Chapter 10
Forensics and Anti-Forensics
Information in this chapter:
Introduction
Anti-Forensics—Hiding your tracks
Forensics
Introduction
It has long been rumored that al-Qaeda uses data hiding techniques to covertly exchange documents related to terrorist plots. Over the last 10 years, al-Qaeda manuals have been found to contain techniques for covert communications using steganography programs and techniques. On May 16th, 2011, an Austrian named Maqsood ...
Get Data Hiding now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.