Reversing the Steganography Myth in Terrorist Operations: The Asymmetrical Threat of Simple Intellig

Commonly available IT software and equipment such as 802.11b wireless networks, laptop and desktop computers, high-capacity media devices, and a little creative thinking, make it possible, indeed simple, to facilitate efficient, short-duration, and completely anonymous communications between even...
By
Robert Bagnall
August 19, 2002

All papers are copyrighted. No re-posting of papers is permitted

470x382_Generic_Whitepaper.jpg