The Information Cover Up The very first problem to do should be to learn if the information was compromised in...