|| [is a]n unauthorized or unintentional physical or electrical connection; an unauthorized or unintentional optical, acoustic, or RF hardware modification, implant, software driver or firmware modification, or the unauthorized collection of fortuitous information-bearing emanations from unmodified systems, from any of these sources designed to intercept and compromise information:
- (1) Known to the source;
- (2) Fortuitous and unknown to the source;
- (3) Clandestinely established; or
- (4) Those implemented or verified through detailed physical and instrumented technical inspections, such as technical surveillance countermeasures (TSCM) operation.