Feeds

Feds probe huge California data breach

Details of 1.4m people exposed

  • alert
  • submit to reddit

5 things you didn’t know about cloud backup

The FBI is investigating the penetration of a university research system that housed sensitive personal data on a staggering 1.4m Californians who participated in a state social program, officials said on Tuesday.

The compromised system had the names, addresses, phone numbers, social security numbers and dates of birth of everyone who provided or received care under California's In-Home Supportive Services program since 2001, says Carlos Ramos, assistant secretary of the state's Health and Human Services Agency. The program pays a modest hourly wage to workers who provide in-home care for hundred of thousands of low-income elderly, blind and disabled people.

Officials say they have not determined whether or not the intruder actually downloaded the database, which had been made available to researchers at the University of California, Berkeley under a confidentiality agreement. "We don't know whether or not the information was accessed," says Ramos. "Since it is sensitive data we figured it would be best to get word out to people so they can take preventive measures just in case."

The agency is recommending that anyone who participated in the program since 2001 contact the three major credit reporting agencies to place a fraud alert on their credit profiles, and start monitoring their credit reports for signs of identity theft.

Ramos says the state has withdrawn the researcher's access to the database.

George Strait, head of U.C. Berkeley's Public Affairs office, confirmed the intrusion, and said the project involved "research into how to make better the delivery of care to people who are homebound."

Mass Disclosure

The intrusion appears the be the largest public disclosure so far under California's anti-identity theft law "SB1386," which requires companies and state agencies to inform Californians of any security breach in which such personal information is "reasonably believed to have been" compromised. In cases involving over 500,000 people, the organization can warn the potential victims en masse through a website posting and by alerting the media. "That's why we're asking folks for help," says Ramos.

The law passed last year in the wake of an intrusion into a government system that housed information on approximately 265,000 state workers -- a fraction of the number at risk in the U.C. Berkeley intrusion.

The intruder used a known vulnerability to crack the university system on 1 August, but wasn't detected until 30 August. Ramos says the university didn't notify the agency until late September; the university says it reported the attack to the state within two weeks of discovery.

According to Ramos, the university had not been in compliance with the security rules the state sets out for research access to sensitive data. The incident has the agency reviewing its agreements with researchers, and looking at ways to verify security compliance. "We're reasonably certain that, had the researcher been in compliance, this would not be an issue," Ramos says.

Strait says he doesn't know anything about the security requirements, but that the university handled the intrusion properly. An FBI spokesperson confirmed the bureau was aware of the incident, but would not otherwise comment.

Copyright © 2004, SecurityFocus logo

Related stories

Investors fret about IT security
FBI publishes computer crime and security stats
Security cert body gives lesson in insecurity

Next gen security for virtualised datacentres

Whitepapers

Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 10 endpoint backup mistakes
Avoid the ten endpoint backup mistakes to ensure that your critical corporate data is protected and end user productivity is improved.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Rethinking backup and recovery in the modern data center
Combining intelligence, operational analytics, and automation to enable efficient, data-driven IT organizations using the HP ABR approach.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.