Install an attack app on your phone. Set up a meeting with the victim and place the phone on the desk next to his laptop (see Q2).
Break into the victim's phone, install the attack app, and wait until the victim inadvertently places his phone next to the target laptop.
Construct a web page use the microphone of the computer running the browser (using Flash or HTML Media Capture, under some excuse such as VoIP chat). When the user permits the microphone access, use it to steal the user's secret key.
Put your stash of eavesdropping bugs and laser microphones to a new use.
Send your server to a colocation facility, with a good microphone inside the box, and then acoustically extract keys from all nearby servers.
Get near a TEMPEST/1-92 protected machine, such as the one pictured to the right, place a microphone next to its ventilation holes, and extract its supposedly-protected secrets.