There are numerous low risk techniques available
to compromise information. "Dumpster diving" describes a simple
but all too effective technique where an operative goes through your trash
to obtain sensitive information not properly disposed of. Commercially
available listening devices as simple as a police scanner can be used
to tune in to the frequency of a wireless microphone being used in the
corporate boardroom from several miles away. The variety of techniques
known collectively as "social engineering" have been used by
clandestine operators from time immemorial. Conversational elicitation
of information from unwitting personnel via telephone or face to face
at conferences and trade shows has proved a sure and safe method of gaining
information without detection.
Other techniques require more elaborate preparation
and technical know how such as gaining access to cache chips on certain
fax and photocopying machines which have the capacity to digitally store
hundreds of pages of documents. Laptop computers are frequent targets
for theft or intrusion because of the vast amount of information they
hold. These and other techniques can provide intelligence services and
terrorist organizations with information about your organization which
may be used to its detriment.
|