Taming the black dragon. Ethical hacking with Kali Linux. Part 8. Methods and means of foreign intelligence