SlideShare ist ein Scribd-Unternehmen logo
1 von 6
Five embarrassing mobile device
thefts
As devices become more portable and storage becomes smaller, the potential for
danger when devices go missing is rising exponentially. Here are five embarrassing
cases where mobile devices went missing, and sensitive information was
compromised.
By Jeff JedrasPhoto by chanpipat
Lost laptop adds to BP oil spill
grief
As if the BP oil spill off Louisiana wasn’t bad enough, the damage was
compounded when a BP employee lost a laptop containing personal data of
thousands of residents who had filed compensation claims in 2011.
Photo by Ideum
Veterans data lost, recovered
An employee of the U.S. Department of Veterans Affairs took home a laptop and
external drive with sensitive personal information on millions of vets in 2006; they
went missing following a home break-in. Following an FBI investigation, the devices
were recovered.
Missing laptop grounds flyers
New sign-ups for the U.S Registered Traveller program were halted when a
contractor lost a laptop in 2008 with personal data on 33,000 applicants at San
Francisco’s airport. The laptop had two layers of password protection, and was in a
locked office.
Photo by Schill
Voter information compromised
In a classic opportunistic theft, a laptop with voter registration information on over
14,000 voters was stolen from a city council office in the UK in 2009. No voter
choice information was compromised, but the data needed to apply for credit was.
Photo by Tatoy
Attempted blackmail of F1 driver
Not a device theft, but a reminder to wipe all personal data before disposing of old
devices. In 2008, someone found F1 driver Adrian Sutil’s old laptop, with its
personal data, and attempted to blackmail him to prevent its disclosure. He was
arrested by the authorities.
Photo by Morgana F1

Weitere ähnliche Inhalte

Andere mochten auch

2 1 polynomials
2 1 polynomials2 1 polynomials
2 1 polynomialshisema01
 
4 2 operations on functions
4 2 operations on functions4 2 operations on functions
4 2 operations on functionshisema01
 
3 1 writing & graphing inequalities
3 1 writing & graphing inequalities3 1 writing & graphing inequalities
3 1 writing & graphing inequalitieshisema01
 

Andere mochten auch (7)

Cadburys dream
Cadburys dreamCadburys dream
Cadburys dream
 
Swot analysis
Swot analysisSwot analysis
Swot analysis
 
Proposal
ProposalProposal
Proposal
 
2 1 polynomials
2 1 polynomials2 1 polynomials
2 1 polynomials
 
Raster graphics
Raster graphicsRaster graphics
Raster graphics
 
4 2 operations on functions
4 2 operations on functions4 2 operations on functions
4 2 operations on functions
 
3 1 writing & graphing inequalities
3 1 writing & graphing inequalities3 1 writing & graphing inequalities
3 1 writing & graphing inequalities
 

Ähnlich wie Five embarrassing mobile device thefts

National Consumers League 2013 State of ID Theft Report
National Consumers League 2013 State of ID Theft ReportNational Consumers League 2013 State of ID Theft Report
National Consumers League 2013 State of ID Theft Reportnationalconsumersleague
 
FBI's New Data Warehouse A Powerhouse
FBI's New Data Warehouse A PowerhouseFBI's New Data Warehouse A Powerhouse
FBI's New Data Warehouse A Powerhousechildlikeegg1000
 
Data Mining: Privacy and Concerns
Data Mining: Privacy and ConcernsData Mining: Privacy and Concerns
Data Mining: Privacy and ConcernsBradley Buchanan
 
The Cost Of Hacking
The Cost Of HackingThe Cost Of Hacking
The Cost Of Hackingbluecoatss
 
Secret service, fbi invesigating claim that mitt romney's tax returns were st...
Secret service, fbi invesigating claim that mitt romney's tax returns were st...Secret service, fbi invesigating claim that mitt romney's tax returns were st...
Secret service, fbi invesigating claim that mitt romney's tax returns were st...VogelDenise
 
1) Assignment 1  ( 2 Pages ) Post-AssessmentMr. Fahad Nas.docx
1) Assignment 1  ( 2 Pages ) Post-AssessmentMr. Fahad Nas.docx1) Assignment 1  ( 2 Pages ) Post-AssessmentMr. Fahad Nas.docx
1) Assignment 1  ( 2 Pages ) Post-AssessmentMr. Fahad Nas.docxteresehearn
 
15 Most Outrageous Data Loss Incidents
15 Most Outrageous Data Loss Incidents15 Most Outrageous Data Loss Incidents
15 Most Outrageous Data Loss IncidentsDatto
 
Presentation3
Presentation3Presentation3
Presentation3ChantallD
 

Ähnlich wie Five embarrassing mobile device thefts (12)

Ni sug disuk 2013
Ni sug disuk 2013Ni sug disuk 2013
Ni sug disuk 2013
 
The State of Identity Theft in 2013
The State of Identity Theft in 2013The State of Identity Theft in 2013
The State of Identity Theft in 2013
 
National Consumers League 2013 State of ID Theft Report
National Consumers League 2013 State of ID Theft ReportNational Consumers League 2013 State of ID Theft Report
National Consumers League 2013 State of ID Theft Report
 
FBI's New Data Warehouse A Powerhouse
FBI's New Data Warehouse A PowerhouseFBI's New Data Warehouse A Powerhouse
FBI's New Data Warehouse A Powerhouse
 
Data Mining: Privacy and Concerns
Data Mining: Privacy and ConcernsData Mining: Privacy and Concerns
Data Mining: Privacy and Concerns
 
Ira Wilsker's January 2014 Identity Theft Presentation
Ira Wilsker's January 2014 Identity Theft PresentationIra Wilsker's January 2014 Identity Theft Presentation
Ira Wilsker's January 2014 Identity Theft Presentation
 
The Cost Of Hacking
The Cost Of HackingThe Cost Of Hacking
The Cost Of Hacking
 
Secret service, fbi invesigating claim that mitt romney's tax returns were st...
Secret service, fbi invesigating claim that mitt romney's tax returns were st...Secret service, fbi invesigating claim that mitt romney's tax returns were st...
Secret service, fbi invesigating claim that mitt romney's tax returns were st...
 
IDT Red Flags White Paper By Wrf
IDT Red Flags White Paper By WrfIDT Red Flags White Paper By Wrf
IDT Red Flags White Paper By Wrf
 
1) Assignment 1  ( 2 Pages ) Post-AssessmentMr. Fahad Nas.docx
1) Assignment 1  ( 2 Pages ) Post-AssessmentMr. Fahad Nas.docx1) Assignment 1  ( 2 Pages ) Post-AssessmentMr. Fahad Nas.docx
1) Assignment 1  ( 2 Pages ) Post-AssessmentMr. Fahad Nas.docx
 
15 Most Outrageous Data Loss Incidents
15 Most Outrageous Data Loss Incidents15 Most Outrageous Data Loss Incidents
15 Most Outrageous Data Loss Incidents
 
Presentation3
Presentation3Presentation3
Presentation3
 

Mehr von JeffJedras

Five sci-fi and tech movies to watch this fall
Five sci-fi and tech movies to watch this fallFive sci-fi and tech movies to watch this fall
Five sci-fi and tech movies to watch this fallJeffJedras
 
Five alternatives to Google Glass
Five alternatives to Google GlassFive alternatives to Google Glass
Five alternatives to Google GlassJeffJedras
 
The techie’s summer reading list
The techie’s summer reading listThe techie’s summer reading list
The techie’s summer reading listJeffJedras
 
Social media screw-ups you *must* avoid
Social media screw-ups you *must* avoidSocial media screw-ups you *must* avoid
Social media screw-ups you *must* avoidJeffJedras
 
Five must-have apps for your summer travels
Five must-have apps for your summer travelsFive must-have apps for your summer travels
Five must-have apps for your summer travelsJeffJedras
 
Five far-out tech office environments
Five far-out tech office environmentsFive far-out tech office environments
Five far-out tech office environmentsJeffJedras
 
Five outrageously expensive mobile phones
Five outrageously expensive mobile phonesFive outrageously expensive mobile phones
Five outrageously expensive mobile phonesJeffJedras
 
Five cool in-car technologies for your summer road trip
Five cool in-car technologies for your summer road tripFive cool in-car technologies for your summer road trip
Five cool in-car technologies for your summer road tripJeffJedras
 
Six browsers that changed the world (wide web)
Six browsers that changed the world (wide web)Six browsers that changed the world (wide web)
Six browsers that changed the world (wide web)JeffJedras
 
The long, slow, fictional death of the PC
The long, slow, fictional death of the PCThe long, slow, fictional death of the PC
The long, slow, fictional death of the PCJeffJedras
 
Did you know they were Canadian?
Did you know they were Canadian?Did you know they were Canadian?
Did you know they were Canadian?JeffJedras
 
The top tech buzzwords of 2013
The top tech buzzwords of 2013The top tech buzzwords of 2013
The top tech buzzwords of 2013JeffJedras
 
History's most notorious hackers
History's most notorious hackersHistory's most notorious hackers
History's most notorious hackersJeffJedras
 
Top social media hoaxes
Top social media hoaxesTop social media hoaxes
Top social media hoaxesJeffJedras
 
Five innovative laptop concept designs
Five innovative laptop concept designsFive innovative laptop concept designs
Five innovative laptop concept designsJeffJedras
 
Five weird wearable computers
Five weird wearable computersFive weird wearable computers
Five weird wearable computersJeffJedras
 
Worst tech blunders of 2012
Worst tech blunders of 2012Worst tech blunders of 2012
Worst tech blunders of 2012JeffJedras
 
Baby names with a tech twist
Baby names with a tech twistBaby names with a tech twist
Baby names with a tech twistJeffJedras
 
Six unfortunate tech product names
Six unfortunate tech product namesSix unfortunate tech product names
Six unfortunate tech product namesJeffJedras
 
Five spooky IT infographics
Five spooky IT infographicsFive spooky IT infographics
Five spooky IT infographicsJeffJedras
 

Mehr von JeffJedras (20)

Five sci-fi and tech movies to watch this fall
Five sci-fi and tech movies to watch this fallFive sci-fi and tech movies to watch this fall
Five sci-fi and tech movies to watch this fall
 
Five alternatives to Google Glass
Five alternatives to Google GlassFive alternatives to Google Glass
Five alternatives to Google Glass
 
The techie’s summer reading list
The techie’s summer reading listThe techie’s summer reading list
The techie’s summer reading list
 
Social media screw-ups you *must* avoid
Social media screw-ups you *must* avoidSocial media screw-ups you *must* avoid
Social media screw-ups you *must* avoid
 
Five must-have apps for your summer travels
Five must-have apps for your summer travelsFive must-have apps for your summer travels
Five must-have apps for your summer travels
 
Five far-out tech office environments
Five far-out tech office environmentsFive far-out tech office environments
Five far-out tech office environments
 
Five outrageously expensive mobile phones
Five outrageously expensive mobile phonesFive outrageously expensive mobile phones
Five outrageously expensive mobile phones
 
Five cool in-car technologies for your summer road trip
Five cool in-car technologies for your summer road tripFive cool in-car technologies for your summer road trip
Five cool in-car technologies for your summer road trip
 
Six browsers that changed the world (wide web)
Six browsers that changed the world (wide web)Six browsers that changed the world (wide web)
Six browsers that changed the world (wide web)
 
The long, slow, fictional death of the PC
The long, slow, fictional death of the PCThe long, slow, fictional death of the PC
The long, slow, fictional death of the PC
 
Did you know they were Canadian?
Did you know they were Canadian?Did you know they were Canadian?
Did you know they were Canadian?
 
The top tech buzzwords of 2013
The top tech buzzwords of 2013The top tech buzzwords of 2013
The top tech buzzwords of 2013
 
History's most notorious hackers
History's most notorious hackersHistory's most notorious hackers
History's most notorious hackers
 
Top social media hoaxes
Top social media hoaxesTop social media hoaxes
Top social media hoaxes
 
Five innovative laptop concept designs
Five innovative laptop concept designsFive innovative laptop concept designs
Five innovative laptop concept designs
 
Five weird wearable computers
Five weird wearable computersFive weird wearable computers
Five weird wearable computers
 
Worst tech blunders of 2012
Worst tech blunders of 2012Worst tech blunders of 2012
Worst tech blunders of 2012
 
Baby names with a tech twist
Baby names with a tech twistBaby names with a tech twist
Baby names with a tech twist
 
Six unfortunate tech product names
Six unfortunate tech product namesSix unfortunate tech product names
Six unfortunate tech product names
 
Five spooky IT infographics
Five spooky IT infographicsFive spooky IT infographics
Five spooky IT infographics
 

Kürzlich hochgeladen

Modernizing Legacy Systems Using Ballerina
Modernizing Legacy Systems Using BallerinaModernizing Legacy Systems Using Ballerina
Modernizing Legacy Systems Using BallerinaWSO2
 
ChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps ProductivityChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps ProductivityVictorSzoltysek
 
Intro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxIntro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxFIDO Alliance
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2
 
ERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage IntacctERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage IntacctBrainSell Technologies
 
2024 May Patch Tuesday
2024 May Patch Tuesday2024 May Patch Tuesday
2024 May Patch TuesdayIvanti
 
The Ultimate Prompt Engineering Guide for Generative AI: Get the Most Out of ...
The Ultimate Prompt Engineering Guide for Generative AI: Get the Most Out of ...The Ultimate Prompt Engineering Guide for Generative AI: Get the Most Out of ...
The Ultimate Prompt Engineering Guide for Generative AI: Get the Most Out of ...SOFTTECHHUB
 
