What is Pod Slurping?

Do you know what “pod slurping” is? How does it happen? Slurping isn’t just for cherry and coke anymore, but a quick and easy method of slurping up information from computers, both personal and private.


An new Olympic event where competitors slurp from Olympic size pools using straws the size of catapults?
No. Pod slurpers use a portable data storage device such as an iPod to illicitly download very large quantities of confidential data. Pod surfers plug directly into the by computers where the data is held and may be on the inside of a firewall. No, pod surfing isn’t an Olympic event. Though the pod slurping can be done in record times, any amateur can do it.
Pod slurpers can access and slurp up your private information using:
*iPods and other MP3 players
*digital cameras
*PDAs
*thumb drives
*plug and pay devices
*mobile phones
United States security expert, Abe Usher, coined the term “pod slurping” in 2005. Usher warned that “There are dishonest people in the world” and “many of them work at many companies – and these USB devices make it rather trivial to steal huge amounts of data.”
The information storage capacity of these top-selling portable devices devices has grown (up to 80 gigabytes) while their size has become smaller, making them easier to conceal. Pod surfing puts individuals at risk for identity theft and poses threats companies and agencies. While companies and individuals invest in antivirus programs and intrusion prevention services to stop corporate and identity thieves from accessing data via the internet, pod slurping makes it possible to slurp up private information from the USB connection on the outside of your computer.
Why Pod Slurping is so Easy:
*It only takes minutes.
*It is a simple automated process that doesn’t take any technical expertise.
*The small devices used to pod surf can still be in the thief’s pocket while they work.
* No one thinks a thing about seeing a person with a iPod, camera, phone or other psd.
Many reports on pod surfing revolved around possible scenarios; thieves dressed as janitors and armed with iPods. But we soon learned that pod surfing wasn’t just possible, it was happening. An employee unhappy with performance review pod slurped and the excel spreadsheets of all employee salaries and e-mailed them to the all the other employees. A crime? Yes, and man what a mess.
While it is corporations and agencies that seem that the likely target for pod slurping, individuals also need to protect themselves from the risk of identity theft through pod surfing.
How Can You Protect Yourself from Pod Slurping and Identity Theft?
Pod Slurers do have to have access to your computer and plug in their device so the best advice is keep your computer inaccessible to others. Whether you’re stepping out of your office or dorm room or walking away from a café’ table for a refill.
When it comes to your computer and your valuable and private information, never think, “I’ll just be a minute.” Abe Usher demonstrated that he was able to download everything from his computer to an iPod in 65 seconds.
As always, identity theft prevention begins with being aware of all the scams identity thieves use to steal (or slurp) or confidential information.

2 thoughts on “What is Pod Slurping?”

  1. Never heard of this, thanks for the info. Also, the article should have been proof-read and spell-checked before putting on the Internet. It read like a rushed 8th grader’s report.

  2. I think I first came across your blog via a link on Twitter.. I truly fancy the stuff I have read on your website and plan to keep reading when I find more time. Do you have a Twitter account?

Comments are closed.