The document summarizes poor man's network espionage devices and tactics that could be used by attackers. It describes small, low-cost devices like the Linksys WRT54G router, Nokia 770 phone, and Gumstix and PicoTux mini-computers that run Linux and can be used to conduct network attacks. These network espionage devices are hard to detect forensically since they use ephemeral filesystems in RAM. The document also provides examples of how these devices could be concealed on a target's network and used to conduct wireless and Bluetooth attacks, establish covert communication channels, and passively sniff network traffic. Countermeasures discussed include knowing network devices and traffic, user education, security policies, and