. "In fact, organizations such as Al-Qaeda and other terrorist are known to use this process to hide information in harmless images hosted on Web sites." . . .