Who Uses Covert Channels? Cracker who has breached your systems: Download tools from outside Upload internal data to outside Create virtual network to outside machine Communicate to outside parties