際際滷

際際滷Share a Scribd company logo
Five embarrassing mobile device
thefts
As devices become more portable and storage becomes smaller, the potential for
danger when devices go missing is rising exponentially. Here are five embarrassing
cases where mobile devices went missing, and sensitive information was
compromised.
By Jeff JedrasPhoto by chanpipat
Lost laptop adds to BP oil spill
grief
As if the BP oil spill off Louisiana wasnt bad enough, the damage was
compounded when a BP employee lost a laptop containing personal data of
thousands of residents who had filed compensation claims in 2011.
Photo by Ideum
Veterans data lost, recovered
An employee of the U.S. Department of Veterans Affairs took home a laptop and
external drive with sensitive personal information on millions of vets in 2006; they
went missing following a home break-in. Following an FBI investigation, the devices
were recovered.
Missing laptop grounds flyers
New sign-ups for the U.S Registered Traveller program were halted when a
contractor lost a laptop in 2008 with personal data on 33,000 applicants at San
Franciscos airport. The laptop had two layers of password protection, and was in a
locked office.
Photo by Schill
Voter information compromised
In a classic opportunistic theft, a laptop with voter registration information on over
14,000 voters was stolen from a city council office in the UK in 2009. No voter
choice information was compromised, but the data needed to apply for credit was.
Photo by Tatoy
Attempted blackmail of F1 driver
Not a device theft, but a reminder to wipe all personal data before disposing of old
devices. In 2008, someone found F1 driver Adrian Sutils old laptop, with its
personal data, and attempted to blackmail him to prevent its disclosure. He was
arrested by the authorities.
Photo by Morgana F1

More Related Content

Viewers also liked (7)

Cadburys dream
Cadburys dreamCadburys dream
Cadburys dream
ubercharged06
Swot analysis
Swot analysisSwot analysis
Swot analysis
ubercharged06
Proposal
ProposalProposal
Proposal
ubercharged06
2 1 polynomials
2 1 polynomials2 1 polynomials
2 1 polynomials
hisema01
Raster graphics
Raster graphicsRaster graphics
Raster graphics
ubercharged06
4 2 operations on functions
4 2 operations on functions4 2 operations on functions
4 2 operations on functions
hisema01
3 1 writing & graphing inequalities
3 1 writing & graphing inequalities3 1 writing & graphing inequalities
3 1 writing & graphing inequalities
hisema01
2 1 polynomials
2 1 polynomials2 1 polynomials
2 1 polynomials
hisema01
4 2 operations on functions
4 2 operations on functions4 2 operations on functions
4 2 operations on functions
hisema01
3 1 writing & graphing inequalities
3 1 writing & graphing inequalities3 1 writing & graphing inequalities
3 1 writing & graphing inequalities
hisema01

Similar to Five embarrassing mobile device thefts (13)

