[³o½g¤å³¹³Ì«á¥Ñrainbow¦b 2005/04/17 08:47pm ²Ä 3 ¦¸½s¿è]QHk
³o½g´£¤Î Tufts University ®դͤ]¨ü®`._H
©½t¥Í³N¼Æ¬ã¨sªÀ -- ³N¼Æ¬ã¨s¡@¡@ rC&9I
LexisNexis Reveals Further Breaches of DatabaseBP
By David Pringle and Rachel ZimmermanlnJ
Wall Street Journal , April 13, 2005
LexisNexis said 310,000 Americans, nearly 10 times its~z;P
original estimate, have had their personal data[{
accessed by unauthorized individuals via its computer$3nO/
systems, raising fresh concerns about ther?:*
data-collection industry's ability to guard againstzo
hackers amid a surge in identity-theft crimes.
Separately, Tufts University sent a "precautionary"5z
letter to alumni last week warning them that personal>L6"<'
information may have been stolen from a computerb
database used for fund raising. The letter, sent to,Y
about 106,000 graduates and other donors, says Tuftst
"detected abnormal activity" on a computer that&X[
included names, addresses, Social Security and}a
credit-card numbers.
The latest revelations are likely to give new urgencyS0f|b
to the clamor for laws to prevent data brokers fromFS}
amassing sensitive personal information withoutS&Z;
consent and for better safeguards of other databases.]
Recently, data broker ChoicePoint Inc. of Alpharetta,~(g
Ga., said identity thieves had obtained information on3c
about 145,000 people by posing as legitimatehb|
customers. Sensitive data also have been compromisedqgd/_m
at some banks, mutual funds and other universities.
LexisNexis, a legal- and business-information providerEE/
owned by Reed Elsevier PLC of the United Kingdom, said[BG
it has identified 59 security breaches over two years8m
-- a rate of about one every two weeks -- making theAB
problem far more pervasive than it had previouslyaWo0
realized. The accessed information included Socialr
Security, driver's license numbers and other personal(CV
information.
U.S. law-enforcement agencies are investigating thee
breach, and Reed said it is offering fraud insuranceB*,
and other services such as credit checks, free ofnR_YE
charge, to individuals whose data were accessed bykhA
unauthorized people. Reed's latest announcement comes1cp?w
five weeks after its initial disclosure that breachesv9
had affected about 30,000 people.
Once individual information has been purloined, it canCeU~
be used by identity thieves to fraudulently obtainiLB
credit cards, mortgage loans and car loans, amonghtY
other things. The Federal Trade Commission estimatesqx`t
27.3 million Americans were affected by identity thefti>@
in the five years through 2003, with the pace of theftZb[kO
quickening toward the end of that period.
Data brokers, which collect and sell personalv5B
information, represent a new and still largely<v}r
unregulated industry -- but virtually every state is=uG
considering some kind of privacy legislation. In at+wQ<!
least 20 states, the law would require companies toV)8
notify individuals when their personal information isz:e9
compromised, according to the Electronic Privacy`h7?s
Information Center, a public-interest research groupEo>A-0
in Washington, D.C. Congress is also considering aP
federal notification standard, based on a California5zCw
law that exposed the ChoicePoint breach.
The Senate Judiciary Committee plans to hold a hearingp&X M
today on the recent wave of data breaches and on thexx}
proposed legislation.
Laws governing the collection and movement of personalN
data are much stricter in Europe and the region hasn'tXH!3c
had the spate of security breaches experienced in the.SWL-
U.S.
Data brokers such as LexisNexis promote theirfZ(4`
"risk-management" services to banks, insurance[j@
companies, law-enforcement agencies and other8J
legitimate organizations that need to guard against7
financial fraud. Banks, for instance, buy the data so4k-KP
they can run checks when deciding whether to approve a~anC
mortgage application. Reed executives say thezXvm*
data-brokering business is an important tool inE~q9.U
preventing fraud.
LexisNexis said it began investigating thousands ofhx?
customers' accounts last month, after announcing thatdy@cw
information on 30,000 people held by its SeisintI
data-brokering division may have been accessed by%.c3Rp
criminals. Yesterday Reed said that it had uncoveredm4'-Rp
dozens of Seisint security breaches that predated itsWOv^
acquisition of the company late last year, as well asW r"
a handful of incidents in other parts of LexisNexis.Jw
Kurt Sanford, head of U.S. corporate and federalN%
markets for LexisNexis, said the company didn't havec
any idea of the extent of the problem before thep-rpr=
investigation.
The security breaches typically took one of three+F"|
forms, Mr. Sanford said, all related to74 }VJ
misappropriation of passwords. In some cases, an<7JBN
unauthorized individual was able to access LexisNexisk4=.
databases after figuring out a legitimate customer'sToA%|
too-obvious password. In others, a former employee of3BB>u<
a legitimate customer was able to continue accessing'*u
the LexisNexis databases because the customer didn't5
change the account details after the employee left. InSpJT
still others, criminals obtained an account=
administrator's identification details, allowing them*#
to create unauthorized accounts.
LexisNexis executives say they are now monitoringL0
customers' usage patterns closely to spot any_9UdEz
irregular activity. They say they are also trying toh;65Dy
force customers to beef up their security by reviewingNfps
passwords monthly and requiring authorizations from$
two managers for each new account.
LexisNexis said that so far none of the 30,000 people-l
notified of a breach in December and January have comeG=@*
back to report instances of identity theft. Privacyw?
advocates, however, say criminals don't always+'
immediately use data they obtain, preferring sometimes*-A>2
to sell them on the Internet. Or, they say, a criminalC4E[
may open a credit card in an individual's name, butkU
use a different address, so the individual doesn't seen-
the credit-card statements and isn't aware of thespO
fraud.
Reed's LexisNexis unit pushed deeply into datad/l.I
brokering when it purchased Seisint Inc. of Boca4k'/RR
Raton, Fla., for $775 million late last year. Seisint`
was known for having some of the top software forS&k
searching databases. It also sold data searches for asQ~_k
little as 25 cents apiece.
Reed said the financial cost of the breaches will be*n
manageable and didn't change its earnings forecasts.
At Tufts, Betsey Jay, director of advancement =R
communications and donor relations, said there is "no~W
evidence that any data is being misused." Still, thesrnBlY
letter urged alumni to contact their banks and checkVTUd
credit reports for any signs of unauthorized activity.D
©½t¥Í³N¼Æ¬ã¨sªÀ -- ³N¼Æ¬ã¨s¡@¡@ E&
Ms. Jay said analysts detected "unusual activity,"o
during routine checks on a server used for telephone7d0
fund raising that is owned by Tufts but managed by anqW*b
outside vendor. The suspicious activity --=}
specifically, large amounts of data moving through the|Fy~qj
machine -- occurred Oct. 31 and Dec. 19, she said. Oneh^)$Dt
theory was that someone was using the computer as ah?d
distribution point for movies and other entertainment"_n b_
media, Ms. Jay said. At the time, Tufts decided there_bNN
wasn't enough evidence to notify alumni about the0B{
unusual activity. But, she said, after recentQ:|e
revelations about security breaches at financial and2
educational institutions, Tufts decided to alert itsAx V
donors. She said there is no evidence that the-'hU8
break-in was carried out by students, faculty members,!h(]q
or employees.
---
--David Pringle and Rachel Zimmerman
Christopher Conkey contributed to this article.
.lpmM