Skip to main content
The largest online newspaper archive
A Publisher Extra® Newspaper

The Sydney Morning Herald from Sydney, New South Wales, Australia • Page 218

Location:
Sydney, New South Wales, Australia
Issue Date:
Page:
218
Extracted Article Text (OCR)

8 Spectrum Saturday, March 17, 2001 smh.com.au Stht 5ibnfj) Pornin $rralb Thf bnfjj Pornin grralb smh.com.au Saturday, March 17, 2001 I I Spectrum 9 Blip and you 11 miss it What do claims of Osama bin Laden's Web porn infiltration have to do with Napster's fight for life? Julian Dibbell connects the microdots subsequently heated, thus recording one of the earliest recipes for invisible ink. The ancient Chinese wrote notes on small pieces of silk that they then wadded into little balls and coated in wax, to be swallowed by a messenger and retrieved, I guess, at the messenger's gastrointestinal convenience. The 16th-century Italian scientist Giovanni Porta proposed a steganographic scheme involving hard-boiled eggs: write on the shell with a vinegar-and-alum solution and your message passes through to the surface of the egg white, where it can't be read until the shell is peeled away. In the 1860s, the technology of microfilm was perfected, ushering in a golden age of stealth that reached its manic peak in World War II, when German spies began making heavy use of the microdot. A page of text shrunk to a one-millimetre speck of film, the microdot could be pasted almost undetectably into any humdrum business letter, hiding out in the shallow well of a type-written full-stop or comma.

With swarms of them passing through the mails, the United States Government started seeing hidden messages everywhere. By the end of the war, censors had either prohibited or tampered with flower deliveries, commercial-radio song requests, broadcast weather reports, postal chess games, children's drawings on their way to grandma, knitting instructions and ti Kxy 1 Uyli tsJiMf' ''w -w- 0 tz A 'J Ai Mil 'W- lis, ij 1 OAMs KM IL ti; 4 fcVK U. W) BQ m- mm0 -0? ji tie 4ito in ifCaL A T' ft I Vv Jk 1s 44100 a JS' rT- "JM a tab f. I i 5 I mt44mMmi. Mf itaJ.S Mi 1 Jj- i MUk Tha Urfoiptn IIP3 4 ffj yJ fy ri "SviNsi I ir The popular American newspaper USA Today recently 'broke the news that Osama bin Laden's terrorist organisation had infiltrated the world's suppty of Web porn, hiding messages for its global operatives deep within the digits of pictures posted on godless Western triple-X sites.

For historically minded readers, the article afforded a moment of wonder at the depths of the US National Security Agency's Cold War nostalgia and the media's willingness to indulge it. There, once again, was the familiar intimacy of the alleged subversion, the thrilling suggestion that the enemy might lurk among us everywhere, sneaking into our bedrooms and our cubicles under cover of cultural trash. I confess to being a bit nostalgic myself when I read the story. Not for the Cold War -1 was born too late to enjoy it in the fullness of its Eisenhowerian heyday but for its Bush-era aftermath. I found myself looking back with melancholic fondness upon the summer of 1992, to a moment when the Internet, long a distant rumour known first-hand only to military contractors and computer-science students, was just starting to enter the lives of the rest of us.

It was also the moment when I first learnt it was possible to do with digital communications what Osama bin Laden is now reported to have done. The technical name for it is steganography, from the Greek for "covered It is the art of keeping communications undetected and it is not to be confused with the related discipline of cryptography. Cryptography assumes that messages will be intercepted and uses codes and ciphers to make sure they can't be understood if they are. But steganography aims for a deeper sort of cover: it assumes that if the message is so much as found to exist, the game is over. Steganographic techniques are as old, at least, as Herodotus, who documented their use among the Greeks of the 5th century BC.

In Book Seven of The Histories, he writes that when Demaratus, a Spartan living in Persia, got wind of the emperor Xerxes' plan to invade Greece, he contrived to tip his compatriots off by sending them a stegotext: he took a pair of folding wooden message tablets, scraped the wax writing surface off them, wrote his message on the wood, then covered his message back over with wax. Persian counterintelligence never suspected a thing. Nor did the Persians have a clue when Histiaeus of Miletus sent a similarly subversive letter home tattooed onto the scalp of a trusted slave. The messenger arrived safely at his destination and said no more than what he'd been instructed to say: "Shave my head and look thereon." In contrast with cryptography, a field long given over to high maths and puzzle-making abstraction, steganography was always more or less a materials science, its history florid with the range of substances and gadgetry used at one time or another to conceal communications. Simon Singh's The Code Book relates that in the 1st century AD, Pliny the Elder explained It is in the numbers that hackers and spooks have looked for places to hide still more information.

the colour or tone of the sensory blip they represent, but a few stand for nuances the average eye or ear won't even pick up. These latter, the so-called least significant bits (LSBs), are effectively indistinguishable from noise from the random hiss and blur that shows up in any information channel. And since properly encrypted data is also indistinguishable from noise, it turns out that an untouched digital copy of a song or photograph is very hard to tell from a copy whose LSBs have been overwritten with a well-enciphered message. The collected LSBs of a Radfohead CD, for instance, might encode a completely undetectable blueprint of the Stealth bomber. I learnt digital steganography from one Timothy May, a 40-year-old microchip physicist who had retired from Intel a wealthy man.