Ni sug disuk 2013
Ni sug disuk 2013Ni sug disuk 2013
Ni sug disuk 2013
DISUK Limited
The State of Identity Theft in 2013
The State of Identity Theft in 2013The State of Identity Theft in 2013
The State of Identity Theft in 2013
nationalconsumersleague
National Consumers League 2013 State of ID Theft Report
National Consumers League 2013 State of ID Theft ReportNational Consumers League 2013 State of ID Theft Report
National Consumers League 2013 State of ID Theft Report
nationalconsumersleague
FBI's New Data Warehouse A Powerhouse
FBI's New Data Warehouse A PowerhouseFBI's New Data Warehouse A Powerhouse
FBI's New Data Warehouse A Powerhouse
childlikeegg1000
Data Mining: Privacy and Concerns
Data Mining: Privacy and ConcernsData Mining: Privacy and Concerns
Data Mining: Privacy and Concerns
Bradley Buchanan
Ira Wilsker's January 2014 Identity Theft Presentation
Ira Wilsker's January 2014 Identity Theft PresentationIra Wilsker's January 2014 Identity Theft Presentation
Ira Wilsker's January 2014 Identity Theft Presentation
Greater Cleveland PC Users Group
CSR&RSA_ACT1: Deep Roots Analytics Proff.pdf
CSR&RSA_ACT1: Deep Roots Analytics Proff.pdfCSR&RSA_ACT1: Deep Roots Analytics Proff.pdf
CSR&RSA_ACT1: Deep Roots Analytics Proff.pdf
WhyntherZaynahPorche
The Cost Of Hacking
The Cost Of HackingThe Cost Of Hacking
The Cost Of Hacking
bluecoatss
Secret service, fbi invesigating claim that mitt romney's tax returns were st...
Secret service, fbi invesigating claim that mitt romney's tax returns were st...Secret service, fbi invesigating claim that mitt romney's tax returns were st...
Secret service, fbi invesigating claim that mitt romney's tax returns were st...
VogelDenise
IDT Red Flags White Paper By Wrf
IDT Red Flags White Paper By WrfIDT Red Flags White Paper By Wrf
IDT Red Flags White Paper By Wrf
Bucacci Business Solutions
1) Assignment 1 油( 2 Pages )油Post-AssessmentMr. Fahad Nas.docx
1) Assignment 1 油( 2 Pages )油Post-AssessmentMr. Fahad Nas.docx1) Assignment 1 油( 2 Pages )油Post-AssessmentMr. Fahad Nas.docx
1) Assignment 1 油( 2 Pages )油Post-AssessmentMr. Fahad Nas.docx
teresehearn
15 Most Outrageous Data Loss Incidents
15 Most Outrageous Data Loss Incidents15 Most Outrageous Data Loss Incidents
15 Most Outrageous Data Loss Incidents
Datto
Presentation3
Presentation3Presentation3
Presentation3
ChantallD
Ni sug disuk 2013
Ni sug disuk 2013Ni sug disuk 2013
Ni sug disuk 2013
DISUK Limited
National Consumers League 2013 State of ID Theft Report
National Consumers League 2013 State of ID Theft ReportNational Consumers League 2013 State of ID Theft Report
National Consumers League 2013 State of ID Theft Report
nationalconsumersleague
FBI's New Data Warehouse A Powerhouse
FBI's New Data Warehouse A PowerhouseFBI's New Data Warehouse A Powerhouse
FBI's New Data Warehouse A Powerhouse
childlikeegg1000
Data Mining: Privacy and Concerns
Data Mining: Privacy and ConcernsData Mining: Privacy and Concerns
Data Mining: Privacy and Concerns
Bradley Buchanan
CSR&RSA_ACT1: Deep Roots Analytics Proff.pdf
CSR&RSA_ACT1: Deep Roots Analytics Proff.pdfCSR&RSA_ACT1: Deep Roots Analytics Proff.pdf
CSR&RSA_ACT1: Deep Roots Analytics Proff.pdf
WhyntherZaynahPorche
The Cost Of Hacking
The Cost Of HackingThe Cost Of Hacking
The Cost Of Hacking
bluecoatss
Secret service, fbi invesigating claim that mitt romney's tax returns were st...
Secret service, fbi invesigating claim that mitt romney's tax returns were st...Secret service, fbi invesigating claim that mitt romney's tax returns were st...
Secret service, fbi invesigating claim that mitt romney's tax returns were st...
VogelDenise
1) Assignment 1 油( 2 Pages )油Post-AssessmentMr. Fahad Nas.docx
1) Assignment 1 油( 2 Pages )油Post-AssessmentMr. Fahad Nas.docx1) Assignment 1 油( 2 Pages )油Post-AssessmentMr. Fahad Nas.docx
1) Assignment 1 油( 2 Pages )油Post-AssessmentMr. Fahad Nas.docx
teresehearn
15 Most Outrageous Data Loss Incidents
15 Most Outrageous Data Loss Incidents15 Most Outrageous Data Loss Incidents
15 Most Outrageous Data Loss Incidents
Datto
Presentation3
Presentation3Presentation3
Presentation3
ChantallD

More from JeffJedras (20)

