T 5.104 Espionage

In addition to the large number of technically complex attacks, there are often much simpler methods for obtaining valuable information. Since sensitive data is not adequately protected in many cases, it is possible to obtain this data using visual, acoustic, or electronic methods.

Examples: