Browse DORAS
Browse Theses
Search
Latest Additions
Creative Commons License
Except where otherwise noted, content on this site is licensed for use under a:

Code wars: steganography, signals intelligence, and terrorism

Conway, Maura (2003) Code wars: steganography, signals intelligence, and terrorism. Knowledge, Technology, and Policy, 16 (2). pp. 45-62. ISSN 1874-6314

This is the latest version of this item.

Full text available as:

[img]
Preview
PDF - Requires a PDF viewer such as GSview, Xpdf or Adobe Acrobat Reader
120Kb
[img]Microsoft Word
137Kb

Abstract

This paper describes and discusses the process of secret communication known as steganography. The argument advanced here is that terrorists are unlikely to be employing digital steganography to facilitate secret intra-group communication as has been claimed. This is because terrorist use of digital steganography is both technically and operationally implausible. The position adopted in this paper is that terrorists are likely to employ low-tech steganography such as semagrams and null ciphers instead.

Item Type:Article (Published)
Refereed:Yes
Uncontrolled Keywords:digital steganography;
Subjects:Social Sciences > Terrorism
DCU Faculties and Centres:Research Initiatives and Centres > Centre for International Studies (CIS)
DCU Faculties and Schools > Faculty of Humanities and Social Science > School of Law and Government
Publisher:Springer Netherlands
Official URL:http://dx.doi.org/10.1007/s12130-003-1026-4
Use License:This item is licensed under a Creative Commons Attribution-NonCommercial-Share Alike 3.0 License. View License
ID Code:494
Deposited On:30 May 2008 by DORAS Administrator. Last Modified 16 Feb 2009 14:41

Available Versions of this Item

Download statistics

Archive Staff Only: edit this record