ITM is an open framework - Submit your contributions now.

Insider Threat Matrix™Insider Threat Matrix™
  • ID: IF003.001
  • Created: 31st May 2024
  • Updated: 14th June 2024
  • Contributor: The ITM Team

Exfiltration via Photography

A subject uses a device, such as a mobile phone or camera, to take photos containing sensitive information.