Using a network card in promiscuous mode to intercept the contents of network traffic belonging to other people. Often done for illicit purposes such as password grabbing. A good reason to use SSH.