Are equipment sounds really vulnerable? When do they need to be masked?
Yes. For example, masking should be used when highly sensitive material is being entered into a computer via a keyboard in a location likely to be under advanced acoustic surveillance or during extremely important negotiations. Also it can be important to mask the acoustics of someone typing in a password to access sensitive data.