Cyber-snooping: how do they do it where you are?