Talk With an Expert

Reversing the Steganography Myth in Terrorist Operations: The Asymmetrical Threat of Simple Intellig

Reversing the Steganography Myth in Terrorist Operations: The Asymmetrical Threat of Simple Intellig (PDF, 2.24MB)Published: 19 Aug, 2002
Created by
Robert Bagnall

Commonly available IT software and equipment such as 802.11b wireless networks, laptop and desktop computers, high-capacity media devices, and a little creative thinking, make it possible, indeed simple, to facilitate efficient, short-duration, and completely anonymous communications between even casual hosts. This paper discusses various ways and methods for simple, clandestine communications that are virtually undetectable and untraceable using common technology.