Hardware key loggers
Infected CDROM labeled something enticing like "layoffs"
Infected USB drive
Teensy USB HID Attack Vector from metasploit
Pen that records audio
Shredder that scans with OCR before shredding (heard about it, but haven't seen one)
Camera to take pictures of sticky notes, documents, etc.
Anything else you guys use?