Re: S-Tools Stego makes an appearance in Law and Order-SVU

2003-04-03 Thread John Kelsey
At 07:15 AM 3/31/03 +0200, Thomas Shaddack wrote:

For very-low-bandwidth data transfers hidden in wideband streams, we could
maybe use timing of packets. Wouldn't work with more congested networks,
and would need some kind of REALLY heavy-duty error correction, but could
be rather difficult to spot.
Do some reasonable error-correction on it, and then implement IP over 
it.  Hey, we *said* it was an unreliable transport protocol  :)

The signal could be transported in the
intervals between the IP packets sent, or by dropping selected packets and
requesting retransmissions, or by swapping the order of some packets.
The constraint here is that an outsider mustn't be able to distinguish the 
performance of a stego-enabled system from a non-stego system.  So I think 
you'd have to be really careful about dropping very many packets, swapping 
packets, etc.

As a first cut, suppose I have a sort of encoding mask for two different 
bits, e.g.

0 == 01010101
1 == 10101010
Then I decide whether to delay packets by some very small amount based on 
which mask I'm using, adding a really small delay whenever there's a 1.

The receiver tries both masks, and chooses the more probable one.  (For the 
nine packets he receives, he does some statistics on the delays between 
packets, and assigns probabilities of 1 symbols in each location, throws 
out obvious outliers, etc., and then chooses the most probable 
decoding.)  The goal here would be to get down to delays that were small 
enough that an attacker who didn't know the two candidate masks would have 
a very low probability of being able to distinguish the behavior of a 
stego-enabled system from a non-stego system.  Sort of like having a timing 
attack which is impractical because the attacker must guess too much 
internal information before he can test his guess

Has anyone done this kind of scheme in the open literature before?  This 
seems like the sort of thing someone would have investigated as a covert 
channel for leaking information from a compromised system.

The world is crammed full with unused communication channels.
Yep.  Mostly unused because they're not all that reliable, or because they 
offer too little bandwidth to be worthwhile, alas.
...

--John Kelsey, [EMAIL PROTECTED]




Re: S-Tools Stego makes an appearance in Law and Order-SVU

2003-03-31 Thread Thomas Shaddack

 As for the how, one wonders some form of fake-stego can't be
 incorporated somehow into non-stego programs, such as zip/compression
 utilities, file-sharing and so on.

For very-low-bandwidth data transfers hidden in wideband streams, we could
maybe use timing of packets. Wouldn't work with more congested networks,
and would need some kind of REALLY heavy-duty error correction, but could
be rather difficult to spot. The signal could be transported in the
intervals between the IP packets sent, or by dropping selected packets and
requesting retransmissions, or by swapping the order of some packets.

The world is crammed full with unused communication channels.

But this is just an immediate idea and I am sick and sleepy.

*cough*



Re: S-Tools Stego makes an appearance in Law and Order-SVU

2003-03-30 Thread Thomas Shaddack
 Mentions of anonymous remailers are now almost commonplace. Looks like
 stego is catching up.

 Implications for attempted bans on these tools, or enhanced
 sentencing, are left to your imagination.

Steganalysis is going to be a big thing.

Possible countermeasure is embedding a steganographed message (can be a
random file with statistical characteristics equal to an encrypted file)
into as many images as possible. The adversary will still be able to
detect the data in the file, but the number of files with real messages
in them could be just a fraction of the total amount.

A Microsoft(R) Worm(R) could be unleashed that would steganographically
embed random files into all JPEG files found on the victim machines, for
diluting the stego files in a worldwide scale; possessing/transmitting
such image wouldn't then be automatically a reaspon for suspicion. Another
approach, less effective but also less dramatic and more difficult to do
in large scale, is to put such module into some popular graphics-editing
software.

Opinions, comments, peer review?



Re: S-Tools Stego makes an appearance in Law and Order-SVU

2003-03-30 Thread Tyler Durden
Gotta give this thought a great big ditto. I've believed for a long time now 
that the real reason the fedz have tried to scare the public from using 
heavy crypto is for precisely this reason...a lot can be determined merely 
by the presence and form of crypto used. I am in fact starting to wonder if 
whether (in certain contexts) merely knowing that something is encrypted 
(and how) is just about as good as de-encrypting it.

As for the how, one wonders some form of fake-stego can't be 
incorporated somehow into non-stego programs, such as zip/compression 
utilities, file-sharing and so on.

-TD






From: Thomas Shaddack [EMAIL PROTECTED]
To: Tim May [EMAIL PROTECTED]
CC: [EMAIL PROTECTED]
Subject: Re: S-Tools Stego makes an appearance in Law and Order-SVU
Date: Sun, 30 Mar 2003 08:22:24 +0200 (CEST)
 Mentions of anonymous remailers are now almost commonplace. Looks like
 stego is catching up.

 Implications for attempted bans on these tools, or enhanced
 sentencing, are left to your imagination.
Steganalysis is going to be a big thing.

Possible countermeasure is embedding a steganographed message (can be a
random file with statistical characteristics equal to an encrypted file)
into as many images as possible. The adversary will still be able to
detect the data in the file, but the number of files with real messages
in them could be just a fraction of the total amount.
A Microsoft(R) Worm(R) could be unleashed that would steganographically
embed random files into all JPEG files found on the victim machines, for
diluting the stego files in a worldwide scale; possessing/transmitting
such image wouldn't then be automatically a reaspon for suspicion. Another
approach, less effective but also less dramatic and more difficult to do
in large scale, is to put such module into some popular graphics-editing
software.
Opinions, comments, peer review?


_
MSN 8 helps eliminate e-mail viruses. Get 2 months FREE*.  
http://join.msn.com/?page=features/virus



S-Tools Stego makes an appearance in Law and Order-SVU

2003-03-29 Thread Tim May
The S-Tools stego package had an appearance in tonight's Law and 
Order--Special Victims Unit, with a suspected child pornographer 
hiding images of children in they could be images of 
anything--sunspots, whatever.

Stego...it's mainly used by spies.

Even a mention of the etymology of steganography.

I recall several mentions on The Agency and similar shows, usually 
involving the alleged secret messages from Osama (no evidence for this 
has been shown, to my knowledge).

Mentions of anonymous remailers are now almost commonplace. Looks like 
stego is catching up.

Implications for attempted bans on these tools, or enhanced 
sentencing, are left to your imagination.

--Tim May