This is a graphic for ANSIR
This is a graphic for Espionage Techniques
This is a graphic of a blue faded line
This is a graphic link to ANSIR Advisories
This is a graphic link to Vulnerabilites
This is a graphic for Espionage Techniques
This is a graphic link to National Security List
This is a graphic link to ANSIR Homepage
This is a graphic link to FBI Homepage

There are numerous low risk techniques available to compromise information. "Dumpster diving" describes a simple but all too effective technique where an operative goes through your trash to obtain sensitive information not properly disposed of. Commercially available listening devices as simple as a police scanner can be used to tune in to the frequency of a wireless microphone being used in the corporate boardroom from several miles away. The variety of techniques known collectively as "social engineering" have been used by clandestine operators from time immemorial. Conversational elicitation of information from unwitting personnel via telephone or face to face at conferences and trade shows has proved a sure and safe method of gaining information without detection.

Other techniques require more elaborate preparation and technical know how such as gaining access to cache chips on certain fax and photocopying machines which have the capacity to digitally store hundreds of pages of documents. Laptop computers are frequent targets for theft or intrusion because of the vast amount of information they hold. These and other techniques can provide intelligence services and terrorist organizations with information about your organization which may be used to its detriment.