[³o½g¤å³¹³Ì«á¥Ñrainbow¦b 2005/04/17 08:47pm ²Ä 3 ¦¸½s¿è])h*
³o½g´£¤Î Tufts University ®դͤ]¨ü®`.%hb*
©½t¥Í³N¼Æ¬ã¨sªÀ -- ³N¼Æ¬ã¨s¡@¡@ j)>>
LexisNexis Reveals Further Breaches of Database!^Y5$-
By David Pringle and Rachel ZimmermanGB)&<
Wall Street Journal , April 13, 2005
LexisNexis said 310,000 Americans, nearly 10 times its(>N
original estimate, have had their personal dataJ
accessed by unauthorized individuals via its computerm
systems, raising fresh concerns about theoa-p^
data-collection industry's ability to guard againstjXjz=
hackers amid a surge in identity-theft crimes.
Separately, Tufts University sent a "precautionary"aeo
letter to alumni last week warning them that personal{
information may have been stolen from a computerS.b
database used for fund raising. The letter, sent to8
about 106,000 graduates and other donors, says Tufts7MqzLA
"detected abnormal activity" on a computer thatk)S
included names, addresses, Social Security and&.x
credit-card numbers.
The latest revelations are likely to give new urgency4!jEd
to the clamor for laws to prevent data brokers fromI
amassing sensitive personal information withoutNg`>
consent and for better safeguards of other databases.9
Recently, data broker ChoicePoint Inc. of Alpharetta,R\\{D
Ga., said identity thieves had obtained information on9T
about 145,000 people by posing as legitimatep
customers. Sensitive data also have been compromised^zw
at some banks, mutual funds and other universities.
LexisNexis, a legal- and business-information providerG{2dg
owned by Reed Elsevier PLC of the United Kingdom, saidMou>UP
it has identified 59 security breaches over two yearsex=+U
-- a rate of about one every two weeks -- making the-?B
problem far more pervasive than it had previously&wf
realized. The accessed information included Socialm6
Security, driver's license numbers and other personal[
information.
U.S. law-enforcement agencies are investigating the+]
breach, and Reed said it is offering fraud insurancef9!VV
and other services such as credit checks, free of>
charge, to individuals whose data were accessed byCI4jL~
unauthorized people. Reed's latest announcement comescUjYA%
five weeks after its initial disclosure that breachesMrR7)[
had affected about 30,000 people.
Once individual information has been purloined, it can%2X>
be used by identity thieves to fraudulently obtain)U]9
credit cards, mortgage loans and car loans, among}
other things. The Federal Trade Commission estimatesr{Wjz
27.3 million Americans were affected by identity theft9u0ni
in the five years through 2003, with the pace of theftkj
quickening toward the end of that period.
Data brokers, which collect and sell personal=8
information, represent a new and still largelyaf%y>
unregulated industry -- but virtually every state isI+,Hf
considering some kind of privacy legislation. In at}I762
least 20 states, the law would require companies toE>f
notify individuals when their personal information is>EkJ
compromised, according to the Electronic PrivacyR
Information Center, a public-interest research group#0_
in Washington, D.C. Congress is also considering aJ
federal notification standard, based on a California=
law that exposed the ChoicePoint breach.
The Senate Judiciary Committee plans to hold a hearing.9
today on the recent wave of data breaches and on theE
proposed legislation.
Laws governing the collection and movement of personal*r
data are much stricter in Europe and the region hasn'tsa
had the spate of security breaches experienced in theO-
U.S.
Data brokers such as LexisNexis promote their/{ sU
"risk-management" services to banks, insurance!
companies, law-enforcement agencies and othertby3_
legitimate organizations that need to guard against%j
financial fraud. Banks, for instance, buy the data soaa
they can run checks when deciding whether to approve a~5}
mortgage application. Reed executives say the`mD8e
data-brokering business is an important tool inA`v
preventing fraud.
LexisNexis said it began investigating thousands of=M{@"=
customers' accounts last month, after announcing that*_[+&;
information on 30,000 people held by its Seisint ni
data-brokering division may have been accessed by!M
criminals. Yesterday Reed said that it had uncovered`^
dozens of Seisint security breaches that predated itsP
acquisition of the company late last year, as well as"
a handful of incidents in other parts of LexisNexis.jk
Kurt Sanford, head of U.S. corporate and federal:6K
markets for LexisNexis, said the company didn't have`ApF|
any idea of the extent of the problem before thevyOH
investigation.
The security breaches typically took one of three4qp[`;
forms, Mr. Sanford said, all related toBB}F
misappropriation of passwords. In some cases, anlUewEa
unauthorized individual was able to access LexisNexiss
databases after figuring out a legitimate customer'sPc/['
too-obvious password. In others, a former employee ofUBsV
a legitimate customer was able to continue accessing.i
the LexisNexis databases because the customer didn't1
change the account details after the employee left. In+tl
still others, criminals obtained an accountA
administrator's identification details, allowing them=K
to create unauthorized accounts.
LexisNexis executives say they are now monitoring#q!
customers' usage patterns closely to spot any+)bJ~
irregular activity. They say they are also trying toyioB=W
force customers to beef up their security by reviewing[A
passwords monthly and requiring authorizations from^-v
two managers for each new account.
LexisNexis said that so far none of the 30,000 peopleJ
notified of a breach in December and January have come~LI*
back to report instances of identity theft. Privacy_
advocates, however, say criminals don't always/A#u
immediately use data they obtain, preferring sometimes%PI^
to sell them on the Internet. Or, they say, a criminalwE<
may open a credit card in an individual's name, butB
use a different address, so the individual doesn't see8KTzE
the credit-card statements and isn't aware of the[7
fraud.
Reed's LexisNexis unit pushed deeply into data%ySM
brokering when it purchased Seisint Inc. of BocaSu!_$
Raton, Fla., for $775 million late last year. SeisintJuJ'
was known for having some of the top software forl(
searching databases. It also sold data searches for asu5 n
little as 25 cents apiece.
Reed said the financial cost of the breaches will beCW
manageable and didn't change its earnings forecasts.
At Tufts, Betsey Jay, director of advancement5I5
communications and donor relations, said there is "no2
evidence that any data is being misused." Still, thezEKSP
letter urged alumni to contact their banks and check5Ou$}n
credit reports for any signs of unauthorized activity.&pN
©½t¥Í³N¼Æ¬ã¨sªÀ -- ³N¼Æ¬ã¨s¡@¡@ c;Z9
Ms. Jay said analysts detected "unusual activity,";7=z
during routine checks on a server used for telephone^jp
fund raising that is owned by Tufts but managed by anhTw}H
outside vendor. The suspicious activity --$<b
specifically, large amounts of data moving through the^+
machine -- occurred Oct. 31 and Dec. 19, she said. One`7`d
theory was that someone was using the computer as ar\d
distribution point for movies and other entertainmentif
media, Ms. Jay said. At the time, Tufts decided there?vSKtf
wasn't enough evidence to notify alumni about theFLc;?}
unusual activity. But, she said, after recenti
revelations about security breaches at financial anda)
educational institutions, Tufts decided to alert itsa]W3l|
donors. She said there is no evidence that the8-m
break-in was carried out by students, faculty membersx_AW1
or employees.
---
--David Pringle and Rachel Zimmerman
Christopher Conkey contributed to this article.
[$