[Dataloss] LA Times on data loss from universities
dano
dano at well.com
Tue May 30 00:10:11 EDT 2006
fair use for this list
<http://www.latimes.com/technology/la-me-hacks30may30,0,4561270,print.story?coll=la-home-headlines>
Colleges an Open Book for Hackers
Cyber criminals find universities are rich in personal data and
easier prey than banks.
By Lynn Doan
Times Staff Writer
7:49 PM PDT, May 29, 2006
Computer systems at universities across the nation are becoming
favorite targets of hackers, and rising numbers of security breaches
have exposed the personal information of thousands of students,
alumni, employees and even college applicants.
Since January, at least 845,000 people have had sensitive information
jeopardized in 29 security failures at colleges nationwide. In these
incidents, compiled by identity theft experts who monitor media
reports, hackers have gained access to Social Security numbers and,
in some cases, medical records.
"There are so many examples within the last year demonstrating that
these universities are just real, true, vulnerable targets," said
Michael C. Zweiback, an assistant U.S. attorney in Los Angeles who
prosecutes hackers. "All of a sudden, it seemed like we were adding
on another university every week to look into."
Although comprehensive statistics on breaches of college computer
systems aren't collected by a single entity, industry experts agree
that the situation is growing worse.
Computer security is an increasing concern for all types of private
groups and government agencies. Last week, the Department of Veterans
Affairs confirmed that electronic records of up to 26.5 million
veterans and some spouses were stolen from the home of a federal
employee.
Cyber security officials say hackers are realizing that colleges hold
many of the same records as banks. But why hack a bank, one official
asked, "when colleges are easier to get into?"
Colleges accounted for the largest percentage, roughly 30%, of
computer security breaches reported in the media last year, according
to ChoicePoint, a consumer data-collecting firm in Georgia.
FBI Special Agent Kenneth McGuire said that five years ago, his cyber
crime unit in Los Angeles worked on one to three college hacking
cases at a time. On a recent afternoon, his team was working with six
colleges whose systems had been hacked.
Arif Alikhan, who oversees computer hacking cases for the U.S.
attorney in Washington, said that when he was chief of cyber crime in
Los Angeles between 2001 and 2005, his caseload doubled.
And for the first time in seven years, colleges identified security
as the most critical issue facing their computer systems, according
to a survey of about 600 colleges released this month by Educause, a
nonprofit group that promotes information technology use. In a 2000
survey, security wasn't even among the top five concerns.
Hackers are drawn to colleges for various reasons.
In March, 41 Stanford University applicants hacked into the
admissions system to see if they had been accepted. A man accused of
hacking into USC's admissions system last year said he was only
trying to prove that it was vulnerable.
In December, hackers appear to have broken into a system at the
University of Washington to find a place to store their music files.
The openness that's rooted in the nature of academic institutions is
partly to blame.
"Students want to be downloading MP3's. Professors want a system for
general research," McGuire said. "Whenever you have such large
portals to information open, you're going to have vulnerability to
attacks."
Erich Kreidler, who teaches an engineering class at USC, said he
posts everything online, including grades and final exams. "It's
about convenience," he said.
But convenience can have a price.
Last month, the University of Texas discovered illegal access to
197,000 Social Security numbers of students, alumni and employees.
Days later, a San Diego man was charged with hacking into the USC
admissions system in June 2005.
Ohio University confirmed its third security breach since April,
together compromising 360,000 personal records and a number of
patented data and intellectual property files.
And Sacred Heart University in Connecticut reported last week that a
security breach has compromised the Social Security numbers and some
credit card numbers of 135,000 people - some of whom never applied
to, worked at or attended the university.
Like many universities, a spokeswoman said, Sacred Heart collects
personal information from college entrance exams, college fairs and
recruiting firms. Robert M. Wood, chief information security officer
at USC, said the college's computer system is scanned by hackers an
estimated 500,000 times a day.
"It's pretty much a lot of doorknob rattling," he said. "But
occasionally, they find an open door."
USC has reported two security breaches in the last year.
The University of California doesn't track security breaches, but
ChoicePoint has logged five hacking incidents at UC campuses since
January 2005. The California State University system reported at
least 24 breaches since July 2003.
In March, an 18-year-old New Jersey man was convicted of breaking
into a dozen systems at San Diego State. He was sentenced to three
years' probation and must pay the school $20,000 in restitution.
John Denune, technology security officer for San Diego State, said
the 2003 hack exposed the Social Security numbers of more than
200,000 people. The hacker wiggled his way through an outdated system
in the drama department to reach the financial aid system.
Targets of hacking have been obscure, such as 1,700-student Anderson
College in South Carolina, and well-known, such as Notre Dame.
Finding the money to pay for security upgrades has been a major
challenge for several schools.
"A university is fighting for every dollar to maintain a good
education standard," said Rick Jones, an information security
consultant in Los Angeles. "It doesn't necessarily allocate a
security budget - at least not until it gets hit a couple times."
One identity theft protection firm in Arizona is catering to the
college crowd. LifeLock, which charges consumers $10 a month to
protect personal data, ran a full-page newspaper advertisement after
the recent University of Texas hack, targeting those affected.
"We told everyone, 'You have been victimized once by the university.
Take steps today,' " said Todd Davis, chief executive of LifeLock.
LifeLock has also forged partnerships with the University of Oklahoma
and Arizona State University and is in talks with two other
institutions.
As hacks ensue, college officials have had no choice but to increase security.
San Diego State doubled its computer security staff after the
disastrous hack of 2003, said Denune, the campus security chief.
"Increasing security is expensive, it's time-consuming, and unless
someone really sees the threat, it's easily put aside," he said.
"This was a wake-up call."
Other colleges now require students to download anti-virus and
firewall software before connecting to campus systems.
At Purdue University in Indiana, which reported two security breaches
last year and two this year, students must change their passwords
monthly to access class schedules, grades and e-mail.
The efforts are part of SecurePurdue, a program the college launched
a year ago to counter the rising attacks, said Steve Tally, IT
spokesman for the university.
"Universities are very attractive to hackers," he said. "Purdue has a
very good name internationally and, unfortunately, it's brought us
the kind of attention we don't want."
In 2004, the college began phasing out the use of Social Security
numbers to identify students and employees.
In response to last year's hack, USC has reprogrammed its admissions
system and requires users to change their passwords more often.
A technical security department created three years ago routinely
scans computers connected to USC's network looking for machines that
aren't equipped with updated anti-virus software.
At some colleges, new security measures have sparked complaints from
students inconvenienced by lengthy virus scans and password prompts.
But others say too much security is better than too little.
Tyler Dolezal was one of the 197,000 individuals whose Social
Security numbers had been exposed in April's breach at the University
of Texas. Dolezal has spent the last month trying to place fraud
alerts with credit reporting agencies - a process that turned out to
be unexpectedly complex because Dolezal, 18, hasn't established
credit.
"These college systems hold really sensitive information on a whole
lot of people," Dolezal said. "That needs to be protected as much as
possible."
--
If the government wants us to obey the law
it should set a better example.
More information about the Dataloss
mailing list