May was soon to land on the cover of Wired magazine's debut issue as one of the founding members of the Cypherpunks, a mostly online collective of hardcore techno-libertarians united to promote the spread of digital encryption tools in what was then just beginning to be called cyberspace. Cryptography was itself about to hit a sort of big time. In mid-1993, the freshly elected Clinton administration would make its mark on technological history by announcing a new digital encryption standard, Clipper, equipped with an FBI-accessible backdoor aimed at heading of precisely what the Cypherpunks aimed to achieve: the complete invulnerability of private electronic communications to government surveillance. Grippingly chronicled in Steven Levy's new history of digital-age encryption, Crypto, the resulting political struggle between Clipper's backers at the FBI, CIA and the NSA on the one hand, and a coalition of hackers, civil-liberties advocates and software industrialists on the other, became the Internet's first great privacy crisis and arguably never ended. Today's Cypherpunk diehards, for instance, mostly dismissed the recent news about bin Laden's porn habit as yet another attempt by America's Three-Letter Agencies to soften up the populace for restrictions on crypto, and they might well have been right.

Though the Three-Letter Agencies long ago lost the Clipper battle (unbreakable crypto has become the infrastructural backbone of e-commerce), their panic-mongering pronouncements on terrorists' use of crypto suggests they may not have given up hopes of winning the war. But in the summer of '92, all that was future history. Cryptography was still just an obscurely fascinating field I had read about in David Kahn's crypto-history bible, The Codebreakers, and Tim May was just a guy whose obscurely fascinating remarks on the subject I had come across on my local bulletin board's Usenet feed. Out of professional curiosity, I got May on the phone one day and didn't get off for 45 minutes, during which time I did very little of the talking. "When Tim May thought about crypto," writes Levy in his chapter on the Cypherpunks, "it was almost like dropping acid" and when he talked about crypto it was almost like you'd drunk from the same spiked punch bowl.

He conjured visions of a worid in which entire virtual communities disappeared into the dark freedom of impenetrable privacy. A world in which anyone planning to give it a shot could do worse than look for precedent in the Nassau colony's overnight collapse at the first appearance of the law. "Blackbeard and 'Calico Jack' Rackham and his crew of pirate women moved on to wilder shores and nastier fates," writes Hakim Bey in his TAZ, "while others meekly accepted the Pardon and reformed." In the midst of all these less-than-thrilling changes, steganography, sadly and ironically enough, remains a mirror of its times. Rumours of terrorist applications notwithstanding, most interest in steganographic techniques these days comes from corporate researchers looking for a way to put digital locks on intellectual property. It turns out stego is pretty gdod for that: by weaving encrypted copyright information and serial numbers into the binary code of photos, songs and movies, rights owners can sear a sort of virtual brand into their property.

Digital watermarks, as they are called, have the usefully paired qualities of being (a) difficult to erase and (b) easy to trace. Some watermark schemes propose sending mark-hunting Web spiders out to troll for content pirates and ID them for prosecution. One imagines fleets of radio-sensitive vans cruising urban business districts, scanning for stego-marked electromagnetic emissions that would give away the presence of pirated software in nearby offices. Whether these plans will take hold in the real world remains to be seen, and may be beside the point. As in '92, so in '01 it's not so much the quality of the tech as the quality of the dreams behind the tech that give the tenor of the times.

And if pirate-chasing stego systems are where the dreams lie these days, then the times they are depressing. And yet I can't help hoping. The anarcho-visionary energy of the Cypherpunk movement may have dissipated siphoned off into the mundane importance of making the world safe for online credit-card transactions -but here and there imaginative hackers are still drawn to stego. They code their cool little apps: the JSteg, which hides data in JPEGs, and MP3Stego, which does the same with MP3S. There is Snow, which embeds information in the white space of text documents.

And the hilarious Spam Mimic, which translates brief messages into the semi-coherent raving of junk-email-speak. They're so much fun, these programs, that I suppose it's possible that fun is realty all they're about. And yet, all the same, their presence makes me suspect there's still an urge out there to drop off the radar, to find that dark freedom Tim May used to rant about. Certainty, they inspire my own small dream that somewhere, someone has embedded the text of Hakim Bey's tribute to pirate Utopias in an album's worth of Metallica MP3S and thrown it up on Napster, thereby ineradicabty marking his own connection to an act of piracy, daring them to come after him. Crypto: How the Code Rebels Beat the Government -Saving Privacy in the Digital Age by Steven Levy (Vikinq Books) $45.

The Code Book by Simon Singh (Fourth Estate) $19.95 Julian Dibbell is the author of My Tiny Life: Crinie and Passion in a Virtual World. A longer version of this article appeared in Feed magazine, www.feedmag.com. Cold War worid had Bfecome and the Net was then becoming. cnmp3 ipels mc3 1 It1 snot so much the quality of the tech as the quality of the dreams behind the tech that give the tenor of the times. -X' "emerging political structures in cyberspace" that, as its title indicates, includes a couple of Tim May's visionary rants as well.

