Second – when he independently employed on forged documents, under the guise of 'legend'. Introduction of its agent to competitors more sophisticated method than the usual bribery or blackmail, but unlike recruited informants, his agent is much more reliable and more efficient as a source of confidential information. Depending on the value of an informant under construction and the relationship between the cooperating parties. Than he importantly, the more respected measures of conspiracy. In particular, a meeting with him disguised as household contacts, there are at safe houses or in public places, through caches and even by technical means. Communication with the less valuable human beings may be an unusual development.
The parties not particularly care about their safety. So that the sample secret surveillance of its own officials may give the head of the firm (in terms of its operational staff) are very interesting information for thought. 3. Reading of data from pc to pc data acquisition is carried out in many ways. Here they are: – theft of storage media (floppy disks, magnetic disks, punched cards) – up program information from the media – read left unattended printouts programs – read information from the screen other person (while displaying its rightful user or his no) – to connect to the pc specialized hardware, provide access to information – the use of special technical means to intercept electromagnetic radiation of a pc (it is known that using a directional antenna such interception is possible for a pc in a metal case, at distances up to 200 meters, and in the plastic – up to one kilometer) – unauthorized access to information, programs, or decoding software encrypted information.