TRACE THE INTRUDER

You use advanced tools to try and trace the origin of the rogue devices. It’s risky—but you uncover masked IPs and suspicious traffic.

Someone is definitely watching. And now, you might be watching them back.

"Digital shadows work both ways."

How do you proceed?

  1. Report the activity to your internet provider.
  2. Flood the connection with false data and misdirection.
  3. Shut everything down and go off-grid immediately.