i was thinking about 'hidden powerline networking' as a threat
the other day. basically anything that could be plugged into a
socket with hidden one-way networking on chip, that would
be able to siphon network data or use as a sensor or bug &
send this data into a larger circuit, say apartment electrical
wires that could be picked up remotely as frequencies that
are outside ordinary spec, at another onsite location such
that a device simply is plugged into the same site to reveal
or tap into the data. i imagine this is completely TRIVIAL
to accomplish, especially due to no regulatory/enforcement
or consumer protections in a security or commercial context
as it aids surveillance goals, especially in political framework
of secret policing, informers, etc. spying by the populations.

such that anything with a cord potentially could feed such
data, if designed this way. speakers or router or monitor or
printer or clock or lights or blender or microwave, etc. and
that it could seem innocuous, yet have this capacity or this
'surveillance potential' (as in, potential energy vs. applied),
such that grassroots on-site monitoring could be aided and
abetted likewise by such technological compromise, this
in terms of intent and design or perhaps not revealed or
deployed though part of a COT readymade solution that
just requires smd circuitry add-ons to activate functionality

this could be a stupid-model, versus smart expert systems
or total monitoring solutions, the dust mote approach that
leads towards a *density* of surveillance means/measures

what is the square-footage of surveillance in your domain,
etc. how many bugs per cubic meter, what if it was not
one or two and instead, potentially dozens, this beyond
the computer itself, in the realm of what it is possible and
thus a question of where ubiquity may exist when fully
surveilled, to what degree is maximal different in kind
from minimal, such that the garage door opener and
the car and dishwasher and HDTV and phone and the
LED lights and remote-control car are monitoring you,
in addition to computers, cellphone, conversations.

(such as: is your router and neighbors wi-fi being used
as an attack vector, are you being imaged via through-
wall radar via wi-fi, for tracking and monitoring. or being
made ill via out of spec radiation boosting via wi-fi, etc)