The threat of cyberattacks has garnered a lot of publicity in recent years -- and rightfully so, as such hacks provide hostile actors with a powerful and convenient intelligence tool. Cyberattacks can be conducted from the relative safety of an offshore platform without having to place valuable assets in jeopardy of being discovered and arrested, and provide actors with some degree of plausibility as well. However, if a capable actor -- such as an intelligence service, advanced criminal group or a well-funded corporate competitive operation -- really wants to get their hands on a specific piece of information, there is a host of other espionage tools at their disposal that they can (and still do) use, including cheap and accessible recorders and transmitters (or bugs). ...