SlideShare a Scribd company logo
1 of 6
Five embarrassing mobile device
thefts
As devices become more portable and storage becomes smaller, the potential for
danger when devices go missing is rising exponentially. Here are five embarrassing
cases where mobile devices went missing, and sensitive information was
compromised.
By Jeff JedrasPhoto by chanpipat
Lost laptop adds to BP oil spill
grief
As if the BP oil spill off Louisiana wasn’t bad enough, the damage was
compounded when a BP employee lost a laptop containing personal data of
thousands of residents who had filed compensation claims in 2011.
Photo by Ideum
Veterans data lost, recovered
An employee of the U.S. Department of Veterans Affairs took home a laptop and
external drive with sensitive personal information on millions of vets in 2006; they
went missing following a home break-in. Following an FBI investigation, the devices
were recovered.
Missing laptop grounds flyers
New sign-ups for the U.S Registered Traveller program were halted when a
contractor lost a laptop in 2008 with personal data on 33,000 applicants at San
Francisco’s airport. The laptop had two layers of password protection, and was in a
locked office.
Photo by Schill
Voter information compromised
In a classic opportunistic theft, a laptop with voter registration information on over
14,000 voters was stolen from a city council office in the UK in 2009. No voter
choice information was compromised, but the data needed to apply for credit was.
Photo by Tatoy
Attempted blackmail of F1 driver
Not a device theft, but a reminder to wipe all personal data before disposing of old
devices. In 2008, someone found F1 driver Adrian Sutil’s old laptop, with its
personal data, and attempted to blackmail him to prevent its disclosure. He was
arrested by the authorities.
Photo by Morgana F1

More Related Content

Viewers also liked

2 1 polynomials
2 1 polynomials2 1 polynomials
2 1 polynomialshisema01
 
4 2 operations on functions
4 2 operations on functions4 2 operations on functions
4 2 operations on functionshisema01
 
3 1 writing & graphing inequalities
3 1 writing & graphing inequalities3 1 writing & graphing inequalities
3 1 writing & graphing inequalitieshisema01
 

Viewers also liked (7)

Cadburys dream
Cadburys dreamCadburys dream
Cadburys dream
 
Swot analysis
Swot analysisSwot analysis
Swot analysis
 
Proposal
ProposalProposal
Proposal
 
2 1 polynomials
2 1 polynomials2 1 polynomials
2 1 polynomials
 
Raster graphics
Raster graphicsRaster graphics
Raster graphics
 
4 2 operations on functions
4 2 operations on functions4 2 operations on functions
4 2 operations on functions
 
3 1 writing & graphing inequalities
3 1 writing & graphing inequalities3 1 writing & graphing inequalities
3 1 writing & graphing inequalities
 

Similar to Five embarrassing mobile device thefts expose sensitive data

National Consumers League 2013 State of ID Theft Report
National Consumers League 2013 State of ID Theft ReportNational Consumers League 2013 State of ID Theft Report
National Consumers League 2013 State of ID Theft Reportnationalconsumersleague
 
FBI's New Data Warehouse A Powerhouse
FBI's New Data Warehouse A PowerhouseFBI's New Data Warehouse A Powerhouse
FBI's New Data Warehouse A Powerhousechildlikeegg1000
 
Data Mining: Privacy and Concerns
Data Mining: Privacy and ConcernsData Mining: Privacy and Concerns
Data Mining: Privacy and ConcernsBradley Buchanan
 
The Cost Of Hacking
The Cost Of HackingThe Cost Of Hacking
The Cost Of Hackingbluecoatss
 
Secret service, fbi invesigating claim that mitt romney's tax returns were st...
Secret service, fbi invesigating claim that mitt romney's tax returns were st...Secret service, fbi invesigating claim that mitt romney's tax returns were st...
Secret service, fbi invesigating claim that mitt romney's tax returns were st...VogelDenise
 
1) Assignment 1  ( 2 Pages ) Post-AssessmentMr. Fahad Nas.docx
1) Assignment 1  ( 2 Pages ) Post-AssessmentMr. Fahad Nas.docx1) Assignment 1  ( 2 Pages ) Post-AssessmentMr. Fahad Nas.docx
1) Assignment 1  ( 2 Pages ) Post-AssessmentMr. Fahad Nas.docxteresehearn
 
15 Most Outrageous Data Loss Incidents
15 Most Outrageous Data Loss Incidents15 Most Outrageous Data Loss Incidents
15 Most Outrageous Data Loss IncidentsDatto
 
Presentation3
Presentation3Presentation3
Presentation3ChantallD
 

Similar to Five embarrassing mobile device thefts expose sensitive data (12)

Ni sug disuk 2013
Ni sug disuk 2013Ni sug disuk 2013
Ni sug disuk 2013
 
The State of Identity Theft in 2013
The State of Identity Theft in 2013The State of Identity Theft in 2013
The State of Identity Theft in 2013
 
