The words "steganography" and "cryptography" may not mean much to the average person but to Osama bin Laden and other suspected terrorists, these terms represent technologies that have reportedly assisted them in carrying out their terrorist acts.
Both cryptography and steg-anography are terms used to refer to freely available software encryption tools that scramble or hide electronic communications. Messages sent using such encryption are virtually impenetrable by authorities.
"Anyone who wants to disguise communications over the Internet can do it pretty easily -- with virtually no risk of being caught," said Benjamin O'Keefe, a Maryland-based Internet security specialist. "You don't have to be a terrorist to get the tools you need."
The tools O'Keefe is referring to allow secret messages to be sent over the Internet either through e-mail or within graphics files. The most popular and reliable e-mail encryption program is called Pretty Good Privacy (PGP). It has been around for years and is used to "scramble" an e-mail message beyond recognition. A special "key," or password, is created by the sender of the message, and in order to read the mail, the receiver must know and supply the key.
Steganography works by allowing users to secretly attach encrypted messages onto image files, sound files, or other types of digital data that would seemingly have nothing to do with written communications.
Collectively, this high-tech encryption technology can be used to subvert just about any type of surveillance activities currently in use. Following the terrorists attacks on New York and Washington on Sept. 11, authorities in the US reportedly contacted scores of encryption experts to help them figure out how bin Laden and his associates were using the Internet and such encryption methods to communicate.
The battle against encryption, at least for authorities, is huge. Steganographic programs are freely available over the Internet for downloading from sites such as Steganographic Software (http://members.tripod.com/steganography/stego/software.html). Pretty Good Privacy's home page (http://www.pgp.com) received thousands of hits each day. The program has been downloaded countless times and is available world-wide at no cost. Much of the software available over the Internet for encrypting messages or to piggyback messages onto graphics or other data files is, in fact, free.
But does this mean that the encryption tools freely available over the Internet probably aided the terrorists who attacked the US on Sept. 11?
Some have suggested as much. Marc Enger, formerly with the US Air Force's Air Intelligence Agency, informed news media after the attacks that bin Laden had relied on steganography to transmit messages to his associates throughout the world. The US' NSA, a top-secret agency devoted to ferreting out information from possible foes of the US, has reportedly been following bin Laden's use of steganography for the past five years.
In the US, this news prompted Republican Senator Judd Gregg, in the wake of the Sept. 11 attacks, to propose that software developers should be forced in the future to provide authorities with keys to encryption programs that they create.
But others are quick to point out that terrorist activities were born far before the use of the Internet became popular. Yet others have argued that bin Laden has reportedly relied not only on publicly available encryption tools but also ones created by Eastern European programmers whose software is not readily available. So even if laws forced legitimate software authors to release "cracking" codes to authorities, developers in certain locations could circumvent or ignore the laws.
O'Keefe, for one, bristles at the idea that encryption tools should be made illegal or that their cryptographic secrets be exposed to authorities.
"I don't think we want to be allowing terrorists to infringe on our civil liberties," he said. "Governments shouldn't have a right to eavesdrop on what we say unless there's a reason for it."
Some point out that encryption technologies help the authorities as well as the criminals. If the technologies were compromised -- if keys to encrypted messages and piggybacked graphics were made penetrable -- then electronic surveillance measures from governments and other legitimate authorities could be under attack from criminals as well.
"Any US crackdown on personal telecommunications privacy might unwittingly hamper foreign resistance to the sort of totalitarian regimes that tend to sponsor terrorism in the first place," argues Washington Post technology expert Jon Ippolito.
Nevertheless, the actions and words of US officials in the wake of the terrorist attacks make it clear that the task of cracking data encryption methods will play an increasingly important role in efforts to thwart future tragedies. The purported use of steganography by bin Laden and associates will mean that, in the future, the electronic surveillance net will have to be case wider to include all types of data, not just e-mail.
CARROT AND STICK: While unrelenting in its military threats, China attracted nearly 40,000 Taiwanese to over 400 business events last year Nearly 40,000 Taiwanese last year joined industry events in China, such as conferences and trade fairs, supported by the Chinese government, a study showed yesterday, as Beijing ramps up a charm offensive toward Taipei alongside military pressure. China has long taken a carrot-and-stick approach to Taiwan, threatening it with the prospect of military action while reaching out to those it believes are amenable to Beijing’s point of view. Taiwanese security officials are wary of what they see as Beijing’s influence campaigns to sway public opinion after Taipei and Beijing gradually resumed travel links halted by the COVID-19 pandemic, but the scale of
TRADE: A mandatory declaration of origin for manufactured goods bound for the US is to take effect on May 7 to block China from exploiting Taiwan’s trade channels All products manufactured in Taiwan and exported to the US must include a signed declaration of origin starting on May 7, the Bureau of Foreign Trade announced yesterday. US President Donald Trump on April 2 imposed a 32 percent tariff on imports from Taiwan, but one week later announced a 90-day pause on its implementation. However, a universal 10 percent tariff was immediately applied to most imports from around the world. On April 12, the Trump administration further exempted computers, smartphones and semiconductors from the new tariffs. In response, President William Lai’s (賴清德) administration has introduced a series of countermeasures to support affected
Pope Francis is be laid to rest on Saturday after lying in state for three days in St Peter’s Basilica, where the faithful are expected to flock to pay their respects to history’s first Latin American pontiff. The cardinals met yesterday in the Vatican’s synod hall to chart the next steps before a conclave begins to choose Francis’ successor, as condolences poured in from around the world. According to current norms, the conclave must begin between May 5 and 10. The cardinals set the funeral for Saturday at 10am in St Peter’s Square, to be celebrated by the dean of the College
MORE VISITORS: The Tourism Administration said that it is seeing positive prospects in its efforts to expand the tourism market in North America and Europe Taiwan has been ranked as the cheapest place in the world to travel to this year, based on a list recommended by NerdWallet. The San Francisco-based personal finance company said that Taiwan topped the list of 16 nations it chose for budget travelers because US tourists do not need visas and travelers can easily have a good meal for less than US$10. A bus ride in Taipei costs just under US$0.50, while subway rides start at US$0.60, the firm said, adding that public transportation in Taiwan is easy to navigate. The firm also called Taiwan a “food lover’s paradise,” citing inexpensive breakfast stalls