Chapter 10

Forensics and Anti-Forensics

Information in this chapter:

ent Introduction

ent Anti-Forensics—Hiding your tracks

ent Forensics

Introduction

It has long been rumored that al-Qaeda uses data hiding techniques to covertly exchange documents related to terrorist plots. Over the last 10 years, al-Qaeda manuals have been found to contain techniques for covert communications using steganography programs and techniques. On May 16th, 2011, an Austrian named Maqsood ...

Get Data Hiding now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.