[³o½g¤å³¹³Ì«á¥Ñrainbow¦b 2005/04/17 08:47pm ²Ä 3 ¦¸½s¿è]*f_
³o½g´£¤Î Tufts University ®դͤ]¨ü®`.["%Q9p
©½t¥Í³N¼Æ¬ã¨sªÀ -- ³N¼Æ¬ã¨s¡@¡@ Na+,Y
LexisNexis Reveals Further Breaches of Database8zC#
By David Pringle and Rachel Zimmerman`7AD&}
Wall Street Journal , April 13, 2005
LexisNexis said 310,000 Americans, nearly 10 times itsdT_
original estimate, have had their personal data=Y
accessed by unauthorized individuals via its computerW.,
systems, raising fresh concerns about theTTdC
data-collection industry's ability to guard against}
hackers amid a surge in identity-theft crimes.
Separately, Tufts University sent a "precautionary":l^
letter to alumni last week warning them that personal7w
information may have been stolen from a computer".poT
database used for fund raising. The letter, sent to+p4*4R
about 106,000 graduates and other donors, says Tuftsr7
"detected abnormal activity" on a computer that^w5
included names, addresses, Social Security anddwybe2
credit-card numbers.
The latest revelations are likely to give new urgencyN8
to the clamor for laws to prevent data brokers from]j
amassing sensitive personal information withoutOg{67
consent and for better safeguards of other databases.]E/
Recently, data broker ChoicePoint Inc. of Alpharetta,8j
Ga., said identity thieves had obtained information onZy(
about 145,000 people by posing as legitimate|)
customers. Sensitive data also have been compromised`QXd
at some banks, mutual funds and other universities.
LexisNexis, a legal- and business-information provider;AO'3
owned by Reed Elsevier PLC of the United Kingdom, saiddxf
it has identified 59 security breaches over two years^e:
-- a rate of about one every two weeks -- making the*=*S',
problem far more pervasive than it had previously+/W.
realized. The accessed information included Social9q/sG
Security, driver's license numbers and other personalC
information.
U.S. law-enforcement agencies are investigating the10<
breach, and Reed said it is offering fraud insurance,Wn.$
and other services such as credit checks, free ofYq
charge, to individuals whose data were accessed byL R\
unauthorized people. Reed's latest announcement comesoWr`h
five weeks after its initial disclosure that breachesJjF
had affected about 30,000 people.
Once individual information has been purloined, it canEcP&4d
be used by identity thieves to fraudulently obtainR
credit cards, mortgage loans and car loans, amongXG1q
other things. The Federal Trade Commission estimatesG
27.3 million Americans were affected by identity theftN^P
in the five years through 2003, with the pace of theft!nbQlF
quickening toward the end of that period.
Data brokers, which collect and sell personal2Q`@D
information, represent a new and still largelyxqz+ 6
unregulated industry -- but virtually every state ish;]
considering some kind of privacy legislation. In atpK5.R
least 20 states, the law would require companies to:k#]C
notify individuals when their personal information is{*&T$O
compromised, according to the Electronic Privacy5w
Information Center, a public-interest research group.$3@>
in Washington, D.C. Congress is also considering a$T5J#
federal notification standard, based on a California]+lx
law that exposed the ChoicePoint breach.
The Senate Judiciary Committee plans to hold a hearing;
today on the recent wave of data breaches and on the^GCG
proposed legislation.
Laws governing the collection and movement of personalnD/B|`
data are much stricter in Europe and the region hasn'tco{Ssv
had the spate of security breaches experienced in them
U.S.
Data brokers such as LexisNexis promote theirW
"risk-management" services to banks, insurance4A)g
companies, law-enforcement agencies and other66l
legitimate organizations that need to guard againstJ
financial fraud. Banks, for instance, buy the data sosB)zW
they can run checks when deciding whether to approve a!R%V0
mortgage application. Reed executives say the5
data-brokering business is an important tool inR*
preventing fraud.
LexisNexis said it began investigating thousands of Q]'
customers' accounts last month, after announcing that~~'
information on 30,000 people held by its SeisintM
data-brokering division may have been accessed by%t|
criminals. Yesterday Reed said that it had uncovered3
dozens of Seisint security breaches that predated itsK
acquisition of the company late last year, as well as.QxINf
a handful of incidents in other parts of LexisNexis.lh}[,G
Kurt Sanford, head of U.S. corporate and federal1
markets for LexisNexis, said the company didn't havewQKn8
any idea of the extent of the problem before theA
investigation.
The security breaches typically took one of threekUd81
forms, Mr. Sanford said, all related toLVe
misappropriation of passwords. In some cases, anD=Yu
unauthorized individual was able to access LexisNexishrcio
databases after figuring out a legitimate customer's-xC;
too-obvious password. In others, a former employee ofYpDX
a legitimate customer was able to continue accessingd
the LexisNexis databases because the customer didn'tr?
change the account details after the employee left. Ing`9z
still others, criminals obtained an account-
administrator's identification details, allowing them/
to create unauthorized accounts.
LexisNexis executives say they are now monitoringo.I5
customers' usage patterns closely to spot any@^,:]
irregular activity. They say they are also trying to oCa~
force customers to beef up their security by reviewing8AjT
passwords monthly and requiring authorizations fromt
two managers for each new account.
LexisNexis said that so far none of the 30,000 peoplee}ap
notified of a breach in December and January have come9|9AU
back to report instances of identity theft. PrivacyN
advocates, however, say criminals don't always6
immediately use data they obtain, preferring sometimes]-
to sell them on the Internet. Or, they say, a criminalQ7f:
may open a credit card in an individual's name, buts|?
use a different address, so the individual doesn't seeV6
the credit-card statements and isn't aware of thenc
fraud.
Reed's LexisNexis unit pushed deeply into dataPM
brokering when it purchased Seisint Inc. of Boca_>!f
Raton, Fla., for $775 million late last year. SeisintQSm'
was known for having some of the top software for#z
searching databases. It also sold data searches for asZAN)^
little as 25 cents apiece.
Reed said the financial cost of the breaches will beR[u743
manageable and didn't change its earnings forecasts.
At Tufts, Betsey Jay, director of advancementI`Y
communications and donor relations, said there is "no?i
evidence that any data is being misused." Still, thes
letter urged alumni to contact their banks and checko8D
credit reports for any signs of unauthorized activity."ij
©½t¥Í³N¼Æ¬ã¨sªÀ -- ³N¼Æ¬ã¨s¡@¡@ yBW
Ms. Jay said analysts detected "unusual activity,"#R
during routine checks on a server used for telephone$o
fund raising that is owned by Tufts but managed by an^#F
outside vendor. The suspicious activity --Sqb!-
specifically, large amounts of data moving through theozE&*
machine -- occurred Oct. 31 and Dec. 19, she said. Oney@i-
theory was that someone was using the computer as ac:sWxm
distribution point for movies and other entertainmentwFT]
media, Ms. Jay said. At the time, Tufts decided there3h(^
wasn't enough evidence to notify alumni about theHI
unusual activity. But, she said, after recentqs<
revelations about security breaches at financial andvs
educational institutions, Tufts decided to alert its-S3l2C
donors. She said there is no evidence that theVD
break-in was carried out by students, faculty membersjpi
or employees.
---
--David Pringle and Rachel Zimmerman
Christopher Conkey contributed to this article.
uwIh