[³o½g¤å³¹³Ì«á¥Ñrainbow¦b 2005/04/17 08:47pm ²Ä 3 ¦¸½s¿è]qkv8M
³o½g´£¤Î Tufts University ®դͤ]¨ü®`.I4fP."
©½t¥Í³N¼Æ¬ã¨sªÀ -- ³N¼Æ¬ã¨s¡@¡@ P
LexisNexis Reveals Further Breaches of DatabaseK]U
By David Pringle and Rachel ZimmermanHqI#-
Wall Street Journal , April 13, 2005
LexisNexis said 310,000 Americans, nearly 10 times itsP(X%
original estimate, have had their personal data:.'<co
accessed by unauthorized individuals via its computer:(g9
systems, raising fresh concerns about the&~RGZ
data-collection industry's ability to guard againstq
hackers amid a surge in identity-theft crimes.
Separately, Tufts University sent a "precautionary"sx|?
letter to alumni last week warning them that personal
information may have been stolen from a computer<<Lz+P
database used for fund raising. The letter, sent to=3z
about 106,000 graduates and other donors, says Tuftsf@
"detected abnormal activity" on a computer thatHj
included names, addresses, Social Security and\
credit-card numbers.
The latest revelations are likely to give new urgency[Bd
to the clamor for laws to prevent data brokers from8
amassing sensitive personal information withoutRe
consent and for better safeguards of other databases.C&5L
Recently, data broker ChoicePoint Inc. of Alpharetta,Y0H
Ga., said identity thieves had obtained information on46_uy
about 145,000 people by posing as legitimate<ehu
customers. Sensitive data also have been compromised00
at some banks, mutual funds and other universities.
LexisNexis, a legal- and business-information provider8m
owned by Reed Elsevier PLC of the United Kingdom, saidW
it has identified 59 security breaches over two years[T,OXI
-- a rate of about one every two weeks -- making the>
problem far more pervasive than it had previously8=
realized. The accessed information included Social79IW=n
Security, driver's license numbers and other personalX%>
information.
U.S. law-enforcement agencies are investigating the2$P
breach, and Reed said it is offering fraud insuranceA2zFR
and other services such as credit checks, free ofufIAN
charge, to individuals whose data were accessed byQ8:y/
unauthorized people. Reed's latest announcement comesZOc{D
five weeks after its initial disclosure that breachesyAv<
had affected about 30,000 people.
Once individual information has been purloined, it canr^o?O\
be used by identity thieves to fraudulently obtain$UX
credit cards, mortgage loans and car loans, amongck2W^
other things. The Federal Trade Commission estimates61,P0
27.3 million Americans were affected by identity thefts
in the five years through 2003, with the pace of theftl ,{o
quickening toward the end of that period.
Data brokers, which collect and sell personal+qY#/
information, represent a new and still largelyZS~%Qw
unregulated industry -- but virtually every state isac4SI
considering some kind of privacy legislation. In at8GnF
least 20 states, the law would require companies toj
notify individuals when their personal information isYu
compromised, according to the Electronic Privacy(#!h
Information Center, a public-interest research groupeR
in Washington, D.C. Congress is also considering ac1u`B
federal notification standard, based on a California7T5S41
law that exposed the ChoicePoint breach.
The Senate Judiciary Committee plans to hold a hearing^e=tJI
today on the recent wave of data breaches and on the`
proposed legislation.
Laws governing the collection and movement of personal[tBjA
data are much stricter in Europe and the region hasn'trg>}q;
had the spate of security breaches experienced in thecg5.S
U.S.
Data brokers such as LexisNexis promote their{
"risk-management" services to banks, insuranceO*9^7
companies, law-enforcement agencies and otherx{d
legitimate organizations that need to guard againstR;Pm<D
financial fraud. Banks, for instance, buy the data so*x?E6
they can run checks when deciding whether to approve ala$
mortgage application. Reed executives say theFwCN
data-brokering business is an important tool in[I
preventing fraud.
LexisNexis said it began investigating thousands ofHTe,Z
customers' accounts last month, after announcing that*@GkO
information on 30,000 people held by its SeisintS+i@
data-brokering division may have been accessed byUq#
criminals. Yesterday Reed said that it had uncoveredrI;nXT
dozens of Seisint security breaches that predated its];
acquisition of the company late last year, as well as]))V
a handful of incidents in other parts of LexisNexis.%
Kurt Sanford, head of U.S. corporate and federalGY6N
markets for LexisNexis, said the company didn't have(/DXg^
any idea of the extent of the problem before theWgUw#+
investigation.
The security breaches typically took one of three`
forms, Mr. Sanford said, all related to$K
misappropriation of passwords. In some cases, ane1q
unauthorized individual was able to access LexisNexisc
databases after figuring out a legitimate customer'sT:8
too-obvious password. In others, a former employee of#N
a legitimate customer was able to continue accessing nS#
the LexisNexis databases because the customer didn't!zTmYt
change the account details after the employee left. Inmis-R
still others, criminals obtained an account+:d%|
administrator's identification details, allowing themnG
to create unauthorized accounts.
LexisNexis executives say they are now monitoringK?EYn
customers' usage patterns closely to spot anyP
irregular activity. They say they are also trying tor
force customers to beef up their security by reviewing|
passwords monthly and requiring authorizations fromw#
two managers for each new account.
LexisNexis said that so far none of the 30,000 people^
notified of a breach in December and January have come+{=V
back to report instances of identity theft. PrivacyC~
advocates, however, say criminals don't always.J
immediately use data they obtain, preferring sometimesduo0
to sell them on the Internet. Or, they say, a criminal:T'o
may open a credit card in an individual's name, but
use a different address, so the individual doesn't see+IXA_s
the credit-card statements and isn't aware of theV3]>
fraud.
Reed's LexisNexis unit pushed deeply into datanm^O
brokering when it purchased Seisint Inc. of Boca}#
Raton, Fla., for $775 million late last year. Seisinta3%%
was known for having some of the top software for_2|
searching databases. It also sold data searches for asQ+@<XC
little as 25 cents apiece.
Reed said the financial cost of the breaches will be/,m?Z
manageable and didn't change its earnings forecasts.
At Tufts, Betsey Jay, director of advancementXra~
communications and donor relations, said there is "noc~mH)
evidence that any data is being misused." Still, thegU0m7]
letter urged alumni to contact their banks and check/\
credit reports for any signs of unauthorized activity.pJ
©½t¥Í³N¼Æ¬ã¨sªÀ -- ³N¼Æ¬ã¨s¡@¡@ `
Ms. Jay said analysts detected "unusual activity,"_-
during routine checks on a server used for telephone7(r
fund raising that is owned by Tufts but managed by an*A
outside vendor. The suspicious activity --f
specifically, large amounts of data moving through the>oqfLr
machine -- occurred Oct. 31 and Dec. 19, she said. Oneoo=$
theory was that someone was using the computer as aIC
distribution point for movies and other entertainmentTT
media, Ms. Jay said. At the time, Tufts decided there\-
wasn't enough evidence to notify alumni about the|o+
unusual activity. But, she said, after recentOU=&/
revelations about security breaches at financial andx!
educational institutions, Tufts decided to alert its/{X
donors. She said there is no evidence that the8Cbs
break-in was carried out by students, faculty members0
or employees.
---
--David Pringle and Rachel Zimmerman
Christopher Conkey contributed to this article.
\iy23