Worry: VoIP especially suitable for conveying hidden messages

Published 5 June 2008

Steganography involves concealing messages within digitally transmitted images or sound files; VoIP systems tolerate packet loss and have built-in redundancy, and are thus especially suitable for conveying hidden messages; law enforcement officials have expressed frustration about the difficulty of deciphering VoIP messages made by suspected terrorists using Skype

Polish researchers have revealed the many ways it is possible to hide messages within the bit stream of Voip phone calls. If security agencies did not like Skype and its IP telephony cousins before, they will really hate it now. The Register’s John Leyden writes that burying hidden message in Internet phone calls represents the latest evolution of steganography. Steganographic techniques for hiding messages have been around for as long as cryptography and have evolved with technology. Steganography once included messages hidden in wax tablets by the ancient Greeks and invisible ink and microdots on paper. Now it involves concealing messages within digitally transmitted images or sound files. The advantage of steganography over simply scrambling messages using cryptographic techniques is that potential eavesdroppers do not know to what to listen. Subtle changes to images, the content of spam messages, or a little extra noise in voice over IP communications are hard to detect and impossible to decipher without knowing that a message is there and applying appropriate unbundling and deciphering software.

The possibility of dropping hidden messages within the lowest bits of noisy sound files is not new in itself. Wojciech Mazurczyk and Krzysztof Szczypiorski, security researchers at Warsaw University of Technology, Poland, have extended this work to show how steganography techniques might be used to create a covert communications channel within VoIP streams. In particular the researchers have developed two new techniques that exploit the fact that VoIP systems tolerate packet loss and have built-in redundancy. One approach exploits unused fields in the RTCP (Real-Time Control Protocol) and RTP (Real-Time Transport Protocol) protocols to transmit hidden messages. Another technique used delayed audio packets to hide covert communications. Mazurczyk and Szczypiorski’s paper also goes through many other possible techniques for VoIP steganography. In an experiment the researchers were able covertly to transmit more than 1.3 Mbits of data in one direction during a VoIP call lasting nine minutes, the average time for such calls. Mazurczyk and Szczypiorski found that protocol steganography was by far the quickest way to transmit covert messages.

Law enforcement officials have expressed frustration about the difficulty of deciphering VoIP messages made by suspected terrorists using Skype. Leaked documents suggest that the German police has commissioned the development of software to intercept Skype VoIP communications and SSL transmissions. This difficulties exist because of the cryptography natively employed by Skype without even considering the complicating factor of steganography.

-read more in Mazurczyk’s and Szczypiorski’s paper on “Steganography of VoIP Streams”