It looks like you're using an Ad Blocker.
Please white-list or disable AboveTopSecret.com in your ad-blocking tool.
Thank you.
Some features of ATS will be disabled while you continue to use an ad-blocker.
Ken Buckler, a Senior Cyber Security expert at a major defense firm, began analyzing images distributed by members of Anonymous via social media. He focused in particular on a very popular Anonymous Twitter account – @YourAnonNews – that has over 100,000 Twitter followers and is a prolific source of news items regarding the activities of Anonymous. Suggestions the image had been cropped, and the cropping explained the data discrepancy, were taken in account. Buckler retested the images by cropping the originals and comparing the results, and was able to rule out cropping as an explanation for the additional data in the images. An article detailing his analysis of these images is published on Buckler’s blog “Caffeine Security.”
I recently started analyzing several images being re-posted by the Twitter handle @YourAnonNews. Out of 51 images analyzed I found two images which returned "positive" as having embedded data, as well as two additional images which generated errors during analysis (possibly obfuscated?).
For terrorists, Anonymous is an invitation to join a loosely affiliated group of people who don’t know who each other are, most often don’t care to find out, and share a love for attacking governments and civilian targets with little to no concern for collateral damage. Read more: sofrep.com...
Originally posted by dirtybird
what program are you running as a detector?