Originally used to describe the capture of sensitive data that can be extracted from the emanations emitted by hardware devices. Usually this is carried out for illegal purposes such as discovering details of bank accounts. The term has broadened to include techniques, specifications, and standards to guard against TEMPEST intrusions.