Home > News >
Steganography in the News > 2008
Digital Insider: Anti-Digital Forensics, The Next Challenge
- Forensic Magazine News
"Examiners need to look for the presence of steganography tools on the suspect’s
computer. If no tools are discovered, possibly their artifacts can be found in the
registery. To aid in this process, there are some commercially available tools that
can detect the presence of steganography applications and their artifacts."
Steganography is key ingredient to anti-forensics - Infosecurity
"Anti-forensics tools are being used more frequently by cyber-criminals to cover
their tracks and to prevent monitoring, said Christopher Novak of Verizon business’
investigation response team, at track session ‘Cyber CSI: How criminals manipulate
anti-forensics to foil the crime scene’ at RSA Europe on 28 October. The use of
steganography (the art and science of writing hidden messages in such a way that
only the sender and intended recipient know there is a hidden message) is very easy
for a forensic investigator to overlook, said Novak, and is thus becoming popular
with cyber-criminals. 'The most important thing to remember', Novak concluded, 'is
that it’s dangerous to speed up an investigation; you need to take your time. Anti-forensics
is moving away from avoidance to being caught into an attack on the investigators.
It’s important to call in the professionals when you feel that anti-forensics have
Link between child porn and Muslim terrorists discovered in police raids
- Times Online
"Secret coded messages are being embedded into child pornographic images, and paedophile
websites are being exploited as a secure way of passing information between terrorists."
messages could be hidden in net phone calls - TMCnet.com
"The next time your internet (VoIP) phone call sounds a bit fuzzy, it might not
be your ISP that's to blame. Someone could be trying to squeeze a secret message
between the packets of data carrying the caller's voice."
When terrorism hits cyberspace - MSN Technology
"Steganography is the technique to fully hide actual content within legitimate or
legitimate-looking) data. Terrorists can easily hide vital and sensitive communications
by mixing it with large amounts of public data. Seemingly normal files can have
embedded secret message data that will appear usual to an innocent observer. An
example is hiding messages within the noise of a digital image, in which some bits
that make up the image are used to encode a secret message without altering the
image significantly. The technology has now expanded to nearly all kinds of file
including audio and video recordings. The expertise to search through thousands
of files filtering through the Internet every second for such encoding is at present
beyond the resources of any government."
Hello Kitty used as drug lord's messenger: report - Agence France-Presse
"Hello Kitty, the Japanese cartoon figure popular with teenagers around the world,
was used by a notorious Colombian drug lord to hide messages to his minions, according
to a report Monday. Juan Carlos Ramirez Abadia, who is being held in Brazil after
his arrest in August, hid voice and text messages digitally encoded into e-mailed
images of the innocent feline, Brazilian police told the Folha de Sao Paulo newspaper."