Virtually every computer, smartphone, and internet-enabled mobile device has a camera and microphone that can be used by malicious threat actors to surveil and spy on the user. Using malware such as NanoCore RAT and Nuclear RAT 2.0, Cyber Criminals, Script Kiddies, and Nation State APTs can compromise devices and remotely monitor the activities of unsuspecting users and organizations.
In this Analysis, entitled “America Exposed: Who’s Watching You Through your Computer’s Camera,” ICIT shines a spotlight on this underreported epidemic by discussing:
- The evolution of surveillance capabilities in computing devices
- Examples of malware used by malicious actors to gain access to cameras and microphones
- “Webcam Gate” and creepy gaming surveillance technology
- Strategies on how to mitigate mass camera-based surveillance
This paper was authored by James Scott, Sr. Fellow, ICIT.
You can download this paper here: https://icitech.org/wp-content/uploads/2017/05/ICIT-Analysis-America-Exposed.pdf