Ways that terrorists could use
steganography
¨ Tourist-information website
Sender would only need to upload a new
picture to the site
Receiver: Just viewing the page would put the
image in their computer’s cache
Stego utilities could be run later to decrypt
message