Five sci-fi and tech movies to watch this fall
Five sci-fi and tech movies to watch this fallFive sci-fi and tech movies to watch this fall
Five sci-fi and tech movies to watch this fall
JeffJedras
Five alternatives to Google Glass
Five alternatives to Google GlassFive alternatives to Google Glass
Five alternatives to Google Glass
JeffJedras
The techies summer reading list
The techies summer reading listThe techies summer reading list
The techies summer reading list
JeffJedras
Social media screw-ups you *must* avoid
Social media screw-ups you *must* avoidSocial media screw-ups you *must* avoid
Social media screw-ups you *must* avoid
JeffJedras
Five must-have apps for your summer travels
Five must-have apps for your summer travelsFive must-have apps for your summer travels
Five must-have apps for your summer travels
JeffJedras
Five far-out tech office environments
Five far-out tech office environmentsFive far-out tech office environments
Five far-out tech office environments
JeffJedras
Five outrageously expensive mobile phones
Five outrageously expensive mobile phonesFive outrageously expensive mobile phones
Five outrageously expensive mobile phones
JeffJedras
Five cool in-car technologies for your summer road trip
Five cool in-car technologies for your summer road tripFive cool in-car technologies for your summer road trip
Five cool in-car technologies for your summer road trip
JeffJedras
Six browsers that changed the world (wide web)
Six browsers that changed the world (wide web)Six browsers that changed the world (wide web)
Six browsers that changed the world (wide web)
JeffJedras
The long, slow, fictional death of the PC
The long, slow, fictional death of the PCThe long, slow, fictional death of the PC
The long, slow, fictional death of the PC
JeffJedras
Did you know they were Canadian?
Did you know they were Canadian?Did you know they were Canadian?
Did you know they were Canadian?
JeffJedras
The top tech buzzwords of 2013
The top tech buzzwords of 2013The top tech buzzwords of 2013
The top tech buzzwords of 2013
JeffJedras
History's most notorious hackers
History's most notorious hackersHistory's most notorious hackers
History's most notorious hackers
JeffJedras
Top social media hoaxes
Top social media hoaxesTop social media hoaxes
Top social media hoaxes
JeffJedras
Five innovative laptop concept designs
Five innovative laptop concept designsFive innovative laptop concept designs
Five innovative laptop concept designs
JeffJedras
Five weird wearable computers
Five weird wearable computersFive weird wearable computers
Five weird wearable computers
JeffJedras
Worst tech blunders of 2012
Worst tech blunders of 2012Worst tech blunders of 2012
Worst tech blunders of 2012
JeffJedras
Baby names with a tech twist
Baby names with a tech twistBaby names with a tech twist
Baby names with a tech twist
JeffJedras
Six unfortunate tech product names
Six unfortunate tech product namesSix unfortunate tech product names
Six unfortunate tech product names
JeffJedras
Five spooky IT infographics
Five spooky IT infographicsFive spooky IT infographics
Five spooky IT infographics
JeffJedras
Five sci-fi and tech movies to watch this fall
Five sci-fi and tech movies to watch this fallFive sci-fi and tech movies to watch this fall
Five sci-fi and tech movies to watch this fall
JeffJedras
Five alternatives to Google Glass
Five alternatives to Google GlassFive alternatives to Google Glass
Five alternatives to Google Glass
JeffJedras
The techies summer reading list
The techies summer reading listThe techies summer reading list
The techies summer reading list
JeffJedras
Social media screw-ups you *must* avoid
Social media screw-ups you *must* avoidSocial media screw-ups you *must* avoid
Social media screw-ups you *must* avoid
JeffJedras
Five must-have apps for your summer travels
Five must-have apps for your summer travelsFive must-have apps for your summer travels
Five must-have apps for your summer travels
JeffJedras
Five far-out tech office environments
Five far-out tech office environmentsFive far-out tech office environments
Five far-out tech office environments
JeffJedras
Five outrageously expensive mobile phones
Five outrageously expensive mobile phonesFive outrageously expensive mobile phones
Five outrageously expensive mobile phones
JeffJedras
Five cool in-car technologies for your summer road trip
Five cool in-car technologies for your summer road tripFive cool in-car technologies for your summer road trip
Five cool in-car technologies for your summer road trip
JeffJedras
Six browsers that changed the world (wide web)
Six browsers that changed the world (wide web)Six browsers that changed the world (wide web)
Six browsers that changed the world (wide web)
JeffJedras
The long, slow, fictional death of the PC
The long, slow, fictional death of the PCThe long, slow, fictional death of the PC
The long, slow, fictional death of the PC
JeffJedras
Did you know they were Canadian?
Did you know they were Canadian?Did you know they were Canadian?
Did you know they were Canadian?
JeffJedras
The top tech buzzwords of 2013
The top tech buzzwords of 2013The top tech buzzwords of 2013
The top tech buzzwords of 2013
JeffJedras
History's most notorious hackers
History's most notorious hackersHistory's most notorious hackers
History's most notorious hackers
JeffJedras
Top social media hoaxes
Top social media hoaxesTop social media hoaxes
Top social media hoaxes
JeffJedras
Five innovative laptop concept designs
Five innovative laptop concept designsFive innovative laptop concept designs
Five innovative laptop concept designs
JeffJedras
Five weird wearable computers
Five weird wearable computersFive weird wearable computers
Five weird wearable computers
JeffJedras
Worst tech blunders of 2012
Worst tech blunders of 2012Worst tech blunders of 2012
Worst tech blunders of 2012
JeffJedras
Baby names with a tech twist
Baby names with a tech twistBaby names with a tech twist
Baby names with a tech twist
JeffJedras
Six unfortunate tech product names
Six unfortunate tech product namesSix unfortunate tech product names
Six unfortunate tech product names
JeffJedras
Five spooky IT infographics
Five spooky IT infographicsFive spooky IT infographics
Five spooky IT infographics
JeffJedras

