ITM is an open framework - Submit your contributions now.

Insider Threat Matrix™Insider Threat Matrix™
  • ID: IF003.003
  • Created: 31st May 2024
  • Updated: 14th June 2024
  • Contributor: The ITM Team

Exfiltration via Audio Capture

A subject uses an external device, such as a mobile phone or camera, to take record audio containing sensitive information, such as conversations.