[³o½g¤å³¹³Ì«á¥Ñrainbow¦b 2005/04/17 08:47pm ²Ä 3 ¦¸½s¿è]8
³o½g´£¤Î Tufts University ®դͤ]¨ü®`.f9):N
©½t¥Í³N¼Æ¬ã¨sªÀ -- ³N¼Æ¬ã¨s¡@¡@ @VAf
LexisNexis Reveals Further Breaches of Database~Ik
By David Pringle and Rachel Zimmerman[6<J;3
Wall Street Journal , April 13, 2005
LexisNexis said 310,000 Americans, nearly 10 times itsN1?*wy
original estimate, have had their personal data'N\1
accessed by unauthorized individuals via its computerNI]ra
systems, raising fresh concerns about theI{
data-collection industry's ability to guard against6"cMs=
hackers amid a surge in identity-theft crimes.
Separately, Tufts University sent a "precautionary"=^f
letter to alumni last week warning them that personalF9
information may have been stolen from a computert4Ykk
database used for fund raising. The letter, sent toK~e
about 106,000 graduates and other donors, says Tufts-=
"detected abnormal activity" on a computer that4
included names, addresses, Social Security and(\qN3c
credit-card numbers.
The latest revelations are likely to give new urgency~p
to the clamor for laws to prevent data brokers fromIG}B
amassing sensitive personal information without(Ce
consent and for better safeguards of other databases.7V92
Recently, data broker ChoicePoint Inc. of Alpharetta,_ /RY
Ga., said identity thieves had obtained information on!F+d
about 145,000 people by posing as legitimate2C,
customers. Sensitive data also have been compromisedFhyGgA
at some banks, mutual funds and other universities.
LexisNexis, a legal- and business-information providerOL\,7u
owned by Reed Elsevier PLC of the United Kingdom, saids
it has identified 59 security breaches over two yearsM|
-- a rate of about one every two weeks -- making theVX=vD
problem far more pervasive than it had previouslyA
realized. The accessed information included Social[wV4L
Security, driver's license numbers and other personals+k
information.
U.S. law-enforcement agencies are investigating the0?
breach, and Reed said it is offering fraud insuranceU
and other services such as credit checks, free ofJ/
charge, to individuals whose data were accessed bye2)lwh
unauthorized people. Reed's latest announcement comesE8
five weeks after its initial disclosure that breachesF]<tlo
had affected about 30,000 people.
Once individual information has been purloined, it canPM`UlT
be used by identity thieves to fraudulently obtain+p>( 1
credit cards, mortgage loans and car loans, among7V
other things. The Federal Trade Commission estimates&Q
27.3 million Americans were affected by identity theftO4HD
in the five years through 2003, with the pace of theftW
quickening toward the end of that period.
Data brokers, which collect and sell personalJ0|_
information, represent a new and still largely,UsL6J
unregulated industry -- but virtually every state isU
considering some kind of privacy legislation. In at&&
least 20 states, the law would require companies tok6#5
notify individuals when their personal information isDnTq
compromised, according to the Electronic Privacyj
Information Center, a public-interest research group4
in Washington, D.C. Congress is also considering a:E~NO;
federal notification standard, based on a Californiakr
law that exposed the ChoicePoint breach.
The Senate Judiciary Committee plans to hold a hearingHq>@P
today on the recent wave of data breaches and on thebbGjf
proposed legislation.
Laws governing the collection and movement of personalc5DQ
data are much stricter in Europe and the region hasn'twXjSl
had the spate of security breaches experienced in theTX
U.S.
Data brokers such as LexisNexis promote theirz
"risk-management" services to banks, insuranceHL5p_E
companies, law-enforcement agencies and otherL
legitimate organizations that need to guard against_kF(3
financial fraud. Banks, for instance, buy the data so2Bf.
they can run checks when deciding whether to approve a$]
mortgage application. Reed executives say the_
data-brokering business is an important tool inaTnq
preventing fraud.
LexisNexis said it began investigating thousands of5
customers' accounts last month, after announcing that.x
information on 30,000 people held by its Seisint|
data-brokering division may have been accessed by!B5V`6
criminals. Yesterday Reed said that it had uncoveredz-<`
dozens of Seisint security breaches that predated itsB9
acquisition of the company late last year, as well as@&B
a handful of incidents in other parts of LexisNexis.c>Hi(}
Kurt Sanford, head of U.S. corporate and federal{5 9
markets for LexisNexis, said the company didn't havetyP9&*
any idea of the extent of the problem before the'
investigation.
The security breaches typically took one of threehE-2{f
forms, Mr. Sanford said, all related toqWxc4d
misappropriation of passwords. In some cases, ang
unauthorized individual was able to access LexisNexis\QSJQ
databases after figuring out a legitimate customer's1v!_%
too-obvious password. In others, a former employee ofLM
a legitimate customer was able to continue accessing6xXM_@
the LexisNexis databases because the customer didn'tQ}
change the account details after the employee left. Inf5Q!
still others, criminals obtained an accountuSe%
administrator's identification details, allowing themCw`Z 0
to create unauthorized accounts.
LexisNexis executives say they are now monitoring l
customers' usage patterns closely to spot anyml"}h
irregular activity. They say they are also trying toWm
force customers to beef up their security by reviewing]j)%
passwords monthly and requiring authorizations fromaD&C
two managers for each new account.
LexisNexis said that so far none of the 30,000 peopleG72g
notified of a breach in December and January have comePC1
back to report instances of identity theft. Privacyc8`qK
advocates, however, say criminals don't always\
immediately use data they obtain, preferring sometimesV
to sell them on the Internet. Or, they say, a criminala59
may open a credit card in an individual's name, but#)pjv
use a different address, so the individual doesn't see=z
the credit-card statements and isn't aware of theBo
fraud.
Reed's LexisNexis unit pushed deeply into datao
brokering when it purchased Seisint Inc. of Boca{
Raton, Fla., for $775 million late last year. SeisintsLuT
was known for having some of the top software forX>
searching databases. It also sold data searches for asrur
little as 25 cents apiece.
Reed said the financial cost of the breaches will be"f
manageable and didn't change its earnings forecasts.
At Tufts, Betsey Jay, director of advancementq8s{T.
communications and donor relations, said there is "noY
evidence that any data is being misused." Still, thec
letter urged alumni to contact their banks and checkVrco_
credit reports for any signs of unauthorized activity.I'
©½t¥Í³N¼Æ¬ã¨sªÀ -- ³N¼Æ¬ã¨s¡@¡@ B>>
Ms. Jay said analysts detected "unusual activity,"H[T
during routine checks on a server used for telephone04U0~d
fund raising that is owned by Tufts but managed by ang
outside vendor. The suspicious activity --z'
specifically, large amounts of data moving through theZ~
machine -- occurred Oct. 31 and Dec. 19, she said. One_-b
theory was that someone was using the computer as a|-"_q,
distribution point for movies and other entertainment_L
media, Ms. Jay said. At the time, Tufts decided thereJ.b]f-
wasn't enough evidence to notify alumni about the[Iq-]
unusual activity. But, she said, after recentm_+ vz
revelations about security breaches at financial andz
educational institutions, Tufts decided to alert itss/qfV
donors. She said there is no evidence that the]]SB=G
break-in was carried out by students, faculty membersHyb@
or employees.
---
--David Pringle and Rachel Zimmerman
Christopher Conkey contributed to this article.
^e\'