[³o½g¤å³¹³Ì«á¥Ñrainbow¦b 2005/04/17 08:47pm ²Ä 3 ¦¸½s¿è]>
³o½g´£¤Î Tufts University ®դͤ]¨ü®`.&kS"u
©½t¥Í³N¼Æ¬ã¨sªÀ -- ³N¼Æ¬ã¨s¡@¡@ QD
LexisNexis Reveals Further Breaches of Database1
By David Pringle and Rachel Zimmerman'v.Pcg
Wall Street Journal , April 13, 2005
LexisNexis said 310,000 Americans, nearly 10 times itsH,>
original estimate, have had their personal dataT>
accessed by unauthorized individuals via its computerN}Q
systems, raising fresh concerns about thevc"
data-collection industry's ability to guard againstbM
hackers amid a surge in identity-theft crimes.
Separately, Tufts University sent a "precautionary"I}{
letter to alumni last week warning them that personal'
information may have been stolen from a computer#w/
database used for fund raising. The letter, sent toE}BCA"
about 106,000 graduates and other donors, says Tufts6*#
"detected abnormal activity" on a computer that%skVf.
included names, addresses, Social Security andNT8
credit-card numbers.
The latest revelations are likely to give new urgencyk
to the clamor for laws to prevent data brokers fromQ
amassing sensitive personal information without&D
consent and for better safeguards of other databases.k+
Recently, data broker ChoicePoint Inc. of Alpharetta,pX'!
Ga., said identity thieves had obtained information on|Z
about 145,000 people by posing as legitimateL
customers. Sensitive data also have been compromised+
at some banks, mutual funds and other universities.
LexisNexis, a legal- and business-information provider$5s
owned by Reed Elsevier PLC of the United Kingdom, said[qKE*
it has identified 59 security breaches over two yearsTvj?!
-- a rate of about one every two weeks -- making ther
problem far more pervasive than it had previouslyU*CC;W
realized. The accessed information included SocialkYxt
Security, driver's license numbers and other personal\.30
information.
U.S. law-enforcement agencies are investigating the3\l%
breach, and Reed said it is offering fraud insurance~F|;3;
and other services such as credit checks, free of&\2>uo
charge, to individuals whose data were accessed by{T&
unauthorized people. Reed's latest announcement comesOxn
five weeks after its initial disclosure that breaches8.<F
had affected about 30,000 people.
Once individual information has been purloined, it canzw{G
be used by identity thieves to fraudulently obtain5S"C
credit cards, mortgage loans and car loans, amongiE1}A
other things. The Federal Trade Commission estimates[%4
27.3 million Americans were affected by identity theftp
in the five years through 2003, with the pace of theftsLJ
quickening toward the end of that period.
Data brokers, which collect and sell personalUs
information, represent a new and still largely'AE
unregulated industry -- but virtually every state is?v3
considering some kind of privacy legislation. In atq-C
least 20 states, the law would require companies to>=
notify individuals when their personal information isc +
compromised, according to the Electronic Privacyq
Information Center, a public-interest research groupk<+1<
in Washington, D.C. Congress is also considering aow`
federal notification standard, based on a California{zTj)
law that exposed the ChoicePoint breach.
The Senate Judiciary Committee plans to hold a hearingqua
today on the recent wave of data breaches and on theWNpf
proposed legislation.
Laws governing the collection and movement of personalJe$Pqb
data are much stricter in Europe and the region hasn'tH
had the spate of security breaches experienced in theOe
U.S.
Data brokers such as LexisNexis promote theirKfI)y
"risk-management" services to banks, insurance|JriLa
companies, law-enforcement agencies and other
legitimate organizations that need to guard against:O
financial fraud. Banks, for instance, buy the data so.VMR^G
they can run checks when deciding whether to approve ayn]C^i
mortgage application. Reed executives say the8!g$gx
data-brokering business is an important tool innZ$!
preventing fraud.
LexisNexis said it began investigating thousands ofZDb
customers' accounts last month, after announcing that:RE1f5
information on 30,000 people held by its Seisint{xx\:
data-brokering division may have been accessed by9'tv
criminals. Yesterday Reed said that it had uncoveredBViXd,
dozens of Seisint security breaches that predated itsdVd
acquisition of the company late last year, as well asR)O
a handful of incidents in other parts of LexisNexis._@No*
Kurt Sanford, head of U.S. corporate and federal|W9
markets for LexisNexis, said the company didn't have#
any idea of the extent of the problem before the-E]X{
investigation.
The security breaches typically took one of three/lq
forms, Mr. Sanford said, all related to28w[}
misappropriation of passwords. In some cases, anH>,,]T
unauthorized individual was able to access LexisNexis}
databases after figuring out a legitimate customer's=
too-obvious password. In others, a former employee ofRXl0%`
a legitimate customer was able to continue accessing
the LexisNexis databases because the customer didn't\EU
change the account details after the employee left. In1
still others, criminals obtained an accountWQj
administrator's identification details, allowing themlEY<
to create unauthorized accounts.
LexisNexis executives say they are now monitoringp.
customers' usage patterns closely to spot anyMfg9
irregular activity. They say they are also trying toS
force customers to beef up their security by reviewing`t
passwords monthly and requiring authorizations from$!]v0d
two managers for each new account.
LexisNexis said that so far none of the 30,000 people'#
notified of a breach in December and January have comeG
back to report instances of identity theft. Privacyy|}
advocates, however, say criminals don't alwaysFxQ
immediately use data they obtain, preferring sometimes|D,jW
to sell them on the Internet. Or, they say, a criminal!/[
may open a credit card in an individual's name, but^MZ
use a different address, so the individual doesn't seewr5q?r
the credit-card statements and isn't aware of the:l-W\
fraud.
Reed's LexisNexis unit pushed deeply into dataebio
brokering when it purchased Seisint Inc. of Boca6x#
Raton, Fla., for $775 million late last year. Seisinti
was known for having some of the top software fort55
searching databases. It also sold data searches for as9'.z
little as 25 cents apiece.
Reed said the financial cost of the breaches will beN(Jp|
manageable and didn't change its earnings forecasts.
At Tufts, Betsey Jay, director of advancementz_]B
communications and donor relations, said there is "no<Za
evidence that any data is being misused." Still, the7Y
letter urged alumni to contact their banks and checkI9Z1M$
credit reports for any signs of unauthorized activity.] vT
©½t¥Í³N¼Æ¬ã¨sªÀ -- ³N¼Æ¬ã¨s¡@¡@ K>
Ms. Jay said analysts detected "unusual activity,"AqXaa
during routine checks on a server used for telephone@!lp
fund raising that is owned by Tufts but managed by an8)m3UR
outside vendor. The suspicious activity --zDz0w
specifically, large amounts of data moving through the0
machine -- occurred Oct. 31 and Dec. 19, she said. Ones@Q|
theory was that someone was using the computer as ax7lR
distribution point for movies and other entertainment1
media, Ms. Jay said. At the time, Tufts decided thereD!\
wasn't enough evidence to notify alumni about the_gN@%z
unusual activity. But, she said, after recent}8!1
revelations about security breaches at financial andh~3|C?
educational institutions, Tufts decided to alert itsb
donors. She said there is no evidence that the~LGE-s
break-in was carried out by students, faculty members9
or employees.
---
--David Pringle and Rachel Zimmerman
Christopher Conkey contributed to this article.
U