Recently uploaded (20)

[Webinar] Scaling Made Simple: Getting Started with No-Code Web Apps
[Webinar] Scaling Made Simple: Getting Started with No-Code Web Apps[Webinar] Scaling Made Simple: Getting Started with No-Code Web Apps
[Webinar] Scaling Made Simple: Getting Started with No-Code Web Apps
Safe Software
The Future of Repair: Transparent and Incremental by Botond Denes
The Future of Repair: Transparent and Incremental by Botond DenesThe Future of Repair: Transparent and Incremental by Botond Denes
The Future of Repair: Transparent and Incremental by Botond Denes
ScyllaDB
Technology use over time and its impact on consumers and businesses.pptx
Technology use over time and its impact on consumers and businesses.pptxTechnology use over time and its impact on consumers and businesses.pptx
Technology use over time and its impact on consumers and businesses.pptx
kaylagaze
Wondershare Dr.Fone Crack Free Download 2025
Wondershare Dr.Fone Crack Free Download 2025Wondershare Dr.Fone Crack Free Download 2025
Wondershare Dr.Fone Crack Free Download 2025
maharajput103
Formal Methods: Whence and Whither? [Martin Fr辰nzle Festkolloquium, 2025]
Formal Methods: Whence and Whither? [Martin Fr辰nzle Festkolloquium, 2025]Formal Methods: Whence and Whither? [Martin Fr辰nzle Festkolloquium, 2025]
Formal Methods: Whence and Whither? [Martin Fr辰nzle Festkolloquium, 2025]
Jonathan Bowen
How Discord Indexes Trillions of Messages: Scaling Search Infrastructure by V...
How Discord Indexes Trillions of Messages: Scaling Search Infrastructure by V...How Discord Indexes Trillions of Messages: Scaling Search Infrastructure by V...
How Discord Indexes Trillions of Messages: Scaling Search Infrastructure by V...
ScyllaDB
TrustArc Webinar - Building your DPIA/PIA Program: Best Practices & Tips
TrustArc Webinar - Building your DPIA/PIA Program: Best Practices & TipsTrustArc Webinar - Building your DPIA/PIA Program: Best Practices & Tips
TrustArc Webinar - Building your DPIA/PIA Program: Best Practices & Tips
TrustArc
Computational Photography: How Technology is Changing Way We Capture the World
Computational Photography: How Technology is Changing Way We Capture the WorldComputational Photography: How Technology is Changing Way We Capture the World
Computational Photography: How Technology is Changing Way We Capture the World
HusseinMalikMammadli
Wondershare Filmora Crack 14.3.2.11147 Latest
Wondershare Filmora Crack 14.3.2.11147 LatestWondershare Filmora Crack 14.3.2.11147 Latest
Wondershare Filmora Crack 14.3.2.11147 Latest
udkg888
DevNexus - Building 10x Development Organizations.pdf
DevNexus - Building 10x Development Organizations.pdfDevNexus - Building 10x Development Organizations.pdf
DevNexus - Building 10x Development Organizations.pdf
Justin Reock
A Framework for Model-Driven Digital Twin Engineering
A Framework for Model-Driven Digital Twin EngineeringA Framework for Model-Driven Digital Twin Engineering
A Framework for Model-Driven Digital Twin Engineering
Daniel Lehner
Gojek Clone Multi-Service Super App.pptx
Gojek Clone Multi-Service Super App.pptxGojek Clone Multi-Service Super App.pptx
Gojek Clone Multi-Service Super App.pptx
V3cube
Revolutionizing-Government-Communication-The-OSWAN-Success-Story
Revolutionizing-Government-Communication-The-OSWAN-Success-StoryRevolutionizing-Government-Communication-The-OSWAN-Success-Story
Revolutionizing-Government-Communication-The-OSWAN-Success-Story
ssuser52ad5e
Technology use over time and its impact on consumers and businesses.pptx
Technology use over time and its impact on consumers and businesses.pptxTechnology use over time and its impact on consumers and businesses.pptx
Technology use over time and its impact on consumers and businesses.pptx
kaylagaze
L01 Introduction to Nanoindentation - What is hardness
L01 Introduction to Nanoindentation - What is hardnessL01 Introduction to Nanoindentation - What is hardness
L01 Introduction to Nanoindentation - What is hardness
RostislavDaniel
Build with AI on Google Cloud Session #4
Build with AI on Google Cloud Session #4Build with AI on Google Cloud Session #4
Build with AI on Google Cloud Session #4
Margaret Maynard-Reid
Endpoint Backup: 3 Reasons MSPs Ignore It
Endpoint Backup: 3 Reasons MSPs Ignore ItEndpoint Backup: 3 Reasons MSPs Ignore It
Endpoint Backup: 3 Reasons MSPs Ignore It
MSP360
FinTech - US Annual Funding Report - 2024.pptx
FinTech - US Annual Funding Report - 2024.pptxFinTech - US Annual Funding Report - 2024.pptx
FinTech - US Annual Funding Report - 2024.pptx
Tracxn
Backstage Software Templates for Java Developers
Backstage Software Templates for Java DevelopersBackstage Software Templates for Java Developers
Backstage Software Templates for Java Developers
Markus Eisele
Q4 2024 Earnings and Investor Presentation
Q4 2024 Earnings and Investor PresentationQ4 2024 Earnings and Investor Presentation
Q4 2024 Earnings and Investor Presentation
