Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Security Newswire

Security News -- London Olympics

67,000 Phones Likely to Be Lost or Stolen During Olympics

July 23, 2012

Security experts at Venafi estimate that 67,000 mobile phones are likely to be lost or stolen during the London Olympics, according to a company press release.

The numbers of smartphones and other portable networked devices have exploded over the past few years, the release says. As such, this year’s Games will see the largest-ever risk of corporate and personal data loss during an Olympics period, with an estimated 214.4 terabytes of potentially sensitive data likely to be lost or stolen – the equivalent of 200 million books’ worth of data.

Over any two-week period, 50,000 mobile phones are lost or stolen in London. During the Olympics, the total population in London is expected to swell by a third as an extra million people flood into the subway every day – leading, Venafi anticipates, to an additional 17,000 lost or stolen phones over the two-week Olympics.

Of that, an estimated 40 percent of mobile devices are smartphones (approximately 26,800). These figures do not include the even higher data volumes at risk from the loss of theft of other mobile devices, such as laptops or tablets.

Plus, the press release states, the recent BYOD (bring your own device) phenomenon means that people are carrying more personally-owned devices at any given time than ever before, but these powerful, network-enabled devices can access, process and store a great deal of data, much of it valuable and often regulated business data.

Data from Venafi

Average number of lost or stolen devices in 17-day period in London:

  • In December 2010, 20,000 mobiles were lost or stolen every day in the UK1. For the 17-day period of the Olympics this makes 20,000 x 17 = 340,000
  • UK population = 65 million; London population = 7.8 million
    Therefore 340,000 x 7.8 / 65 = 40,800 mobiles lost in 17-day period
  • Since 2010, Android and iPhone sales have soared. The number of lost and stolen devices during the two-week Olympic period can therefore be reasonably estimated at 50,000

Predicted increase of lost or stolen devices during the Olympics:

  • Approximately 3.04 million passengers travel on the tube every day2. With a predicted increase of one million extra passengers per day during the Olympics3, this means we can anticipate a one-third increase, placing the total number of lost or stolen devices during the Olympics at around 50,000 + 17,000 = 67,000.

Predicted increase of lost or stolen devices during the Olympics:

  • Approximately 3.04 million passengers travel on the tube every day2. With a predicted increase of one million extra passengers per day during the Olympics3, this means we can anticipate a one-third increase, placing the total number of lost or stolen devices during the Olympics at around 50,000 + 17,000 = 67,000.

Estimated amount of data on lost and stolen devices during the Olympics:

  • Forty percent of mobile phones now are smartphones4. Therefore of the lost or stolen 67,000 phones, 26,800 are likely to be smartphones.
  • The capacity of most smartphones is at least eight gigabytes. Therefore 26,800 smartphones could equal about 214.4 terabytes of lost or stolen data during the Olympics.
  • One megabyte equates to one book , equaling 214.4 million books in lost data
KEYWORDS: data security data theft Olympics Security smartphone theft smartphones

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Cyber tech background

    Security’s Top Cybersecurity Leaders 2026

    Security magazine’s Top Cybersecurity Leaders 2026 award...
    Top Cybersecurity Leaders
  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Columns
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Popular Stories

Cables plugged in

Chinese Supercomputer Allegedly Hacked, 10 Petabytes of Data Stolen

Man on laptop

Healthcare Executives Face a New Era of Personal Risk

Abstract shape

What Are Security Experts Saying About Claude Mythos and Project Glasswing?

Padlock with computer keys

Breach of FBI Surveillance System Considered a “Major Incident,” Security Experts Weigh In

AI

AI Startup Mercor, Which Works With Open AI and Anthropic, Confirms Data Breach

SEC 2026 Benchmark Banner
SEC 2026 Benchmark Banner

Events

April 30, 2026

Building a Campus-Wide Culture of Security and Shared Responsibility

In today’s higher education environment, where institutions face evolving and multifaceted incidents, safety must be embedded into the fabric of campus culture. Learn strategies for generating collective buy-in from faculty, staff, students and senior leadership. 

May 7, 2026

Beyond Cameras: Revolutionizing Perimeter Security with LiDAR, AI and Digital Twins

In this webinar, we will explore how LiDAR‑based detection, AI‑powered analytics and digital twins are transforming the future of perimeter protection with 3D detection, real-time situational awareness and unified operational views.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
SEC 2026 Top Cybersecurity Leaders

Related Articles

  • winter-olympics-freepik1170.jpg

    FBI asks athletes to use burner phones during Beijing Winter Olympics

    See More
  • Person skiing

    How to Protect Organizations During the Winter Olympics, According to CISOs

    See More
  • socialmedia1-900px.jpg

    During Disasters, Active Twitter Users Likely to Spread Falsehoods

    See More

Related Products

See More Products
  • The Complete Guide to Physical Security

  • physical security.webp

    Physical Security Assessment Handbook An Insider’s Guide to Securing a Business

  • A Leaders Guide Book Cover_Nicholson_29Sept2023.jpg

    A Leader’s Guide to Evaluating an Executive Protection Program

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media, Inc. and BNP Media II, LLC.

Design, CMS, Hosting & Web Development :: ePublishing