Theft and "Dumpster Diving"
This discussion of theft focuses on theft by outsiders, not by insiders, although such theft may be aided by information provided by an insider. Principal targets for theft are laptop computers (stolen for the information on them as well as for the value of the computer), sensitive papers taken from waste baskets, trash containers or dumpsters (often called "dumpster diving"), and sensitive equipment (stolen or diverted briefly so that it may be copied),
Laptop computers are a prime target for theft. According to Safeware, a computer insurance firm in Columbus, Ohio, 309,000 laptop computers were stolen in the United States during 1997. When a laptop is stolen, one doesn't know whether it was taken for the valuable of the information on the computer or for the value of computer itself. This makes it difficult to assess the damage caused by the loss, especially since it is possible to recover computer files even after they have been "deleted" from a hard drive.
There is a high risk of theft during foreign travel. Two incidents at separate European airports demonstrate the modus operandi of thieves operating in pairs to target laptop computers:
All travelers, both domestic and international, should be alert to any sudden diversions when traveling, especially when transiting transportation terminals. If victimized, travelers should report the thefts immediately to the authorities and be able to provide the make, model information, and serial number of their laptop computer or any other item of value. 1
The best protection for information on your laptop is to encrypt all sensitive files and e-mail. A variety of keys, cards, and other physical means of preventing unauthorized access to information on a laptop are now coming on the market. Evaluate the various alternatives to see if one of them meets your needs.
There is an old saying that "one man's trash is another man's treasure." That is certainly true in the intelligence world.
In 1991 a guard observing the home of a senior executive of a defense contractor in Houston, Texas, observed two men in an unmarked van take trash bags that had been put out for routine trash collection. The guard obtained the van's license number and later identified one of the men as the consul general from a friendly Western European country that collects economic intelligence in the United States. When confronted, the consul general claimed that he and an assistant were simply trying to collect bags of grass cuttings for filler -- to fill a hole dug at the consulate compound for a swimming pool that could not be completed because of a zoning dispute.
Stealing trash is not illegal. The Supreme Court ruled in 1988 that once an item is left for trash pickup, there is no expectation of privacy or continued ownership.
Strict procedures govern the disposal of classified information. For disposal of sensitive but unclassified waste, however, each government office or private company sets its own regulations. These procedures depend upon the sensitivity of the information and the likelihood that a foreign group or domestic interest may want to obtain that information. If unclassified documents need to be destroyed prior to disposal, a commercially available cross-cut shredder should be used. A cross-cut shredder cuts the paper both vertically and horizontally. Destruction should not be entrusted to paper recycling vendors.
Sensitive equipment may be stolen so that it can be copied through reverse engineering. For some purposes, it may be sufficient to only gain access to the equipment for a brief period.
Lesson learned: The company did not really need to take the entire radar assembly to the air show. A mock-up without the internal mechanisms could have been set up along with photographs of the internal components.2