Dropbox
[Webinar] Scaling Made Simple: Getting Started with No-Code Web Apps
[Webinar] Scaling Made Simple: Getting Started with No-Code Web Apps[Webinar] Scaling Made Simple: Getting Started with No-Code Web Apps
[Webinar] Scaling Made Simple: Getting Started with No-Code Web Apps
Safe Software
The Future of Repair: Transparent and Incremental by Botond Denes
The Future of Repair: Transparent and Incremental by Botond DenesThe Future of Repair: Transparent and Incremental by Botond Denes
The Future of Repair: Transparent and Incremental by Botond Denes
ScyllaDB
Technology use over time and its impact on consumers and businesses.pptx
Technology use over time and its impact on consumers and businesses.pptxTechnology use over time and its impact on consumers and businesses.pptx
Technology use over time and its impact on consumers and businesses.pptx
kaylagaze
Wondershare Dr.Fone Crack Free Download 2025
Wondershare Dr.Fone Crack Free Download 2025Wondershare Dr.Fone Crack Free Download 2025
Wondershare Dr.Fone Crack Free Download 2025
maharajput103
Formal Methods: Whence and Whither? [Martin Fr辰nzle Festkolloquium, 2025]
Formal Methods: Whence and Whither? [Martin Fr辰nzle Festkolloquium, 2025]Formal Methods: Whence and Whither? [Martin Fr辰nzle Festkolloquium, 2025]
Formal Methods: Whence and Whither? [Martin Fr辰nzle Festkolloquium, 2025]
Jonathan Bowen
How Discord Indexes Trillions of Messages: Scaling Search Infrastructure by V...
How Discord Indexes Trillions of Messages: Scaling Search Infrastructure by V...How Discord Indexes Trillions of Messages: Scaling Search Infrastructure by V...
How Discord Indexes Trillions of Messages: Scaling Search Infrastructure by V...
ScyllaDB
TrustArc Webinar - Building your DPIA/PIA Program: Best Practices & Tips
TrustArc Webinar - Building your DPIA/PIA Program: Best Practices & TipsTrustArc Webinar - Building your DPIA/PIA Program: Best Practices & Tips
TrustArc Webinar - Building your DPIA/PIA Program: Best Practices & Tips
TrustArc
Computational Photography: How Technology is Changing Way We Capture the World
Computational Photography: How Technology is Changing Way We Capture the WorldComputational Photography: How Technology is Changing Way We Capture the World
Computational Photography: How Technology is Changing Way We Capture the World
HusseinMalikMammadli
Wondershare Filmora Crack 14.3.2.11147 Latest
Wondershare Filmora Crack 14.3.2.11147 LatestWondershare Filmora Crack 14.3.2.11147 Latest
Wondershare Filmora Crack 14.3.2.11147 Latest
udkg888
DevNexus - Building 10x Development Organizations.pdf
DevNexus - Building 10x Development Organizations.pdfDevNexus - Building 10x Development Organizations.pdf
DevNexus - Building 10x Development Organizations.pdf
Justin Reock
A Framework for Model-Driven Digital Twin Engineering
A Framework for Model-Driven Digital Twin EngineeringA Framework for Model-Driven Digital Twin Engineering
A Framework for Model-Driven Digital Twin Engineering
Daniel Lehner
Gojek Clone Multi-Service Super App.pptx
Gojek Clone Multi-Service Super App.pptxGojek Clone Multi-Service Super App.pptx
Gojek Clone Multi-Service Super App.pptx
V3cube
Revolutionizing-Government-Communication-The-OSWAN-Success-Story
Revolutionizing-Government-Communication-The-OSWAN-Success-StoryRevolutionizing-Government-Communication-The-OSWAN-Success-Story
Revolutionizing-Government-Communication-The-OSWAN-Success-Story
ssuser52ad5e
Technology use over time and its impact on consumers and businesses.pptx
Technology use over time and its impact on consumers and businesses.pptxTechnology use over time and its impact on consumers and businesses.pptx
Technology use over time and its impact on consumers and businesses.pptx
kaylagaze
L01 Introduction to Nanoindentation - What is hardness
L01 Introduction to Nanoindentation - What is hardnessL01 Introduction to Nanoindentation - What is hardness
L01 Introduction to Nanoindentation - What is hardness
RostislavDaniel
Build with AI on Google Cloud Session #4
Build with AI on Google Cloud Session #4Build with AI on Google Cloud Session #4
Build with AI on Google Cloud Session #4
Margaret Maynard-Reid
Endpoint Backup: 3 Reasons MSPs Ignore It
Endpoint Backup: 3 Reasons MSPs Ignore ItEndpoint Backup: 3 Reasons MSPs Ignore It
Endpoint Backup: 3 Reasons MSPs Ignore It
MSP360
FinTech - US Annual Funding Report - 2024.pptx
FinTech - US Annual Funding Report - 2024.pptxFinTech - US Annual Funding Report - 2024.pptx
FinTech - US Annual Funding Report - 2024.pptx
Tracxn
Backstage Software Templates for Java Developers
Backstage Software Templates for Java DevelopersBackstage Software Templates for Java Developers
Backstage Software Templates for Java Developers
Markus Eisele
Q4 2024 Earnings and Investor Presentation
Q4 2024 Earnings and Investor PresentationQ4 2024 Earnings and Investor Presentation
Q4 2024 Earnings and Investor Presentation
Dropbox

