War in Cyberspace, a look at tactics and "threats"
An internal audit by Pinellas County (Florida) clerk of the circuit court, in Florida found that the publics sensitive information was improperly handled. Documents that had Social Security numbers, medical information, privileged communications between attorneys and clients, juvenile defendant records and child abuse materials. Had been found intact and trash containers that the public had access to (15 ).
A file that had inadvertently been placed on the internet. This file had information had Social Security numbers and other information on 675 who had applied to Poly Pomona university in California (16 ).
In San Antonio, state and federal authorities are looking in the theft of 17,000 peoples personal information when they say at San Antonio hotels. Special agent in charge of U.S. Secret Service in San Antonio, Mark Bartlett said, "Up to this point, we have recovered 1,500 (receipts), but we're estimating 17,000 were compromised," (17 ).
In 2008 the national shoe retailer DSW said hackers had access 103 of its stores with 1.4 million of its customers affected. The hackers got credit card information, including account numbers, cardholders' names, and the transaction amounts, they also got information like driver license numbers. A private contractor for a subsidiary of Wells Fargo was hired to print monthly statements certain home equity mortgage and student loan customers a lap top that had unencrypted information like customer names, addresses, social security numbers and account numbers was stolen (18 ).
Areas of concern
Chips that "broadcast" information are used Groceries, clothing, swipe-free credit cards, library cards, warehouse inventories, under-skin pet tags, for prisoner and parole tags, in hospital patient wristbands, and in smart passports. Indeed the increasing Radio-frequency identification (RFID) chips is troubling. Eleni Kosta and Jos Dumortier of the Katholieke Universiteit Leuven in Belgium said the benefits from these chips are apparent. But we also must consider personal privacy when designing applications for these chips (19 ).