- AR3
- -PR037
Oversight Circumvention and Control Degradation - AR3
Contributor: The ITM Team @ - Section PR037
- AR2
- -ME031
Unmanaged Device Presence - AR2
Contributor: The ITM Team @ - Section ME031
- AR4
- -IF030
Exfiltration via SMS/MMS - AR4
Contributor: The ITM Team @ - Section IF030
- AR2
- -ME003
- -ME003.001
Virtual Machines - AR2
Contributor: The ITM Team @ - Subsection ME003.001
- AR2
- -ME003
- -ME003.002
VPN Applications - AR2
Contributor: The ITM Team @ - Subsection ME003.002
- AR2
- -ME003
- -ME003.003
Browsers - AR2
Contributor: The ITM Team @ - Subsection ME003.003
- AR2
- -ME003
- -ME003.004
Browser Extensions - AR2
Contributor: The ITM Team @ - Subsection ME003.004
- AR2
- -ME003
- -ME003.005
Cloud Storage Applications - AR2
Contributor: The ITM Team @ - Subsection ME003.005
- AR2
- -ME003
- -ME003.006
Note-Taking Applications - AR2
Contributor: The ITM Team @ - Subsection ME003.006
- AR2
- -ME003
- -ME003.007
Messenger Applications - AR2
Contributor: The ITM Team @ - Subsection ME003.007