ropping through wiretapping, bugging offices, or capturing cellular telephone conversations. * Penetrating a computer system through hacking into the network, hard drive, or software. Physical Access of Protected Environments * Using direct illegal observation and surreptitious photography. * Using surveillance and reconnaissance. * Trespassing on a competitor's property. * Stealing proprietary information contained in drawings and documents or on floppy disks and CD ROMs. Access to Personnel Working in Protected Environments * Utilizing the services of a prostitute for blackmail purposes. * Using a "swallow" (good looking woman) or a "raver" (good looking man) to form a close personal relationship with an employee having knowledge of trade secrets. * Hiring a competitor's employee who has the specific knowledge desired. * Bribing a supplier or employee. * Planting an agent or "mole" on the competitor, whose true identity is hidden and whose true task is to compromise key employees, tap into the computer databases, and intercept all communications with the goal of ferreting out confidential research, technologies, and information. * Conducting false employment interviews with competitor's employees who have knowledge of trade secrets. Nonintrusive Methods The use of nonintrusive methods to gather nonproprietary information from open so...