All of the following are examples of criminal threats to our privacy, EXCEPT ______.
spamming
hacking
phishing
spyware