foreign-power sponsored or coordinated intelligence activity directed toward someone for the purpose of unlawful act of obtaining economic information
Sometimes legal, this is where a company attempts to find information about the trade secrets of another
wiretapping, bugging offices, capturing cellular telephone conversations
Transient Electromagnetic Pulse Emanation Standard
Secret Global Surveillance Network, includes 5 countries. Super computer able to scan , read, interpret any phone call, fax, email, text sent anywhere in the world.
Penetrating a computer system
hacking a network, hard drive, software
Viruses, Worms, Trojans, Adware/pop-ups, Spyware, Keyloggers, Rootkits, Scareware