- AR3
- -PR037
Oversight Circumvention and Control Degradation - AR3
Contributor: The ITM Team @ - Section PR037
- AR2
- -ME031
Unmanaged Device Presence - AR2
Contributor: The ITM Team @ - Section ME031
- AR4
- -IF030
Exfiltration via SMS/MMS - AR4
Contributor: The ITM Team @ - Section IF030
- AR4
- -IF031
Unauthorized Presence in Restricted Physical Areas - AR4
Contributor: The ITM Team @ - Section IF031
- AR4
- -IF032
External Credential Sharing - AR4
Contributor: The ITM Team @ - Section IF032
- AR3
- -PR039
Observational Information Gathering - AR3
Contributor: The ITM Team @ - Section PR039
- AR4
- -IF033
Digital Defacement - AR4
Contributor: The ITM Team @ - Section IF033
- AR4
- -IF034
Exfiltration via Automated Transcription - AR4
Contributor: The ITM Team @ - Section IF034
- AR4
- -IF036
Misuse of Corporate Communication Channels - AR4
Contributor: The ITM Team @ - Section IF036
- AR4
- -IF037
Physical Sabotage - AR4
Contributor: The ITM Team @ - Section IF037