• Steganography is limited in scope. It requires specific tools and knowledge for using them. While both are readily attainable, they require some effort to master. In the case of terrorist cells, disseminating this knowledge poses the significant risk of establishing a traceable link among groups that otherwise might not (or should not) know each other exists.
• Steganography is easily traceable since it requires specific tools to function properly. Thus, computer systems that include such tools would normally signify a user with advanced knowledge to mask and then unmask data within images and perhaps a more sinister goal than typical end users.
• Steganography can be undone by others with similar tool sets or other forensic capabilities. Thus, the mere presence of data hidden within a system's images allows law enforcement authorities to make certain assumptions and take their investigation to the next level.