I recently completed a project looking at the OSI 7 layer model. The concept of the paper was to identify a variety of methods to obscure or remove all traces of the orginators message. This is a project related to my PhD research on cyber warfare. The idea of traitor tracing (usually watermarks and encryption) being expanded to other methods of tracing or identifying rogue entities in an organization. Looking at the OSI 7 layer model we can remove every trace, at every level, between two end points of any communication. And, even if detected it is encrypted in such a way as any message would be OBE before forced decryption. Literally keyboard of sender to monitor of receiver the message is untraceable. For some reason people don't want me to publish the paper. I wonder why.