[³o½g¤å³¹³Ì«á¥Ñrainbow¦b 2005/04/17 08:47pm ²Ä 3 ¦¸½s¿è]a?
³o½g´£¤Î Tufts University ®դͤ]¨ü®`.*Z2dh
©½t¥Í³N¼Æ¬ã¨sªÀ -- ³N¼Æ¬ã¨s¡@¡@ *
LexisNexis Reveals Further Breaches of Databaset
By David Pringle and Rachel Zimmerman98sJ
Wall Street Journal , April 13, 2005
LexisNexis said 310,000 Americans, nearly 10 times its,x8
original estimate, have had their personal data-wJ;
accessed by unauthorized individuals via its computerlzS
systems, raising fresh concerns about theJL
data-collection industry's ability to guard againstA/k!
hackers amid a surge in identity-theft crimes.
Separately, Tufts University sent a "precautionary"^za`
letter to alumni last week warning them that personal-ee
information may have been stolen from a computere
database used for fund raising. The letter, sent toX(
about 106,000 graduates and other donors, says Tufts]D
"detected abnormal activity" on a computer thatxwuVU.
included names, addresses, Social Security and9t$q
credit-card numbers.
The latest revelations are likely to give new urgencyLm
to the clamor for laws to prevent data brokers from= j
amassing sensitive personal information withoutN
consent and for better safeguards of other databases.L
Recently, data broker ChoicePoint Inc. of Alpharetta,|
Ga., said identity thieves had obtained information onDM
about 145,000 people by posing as legitimate>|4O>
customers. Sensitive data also have been compromised1*v/8I
at some banks, mutual funds and other universities.
LexisNexis, a legal- and business-information provider]6q|L
owned by Reed Elsevier PLC of the United Kingdom, said+c
it has identified 59 security breaches over two yearslH5p
-- a rate of about one every two weeks -- making the_[x*Rl
problem far more pervasive than it had previouslyC_|f
realized. The accessed information included Socialmd
Security, driver's license numbers and other personal+/
information.
U.S. law-enforcement agencies are investigating the_m
breach, and Reed said it is offering fraud insurancev
and other services such as credit checks, free of2
charge, to individuals whose data were accessed byn
unauthorized people. Reed's latest announcement comes}Ac
five weeks after its initial disclosure that breachesB[REml
had affected about 30,000 people.
Once individual information has been purloined, it canRy
be used by identity thieves to fraudulently obtain)UK>
credit cards, mortgage loans and car loans, amongG?!t
other things. The Federal Trade Commission estimates5n^
27.3 million Americans were affected by identity theft9D9I
in the five years through 2003, with the pace of theft49R]U
quickening toward the end of that period.
Data brokers, which collect and sell personalPvX0.
information, represent a new and still largely^=q\
unregulated industry -- but virtually every state is3
considering some kind of privacy legislation. In atS
least 20 states, the law would require companies toG|^T"Z
notify individuals when their personal information is,
compromised, according to the Electronic Privacy8Lqu
Information Center, a public-interest research groupq7}5
in Washington, D.C. Congress is also considering a1{
federal notification standard, based on a California(",:|
law that exposed the ChoicePoint breach.
The Senate Judiciary Committee plans to hold a hearing<^hKJP
today on the recent wave of data breaches and on thegK#[x
proposed legislation.
Laws governing the collection and movement of personalu08\
data are much stricter in Europe and the region hasn'tC4R|KH
had the spate of security breaches experienced in the!M:w
U.S.
Data brokers such as LexisNexis promote theirq;4T4
"risk-management" services to banks, insurance-}MF?
companies, law-enforcement agencies and other5_ouy
legitimate organizations that need to guard againstL2
financial fraud. Banks, for instance, buy the data sof
they can run checks when deciding whether to approve a@(5
mortgage application. Reed executives say the+p
data-brokering business is an important tool inb'
preventing fraud.
LexisNexis said it began investigating thousands of24
customers' accounts last month, after announcing thatw{.A>
information on 30,000 people held by its SeisintxU
data-brokering division may have been accessed byY
criminals. Yesterday Reed said that it had uncoveredcW"{~
dozens of Seisint security breaches that predated its[B!.
acquisition of the company late last year, as well astGjl
a handful of incidents in other parts of LexisNexis.j2;
Kurt Sanford, head of U.S. corporate and federal\D)}
markets for LexisNexis, said the company didn't havekLG?C0
any idea of the extent of the problem before the1
investigation.
The security breaches typically took one of three[2$.9\
forms, Mr. Sanford said, all related toK
misappropriation of passwords. In some cases, an,W'Rq
unauthorized individual was able to access LexisNexistP`!v
databases after figuring out a legitimate customer'sM
too-obvious password. In others, a former employee of?Z
a legitimate customer was able to continue accessingAYz
the LexisNexis databases because the customer didn'tEuh8K
change the account details after the employee left. InUAml9J
still others, criminals obtained an accountHX_zhR
administrator's identification details, allowing themL#{j#
to create unauthorized accounts.
LexisNexis executives say they are now monitoringu
customers' usage patterns closely to spot any*j8hS`
irregular activity. They say they are also trying to-pY)
force customers to beef up their security by reviewing>
passwords monthly and requiring authorizations from7AZd
two managers for each new account.
LexisNexis said that so far none of the 30,000 peopleA-2
notified of a breach in December and January have come,
back to report instances of identity theft. PrivacyX
advocates, however, say criminals don't alwaysE5:`+
immediately use data they obtain, preferring sometimes7|y2$
to sell them on the Internet. Or, they say, a criminal5>n
may open a credit card in an individual's name, butE
use a different address, so the individual doesn't see:
the credit-card statements and isn't aware of the4E:W
fraud.
Reed's LexisNexis unit pushed deeply into dataC8j
brokering when it purchased Seisint Inc. of Boca*{
Raton, Fla., for $775 million late last year. Seisint_W>=Pf
was known for having some of the top software for
searching databases. It also sold data searches for asUgT&V
little as 25 cents apiece.
Reed said the financial cost of the breaches will beuci^
manageable and didn't change its earnings forecasts.
At Tufts, Betsey Jay, director of advancement=#
communications and donor relations, said there is "noAyH"
evidence that any data is being misused." Still, the CmPJ?
letter urged alumni to contact their banks and check;:U\{
credit reports for any signs of unauthorized activity.5qmqz
©½t¥Í³N¼Æ¬ã¨sªÀ -- ³N¼Æ¬ã¨s¡@¡@ \gZO
Ms. Jay said analysts detected "unusual activity,"s@
during routine checks on a server used for telephone#&Z|7s
fund raising that is owned by Tufts but managed by an0o.
outside vendor. The suspicious activity --G5cQCN
specifically, large amounts of data moving through theg:h
machine -- occurred Oct. 31 and Dec. 19, she said. Onea
theory was that someone was using the computer as a':@*
distribution point for movies and other entertainmentFv/&op
media, Ms. Jay said. At the time, Tufts decided thereX']uv|
wasn't enough evidence to notify alumni about they/nU
unusual activity. But, she said, after recentdju:
revelations about security breaches at financial and6rY
educational institutions, Tufts decided to alert itszEXf
donors. She said there is no evidence that theE)MmM
break-in was carried out by students, faculty membersJTN(S
or employees.
---
--David Pringle and Rachel Zimmerman
Christopher Conkey contributed to this article.
#n/5