Explains exactly what steganography is–hiding a message inside an innocuous picture or music file–and how it has become a popular tool for secretly sending and receiving messages for both the good guys and the bad guys First book to describe international terrorists′ cybersecurity tool of choice in an accessible language Author is a top security consultant for the CIA and provides gripping stories that show how steganography works Appendix provides tools to help people detect and counteract stenanography
From the Back Cover Your hands–on guide to understanding, detecting, and using today’s most potent tool for secret communication–steganography These days, encryption of confidential data and communications is an increasingly important part of doing business. But steganography can take data confidentiality to a whole new level, since it hides encrypted messages in ordinary–looking data files, making the very existence of the messages practically undetectable. Although steganography is not a new field and has played a critical part in secret communication throughout history, few people understand exactly how it works today. This detailed, practical guide changes that–whether your goal is to add an extra level of security to business or government communications or to detect and counter steganography when it’s used by criminals or terrorists.