But May's project was really just a more pragmatic version of Beys an attempt to frame the prospects for online autonomous zones in the only terms Net culture had ever really respected: rough consensus and running code. May laid a whole shopping list of cool hacks and peer-to-peer conspiracies on me anonymous remailers, untraceable e-cash, zero-knowledge markets in corporate secrets, pirated software and murder contracts -and each one grabbed my attention as if he were telling me the precise date and channel the revolution would be televised on. anything else that might too easily encode Axis intelligence. At one point, an entire shipment of watches was held up so officials could spin the dials and wipe out any messages hidden in the positions of the hands. The sweeping digitisation of communications technology has caused steganography at last to veer away from the material world, joining cryptography in the realms of mathematics and abstraction.

As ever, of course, information still reaches the mind in the form of concrete sensory stimuli as light and sound but increasingly it is the universal code of binary numbers that shapes that information. And it is in the numbers that hackers and spooks have looked for places to hide still more information. They have found those places. Digital stego takes a number of forms, but most of them are variations on the most popular technique (the one most likely to be used by Osama bin Laden and company if, in fact, they are using any at all) It's called "least significant bit" steganography, and to understand how it works you have to think a little about how digital media work. Consider the dots of light that compose an image on a computer screen.

Or the slivers of sound that blend together to form a song as it streams from a CD player. Each dot, each sliver, is recorded as a small number of bits ones and zeroes -maybe 16 of them, maybe 24. Most of the bits specify crucial information about cryogenics and the Gnostic dream of uploading human consciousness into computers. And yet, at its core, May's "crypto anarchist" vision resonated deeply with some of the latest wrinkles in soft Marxism coming out of the theory mills. In particular, it seemed almost to have taken direct inspiration from Hakim Bey's classic The Temporary Autonomous Zone, which celebrates not the final Utopias yearned for in traditional radicalism, but the brief liberatory grace of failed uprisings, transient communes and excellent parties smuggled out from under the controlling gaze of the state.

Inspired by the shadow history of pirate Utopias, the tropical island havens of democratic lawlessness to which 1 8th-century buccaneers repaired, Hakim Bey's notion of the temporary autonomous zone, or TAZ, embraced with guarded enthusiasm the possibility of virtual outlaw colonies taking quiet shape amid the burgeoning connections of the world's computer networks. "Islands in the Net," Bey called them, hip enough to borrow the phrase from arch-cyberpunk Bruce Sterling's latest novel. As it happens, The Temporary Autonomous Zone is about to be republished in the US by MIT Press in Crypto Anarchy, Cyberstates, and Pirate Utopias, an anthology of essays on These days, the moment when the Net could serve as an empty screen on which to project dreams of radical autonomy has long since passed. Already in 1995, the Net evangelist John Perry Barlow was drawing snickers from the post-soft-Marxist set for his "Declaration of the Independence of a classic bit of mailing-list bluster that proclaimed to the governments of the industrial world those "weary giants of flesh and steel" that their laws and their intellectual-property regimes held no sovereignty over "Cyberspace, the new home of Nowadays, the snickerers would probably find it a balm to be able to entertain the fantasy for just a moment or two. And as for those intellectual-property regimes well, let's just say that if ever there was a genuine pirate Utopia online, it was Napster, and that if ever there was an online equivalent to the appearance of His Majesty's gunships in the waters off the last genuine pirate Utopia before that, Blackbeard's shantytown at Nassau, it was the Ninth Circuit Court of Appeals judgment last month ef fectively handing Napster over to the record industry.

It's probably too soon to predict with any precision the future of Napster's 58 million-member but uriously, none of them captured my imagination like a certain minor hack he mentioned all markets were black and untaxable, and in which the tyranny of the nation-state withered inexorably away. A world always just beneath the surface of this one but at the same time light years distant, safe behind a wall of maths so thick that even the NSA's most powerful computers could never crunch through it. "You can get further away in cyberspace than you could in going to Alpha Centauri," May told me. "Some of these things sound like just a bunch of numbers, but what they really are is they're things which in computability space take more energy to get to than to drive a car to Andromeda." In a certain light, of course, May's prophecies were just an extreme form of sci-fi geekdom and not my cup of Kool-Aid. As it turned out, May was an energetic adept of Extropianism, a scientistic California semi-cult devoted to Ayn Rand, immortality through CO towards the end of our conversation, almost in passing.

The hack was LSB stego, and what so thrilled me about it was the idea that any piece of information I came across on the Net might secretly hold within it yet another piece, which for that matter might contain another one in its turn, and so on and on. It was the way it literalised how pregnant with possible futures the post- how the milk of thethithymallus plant dried to transparency when applied to paper but darkened to brown when.

Get access to Newspapers.com

  • The largest online newspaper archive
  • 300+ newspapers from the 1700's - 2000's
  • Millions of additional pages added every month

Publisher Extra® Newspapers

  • Exclusive licensed content from premium publishers like the The Sydney Morning Herald
  • Archives through last month
  • Continually updated

About The Sydney Morning Herald Archive

Pages Available:
2,319,638
Years Available:
1831-2002