Menu
  • Home
  • My Books
  • Courses
  • About Me
  • Contact
  • Home
  • My Books
  • Courses
  • About Me
  • Contact

Brett Shavers | Ramblings

Brett's Ramblings

Subscribe to blog
Unsubscribe from blog
Settings
Sign In
If you are new here, Register
  • Forget Username
  • Reset Password
Font size: + –
Subscribe to this blog post Unsubscribe
Report
Print
1 minute reading time (170 words)

White Paper: The Susceptibility of Interconnected Devices in a Global Concept as Surveillance Affects the Consumer-user

Digital Forensics
Brett Shavers
Wednesday, 16 December 2020
4613 Hits
0 Comments
hacked

I read an article that China used technology to spy on users via their phones (https://www.theguardian.com/us-news/2020/dec/15/revealed-china-suspected-of-spying-on-americans-via-caribbean-phone-networks). 

Here is my white paper analysis.

#1 - If a device has connectivity with at least one other device, it can be,  has been, or will be compromised.

#2 - If a device has the ability for connectivity with at least one other device but isn't connected yet, see #1.

#3 - If a device is airgapped from any other device, it can still be compromised.

#4 - If a device has a speaker, someone you don't know can hear you.

#5 - If a device has a camera, someone you don't know can see you.

#6 - If one nation-state is monitoring your device, probably another one is too (maybe your own government!).

The good news is that criminals are more easily identified, tracked, arrested, charged, convicted, and incarcerated.

The bad news is that every bit of your life is logged somewhere, by multiple entities without your consent or knowledge.

 

Tweet
Share on Pinterest
0
I took a look at Instagram's Terms of Service so t...
How long does it take to get into the DFIR field?

About the author

Brett Shavers

Brett Shavers

 

Comments

No comments made yet. Be the first to submit a comment
Guest
Saturday, 16 January 2021

Captcha Image

By accepting you will be accessing a service provided by a third-party external to https://brettshavers.com/

direct link

Brett's blog

Posts List

Tag Cloud

bitcoin wiretap Jimmy Weg bitcoin forensics Bitcoin Forensics windows fe windows forensic environment phishing Hacker email Windows Forensic Environment privacy gmail tor browser 4cast imaging North korea X-Ways Forensics forensics dfir training expert Placing the Suspect Behind the Keyboard Hiding Behind the Keyboard winfe Registry Forensics investigations Volume Shadow Copy RegRipper X-Ways Forensics Practitioner's Guide case studies writing surveillance book presentations investigation Virtualization University of Washington

Search Blog

DFIR Training

Be sure to check out my DFIR Training website for practically the best resources for all things Digital Forensics/Incident Response related.


Even better, support DFIR Training by subscribing at https://www.dfir.training/subscribe-3 and get access to multiple online courses in digital forensics with included ebooks!

© 2021 Brett Shavers