Hadoop technology was designed without any security features
- Retail was the earliest adopter
- Healthcare was an early adopter
- Justice Systems were early adopters
No fine grain access features - applications which require specific tables to be checked and others omitted by not knowing they are involved in the information is called fifth normal form by some.
Its called white collar crime by others
Its a realistic place to start looking at how breaches were made at the source-an open data store is where we need to look.
Botnets, fhishing or any "GET" or "INSERT" in a script regardless of the software programming language should be an indication of changes to information, records or anything produced by digital acquisition (including video and audio or text from any device).