SI
SI
discoversearch

We've detected that you're using an ad content blocking browser plug-in or feature. Ads provide a critical source of revenue to the continued operation of Silicon Investor.  We ask that you disable ad blocking while on Silicon Investor in the best interests of our community.  If you are not using an ad blocker but are still receiving this message, make sure your browser's tracking protection is set to the 'standard' level.
Politics : War

 Public ReplyPrvt ReplyMark as Last ReadFilePrevious 10Next 10PreviousNext  
To: Carolyn who wrote (9085)11/21/2001 8:51:01 AM
From: GUSTAVE JAEGER  Read Replies (1) of 23908
 
Re: Ah, Gus. So On Topic. Why is it that we don't see flying carpets, unicorns, genies, trolls, elves and faeries any more?

These magic carpet stories are on-topic indeed --it's just a matter of reading between the lines of these centuries-old Central Asian fairytales. See by yourself:

Excerpted from my post #9041:

Another important motif in Azerbaijani legends is that carpets can "talk": not in human speech, but through their patterns. In one story a king was saved by his own skill at carpet weaving. Kidnapped, he wove a carpet which merchants carried from country to country until his wife chanced to see it, deciphered the message in the symbols, and arranged for his rescue.

And here's how it translates into our modern world:

Friday September 21 05:01 PM EDT

Experts say Osama's men used encrypted messages on the Internet to communicate

By Sam Handlin, Court TV


For members of Osama bin Laden's terrorist network, a picture could really tell a thousand words —but ordinary people and law enforcement personnel might not know it.

Authorities trying to follow the cyber-trail of terrorists linked to recent attacks face a daunting task. While some e-mails between operatives in America have been recovered, bin Laden's organization also uses a full array of encryption tactics, experts say, including concealing hidden messages within the source codes of images, in order to communicate covertly over the Internet.

During a meeting in with the Senate Intelligence Committee last February, security officials reportedly said that bin Laden's associates were hiding messages in image files and chat rooms on the Internet, perhaps even within online pornography — a bizarre choice for the devout Muslims.

"They put encrypted messages within all sorts of files. Bin Laden's up on the latest technologies. The guy can do anything that any other techno-junkie is capable of," says Harvey Kushner, criminal justice professor and author of "Terrorism in America and The Future of Terrorism: Violence in the New Millennium."

Image files just consist of source code, and concealing text within that code isn't that difficult, according to Dorothy Denning, a Georgetown University computer science professor and expert on cyber-terrorism.

"It's very simple, I'm afraid," she says. "There are simple and easily available software tools for this. You select an image file. You type your covert message in another file, then combine and encrypt them with the software program. It will ask you for a password, which is the encryption key. Then somebody else with the password can uncover the message, but it won't be apparent to anybody else."
[snip]

google.com
Report TOU ViolationShare This Post
 Public ReplyPrvt ReplyMark as Last ReadFilePrevious 10Next 10PreviousNext