Leggo my steggo!
Many observers that monitor the Internet suggest that due to the effects of intensified counterterrorism efforts worldwide,Islamic extremists are gravitating toward the Internet, and are succeeding in organizing online where they have been failing in the physical world. Terrorist
groups increasingly use online services for covert messaging, through steganography, anonymous e-mail accounts, and encryption
CRS RL33123 Report for Congress Jan, 2007
Last site I downloaded the jpg files off of contained about 200 jpeg files that fit the 50-500K size requirements I set. Out of those so far, I have washed approximately 60 through stegdetect. So far I have 4 “high” probability jphide stegged images.
Hmmmmm……
Uhh Niels, what was it you were saying about not finding that the Jihadists were using steg?
Leave a comment