National Consumers League 2013 State of ID Theft Report
National Consumers League 2013 State of ID Theft ReportNational Consumers League 2013 State of ID Theft Report
National Consumers League 2013 State of ID Theft Report
 
FBI's New Data Warehouse A Powerhouse
FBI's New Data Warehouse A PowerhouseFBI's New Data Warehouse A Powerhouse
FBI's New Data Warehouse A Powerhouse
 
Data Mining: Privacy and Concerns
Data Mining: Privacy and ConcernsData Mining: Privacy and Concerns
Data Mining: Privacy and Concerns
 
Ira Wilsker's January 2014 Identity Theft Presentation
Ira Wilsker's January 2014 Identity Theft PresentationIra Wilsker's January 2014 Identity Theft Presentation
Ira Wilsker's January 2014 Identity Theft Presentation
 
The Cost Of Hacking
The Cost Of HackingThe Cost Of Hacking
The Cost Of Hacking
 
Secret service, fbi invesigating claim that mitt romney's tax returns were st...
Secret service, fbi invesigating claim that mitt romney's tax returns were st...Secret service, fbi invesigating claim that mitt romney's tax returns were st...
Secret service, fbi invesigating claim that mitt romney's tax returns were st...
 
IDT Red Flags White Paper By Wrf
IDT Red Flags White Paper By WrfIDT Red Flags White Paper By Wrf
IDT Red Flags White Paper By Wrf
 
1) Assignment 1  ( 2 Pages ) Post-AssessmentMr. Fahad Nas.docx
1) Assignment 1  ( 2 Pages ) Post-AssessmentMr. Fahad Nas.docx1) Assignment 1  ( 2 Pages ) Post-AssessmentMr. Fahad Nas.docx
1) Assignment 1  ( 2 Pages ) Post-AssessmentMr. Fahad Nas.docx
 
15 Most Outrageous Data Loss Incidents
15 Most Outrageous Data Loss Incidents15 Most Outrageous Data Loss Incidents
15 Most Outrageous Data Loss Incidents
 
Presentation3
Presentation3Presentation3
Presentation3
 

More from JeffJedras

Five sci-fi and tech movies to watch this fall
Five sci-fi and tech movies to watch this fallFive sci-fi and tech movies to watch this fall
Five sci-fi and tech movies to watch this fallJeffJedras
 
Five alternatives to Google Glass
Five alternatives to Google GlassFive alternatives to Google Glass
Five alternatives to Google GlassJeffJedras
 
The techie’s summer reading list
The techie’s summer reading listThe techie’s summer reading list
The techie’s summer reading listJeffJedras
 
Social media screw-ups you *must* avoid
Social media screw-ups you *must* avoidSocial media screw-ups you *must* avoid
Social media screw-ups you *must* avoidJeffJedras
 
Five must-have apps for your summer travels
Five must-have apps for your summer travelsFive must-have apps for your summer travels
Five must-have apps for your summer travelsJeffJedras
 
Five far-out tech office environments
Five far-out tech office environmentsFive far-out tech office environments
Five far-out tech office environmentsJeffJedras
 
Five outrageously expensive mobile phones
Five outrageously expensive mobile phonesFive outrageously expensive mobile phones
Five outrageously expensive mobile phonesJeffJedras
 
Five cool in-car technologies for your summer road trip
Five cool in-car technologies for your summer road tripFive cool in-car technologies for your summer road trip
Five cool in-car technologies for your summer road tripJeffJedras
 
Six browsers that changed the world (wide web)
Six browsers that changed the world (wide web)Six browsers that changed the world (wide web)
Six browsers that changed the world (wide web)JeffJedras
 
The long, slow, fictional death of the PC
The long, slow, fictional death of the PCThe long, slow, fictional death of the PC
The long, slow, fictional death of the PCJeffJedras
 
Did you know they were Canadian?
Did you know they were Canadian?Did you know they were Canadian?
Did you know they were Canadian?JeffJedras
 
The top tech buzzwords of 2013
The top tech buzzwords of 2013The top tech buzzwords of 2013
The top tech buzzwords of 2013JeffJedras
 
History's most notorious hackers
History's most notorious hackersHistory's most notorious hackers
History's most notorious hackersJeffJedras
 
Top social media hoaxes
Top social media hoaxesTop social media hoaxes
Top social media hoaxesJeffJedras
 
Five innovative laptop concept designs
Five innovative laptop concept designsFive innovative laptop concept designs
Five innovative laptop concept designsJeffJedras
 
Five weird wearable computers
Five weird wearable computersFive weird wearable computers
Five weird wearable computersJeffJedras
 
Worst tech blunders of 2012
Worst tech blunders of 2012Worst tech blunders of 2012
Worst tech blunders of 2012JeffJedras
 
