Fortunately, the stolen notebook was recovered. Unfortunately, it's now up to the forensics experts to determine if any of the data, including the names and Social Security numbers of register voters, was accessed or tampered with. I'm talking about the notebook that was allegedly stolen from the Election Commission in the Nashville area last month. According to this <a href="http://www.nashvillecitypaper.com/news.php?viewStory=58576">report</a>, the notebook held the names and Social Security n
January 22, 2008
Fortunately, the stolen notebook was recovered. Unfortunately, it's now up to the forensics experts to determine if any of the data, including the names and Social Security numbers of register voters, was accessed or tampered with. I'm talking about the notebook that was allegedly stolen from the Election Commission in the Nashville area last month. According to this report, the notebook held the names and Social Security numbers for 337,000 registered voters.The story goes on to detail that a suspected homeless man broke into the offices and walked away with some computer equipment. Judging by the background on the suspect, this was probably a case of a thief targeting the computer, not the data inside. But that doesn't matter much to anyone involved, since the only assumption that can be made is that each registered voter is now at significant risk of identity theft.
Now comes the cost from the fallout of the theft:
The cost for those whose Social Security numbers were stolen: Agony.
The price of freedom for the suspect: $80,000 bond.
The forensic analysis for analysts to sweeping through the drive to see if any sensitive information was accessed, or changed: $200 an hour.
Defending the upcoming lawsuits: To be determined.
For at least one security guard: His job.
The estimated to cost to provide 337,000 registered voters "identity theft protection:" $1 million.
The relief for everyone (except the thief) from government officials having used encryption that comes with many versions of Windows, and costs nearly nothing: Priceless.
About the Author(s)
You May Also Like
Beyond Spam Filters and Firewalls: Preventing Business Email Compromises in the Modern Enterprise
April 30, 2024Key Findings from the State of AppSec Report 2024
May 7, 2024Is AI Identifying Threats to Your Network?
May 14, 2024Where and Why Threat Intelligence Makes Sense for Your Enterprise Security Strategy
May 15, 2024Safeguarding Political Campaigns: Defending Against Mass Phishing Attacks
May 16, 2024
Black Hat USA - August 3-8 - Learn More
August 3, 2024Cybersecurity's Hottest New Technologies: What You Need To Know
March 21, 2024