Eavesdropping and Counter-Measures: Technology and Techniques