Stop IT Incompetence masthead.
Stop IT Incompetence motto.

Data Breaches tab.

Not black hat hacker Einstein, bad coding clown.

Data Breaches



Whenever there is a data breach (hacking), to cover up their negligence the (ir)responsible organization claims it was a "sophisticated" hacking, pretending it was done by hacker geniuses -- so there was nothing the organization could have done about it -- and not by the organization's IT incompetence. But data breaches are caused by IT incompetence, i.e. IT incompetents, not black hat hacker Einsteins. Period.

To understand and appreciate Data Breaches be sure to read the Principles of IT Incompetence.

Chronological by year with most recent at top and alphabetical by organization within a year.


Experian hacked Sep 2013 - Sep 2015; HealthCare.gov hacked Oct 2013 - Sep 2015.

HealthCare.gov-Experian, 2013 - 2015



HealthCare.gov, the Obamacare website, was launched in October 2013. Its launch was universally considered a monumental disaster and this was largely due to the IT incompetence of the website's foreign (Canadian) developers. There had been great concern HealthCare.gov would be hacked. When that didn't happen immediately it was taken as proof that its IT was secure. However, absence of evidence is not evidence of absence. Most hackers want to steal sensitive data, particularly identity data, undetected, and go to a lot of trouble for the undetected part, since it means they can continue to steal data, which is constantly updated, for years. Data breaches are thus often not discovered, and made public, until years later
, if ever. In early-March 2020, I made the shocking discovery, reported nowhere else, that HealthCare.gov, via Experian, had been hacked from its launch in October 2013 until September 2015, i.e. for 2 years.   ...


BAH-NSA hacked 2013 Edward Snowden.

National Security Agency (NSA), 2013



Since Information Technology (IT) is really communication-of-information technology, IT is mostly computer networking. (Cyber is a prefix meaning IT, so for example, IT security is also known as cybersecurity.) "Computer" includes supercomputers, servers, desktops, laptops, tablets, phones (landlines and cells), TV, etc. There has been a "convergence" and all of these devices now communicate -- their most important function -- over the same network, the Internet.

For years the NSA was primarily a human spy agency. The NSA did do research in encryption, for which they became well-known, but did so primarily so they (and the CIA) could communicate securely with their human spies and break the communications of enemy human spies, particularly those from the Soviet Union.


Dell-CIA hacked 2012 Edward Snowden.

Central Intelligence Agency (CIA), 2012



Since Information Technology (IT) is really communication-of-information technology, IT is mostly computer networking. (Cyber is a prefix meaning IT, so for example, IT security is also known as cybersecurity.) "Computer" includes supercomputers, servers, desktops, laptops, tablets, phones (landlines and cells), TV, etc. There has been a "convergence" and all of these devices now communicate -- their most important function -- over the same network, the Internet.

For years the CIA was primarily a human spy agency. They did little with IT except use it to communicate securely with their human spies and break the communications of enemy human spies, particularly those from the Soviet Union.