I found this video (LINK) over at Schnier on Security today and I thought it was worthy to share. It is a great example of social engineering. While watching this think about how one could implement similar techniques to gain access to restricted areas.
For more videos check out YouTube, start here (LINK). Read Kevin Mitnick’s first book, he is truly the master!
John "Mike" Wright