The small, camera-equipped drone hovers unobtrusively outside your office window, quietly photographing the confidential documents on your desk and on your computer screen. A dumpster diver retrieves your shredded printouts, scans them into a computer and uses jigsaw-puzzle-solving software to reform the shreds into legible documents.
An innocent-looking but virus-infected computer uses nothing more than heat signatures to glean data from your air-gapped (non-networked), “off-the-grid” machines that you thought wereperfectly safe from prying eyes. And an industrial spy has tapped into your network links to make copies of private documents as they flow around your company.