Home 13. Hiding in Porn Sites
Chapter
Licensed
Unlicensed Requires Authentication

13. Hiding in Porn Sites

View more publications by Yale University Press
Prisoners, Lovers, and Spies
This chapter is in the book Prisoners, Lovers, and Spies
28413Hiding in Porn SitesUSA Today startled the world in February 2001 when Jack Kelley reported that terrorists might be hiding blueprints to attack the United States of America in X-rated pictures on pornographic websites. The very thought was enough to galva-nize federal law enforcement officials into action. But unlike e-mails and phone calls, tracking messages in digital photographs posed a special challenge, because both the message and the very act of communication are hidden. Investigators never did find those nefarious messages in X-rated pictures, at least not in 2001. For the next ten years they searched and searched, to no avail. Niels Provos and Peter Honeyman, leading informa-tion security specialists at the University of Michigan, reported that they “analyzed two million images” from the eBay auction website but did not “find a single hidden message.”1 There was nothing there, or so they thought.Ten years later, computer forensics experts from the German Federal Criminal Police (BKA) hit pay dirt. In May 2011, Maq-sood Lodin, an Austrian national on a watch list, was detained, questioned, and searched by Berlin police because he had just returned from Pakistan and was suspected of having attached himself to militant Jihadists on the Pakistan-Afghanistan bor-der. In the course of the search, police were surprised to find
© Yale University Press, New Haven

28413Hiding in Porn SitesUSA Today startled the world in February 2001 when Jack Kelley reported that terrorists might be hiding blueprints to attack the United States of America in X-rated pictures on pornographic websites. The very thought was enough to galva-nize federal law enforcement officials into action. But unlike e-mails and phone calls, tracking messages in digital photographs posed a special challenge, because both the message and the very act of communication are hidden. Investigators never did find those nefarious messages in X-rated pictures, at least not in 2001. For the next ten years they searched and searched, to no avail. Niels Provos and Peter Honeyman, leading informa-tion security specialists at the University of Michigan, reported that they “analyzed two million images” from the eBay auction website but did not “find a single hidden message.”1 There was nothing there, or so they thought.Ten years later, computer forensics experts from the German Federal Criminal Police (BKA) hit pay dirt. In May 2011, Maq-sood Lodin, an Austrian national on a watch list, was detained, questioned, and searched by Berlin police because he had just returned from Pakistan and was suspected of having attached himself to militant Jihadists on the Pakistan-Afghanistan bor-der. In the course of the search, police were surprised to find
© Yale University Press, New Haven
Downloaded on 10.10.2025 from https://www.degruyterbrill.com/document/doi/10.12987/9780300188257-014/html?srsltid=AfmBOoog4ZwPKefPHeHoUersgbth1qj1SZXpH_fAQr85jRkV1ZIRvmmo
Scroll to top button