Page 1 of 1
1. Why might it be important to confiscate a suspects computer and identify the
Web sites visited with it and the kinds of images found on it?
It may contain website history or images that pertain to the case.
2. Explain what the
Page 1 of 2
There are 3,022 total sorted files.
Low Suspect 586
Highly Suspect 1
Page 2 of 2
The export option made everything into a folder and made the files into .MD5
files. I wasnt expecting this type of format for
Page 1 of 4
File Name and size:
Challenge.bmp = 113KB
Description: picture of a red Camaro in a field
ConfederateCipher.bmp = 3.60MB
Description: picture of a confederate cipher disc
MountRainier.bmp = 19.1MB
Description: picture of mount Rai
1. What is steganography?
the practice of concealing messages or information within other nonsecret text or data.
2. Describe a legitimate business need to leverage steganography.
An artist can add watermarks to his/her digital works to eliminate copyrigh