API Governance and Monetization - The evolution of API governance
API Governance and Monetization -  The evolution of API governanceAPI Governance and Monetization -  The evolution of API governance
API Governance and Monetization - The evolution of API governanceWSO2
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxFIDO Alliance
 
Design and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data ScienceDesign and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data SciencePaolo Missier
 
Introduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxIntroduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxFIDO Alliance
 
UiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overviewUiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overviewDianaGray10
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityWSO2
 
JavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate GuideJavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate GuidePixlogix Infotech
 
Stronger Together: Developing an Organizational Strategy for Accessible Desig...
Stronger Together: Developing an Organizational Strategy for Accessible Desig...Stronger Together: Developing an Organizational Strategy for Accessible Desig...
Stronger Together: Developing an Organizational Strategy for Accessible Desig...caitlingebhard1
 
How to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cfHow to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cfdanishmna97
 
AI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAnitaRaj43
 
ADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptxADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptxFIDO Alliance
 
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptxFIDO Alliance
 

Kürzlich hochgeladen (20)

Modernizing Legacy Systems Using Ballerina
Modernizing Legacy Systems Using BallerinaModernizing Legacy Systems Using Ballerina
Modernizing Legacy Systems Using Ballerina
 
ChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps ProductivityChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps Productivity
 
Intro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxIntro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptx
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
ERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage IntacctERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage Intacct
 
2024 May Patch Tuesday
2024 May Patch Tuesday2024 May Patch Tuesday
2024 May Patch Tuesday
 
The Ultimate Prompt Engineering Guide for Generative AI: Get the Most Out of ...
The Ultimate Prompt Engineering Guide for Generative AI: Get the Most Out of ...The Ultimate Prompt Engineering Guide for Generative AI: Get the Most Out of ...
The Ultimate Prompt Engineering Guide for Generative AI: Get the Most Out of ...
 
API Governance and Monetization - The evolution of API governance
API Governance and Monetization -  The evolution of API governanceAPI Governance and Monetization -  The evolution of API governance
API Governance and Monetization - The evolution of API governance
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
 
Design and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data ScienceDesign and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data Science
 
Introduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxIntroduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptx
 
UiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overviewUiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overview
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
JavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate GuideJavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate Guide
 
Stronger Together: Developing an Organizational Strategy for Accessible Desig...
Stronger Together: Developing an Organizational Strategy for Accessible Desig...Stronger Together: Developing an Organizational Strategy for Accessible Desig...
Stronger Together: Developing an Organizational Strategy for Accessible Desig...
 
How to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cfHow to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cf
 
AI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by Anitaraj
 
ADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptxADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptx
 
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
 

Five embarrassing mobile device thefts

  • 1. Five embarrassing mobile device thefts As devices become more portable and storage becomes smaller, the potential for danger when devices go missing is rising exponentially. Here are five embarrassing cases where mobile devices went missing, and sensitive information was compromised. By Jeff JedrasPhoto by chanpipat
  • 2. Lost laptop adds to BP oil spill grief As if the BP oil spill off Louisiana wasn’t bad enough, the damage was compounded when a BP employee lost a laptop containing personal data of thousands of residents who had filed compensation claims in 2011. Photo by Ideum
  • 3. Veterans data lost, recovered An employee of the U.S. Department of Veterans Affairs took home a laptop and external drive with sensitive personal information on millions of vets in 2006; they went missing following a home break-in. Following an FBI investigation, the devices were recovered.
  • 4. Missing laptop grounds flyers New sign-ups for the U.S Registered Traveller program were halted when a contractor lost a laptop in 2008 with personal data on 33,000 applicants at San Francisco’s airport. The laptop had two layers of password protection, and was in a locked office. Photo by Schill
  • 5. Voter information compromised In a classic opportunistic theft, a laptop with voter registration information on over 14,000 voters was stolen from a city council office in the UK in 2009. No voter choice information was compromised, but the data needed to apply for credit was. Photo by Tatoy
  • 6. Attempted blackmail of F1 driver Not a device theft, but a reminder to wipe all personal data before disposing of old devices. In 2008, someone found F1 driver Adrian Sutil’s old laptop, with its personal data, and attempted to blackmail him to prevent its disclosure. He was arrested by the authorities. Photo by Morgana F1