Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

Mucking Around In the Trash

By Steve Hunt
October 1, 2007


The chief security officer of a Fortune 1000 company was talking to his staff recently about whether to do background checks on all the housekeeping staff, or to escort the housekeepers with security personnel.

If your facility is suffering from theft at night, what other option do you have? Security video can’t watch everyone all of the time, right?

As I pondered this question, it dawned on me that the best course of action may be to ignore the problem. It won’t go away. but you can put it in the same place you put other problems you ignore, like all the sensitive information thrown out in dumpsters behind your building.

Treasures in the Dumpster

I’ve rooted through more than a few corporate dumpsters in my time as a security professional and still get shocked by the “treasures” I uncover.

Wireless phone shops are sometimes bonanzas. Ever wonder what happens to the form you fill out with your name, address and Social Security number when applying for a phone? That single, slow, obnoxious paper shredder behind the counter fills up by two o’clock in the afternoon and the rest of those private forms just get piled on top. Go see for yourself. Walk into any cellular phone shop at four in the afternoon and look for the trash pile with a shredder underneath.

Office buildings with doctor’s or lawyer’s offices are gold mines of confidential information, if you can get around the Panera leftovers, Twinkie wrappers and disgusting “medical waste” bags. Yeeech. Names, addresses, Social Security numbers and, most frighteningly, health records! Actual health records with medical histories, prescriptions ordered, blood work. And legal settlements. Divorce settlements. Sad, scary stuff.

When we find such information in a security audit, we launch an awareness campaign around trash, recycling and shredders. Not surprisingly, recycling bins, like dumpsters, are repositories for plenty of corporate secrets.

But bank dumpsters are the worst (or best, if you’re a bad guy). The large bank branches in wealthy neighborhoods attract the most valuable dumpster data of all: personal financial statements of millionaires. You heard right. Dive into a dumpster in Lake Forest or Bal Harbour and commandeer the bank accounts of the very rich.

I’ve noticed that certain well known banks are particularly lax in shredder placement. Private bankers, every night, throw out tons of paper with names, addresses, bank accounts, Social Security numbers, dates of birth and even mother’s maiden names are thrown out in bank dumpsters around the U.S.

Crime on Private Property; No Crime on Public Property

Climbing through these dumpsters is usually a crime (if not performed as part of an authorized security audit, of course), since they sit on private property – often behind that crooked wooden gate in the parking lot. But I know of more than one national bank branch located in wealthy neighborhoods with dumpsters in the alley, that is, in the public domain.

Some communities have laws that inhibit trash picking, but in general, the U.S. Supreme Court protects dumpster diving and trash picking on public property, ostensibly to permit law enforcement to gather evidence without a warrant. You don’t have to be a freegan (a person who chooses to live off food and property retrieved from trash) to see the value of that kind of accessibility. Identity thieves and all-around scum bags can benefit, too.

The personal financial statements of the very wealthy that I mentioned are the documents used to “apply” for high end personal and business loans and usually have all the info needed to set up bank-by-phone and an Internet account. After all, the very rich don’t usually do their own banking. Their accountants do it for them the old fashioned way, by balancing ledgers against monthly statements. Enough time for a bad guy to set up wire transfers, print checks and connect to a Paypal account.

Keeping an eye on housekeepers may help an after-hours theft problem, but it is by no means the most cost effective way to protect against corporate or personal loss. A good light and a camera and recorder on the parking lot dumpster will be money very well spent.

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Steve Hunt is CEO of Hunt Business Intelligence, an industry analysis and advisory firm. He also authors the popular Blog securitydreamer.com.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Cyber tech background

    Security’s Top Cybersecurity Leaders 2026

    Security magazine’s Top Cybersecurity Leaders 2026 award...
    Top Cybersecurity Leaders
  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Education & Training
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Popular Stories

Cables plugged in

Chinese Supercomputer Allegedly Hacked, 10 Petabytes of Data Stolen

Man on laptop

Healthcare Executives Face a New Era of Personal Risk

Abstract shape

What Are Security Experts Saying About Claude Mythos and Project Glasswing?

Padlock with computer keys

Breach of FBI Surveillance System Considered a “Major Incident,” Security Experts Weigh In

AI

AI Startup Mercor, Which Works With Open AI and Anthropic, Confirms Data Breach

SEC 2026 Benchmark Banner
SEC 2026 Benchmark Banner

Events

April 30, 2026

Building a Campus-Wide Culture of Security and Shared Responsibility

In today’s higher education environment, where institutions face evolving and multifaceted incidents, safety must be embedded into the fabric of campus culture. Learn strategies for generating collective buy-in from faculty, staff, students and senior leadership. 

May 7, 2026

Beyond Cameras: Revolutionizing Perimeter Security with LiDAR, AI and Digital Twins

In this webinar, we will explore how LiDAR‑based detection, AI‑powered analytics and digital twins are transforming the future of perimeter protection with 3D detection, real-time situational awareness and unified operational views.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
SEC 2026 Top Cybersecurity Leaders

Related Articles

  • Buying and Selling In the New Security Environment

    See More
  • The Endpoint is the Point

    See More
  • best cities for cybersecurity opportunities

    Cybersecurity experts in Luxembourg earn the highest salaries and more data on cyber jobs around the world

    See More

Related Products

See More Products
  • Physical Security and Safety: A Field Guide for the Practitioner

  • Risk Analysis and the Security Survey, 4th Edition

  • s and the law.jpg

    Surveillance and the Law: Language, Power and Privacy

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media, Inc. and BNP Media II, LLC.

Design, CMS, Hosting & Web Development :: ePublishing