Slide 1 Steganography and Steganalysis What’s hiding on your suspect’s computer? Slide 2 A Net-Centric DoD NII/CIO Clarke’s Third Law 2 “Any sufficiently advanced…