This talk is based on recent leaks that show how state-actors could be engaging in surveillance against people they deem as 'threats'. I will cover the basics on what was leaked, and cover a pragmatic approach on how to detect hardware bugs, implanted radio transceivers, firmware injections and cellular network monitoring.
No need to bring your tin-foil hats though, the discussion here is a pragmatical approach to how to detect such threats and identify if you have been targetted. No blind faith approaches, or attempts to sell any privacy snake oil will be found here.