|
g) If you were able to extract any of the information, please provide details on the method used here. |
|
|
|
b) How was steganography used? |
|
|
|
7. a) Please provide a brief description of the case. |
|
|
|
c) What prompted you to look for it? |
|
|
|
d) What methods were used to locate it? |
|
|
|
e) Where was the user(s) of the steganography located (geographically)? |
|
|
|
f) What steganography software (or traces) or algorithms were used and how did you discover this? |
|
|