This report will explore the art of hiding data as it traverses a network. This paper will analyze motivations for network covert channels, survey current data hiding research and tools, and evaluate countermeasures to detect and prevent network-based steganography.