Computerworld - An engineering firm suspected that an insider was transmitting valuable intellectual property out of its network. When Seattle-based forensics consulting firm Electronic Evidence Discovery Inc. (EED) investigated the case in June 2000, it couldn't find the evidence on the local hard drive. After checking mail logs, however, investigators found the smoking gun: two e-mails with harmless-looking image attachments sent by an engineer. Turns out, the images were hiding two of the company's most precious engineering specifications.
During the Roman Empire, he explains, secret information was tattooed on a messenger's shaved head. When the hair grew back, the messenger was sent out with the secret message on his scalp and a decoy message in hand.
In the IT realm, steganography replaces unneeded bits in image and sound files with secret data. Instead of protecting data the way encryption does, steganography hides the very existence of the data. And it's undetectable under traditional traffic-pattern analysis.
There are few legitimate uses for steganography, say forensics professionals. And despite reports circulating about terrorists using steganography to communicate secretly, experts doubt that's the case.
"Most people study steganography either as an academic discipline or a curiosity, but I don't know if even terrorist groups would actually use it," says Chakraborty.
Last year, after reading a USA Today article about steganography and terrorism, Neils Provos, a Ph.D. student in computer science at the University of Michigan in Ann Arbor, decided do his dissertation on steganography.
Provos developed detection and cracking tools to analyze images for signs of steganography, such as overly large files and uneven bit mapping. He tested the tools and then used them to compare 2 million images on San Jose-based eBay Inc.'s Web site, which has been cited as a possible place for posting and retrieving hidden messages. Provos found no cases of steganography.
"Steganography becomes the focus of attention, dies down, and then the public is all over it again," says Provos. "But it will never be pervasive, because the amount of data you can actually hide in the images is fairly small. And if someone wanted to steal intellectual property, it'd be easier to copy the data on a disk and carry it out in your pocket."
Even if steganography is present, forensics experts prefer to start by investigating less complex areas. But in some cases, the only evidence might be hidden in image or sound files, so investigators need to be aware of steganography and the tools used to detect and crack it, say experts.
"It's true that steganography is very little used, but we need to be aware of it when doing almost any forensics analysis," advises Kenneth Shear, vice president of technology and law at EED.
|POSSIBLE USES OF STEGANOGRAPHY||DRAWBACKS||Used to combine explanatory information with an image (like doctor's notes accompanying an X-ray)||Could accidentally degrade or render an image misleading|
|Embedding corrective audio or image data in case corrosion occurs from a poor connection or transmission||Could counteract and be counterproductive with the original image|
|Peer-to-peer private communications||Doesn't hide the fact that an e-mail was sent, negating the purpose of secret communications|
|Posting secret communications on the Web to avoid transmission||Someone else with a steganography detection and cracking tool could expose the message|
|Copyright protection||A form of this already exists, called digital watermarking, but requires use of separate hardware tools because steganographic software can't use separate hardware tools. Steganographic software also can't protect the watermark.|
|Maintaining anonymity||Easier to open free Web-based e-mail or use cloaked e-mail|
|Hiding data on the network in case of a breach||Better to understand and effectively use standardized encryption|
See additional Computerworld QuickStudies
Read more about Security in Computerworld's Security Topic Center.
- Best iPhone, iPad Business Apps for 2014
- 14 Tech Conventions You Should Attend in 2014
- 10 Desktop Apps to Power Your Windows PC
- How to Add New Job Skills Without Going Back to School
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- The 12 PCI DSS 3.0 requirements addressed by Peer 1 Hosting This handy quick reference outlines the 12 PCI DSS 3.0 requirements, who needs to be compliant and how Alert Logic solutions address the...
- Defense Throughout the Vulnerability Life Cycle This whitepaper provides insight into how to leverage threat and log management technologies to protect your IT assets throughout their vulnerability life cycle.
- Alert Logic for PCI DSS Compliance To achieve PCI DSS compliance, you must identify and remediate all critical vulnerabilities detected during PCI scans. Threat Manager streamlines this process by...
- Cybersecurity Imperatives Reinvent Your Network Security With Palo Alto Networks The Rise of CyberSecurity
- Live Webcast On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy...
- Live Webcast Endpoint Backup & Restore: Protect Everyone, Everywhere Arek Sokol from the bleeding-edge IT team at Genentech/Roche explains how he leverages cross-platform enterprise endpoint backup in the public cloud as part...
- Streamline Software Asset Management, Compose a software Management Symphony Keeping track of your organization's software is easy with effective software management solutions from CDW. View the videos in our software solutions channel
- Druva inSync: Endpoint Data Protection & Governance CLICK HERE to watch this video about protecting corporate data on laptops and mobile devices, sponsored by Druva. All Security White Papers | Webcasts