This document discusses who owns sensitive information, how it is taken, and how to protect it. It notes that hackers, cyber mafia, cyber terrorists, movies, cyber armies, and Wikileaks can own sensitive information. Information is often taken through password theft, insecure infrastructure, insecure data protection, lack of security policies/procedures, intrusion/hacking, and social engineering. The document provides examples of how Bradley Manning leaked classified US airstrike videos and diplomatic cables to Wikileaks by copying them to a Lady Gaga CD. It recommends upgrading security awareness, following security manuals, using strong authentication/encryption, antivirus software, and realizing that no system is completely secure and security requires human diligence