We are independent & ad-supported. We may earn a commission for purchases made through our links.

Advertiser Disclosure

Our website is an independent, advertising-supported platform. We provide our content free of charge to our readers, and to keep it that way, we rely on revenue generated through advertisements and affiliate partnerships. This means that when you click on certain links on our site and make a purchase, we may earn a commission. Learn more.

How We Make Money

We sustain our operations through affiliate commissions and advertising. If you click on an affiliate link and make a purchase, we may receive a commission from the merchant at no additional cost to you. We also display advertisements on our website, which help generate revenue to support our work and keep our content free for readers. Our editorial team operates independently from our advertising and affiliate partnerships to ensure that our content remains unbiased and focused on providing you with the best information and recommendations based on thorough research and honest evaluations. To remain transparent, we’ve provided a list of our current affiliate partners here.

What is Data Theft?

By Rhonda Rivera
Updated Feb 27, 2024
Our promise to you
WiseGEEK is dedicated to creating trustworthy, high-quality content that always prioritizes transparency, integrity, and inclusivity above all else. Our ensure that our content creation and review process includes rigorous fact-checking, evidence-based, and continual updates to ensure accuracy and reliability.

Our Promise to you

Founded in 2002, our company has been a trusted resource for readers seeking informative and engaging content. Our dedication to quality remains unwavering—and will never change. We follow a strict editorial policy, ensuring that our content is authored by highly qualified professionals and edited by subject matter experts. This guarantees that everything we publish is objective, accurate, and trustworthy.

Over the years, we've refined our approach to cover a wide range of topics, providing readers with reliable and practical advice to enhance their knowledge and skills. That's why millions of readers turn to us each year. Join us in celebrating the joy of learning, guided by standards you can trust.

Editorial Standards

At WiseGEEK, we are committed to creating content that you can trust. Our editorial process is designed to ensure that every piece of content we publish is accurate, reliable, and informative.

Our team of experienced writers and editors follows a strict set of guidelines to ensure the highest quality content. We conduct thorough research, fact-check all information, and rely on credible sources to back up our claims. Our content is reviewed by subject matter experts to ensure accuracy and clarity.

We believe in transparency and maintain editorial independence from our advertisers. Our team does not receive direct compensation from advertisers, allowing us to create unbiased content that prioritizes your interests.

Data theft is not a new occurrence, but it is happening more frequently due to the ease of stealing data with modern technology. There are several different types of data theft, including pod slurping, bluesnarfing, and sneakernet, all of which use different methods to obtain data. Pod slurping is the act of using an iPod® or iPod®-like device to download and take data from a computer. Bluesnarfing is the act of stealing data from another Bluetooth®-enabled mobile phone, laptop or other electronic by linking to it with a Bluetooth® connection. Sneakernet is a method of transferring data from one computer to another with the use of USB flash drives, compact discs (CDs), or other forms of removable storage.

With pod slurping, a data thief is only limited by the capacity of the device he or she is using to steal the data. As technology advances, these devices are becoming physically smaller but are capable of holding more. In fact, even though these devices are normally music players meant to hold a few hundred to a couple thousand songs, they can be filled with enough illicit data to potentially ruin a business. It is usually not immediately obvious that someone is pod slurping because people connect music devices such as iPod®s to computers all the time to charge them, listen to music, or place music on them.

Data theft through Bluesnarfing is a very limited method, but it can still acquire private data like address books, photos, and videos. To Bluesnarf, both the thief and victim’s device must be Bluetooth®-enabled. The victim’s device must be set to discoverable rather than hidden, and must be in range of the thief. Once everything is in place, the thief can begin copying data from the victim’s device to his or her device. This type of data theft is illegal in some countries because it violates privacy laws.

Sneaknet is perhaps the most common method used for data theft. The term sneakernet is not used solely to describe stealing data, but for any type of file sharing through removable storage devices like USB flash drives. Like music devices, portable storage devices are being designed to be physically smaller but can fit more data than ever. This makes it easy for thieves to sneak data from work to home, which is a growing problem in many workplaces around the world. It is particularly common when an employee quits or is fired.

WiseGEEK is dedicated to providing accurate and trustworthy information. We carefully select reputable sources and employ a rigorous fact-checking process to maintain the highest standards. To learn more about our commitment to accuracy, read our editorial process.

Discussion Comments

By Charred — On Dec 24, 2011

@miriam98 - I agree. I find it hard to believe however that a data breach could take place using an iPod or a Bluetooth enabled device.

For Bluetooth to work you have to be within range of the device, from what I understand. Is a thief going to stand ten feet next to you to steal your data? I suppose it’s likely but it doesn’t seem practical.

The same goes for an iPod. It’s pretty obvious if you’re sticking an iPod into a computer. Yeah, people do it to download music and charge the batteries, but why would people do it at work? That looks suspicious.

So I agree that the best method for this kind of computer data theft is using an Internet connection. That is, after all, the number one way that identity theft is happening.

By miriam98 — On Dec 23, 2011

I work at a company where we deal with confidential government data. I actually work in a sequestered part of the building. Our manager specifically told us that we were never to bring an iPod or flash drive to work, specifically for the reasons mentioned in this article, for data theft protection.

Of course there are other ways to steal data, like uploading it over the Internet, which frankly is easier than the other methods described here. The fact remains that we do have Internet access.

So in the final analysis prohibiting certain devices in the workplace does nothing in my opinion. The only real data loss prevention method is called the personal integrity of the employee. With that intact you have nothing to worry about. If the integrity is not there, there’s always a way to steal the data.

WiseGEEK, in your inbox

Our latest articles, guides, and more, delivered daily.

WiseGEEK, in your inbox

Our latest articles, guides, and more, delivered daily.