Reversing the Steganography Myth in Terrorist Operations: The Asymmetrical Threat of Simple Intellig
Commonly available IT software and equipment such as 802.11b wireless networks, laptop and desktop computers, high-capacity media devices, and a little creative thinking, make it possible, indeed simple, to facilitate efficient, short-duration, and completely anonymous communications between even...