Preparation
Archive Data
Authorization Token Staging
Boot Order Manipulation
CCTV Enumeration
Circumventing Security Controls
Data Obfuscation
Data Staging
Device Mounting
Email Collection
External Media Formatting
File Download
File Exploration
Impersonation
Increase Privileges
IT Ticketing System Exploration
Joiner
Media Capture via External Device
Mover
Network Scanning
On-Screen Data Collection
Persistent Access via Bots
Physical Disk Removal
Physical Exploration
Physical Item Smuggling
Private / Incognito Browsing
Read Windows Registry
Remote Desktop (RDP)
Security Software Enumeration
Social Engineering (Outbound)
Software Installation
- Installation of Dark Web-Capable Browsers
- Installing Browser Extensions
- Installing Browsers
- Installing Cloud Storage Applications
- Installing FTP Clients
- Installing Messenger Applications
- Installing Note-Taking Applications
- Installing RDP Clients
- Installing Screen Sharing Software
- Installing SSH Clients
- Installing Virtual Machines
- Installing VPN Applications
Software or Access Request
Suspicious Web Browsing
Testing Ability to Print
VPN Usage
- ID: PR034
- Created: 20th February 2026
- Updated: 20th February 2026
- Contributor: The ITM Team
Media Capture via External Device
The subject uses an external recording device, such as a personal mobile phone, tablet, wearable camera, or dedicated camera, to capture photographs, video, or audio of sensitive information displayed or stored within the organization’s environment.
This method is commonly used to collect information from computer screens, whiteboards, printed documents, internal dashboards, source code repositories, financial records, or physical access areas. The subject may position the device discreetly to photograph multiple screens, record walkthroughs of restricted areas, or document proprietary material during meetings or presentations.