In this chapter, we will discuss data at rest and data in motion, how it can be stolen, and what is at risk. We will discuss other methods of data exploitation and theft as well as cover how digital forensics can be used to reconstruct a crime scene and provide evidence. Other topics will include how to mitigate this thread specifically with encryption and how we can safeguard our data and identities. We will discuss how to set up a data capture methodology for physical and logical spying on user activities. Other topics include data capture, dissemination, and use as well as legal concerns.