The lies are often backed up by materials found in dumpster diving, which involves digging through the victim’s trash, looking for important documents, phone lists, and so forth. Knowing a few important names, for example, can make the attacker seem more authentic and can allow him to pose as someone he is not, perhaps asking for classified information over the telephone. This information can be something as trivial as someone’s telephone number, or as confidential as someone’s server password and login ID.