulted in the various copyright infringers gaining access to the documents without duly paying the original owner of the document (Sellars).

In the past few years, more complex methods of steganography have been devised. These new methods are built with the intention of beating or rather evading detection by the common or rather standard detection techniques. The modern methods include the analysis of the image to be used prior to embedding the information on it. This is in order to determine its statistical properties. The redundant bits of the image are then located and then they get replaced probabilistically with new but redundant information bits. This method helps in beating the common statistical steganographic analyzers. The image is then subsequently modified in certain parts. This makes it very hard to recreate the original statistical footprints of the image.

The previous introductions of various encoding software have made it absolutely easy for anyone to compose a steganographic message. Most of the steganographic tools are also available online as freeware and therefore easily downloadable over the internet. Examples include the "StegFS" which is windows based. The steganograhic tool hide the information in the imagery. The various steganographic tools therefore are developed and then subsequently released in order to detect the existence of steganographic content. An image suspected to contain hidden information is then ran through the software which initiates a dictionary attack on the suspect image in order to determine the various key phrases.

Detection of Steganography

It is very important for various governments and corporations to devise effective and efficient methods of detecting the existence of covertly stored information within the various imagery that are being transmitted across their national borders, be it electronically or otherwise. This is because steganography can be a major source of national insecurity as it may aid rebels and terrorists in easily communicating right under the noses of the authorities.

The recent involvement of the U.S. authorities with Iomart, a Scottish corporate spyware vendor in an effort of tracking down Osama Bin Laden...


The fact that various steganographic tools are readily available to create these messages is even more worrying. The technology involved in steganography has in actual fact been upgraded to a point that it is almost impossible to detect its presence on any images.

The utilization of various scanners such as the fingerprint* product has seen the normal workplace placed under the watchful eye of the steganography detection technology. This is in an effort to rid the corporate networks by unmasking the employees who maybe secretly passing out very sensitive information for the purpose of implementing various terrorist intensions.

The role of United States law is evident from the fact that its legislative wing has enacted various legislations as a reaction to the perceived threat that can be caused through the use of steganography.The passed legislation would allow the U.S. government to embark on projects that would result in the coming up with appropriate technologies geared towards the detection of the encoded imagery that is based on the suspected threat. This enactment is fully put into action through the "USA Patriot Act" which got signed in 2006.The Act gives the federal government the powers to monitor all forms of electronic communication that might be emanating from various terrorist groups. In order to illustrate the gravity of the perceived threat that could arise from the use of steganographic images, the United States legislature passed the electronic communication aspect of the act even before substantial evidence was gathered to prove that terrorist really use apply the technology while communicating with each other, both within and without the United States of America.

The idea of having a perfectly secure internet is still a dream. This is despite the fact that various research and studies have been dedicated to the field of internet security. The ever evolving nature of internet threats is however a major blow to the ongoing efforts to the internet security problem. As for now the concept of terrorist applying steganography in their communications is a myth. It is however very possible to predict the kind of reaction and level of preparedness that would result if an actual steganographic imagery with credible details such as the intended target is found with the terrorists. At this moment, therefore, the concept of terrorist using steganography to covertly communicate with each other remain a total myth that will be proved maybe with time.


B.W. Lampson, (1973), a note on the confinement problem, Communications of the ACM, vol.16, no. 10, pp. 613 -- 615.

Declan, McCullagh. (2001) Bin Laden: Steganography Master?

URL: http://www.wired.com/news/politics/0,1283,41658,00.html

Dibbell, Julian. (2001) Pirate Utopia.

URL: http://www.feedmag.com/templates/default.php3?a_id=1624

G.J. Simmons, (1984) the prisoners' problem and the subliminal channel, in Advances in Cryptography: Proceedings of Crypto-83, D. Chaum, Ed. Aug. 1983, pp. 51 -- 67, Plenum

Press, New York and London

N.F. Johnson, (2001) Steganalysis of images created using current steganographic software, in Proceedings of the Second Information Hiding Workshop.

Sellars, Duncan. (2001) an Introduction to Steganography.…

Sources Used in Documents:


B.W. Lampson, (1973), a note on the confinement problem, Communications of the ACM, vol.16, no. 10, pp. 613 -- 615.

Declan, McCullagh. (2001) Bin Laden: Steganography Master?

URL: http://www.wired.com/news/politics/0,1283,41658,00.html

Dibbell, Julian. (2001) Pirate Utopia.
URL: http://www.feedmag.com/templates/default.php3?a_id=1624
URL: http://www.cs.uct.ac.za/courses/CS400W/NIS/papers99/dsellars/stego.html

Cite this Document:

"Terrorist Attack On September 11th" (2010, March 22) Retrieved December 2, 2022, from

"Terrorist Attack On September 11th" 22 March 2010. Web.2 December. 2022. <

"Terrorist Attack On September 11th", 22 March 2010, Accessed.2 December. 2022,

Related Documents
September 11, 2001 Terrorist Attacks
Words: 2073 Length: 6 Pages Topic: Terrorism Paper #: 17140499

Of course, not all of the counterterrorism methods will work, and there will certainly be changes, alterations, and even the disbanding of some of the things the government has done to help prevent further attacks. Clearly, the nation has learned quite a bit from the terrorist attacks of 9/11. The people learned the country was vulnerable to attacks never before imagined. They learned that thousands of people could die in

September 11th After Effects September
Words: 1615 Length: 5 Pages Topic: Terrorism Paper #: 89251114

It was seen that the Russian security interests were undermined by the Taliban regime. The Taliban regime was also the one that recognized the importance of the Chechen government. It was understood by the Russians that the relationships with the Americans was the main way to enhance security in Russia. Since September 11, it has been seen that there has been a great increase in the international prestige of

September 11 and the New Emerging International
Words: 4078 Length: 15 Pages Topic: Terrorism Paper #: 83500963

September 11 and the New Emerging International Order America and Europe in the New World Order This is a paper that outlines the international order in American and Europe in the formation of New World Order. It has 11 sources. As the War in Iraq takes place, and people hope for a quick end to all conflicts around them there is deep thought continuously being given to the emergence of a new

Terrorist Attack on September 11, 2001, 19
Words: 1396 Length: 4 Pages Topic: Terrorism Paper #: 61751050

Terrorist Attack On September 11, 2001, 19 Al Qaeda terrorists hijacked four United States commercial airliners travelling from the east coast to California. The hijackers forcibly took control of four planes. Two planes were purposefully crashed into the World Trade Center (WTC) in New York City. The third aircraft was flown into the Pentagon building in Washington DC. The fourth plane landed in a Pennsylvania field. All of the people on

Terrorist Attack on the U.S.
Words: 5892 Length: 21 Pages Topic: Military Paper #: 64887037

The House rejected an effort to require the withdrawal of the Marines by early 1984, on November 2nd, 1983. And, Senate "Democrats were unable to force a vote on a proposal, introduced on Oct. 26 as SRes253, to replace the Marines with a United Nations, or some other "neutral," force." The primary short-term threat was that Marines had become targets in Lebanon. They were no longer the neutral forces that had

Terrorist Attacks an Assessment of
Words: 3907 Length: 10 Pages Topic: Terrorism Paper #: 74627576

Taking the nature of this weapon into account the general assumption is that the target of a bomb of this nature would possible be a large city, congested transport or residential area. However this is common assumption and possibly not the only targets that terrorists might consider. From the point-of-view of the terrorist it may be more appropriate to choose a target which would be less secure and would maximize