Fattrad nuked - classic

Search
Go

Discussion Topic

Return to Forum List
This thread has been locked
Messages 861 - 863 of total 863 in this topic << First  |  < Previous  |  Show All  |  Next >  |  Last >>
John Moosie

climber
Beautiful California
May 10, 2012 - 12:54pm PT
well I don't know why his profile would show nothing at all. That's nonsense.

He didn't post the trip report under trip reports. That is why it doesn't show in that category. He might have called it a trip report, but he didn't post it in the trip report section.

You can still post photos from things like photo bucket. Those photos won't show up because they aren't stored on the forums server.
philo

Trad climber
Somewhere halfway over the rainbow
May 10, 2012 - 12:55pm PT
Got it. Thanks.
lostinshanghai

Social climber
someplace
May 10, 2012 - 04:28pm PT
As I predicted, Fatty has not changed a bit. 47 posts yesterday”

It just because he is out of the loop or not in it.

Hey! Fattie now that I have your attention: remember last year I posted in “ Bin Laden’s Dead” May 13 2011 “Could be he encrypted messages in photos Fatty. He would have used this software or similar” with the photo of one program. go back and look.

Al-Qaeda uses steganography - documents hidden in porn videos found on memory stick

02 May 2012 Source: ISE

Steganography is the science of hiding data. Its most common digital use is to hide data within graphics – text hidden in a picture. Al-Qaeda apparently hid documents within porn videos on a memory stick.

Maqsood Lodin, a 22-year-old Austrian, is on trial in Germany. It now emerges that when stopped and questioned by Berlin police almost exactly one year ago (16 May 2011, after traveling to Berlin from Pakistan via Hungary) he was found to have a memory stick hidden in his underpants. The memory stick contained two porn videos; but the porn videos were hiding around 100 documents believed to include al-Qaeda training manuals and operational details.

The basis for most of the current reports comes from CNN, which takes its source from an article in Die Zeit. The Die Zeit article is not currently online. However, the investigative journalist author of the article, Yassin Musharbash, has published an English-language summary of his findings, on his own blog. He discusses some of the details found in the recovered documents and whether they are genuine: how effective western intelligence has been in disrupting al-Qaeda operations, how suspected operatives should draw attention away from active plotters, and how concerned the leadership had become at the failure to deliver new attacks.

The documents of most interest, he says, are “Lessons learned from past operations – Reports on three past operations (7/7 London; 21/7 London (sic!); Airliner Plot) – a sketch for a terror campaign in the West.”
The current reports are all concerned with the politics of the situation.

Sadly, no details are given on the technology: how were the files hidden; were they encrypted as well as hidden; how were they discovered and extracted? We have to surmise. Infosecurity asked RandomStorm’s security researcher Robin Wood to explain the concepts and methods behind steganography. “It can take many forms,” he said, “from simply hiding the information in clear text (that is, unencrypted) in unused portions of a host file, to encrypting the data and then actually modifying the contents of the host file.” We can assume that the latter more complicated approach was used in this case. But how?

“For storing in images,” says Wood, “what you can do is to encode the data in the least significant bit of a range of pixels. What you end up with is a slightly different image; but as it is the least significant bit, the color is changed so insignificantly that a viewer won't notice. Exactly the same can be done with video, changing areas where humans won't notice the almost insignificant change. And as video is a much denser file format – sound, image, transitions etc – there is much more capacity to hide the data.”

It would seem, however, that steganography is not too difficult to detect once it is suspected. “Retrieving the data depends on how it was hidden,” Wood told Infosecurity. “Most file formats have a recognizable footprint, so using tools which can look for that footprint in other files you can easily pull out data which has been just been added to an unused portion.” In this part, steganography is more akin to obfuscation than serious security. However, added Wood, “If the data has been encrypted and mixed in with the host data then it is harder – but there are other tools that use various techniques to spot content.”

---------------------


Surprised with all your connections and knowledge especially the jacket would know this already?
Messages 861 - 863 of total 863 in this topic << First  |  < Previous  |  Show All  |  Next >  |  Last >>
Return to Forum List
 
Our Guidebooks
spacerCheck 'em out!
SuperTopo Guidebooks

guidebook icon
Try a free sample topo!

 
SuperTopo on the Web

Recent Route Beta