Assaults on privacy Theft of information Break-ins, assaults, and thefts are prohibited. Yet they happen. How is this so? Just how clever are the invaders? What are the holes in supposedly secure... This description may be from another edition of this product.