Code wars: Steganography, signals intelligence, and terrorism

@article{Conway2003CodeWS,
  title={Code wars: Steganography, signals intelligence, and terrorism},
  author={Maura Conway},
  journal={Knowledge, Technology & Policy},
  year={2003},
  volume={16},
  pages={45-62}
}
This paper discusses the process of secret communication known as steganography. The argument advanced here is that terrorists are unlikely to be employing digital steganography to facilitate secret intra-group communication as has been claimed. This is because terrorist use of digital steganography is both technically and operationally implausible. The position adopted in this paper is that terrorists are likely to employ low-tech steganography such as semagrams and null ciphers instead. 
BETA

Similar Papers

Figures and Topics from this paper.

Citations

Publications citing this paper.

References

Publications referenced by this paper.
SHOWING 1-10 OF 20 REFERENCES

The Encrypted Jihad.

February. Jolish, Barak
  • Salon.com 4 February
  • 2002

The Masterminds.

Fouda, Yosri
  • The Sunday Times
  • 2002

CITI Technical Report 01-11: Detecting Steganographic Content on the Internet. University of Michigan: Center for Information Technology Integration

00.html. Provos, Neils, Peter Honeyman
  • http://www.citi.umich.edu/techreports/reports/citi-tr-01-11.pdf. Reuters
  • 2001

Hidden Messages: Any There?’ Wired 8 November

Manjoo, Farhad.
  • http://www.wired.com/news/technology/0,1282,48235,00.html. Marvel, Lisa M., Charles G. Boncelet, & Charles T. Retter. 1998. ‘Reliable Blind Information Hiding for Images.’ Lecture Notes in Computer Science No. 1525, 48-61. McGrory, Daniel. 2001. ‘Al-Qaeda Hid Coded Messages on Porn Websites.’ The Ti
  • 2001

Militants Plan Terror in Chat Rooms Shocker.’ The Register (UK) 6 February

John
  • http://www.theregister.co.uk/content/archive/16684.html. Lyman, Jay
  • 2001

Reply to the Times Article: Secrets Concealed by Software.

Anderson, Ross
  • IEEE Journal of Selected Areas in Communication
  • 2001

Secrets Concealed by Software.

Mark
  • The Times (London) 6 October,
  • 2001

‘ How Terrorists Use the Internet

Farhad. Manjoo
  • 2001
VIEW 1 EXCERPT