Secretly gaining unauthorized access to confidential communications. Examples include listening to radio transmissions or using laser interferometers to reconstitute conversations by reflecting laser beams off windows that are vibrating in synchrony to the sound in the room. See wiretapping.
Watching data or information as it travels through the Internet.
Schell, B.H. and Martin, C. Contemporary World Issues Series: Cybercrime: A Reference Handbook. Santa Barbara, CA: ABC-CLIO, 2004.
Any thoughts on NSA (the National Security Administration, whose domestic eavesdropping program has provoked a political firestorm )?
This initial study was more recently updated by Markus G. Kuhn: compromising emanations: eavesdropping risks of computer displays.
Garnet, it is true, claimed to limit the justification of equivocation to cases " of necessary defence from injustice and wrong or of the obtaining some good of great importance when there is no danger of harm to others," and he could justify his conduct in lying to the council by their own conduct towards him, which included treacherous eavesdropping and fraud, and also threats of torture.