Weaknesses of the Michigan
Study
Only looking for very specific types of
steganographic encryption, and only of jpeg
files
Outguess, Jsteg, JPHide
Not looking for S-Tools
Not looking for any .bmp, .gif, or .wav files
Terrorists may have their own independent apps
Only looked in two places:  eBay, and
USENET