concentric circles of trust infographic - privoro · concentric circles of trust infographic...

1
WHO IT IS: The target’s inner circle typically consists of immediate family, close friends, trusted colleagues and others with whom the target speaks freely about sensitive matters. WHAT’S AT STAKE: If the target has a sensitive conversation in the presence of a smartphone belonging to a member of the inner circle and the device is compromised, the target’s protections may be bypassed. HOW TO PROTECT: Because keeping the inner circle’s smartphones away from sensitive conversations and holding back information are unrealistic options, the same standard of care given to the target’s smartphone should be afforded to these devices. WHO IT IS: Members of the target’s outer circles run the gamut from friends to acquaintances to complete strangers. WHAT’S AT STAKE: Sensitive details tend to slip out – either inadvertently or out of necessity – in conversations between the target or inner circle and members of the outer circles. HOW TO PROTECT: Instead of taking a leap of faith that the smartphone of a key member of the outer circle hasn’t been compromised, such a person can be treated as a member of the inner circle and provided with trusted anti-surveillance protections, even on a temporary or as-needed basis. WHO IT IS: Frequent targets of mobile eavesdropping include military leaders, soldiers, politicians, corporate executives, journalists and anyone with access to sensitive information. WHAT’S AT STAKE: By hijacking the microphones of the target’s smartphone, threat actors essentially turn the device into a live bug that can hear everything the target says and everything the target hears. HOW TO PROTECT: Because the target’s compromised smartphone is virtually always at the center of sensitive conversations, providing trusted anti-surveillance protections for this device is critical. For sophisticated threat actors, the use of mobile eavesdropping via hijacked smartphone microphones is rarely limited to the actual target. Instead, the scope of surveillance extends to the mobile devices of the target’s inner circle and sometimes beyond. Protecting the target’s sensitive conversations from capture requires an understanding of the group dynamics of mobile eavesdropping. © 2019 PPIP, LLC. All rights reserved. PVOCONJ102V01

Upload: others

Post on 08-Aug-2020

2 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Concentric circles of trust infographic - Privoro · Concentric circles of trust infographic Created Date: 4/29/2019 2:46:13 PM

WHO IT IS: The target’s inner circle typically consists of immediate family, close friends, trusted colleagues and otherswith whom the target speaks freely about sensitive matters.

WHAT’S AT STAKE: If the target has a sensitive conversation inthe presence of a smartphone belonging to a member of the inner circle and the device is compromised, the target’s protections may be bypassed.

HOW TO PROTECT: Because keeping the inner circle’s smartphones away from sensitive conversations and holding back information are unrealistic options, the same standard of care givento the target’s smartphone should be a�orded to these devices.

WHO IT IS: Members of thetarget’s outer circles run the gamut from friends to acquaintances to complete strangers.

WHAT’S AT STAKE: Sensitive details tend to slip out – either inadvertently or out of necessity – in conversations between the target or inner circleand members of the outer circles.

HOW TO PROTECT: Instead oftaking a leap of faith that the smartphone of a key memberof the outer circle hasn’t been compromised, such a person canbe treated as a member of the inner circle and provided with trusted anti-surveillance protections, evenon a temporary or as-needed basis.

WHO IT IS: Frequent targets of mobile eavesdropping include military leaders, soldiers, politicians, corporate executives, journalistsand anyone with access tosensitive information.

WHAT’S AT STAKE: By hijackingthe microphones of the target’s smartphone, threat actors essentially turn the device into a live bug that can hear everything the target says and everything the target hears.

HOW TO PROTECT: Because the target’s compromised smartphoneis virtually always at the center of sensitive conversations, providing trusted anti-surveillance protections for this device is critical.

For sophisticated threat actors, the use of mobile eavesdropping via hijacked smartphone microphones is rarely limited to the actual target. Instead, the scope of surveillance extends to the mobile devices of the target’s inner circle and sometimes beyond. Protecting the target’s sensitive conversations from capture requires an understanding of the group dynamics of mobile eavesdropping.

© 2019 PPIP, LLC. All rights reserved. PVOCONJ102V01