Five embarrassing mobile device thefts

  • 1. Five embarrassing mobile device thefts As devices become more portable and storage becomes smaller, the potential for danger when devices go missing is rising exponentially. Here are five embarrassing cases where mobile devices went missing, and sensitive information was compromised. By Jeff JedrasPhoto by chanpipat
  • 2. Lost laptop adds to BP oil spill grief As if the BP oil spill off Louisiana wasnt bad enough, the damage was compounded when a BP employee lost a laptop containing personal data of thousands of residents who had filed compensation claims in 2011. Photo by Ideum
  • 3. Veterans data lost, recovered An employee of the U.S. Department of Veterans Affairs took home a laptop and external drive with sensitive personal information on millions of vets in 2006; they went missing following a home break-in. Following an FBI investigation, the devices were recovered.
  • 4. Missing laptop grounds flyers New sign-ups for the U.S Registered Traveller program were halted when a contractor lost a laptop in 2008 with personal data on 33,000 applicants at San Franciscos airport. The laptop had two layers of password protection, and was in a locked office. Photo by Schill
  • 5. Voter information compromised In a classic opportunistic theft, a laptop with voter registration information on over 14,000 voters was stolen from a city council office in the UK in 2009. No voter choice information was compromised, but the data needed to apply for credit was. Photo by Tatoy
  • 6. Attempted blackmail of F1 driver Not a device theft, but a reminder to wipe all personal data before disposing of old devices. In 2008, someone found F1 driver Adrian Sutils old laptop, with its personal data, and attempted to blackmail him to prevent its disclosure. He was arrested by the authorities. Photo by Morgana F1