Cyber spying
Dangerous search
Telemetry
Data leakage
Privacy violation and tracking
Mass surveillance systems
Physical access and computer forensics
Peeping information on the screen
Mass hacking of devices
Digital data loss
Cyber-warfare, cyber diversions and cyber terrorism
Planting digital evidence
Deanonymization and unicalization
Digital identity theft