Gaining Physical Access to Information ResourcesPhysical IntrusionComputersWiring ClosetsMailrooms, File Cabinets, Labs, and Equipment RoomsRemote SurveillanceLooking in WindowsHigh-Tech Shoulder SurfingElectronic EavesdroppingSniffing Wireless NetworksCapturing Traffic DownstreamRetrieving Voice MailTargeted Equipment TheftDumpsters and Recycling BinsLease Returns, Auctions, and Equipment ResalesComputersRemovable Storage Devices and Specialized HardwareMediaDocumentationUsing Social EngineeringBriberyAssuming a Position of AuthorityForgeryFlatteryFrequently Asked Questions