About
Community
Bad Ideas
Drugs
Ego
Erotica
Fringe
Society
Technology
Phreak
Boxes, Old and New
Bugs and Taps
Cellular Phones
Introduction to Telecommunications
PBX's and Switches
Payphones
Phone Phun
VMB's, Pagers, E-Mail, and S&F Systems
register | bbs | search | rss | faq | about
meet up | add to del.icio.us | digg it

Get data by being a dumpster diver


NOTICE: TO ALL CONCERNED Certain text files and messages contained on this site deal with activities and devices which would be in violation of various Federal, State, and local laws if actually carried out or constructed. The webmasters of this site do not advocate the breaking of any law. Our text files and message bases are for informational purposes only. We recommend that you contact your local law enforcement officials before undertaking any project based upon any information obtained from this or any other web site. We do not guarantee that any of the information contained on this system is correct, workable, or factual. We are not responsible for, nor do we assume any liability for, damages resulting from the use of any information on this site.
=========================================
'Dumpster Divers' have access to data
By Mitch Betts, ComputerWorld Staff Writer
ComputerWorld May 23, 1988
=========================================
Washington D.C. - A ruling by the U.S Supreme Court last week underscored
the need for MIS managers to have an information security policy that extends
all the way to the corporate trash Dumpster.
The high court's ruling in 'California v. Greenwood' rejected claims that
Americans have a reasonable expectation of privacy involving their garbage.
Consequently, "anything put into the trash becomes fair game" for computer
hackers or corporate spies, according to Robert P. Campbell, president of
Advanced Information Management, Inc., a Woodbridge, Va.-based computer
security consulting firm.
Campbell said the so-called "Dumpster divers" look for competitive
intelligence, private information on employees, system documentation, logic
designs, flowcharts, passwords and even poorly disguised production data
used for test purposes.
"A well-designed information security policy makes sure that sensitive
data does not end up in the trash," he said, suggesting that computer
companies consider paper shredders or compactors and the destruction of
magnetic media.
The specific case before the Supreme Court involved a police search of the
trash of two suspected drug dealers. Writing the court's majority opinion,
Justice Byron R. White said a search warrant was unnecessary because it was
"common knowledge that plastic garbage bags left on or at the side of a
public street are readily accessible to animals, children, scavengers, snoops
and other members of the public."
In the 6-to-2 court decision, the dissenters suggested that picking through
another's trash is revolting and uncivilized behavior.
Consultant Campbell said the ruling may be a boon for the growing
"information underground" in personal credit and character information.
In addition, he contended that there is a high street value for private
information that helps financial institutions determine a person's credit
worthiness or helps employers gauge the character of job applicants.




 
To the best of our knowledge, the text on this page may be freely reproduced and distributed.
If you have any questions about this, please check out our Copyright Policy.

 

totse.com certificate signatures
 
 
About | Advertise | Bad Ideas | Community | Contact Us | Copyright Policy | Drugs | Ego | Erotica
FAQ | Fringe | Link to totse.com | Search | Society | Submissions | Technology
Hot Topics
What do you call the main box of the computer?
Comp keeps freezing after bootup :(
Essential Programs Thread
Your tech related job
32-bit OS on 64-bit computer
Split Hard Drive???
computer crashed
Intel's Q6600
 
Sponsored Links
 
Ads presented by the
AdBrite Ad Network

 

TSHIRT HELL T-SHIRTS