Audio and video input devices connected to computers for
multi-media applications are exploited to allow attackers to look at and
listen to events at remote locations. Examples include most versions of
video and audio equipment currently connected to multi-media workstations
and some video-phone systems.
Complexity: Audio and video viewing attacks
normally depend on breaking into the operating system and then enabling a
built-in function. The complexity lies primarily in breaking into the
system and not in turning on the viewing function.