USB Wristbands can be concealed as a regular wrist band, but also can store data from 256mb to 1gig. Laptops can be used to break into computer systems, sniff wireless networks, and browse networks. Digital Cameras and Cellphones can be used to take pictures of documents. Dumpsters people never think about what they trash. Most documents are never shredded and these can contain bank info, SS numbers, and fragile info.
You VS Them. People are a gold mine for information. Just remember “Luck Beats Skill Everyday”. The attacker will study what they need to get if they are going into a company. The will more then likely blend in with everyone and you wont know who they are or what they look like. How do they get the info. They just talk to people its more of a friend business friend relationship. Its harder to decline a friend info then it is to tell a stranger “NO”. People are like a gold mine. Remember what you tell your kids. “Stranger Danger” instead of “Phone a parent” you used “Phone the boss”.
The attacker normally has friends or will make friends that are in the workplace. They will figure out the patterns of these people do. They may even have resource contacts that they can use to get into a company and forged documents that will make them seem they are better then what they are.
Corporate Espionage THE GAME OF CORPORATE SURVIVAL & CONQUEST
Corporate espionage describes activities such as theft of trade secrets, bribery, blackmail, and technological surveillance. As well as spying on commercial organizations, governments can also be targets of commercial espionage—for example, to determine the terms of a tender for a government contract so that another tenderer can underbid.
Industrial espionage is most commonly associated with technology-heavy industries, particularly the computer and automobile sectors.
Espionage takes place in many forms. In short, the purpose of espionage is to gather knowledge about (an) organization(s). A spy may be hired, or may work for oneself.