[³o½g¤å³¹³Ì«á¥Ñrainbow¦b 2005/04/17 08:47pm ²Ä 3 ¦¸½s¿è]>
³o½g´£¤Î Tufts University ®դͤ]¨ü®`.iRD[?
©½t¥Í³N¼Æ¬ã¨sªÀ -- ³N¼Æ¬ã¨s¡@¡@ ,
LexisNexis Reveals Further Breaches of Database"g)
By David Pringle and Rachel Zimmerman2%d<K
Wall Street Journal , April 13, 2005
LexisNexis said 310,000 Americans, nearly 10 times itsLB
original estimate, have had their personal dataYI
accessed by unauthorized individuals via its computern(AWuX
systems, raising fresh concerns about theWC
data-collection industry's ability to guard againstH<Aqk.
hackers amid a surge in identity-theft crimes.
Separately, Tufts University sent a "precautionary"|
letter to alumni last week warning them that personalY*7
information may have been stolen from a computerBHoIA
database used for fund raising. The letter, sent to@7fREr
about 106,000 graduates and other donors, says Tufts>
"detected abnormal activity" on a computer thatC
included names, addresses, Social Security andz
credit-card numbers.
The latest revelations are likely to give new urgency-n,n
to the clamor for laws to prevent data brokers from4VP
amassing sensitive personal information without]OGH
consent and for better safeguards of other databases.>p!.
Recently, data broker ChoicePoint Inc. of Alpharetta,kp6fD
Ga., said identity thieves had obtained information onOaU.L
about 145,000 people by posing as legitimate,$G
customers. Sensitive data also have been compromisedao7
at some banks, mutual funds and other universities.
LexisNexis, a legal- and business-information provider4d#4~
owned by Reed Elsevier PLC of the United Kingdom, saidk-fw
it has identified 59 security breaches over two years7L^E@u
-- a rate of about one every two weeks -- making the&
problem far more pervasive than it had previouslyJ3
realized. The accessed information included Socialys EZ
Security, driver's license numbers and other personalGzj
information.
U.S. law-enforcement agencies are investigating the),v
breach, and Reed said it is offering fraud insuranceXMOJ
and other services such as credit checks, free ofhkObZ
charge, to individuals whose data were accessed byKqa.gX
unauthorized people. Reed's latest announcement comesu3
five weeks after its initial disclosure that breachesKd1)
had affected about 30,000 people.
Once individual information has been purloined, it canl5u
be used by identity thieves to fraudulently obtainu<vR
credit cards, mortgage loans and car loans, amongo]cQ
other things. The Federal Trade Commission estimatesXcmF`
27.3 million Americans were affected by identity theft^>9%
in the five years through 2003, with the pace of theftW@HHo
quickening toward the end of that period.
Data brokers, which collect and sell personal^4f3T
information, represent a new and still largelyO)5
unregulated industry -- but virtually every state isD.G20F
considering some kind of privacy legislation. In atNMOn
least 20 states, the law would require companies to&l<|aK
notify individuals when their personal information isv
compromised, according to the Electronic Privacy;$= *%
Information Center, a public-interest research group\m\,
in Washington, D.C. Congress is also considering aJ8x
federal notification standard, based on a Californiad]q
law that exposed the ChoicePoint breach.
The Senate Judiciary Committee plans to hold a hearingW
today on the recent wave of data breaches and on the$R*Qo
proposed legislation.
Laws governing the collection and movement of personali
data are much stricter in Europe and the region hasn't.;@A=
had the spate of security breaches experienced in thehM|Dss
U.S.
Data brokers such as LexisNexis promote theirv_6y
"risk-management" services to banks, insurancePMq{
companies, law-enforcement agencies and otherQB
legitimate organizations that need to guard againstNN
financial fraud. Banks, for instance, buy the data soc*O
they can run checks when deciding whether to approve a1uaO
mortgage application. Reed executives say the^1
data-brokering business is an important tool inYzJuvI
preventing fraud.
LexisNexis said it began investigating thousands ofYv
customers' accounts last month, after announcing that`Z
information on 30,000 people held by its SeisintVG>
data-brokering division may have been accessed byUymW
criminals. Yesterday Reed said that it had uncoveredC5xS
dozens of Seisint security breaches that predated itsusj/$
acquisition of the company late last year, as well asC
a handful of incidents in other parts of LexisNexis.YT]
Kurt Sanford, head of U.S. corporate and federalbnow>
markets for LexisNexis, said the company didn't haveBj{;`C
any idea of the extent of the problem before thelZ
investigation.
The security breaches typically took one of threedX^F
forms, Mr. Sanford said, all related to ,yxla
misappropriation of passwords. In some cases, anK
unauthorized individual was able to access LexisNexisBd}}
databases after figuring out a legitimate customer'sgErm>
too-obvious password. In others, a former employee of?):1j8
a legitimate customer was able to continue accessing/$.J~Q
the LexisNexis databases because the customer didn't&
change the account details after the employee left. In"4T@^)
still others, criminals obtained an accountpgo
administrator's identification details, allowing themO$
to create unauthorized accounts.
LexisNexis executives say they are now monitoringaRt
customers' usage patterns closely to spot anyB2,(g
irregular activity. They say they are also trying to'6-0Sj
force customers to beef up their security by reviewing"~Gvhz
passwords monthly and requiring authorizations fromY
two managers for each new account.
LexisNexis said that so far none of the 30,000 people{tO
notified of a breach in December and January have come/TQ>C
back to report instances of identity theft. Privacy?QOG
advocates, however, say criminals don't alwayswz`
immediately use data they obtain, preferring sometimese{.pl3
to sell them on the Internet. Or, they say, a criminalxJ
may open a credit card in an individual's name, butyV
use a different address, so the individual doesn't seeI5>0^
the credit-card statements and isn't aware of theCDLV\v
fraud.
Reed's LexisNexis unit pushed deeply into data-;&x-
brokering when it purchased Seisint Inc. of Bocaf
Raton, Fla., for $775 million late last year. Seisint/6UU
was known for having some of the top software forc
searching databases. It also sold data searches for as?E#2[
little as 25 cents apiece.
Reed said the financial cost of the breaches will beY
manageable and didn't change its earnings forecasts.
At Tufts, Betsey Jay, director of advancement?%'
communications and donor relations, said there is "noGo
evidence that any data is being misused." Still, theg#pw\
letter urged alumni to contact their banks and checkzx
credit reports for any signs of unauthorized activity.5mD[
©½t¥Í³N¼Æ¬ã¨sªÀ -- ³N¼Æ¬ã¨s¡@¡@ Wi)|Cv
Ms. Jay said analysts detected "unusual activity,")p
during routine checks on a server used for telephoneC/q.E5
fund raising that is owned by Tufts but managed by an4]@
outside vendor. The suspicious activity --%c6{
specifically, large amounts of data moving through thee
machine -- occurred Oct. 31 and Dec. 19, she said. One~2Q0
theory was that someone was using the computer as aX1,
distribution point for movies and other entertainment{
media, Ms. Jay said. At the time, Tufts decided there,m
wasn't enough evidence to notify alumni about thev{oM
unusual activity. But, she said, after recent7
revelations about security breaches at financial andvmt
educational institutions, Tufts decided to alert its2NNtv6
donors. She said there is no evidence that the>;X1C
break-in was carried out by students, faculty members@ZUE2
or employees.
---
--David Pringle and Rachel Zimmerman
Christopher Conkey contributed to this article.
k