An information-gathering technique in which an attacker roots through the physical garbage of a potential target, looking for information that might be useful in subsequent attacks. It might be used as reconnaissance precedent to a social engineering attack.