Alter the hardware configuration of a system to limit what an adversary can do with the device.
Hardware Manipulation can be making physical or configuration changes, including physically removing a system's microphone, camera, on-board Wi-Fi adapter, etc. or using other controls to disable those devices.
|There is an opportunity to alter the system to prevent an adversary from capturing audio content.
|There is an opportunity to alter the system to prevent an adversary from capturing video content.
|A defender can physically remove or disable a system's microphone and web camera so that audio capture is not possible.
|A defender can physically remove or disable a system's web camera and remove any video capture applications so that video capture is not possible.
|Remove the microphone from a laptop to prevent an adversary from capturing audio from the device.
|Remove the Wi-Fi hardware from a device to prevent an adversary from enabling and using a Wi-Fi connection.