- Introduction to Steganography
- The Steganography Scenario
- The Security Breach
- Corrective Actions
- Don't Be an Unwitting Collaborator
Don't Be an Unwitting Collaborator
Although some research indicates that terrorists are not using advanced computer tools to hide messages in innocuous-looking web images, others believe that methods used by the "doubting Thomases" were particularly aimed at uncovering use of steganographic tools already released on the Internet. Critics of the research state that there are more advanced methods of hiding communications within images that involve using active as well as redundant parts of the underlying code.
Whatever the case, people inside your organization may be using steganographic methods to exchange messages and secrets, and it's up to you to guard against the use of your resources for malicious purposes.