In studying for my CISSP, the topic of TEMPEST came up. TEMPEST is, essentially, interpreting the electromagnetic waves given off by electrical devices to recover the data they contain. This can happen accidentally, or on purpose.
An accidental example of this happened to my neighbors in college.Darren lived directly below me. Scott lived across the hall. Darren had a cheap, no-name 486SX clone, and he lived on it. Problem was, it interfered with Scott’s TV.
One night, Scott got fed up with it and called Darren on the phone. "Get off your computer," he said.
"Can’t. I’m doing my homework."
"No you’re not, you’re playing Solitaire. Cut it out so I can watch TV."
Not only was Darren’s computer interfering with Scott’s TV, but Scott could see what Darren was doing. Not plain as day, but close enough.
The next semester, Darren traded his PC in for a slightly faster Dell, and Darren’s Dell got along just fine with Scott’s TV.
Extreme examples like this are rare, but possible. Even today.

David Farquhar is a computer security professional, entrepreneur, and author. He has written professionally about computers since 1991, so he was writing about retro computers when they were still new. He has been working in IT professionally since 1994 and has specialized in vulnerability management since 2013. He holds Security+ and CISSP certifications. Today he blogs five times a week, mostly about retro computers and retro gaming covering the time period from 1975 to 2000.

What was that quote?
When first we practice to deceive,
we’d better not be using a cheap 486SX.
Something like that, anyway.