Steganography: how al-Qaeda hid secret documents in a porn video

Maybe the subtitle should be:  How the War on Terror, is over….

When a suspected al-Qaeda member was arrested in Berlin in May of 2011, he was found with a memory card with a password-protected folder—and the files within it were hidden. But, as the German newspaper Die Zeitreports, computer forensics experts from the German Federal Criminal Police (BKA) eventually uncovered its contents—what appeared to be a pornographic video called “KickAss.”

Within that video, they discovered 141 separate text files, containing what officials claim are documents detailing al-Qaeda operations and plans for future operations—among them, three entitled “Future Works,” “Lessons Learned,” and “Report on Operations.”

So just how does one store a terrorist’s home study library in a pirated porn video file? In this case the files had been hidden (unencrypted) within the video file through a well-known approach for concealing messages in plain sight: steganography.

Read the Rest of ArsTechnica’s look at how al-Qaeda hid secret documents in a porn video.