This document discusses the threats of corporate espionage and illegal surveillance. It notes that competitors and foreign entities may seek to gain intelligence through intercepting communications or planting bugs. Technical surveillance countermeasures involve detecting and neutralizing such hostile penetration technologies used to obtain unauthorized access. The document warns that threats of spying should not be ignored, as it can cost businesses millions in lost secrets or damages. It provides examples of common devices used for bugs and advises those who suspect surveillance to contact experts for assistance.