Contact Sales
Contact Sales

Reversing the Steganography Myth in Terrorist Operations: The Asymmetrical Threat of Simple Intellig

Reversing the Steganography Myth in Terrorist Operations: The Asymmetrical Threat of Simple Intellig (PDF, 2.24MB)Published: 19 Aug, 2002
Created by:
Robert Bagnall

Commonly available IT software and equipment such as 802.11b wireless networks, laptop and desktop computers, high-capacity media devices, and a little creative thinking, make it possible, indeed simple, to facilitate efficient, short-duration, and completely anonymous communications between even casual hosts. This paper discusses various ways and methods for simple, clandestine communications that are virtually undetectable and untraceable using common technology.

Reversing the Steganography Myth in Terrorist Operations: The Asymmetrical Threat of Simple Intellig