Threats
Public-Chargers
[!toc] Table of Contents Public “chargers” can be found, for example, in public transportatio...
Forensics
[!toc] Table of Contents Introduction Forensics is a collective term for fields of work in wh...
Phishing
[!toc] Table of Contents Phishing via email or text message is generally more commonly associ...
Silent-Sms
[!toc] Table of Contents SMS is the protocol by which standard text messages are delivered to...
Shoulder-Surfing
[!toc] Table of Contents Shoulder surfing is when someone secretly looks over your shoulder t...
Meta-Data
[!toc] Table of Contents Here we describe what metadata is and where it can be found. If you ...
Data-Dogs
[!toc] Table of Contents [!info] TL;DR {static} Data dogs, similar to drug detection dogs, ...
Radio-Cell-Interrogation
[!toc] Table of Contents To understand this chapter, it is necessary to understand the basic ...
Mobile-Communication
[!toc] Table of Contents First, some basic information about threats in the field of mobile c...
Network-Surveillance
[!toc] Table of Contents Monitoring of traffic data This is usually what is meant when people...
Logger
[!toc] Table of Contents Loggers are devices that can be used to ‘log’ or record something. T...
Imsi-Catcher
[!toc] Table of Contents An IMSI catcher, also known as Cell-Site Simulator or "Stingray", is...