[³o½g¤å³¹³Ì«á¥Ñrainbow¦b 2005/04/17 08:47pm ²Ä 3 ¦¸½s¿è]#6]V G
³o½g´£¤Î Tufts University ®դͤ]¨ü®`.DiW
©½t¥Í³N¼Æ¬ã¨sªÀ -- ³N¼Æ¬ã¨s¡@¡@ ^VJ7\l
LexisNexis Reveals Further Breaches of DatabaseKkCu{s
By David Pringle and Rachel ZimmermansH2r;
Wall Street Journal , April 13, 2005
LexisNexis said 310,000 Americans, nearly 10 times itssLSz|
original estimate, have had their personal datao#QX/c
accessed by unauthorized individuals via its computerJai4q
systems, raising fresh concerns about thez
data-collection industry's ability to guard against(>G-%d
hackers amid a surge in identity-theft crimes.
Separately, Tufts University sent a "precautionary""p5,
letter to alumni last week warning them that personal5p2j>M
information may have been stolen from a computerEy[ri
database used for fund raising. The letter, sent to'`u`
about 106,000 graduates and other donors, says Tufts'(Zh(w
"detected abnormal activity" on a computer thatux#.7
included names, addresses, Social Security and=B7(
credit-card numbers.
The latest revelations are likely to give new urgencyXoH~
to the clamor for laws to prevent data brokers fromlZX
amassing sensitive personal information withoutVJ<7U
consent and for better safeguards of other databases.2R+`
Recently, data broker ChoicePoint Inc. of Alpharetta,ahv3
Ga., said identity thieves had obtained information on#_!m{7
about 145,000 people by posing as legitimateV
customers. Sensitive data also have been compromisedCutXhV
at some banks, mutual funds and other universities.
LexisNexis, a legal- and business-information provider5
owned by Reed Elsevier PLC of the United Kingdom, said_.|6Du
it has identified 59 security breaches over two yearsr~Q
-- a rate of about one every two weeks -- making the5
problem far more pervasive than it had previouslyGqX\yk
realized. The accessed information included SocialDnoG
Security, driver's license numbers and other personalaV{
information.
U.S. law-enforcement agencies are investigating the#S|~W
breach, and Reed said it is offering fraud insurance?
and other services such as credit checks, free of0 IH{
charge, to individuals whose data were accessed by/ft
unauthorized people. Reed's latest announcement comesJZH@
five weeks after its initial disclosure that breaches;G{L^1
had affected about 30,000 people.
Once individual information has been purloined, it can3)L
be used by identity thieves to fraudulently obtainK
credit cards, mortgage loans and car loans, amonge]!pA
other things. The Federal Trade Commission estimatesT2Iv
27.3 million Americans were affected by identity theftV)?u"
in the five years through 2003, with the pace of theftR!b:D;
quickening toward the end of that period.
Data brokers, which collect and sell personalH)'R
information, represent a new and still largely`Q2
unregulated industry -- but virtually every state isLb8
considering some kind of privacy legislation. In atq
least 20 states, the law would require companies tontdg
notify individuals when their personal information isoM
compromised, according to the Electronic Privacyd/v
Information Center, a public-interest research groupWXl.u
in Washington, D.C. Congress is also considering a2,+.r2
federal notification standard, based on a Californiaju
law that exposed the ChoicePoint breach.
The Senate Judiciary Committee plans to hold a hearings
today on the recent wave of data breaches and on theU
proposed legislation.
Laws governing the collection and movement of personal;y+
data are much stricter in Europe and the region hasn't{
had the spate of security breaches experienced in the4iBS
U.S.
Data brokers such as LexisNexis promote their/_
"risk-management" services to banks, insuranceusyWX'
companies, law-enforcement agencies and otherKl
legitimate organizations that need to guard against`
financial fraud. Banks, for instance, buy the data soM*
they can run checks when deciding whether to approve aX
mortgage application. Reed executives say thejHZuB
data-brokering business is an important tool inyJowC
preventing fraud.
LexisNexis said it began investigating thousands oflgL%p
customers' accounts last month, after announcing that-I)
information on 30,000 people held by its Seisint<[OL
data-brokering division may have been accessed by=
criminals. Yesterday Reed said that it had uncoveredOdx?&>
dozens of Seisint security breaches that predated itsZ44E
acquisition of the company late last year, as well as{d"\q
a handful of incidents in other parts of LexisNexis.|<O7
Kurt Sanford, head of U.S. corporate and federals9f(n
markets for LexisNexis, said the company didn't have8'?N=L
any idea of the extent of the problem before theS
investigation.
The security breaches typically took one of three58N
forms, Mr. Sanford said, all related toG\=U
misappropriation of passwords. In some cases, anzm
unauthorized individual was able to access LexisNexis[\C%Y
databases after figuring out a legitimate customer'sr2f+|b
too-obvious password. In others, a former employee of%
a legitimate customer was able to continue accessing^
the LexisNexis databases because the customer didn't1l
change the account details after the employee left. InrB
still others, criminals obtained an accounteN)a
administrator's identification details, allowing them}PuP
to create unauthorized accounts.
LexisNexis executives say they are now monitoring0
customers' usage patterns closely to spot anyZ
irregular activity. They say they are also trying to_zz
force customers to beef up their security by reviewing8=Ri7=
passwords monthly and requiring authorizations fromrs4
two managers for each new account.
LexisNexis said that so far none of the 30,000 peopleqGC"jZ
notified of a breach in December and January have comeaEiT
back to report instances of identity theft. PrivacyxCg
advocates, however, say criminals don't alwaysI
immediately use data they obtain, preferring sometimesST
to sell them on the Internet. Or, they say, a criminal&Vap
may open a credit card in an individual's name, but132&hH
use a different address, so the individual doesn't seey#
the credit-card statements and isn't aware of the089
fraud.
Reed's LexisNexis unit pushed deeply into datahM2&
brokering when it purchased Seisint Inc. of Boca\
Raton, Fla., for $775 million late last year. SeisintS}{47F
was known for having some of the top software forSL
searching databases. It also sold data searches for asw
little as 25 cents apiece.
Reed said the financial cost of the breaches will be7yE\
manageable and didn't change its earnings forecasts.
At Tufts, Betsey Jay, director of advancementNw
communications and donor relations, said there is "noAq
evidence that any data is being misused." Still, the"p?i
letter urged alumni to contact their banks and check&A$hf
credit reports for any signs of unauthorized activity.T6d^Z
©½t¥Í³N¼Æ¬ã¨sªÀ -- ³N¼Æ¬ã¨s¡@¡@ m[
Ms. Jay said analysts detected "unusual activity,"I)uh>
during routine checks on a server used for telephone^g
fund raising that is owned by Tufts but managed by an|Wh
outside vendor. The suspicious activity --7pO<~
specifically, large amounts of data moving through theF25?O
machine -- occurred Oct. 31 and Dec. 19, she said. OneV:)
theory was that someone was using the computer as aCA!
distribution point for movies and other entertainment(aL;G
media, Ms. Jay said. At the time, Tufts decided there-Tm
wasn't enough evidence to notify alumni about the~%"
unusual activity. But, she said, after recent@0
revelations about security breaches at financial andt{W`]
educational institutions, Tufts decided to alert its6f:
donors. She said there is no evidence that the36?0g
break-in was carried out by students, faculty membersfA>L_
or employees.
---
--David Pringle and Rachel Zimmerman
Christopher Conkey contributed to this article.
MR.P