In fifteen pages this paper considers the downside of Internet technology in a discussion of security issues and their breaches. Seventeen sources are cited in the bibliography.