The Coffee Shop Spy
Two colleagues are catching up at a coffee shop after work:
"So stressed about the Acme Corp acquisition. The due diligence is killing me."
"Tell me about it. The numbers look good though - we're offering $50 million, right?"
"Yeah, but keep it quiet. Supposed to announce next month after the board meeting on the 15th."
At the next table, someone is listening carefully. They're an investor who will now trade on this material non-public information. Or a competitor who will swoop in with a counter-offer. Or a journalist who will break the story early.
Information Leaks Are Everywhere
Social Media
Posting about projects, travel, or frustrations reveals patterns and information
Public Conversations
Elevators, restaurants, airports - you never know who's listening
Screen Visibility
Working on a plane or in a coffee shop with sensitive documents visible
Discarded Documents
Papers in the trash, whiteboards left visible, sticky notes with passwords
What Attackers Want
- Organizational Charts: Who has authority to approve what?
- Project Names/Timelines: For targeted attacks or competitive intel
- Travel Schedules: When executives will be vulnerable or unavailable
- Technology Details: What systems to target
- Personal Information: For social engineering attacks
Protecting Information
Before discussing sensitive topics, check who might overhear
Filters that prevent people beside you from seeing your screen
Social media reveals more than you think about your work and life
Dumpster diving is a real reconnaissance technique