Threats
Public-Chargers
[!toc] Table of Contents Public “chargers” can be found, for example, in public transportation...
Forensics
[!toc] Table of Contents Introduction Forensics is a collective term for fields of work in whi...
Phishing
[!toc] Table of Contents Phishing via email or text message is generally more commonly associa...
Silent-Sms
[!toc] Table of Contents SMS is the protocol by which standard text messages are delivered to ...
Shoulder-Surfing
[!toc] Table of Contents Shoulder surfing is when someone secretly looks over your shoulder to...
Meta-Data
[!toc] Table of Contents Here we describe what metadata is and where it can be found. If you j...
Data-Dogs
[!toc] Table of Contents [!info] TL;DR {static} Data dogs, similar to drug detection dogs, ar...
Radio-Cell-Interrogation
[!toc] Table of Contents To understand this chapter, it is necessary to understand the basic c...
Mobile-Communication
[!toc] Table of Contents First, some basic information about threats in the field of mobile co...
Network-Surveillance
[!toc] Table of Contents Monitoring of traffic data This is usually what is meant when people ...
Logger
[!toc] Table of Contents Loggers are devices that can be used to ‘log’ or record something. Tw...
Imsi-Catcher
[!toc] Table of Contents An IMSI catcher, also known as Cell-Site Simulator or "Stingray", is ...