Baby names with a tech twist
Baby names with a tech twistBaby names with a tech twist
Baby names with a tech twistJeffJedras
 
Six unfortunate tech product names
Six unfortunate tech product namesSix unfortunate tech product names
Six unfortunate tech product namesJeffJedras
 
Five spooky IT infographics
Five spooky IT infographicsFive spooky IT infographics
Five spooky IT infographicsJeffJedras
 

More from JeffJedras (20)

Five sci-fi and tech movies to watch this fall
Five sci-fi and tech movies to watch this fallFive sci-fi and tech movies to watch this fall
Five sci-fi and tech movies to watch this fall
 
Five alternatives to Google Glass
Five alternatives to Google GlassFive alternatives to Google Glass
Five alternatives to Google Glass
 
The techie’s summer reading list
The techie’s summer reading listThe techie’s summer reading list
The techie’s summer reading list
 
Social media screw-ups you *must* avoid
Social media screw-ups you *must* avoidSocial media screw-ups you *must* avoid
Social media screw-ups you *must* avoid
 
Five must-have apps for your summer travels
Five must-have apps for your summer travelsFive must-have apps for your summer travels
Five must-have apps for your summer travels
 
Five far-out tech office environments
Five far-out tech office environmentsFive far-out tech office environments
Five far-out tech office environments
 
Five outrageously expensive mobile phones
Five outrageously expensive mobile phonesFive outrageously expensive mobile phones
Five outrageously expensive mobile phones
 
Five cool in-car technologies for your summer road trip
Five cool in-car technologies for your summer road tripFive cool in-car technologies for your summer road trip
Five cool in-car technologies for your summer road trip
 
Six browsers that changed the world (wide web)
Six browsers that changed the world (wide web)Six browsers that changed the world (wide web)
Six browsers that changed the world (wide web)
 
The long, slow, fictional death of the PC
The long, slow, fictional death of the PCThe long, slow, fictional death of the PC
The long, slow, fictional death of the PC
 
Did you know they were Canadian?
Did you know they were Canadian?Did you know they were Canadian?
Did you know they were Canadian?
 
The top tech buzzwords of 2013
The top tech buzzwords of 2013The top tech buzzwords of 2013
The top tech buzzwords of 2013
 
History's most notorious hackers
History's most notorious hackersHistory's most notorious hackers
History's most notorious hackers
 
Top social media hoaxes
Top social media hoaxesTop social media hoaxes
Top social media hoaxes
 
Five innovative laptop concept designs
Five innovative laptop concept designsFive innovative laptop concept designs
Five innovative laptop concept designs
 
Five weird wearable computers
Five weird wearable computersFive weird wearable computers
Five weird wearable computers
 
Worst tech blunders of 2012
Worst tech blunders of 2012Worst tech blunders of 2012
Worst tech blunders of 2012
 
Baby names with a tech twist
Baby names with a tech twistBaby names with a tech twist
Baby names with a tech twist
 
Six unfortunate tech product names
Six unfortunate tech product namesSix unfortunate tech product names
Six unfortunate tech product names
 
Five spooky IT infographics
Five spooky IT infographicsFive spooky IT infographics
Five spooky IT infographics
 

Recently uploaded

08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 

Recently uploaded (20)

08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 

Five embarrassing mobile device thefts expose sensitive data

  • 1. Five embarrassing mobile device thefts As devices become more portable and storage becomes smaller, the potential for danger when devices go missing is rising exponentially. Here are five embarrassing cases where mobile devices went missing, and sensitive information was compromised. By Jeff JedrasPhoto by chanpipat
  • 2. Lost laptop adds to BP oil spill grief As if the BP oil spill off Louisiana wasn’t bad enough, the damage was compounded when a BP employee lost a laptop containing personal data of thousands of residents who had filed compensation claims in 2011. Photo by Ideum
  • 3. Veterans data lost, recovered An employee of the U.S. Department of Veterans Affairs took home a laptop and external drive with sensitive personal information on millions of vets in 2006; they went missing following a home break-in. Following an FBI investigation, the devices were recovered.
  • 4. Missing laptop grounds flyers New sign-ups for the U.S Registered Traveller program were halted when a contractor lost a laptop in 2008 with personal data on 33,000 applicants at San Francisco’s airport. The laptop had two layers of password protection, and was in a locked office. Photo by Schill
  • 5. Voter information compromised In a classic opportunistic theft, a laptop with voter registration information on over 14,000 voters was stolen from a city council office in the UK in 2009. No voter choice information was compromised, but the data needed to apply for credit was. Photo by Tatoy
  • 6. Attempted blackmail of F1 driver Not a device theft, but a reminder to wipe all personal data before disposing of old devices. In 2008, someone found F1 driver Adrian Sutil’s old laptop, with its personal data, and attempted to blackmail him to prevent its disclosure. He was arrested by the authorities. Photo by Morgana F1