LexisNexis warns of breach after alleged mafia bust
IDG News Service - Information broker LexisNexis has warned more than 13,000 consumers, saying that a Florida man who is facing charges in an alleged mafia racketeering conspiracy may have accessed some of the same sensitive consumer databases that were once used to track terrorists.
Lee Klein, 39, of Boynton Beach, Fla., was charged by the U.S. Department of Justice (DOJ) in May following an undercover sting operation that netted 11 suspects from an alleged South Florida crew of the Bonanno crime family.
On Friday, the office of the New Hampshire Attorney General posted a letter that LexisNexis sent out to consumers last month, warning that Klein may have used his access to LexisNexis' Seisint databases "in order to perpetrate certain crimes."
LexisNexis has had problems with credit card fraudsters using its database in the past, but Klein's alleged crimes are different.
In court filings, the DOJ said Klein would provide Bonanno family members with names, addresses and account numbers as part of a fake check-cashing operation. But he's also accused of using computer databases to get information on potential extortion or assault targets as well as "individuals suspected by the Enterprise members of being involved with law enforcement."
In a statement, LexisNexis said Monday that "the former Seisint customer involved in this matter should have provided notice to potentially affected individuals. However, because the customer is no longer in business we provided the notice." The company said it sent out 13,329 notification letters.
Seisint is best known as the creator of the ill-fated MATRIX (Multi-State Anti-Terrorism Information Exchange) terrorist data-mining project, which was shut down in 2005 following privacy concerns. LexisNexis, a division of Reed Elsevier, acquired Seisint in 2004 for $775 million. It sells two Seisint products: Accurint, which provides information on individuals and their assets, and Securint, a background screening tool.
LexisNexis has had problems preventing criminals from using its databases for identity theft. Last May, the company warned that ID thieves had accessed around 32,000 records using its services. In March 2008, LexisNexis settled charges brought by the U.S. Federal Trade Commission, which said the company wasn't doing enough to prevent its data from being abused.
In the letter posted to the New Hampshire Attorney General's Web site, Lexis Nexis also warned that another man used its databases in an unrelated incident. On May 8, Yomi Jagunna, 44, pleaded guilty to fraud charges, saying he set up a fake debt collection company called the Elam Collection Agency. Using his account, Jagunna obtained and then sold Social Security numbers, charging $30 for each one.
Jagunna, who faces a sentence of up to 15 years on a conspiracy charge, was allegedly part of an eight-man identity theft ring.
This pilot fish is a contractor at a military base, working on some very cool fire-control systems for tanks. But when he spots something obviously wrong during a live-fire test, he can't get the firing-range commander's attention.
- IT Certification Study Tips
- Register for this Computerworld Insider Study Tip guide and gain access to hundreds of premium content articles, cheat sheets, product reviews and more.
- Reduce federal infrastructure risk with compliance management and situational awareness
- IBM continuous monitoring and management solutions deliver real-time situational awareness to help federal agencies understand vulnerabilities, and protect the infrastructure.
- Improving IT Efficiencies: Four Advantages of Multi-Tenant Data Centers
- Increasing demands on IT are forcing organizations to rethink their data center options. For many organizations, that means turning to the flexibility afforded...
- Accelerating Cloud Deployment and Operations with Managed Services
- Companies that do not have sufficient in-house expertise to either deploy or maintain an IaaS cloud should turn to Managed Service Providers .
- Rethinking IT Operations in the Cloud
- This paper breaks down the challenges that often prevent the cloud from delivering the fast, flexible and affordable infrastructure companies seek - and...
- Gartner Magic Quadrant for Cloud-Enabled Managed Hosting, North America
- Cloud-enabled managed hosting brings cloudlike consumption and provisioning attributes to the traditional managed hosting market All Government IT White Papers
- NSS Labs & Cisco Present: Evaluating Leading Breach Detection Systems Today's constantly evolving advanced malware and APTs can evade point-in-time defenses to penetrate networks. Security professionals must evolve their strategy in lockstep to...
- Will the Real Endpoint Threat Detection and Response Please Stand Up? This webinar explores new technologies & process for protecting endpoints from advanced attackers as well as the innovations that are pushing the envelope...
- What should I look for in a Next Generation Firewall? SANS Provides Guidance With so many vendors claiming to have a Next Generation Firewall (NGFW), it can be difficult to tell what makes each one different....
- Why Are Customers Really Deploying an NGFW? It seems every IT Security expert is talking about the NGFW, but what are people really doing? This webcast covers 5 real-world customer...
- Charting Your Analytical Future - "Making predictive analytics part of your business processes" Webinar This session will show how predictive analytics can be used throughout the organization by anyone looking for answers and how organizations can make...
- All Government IT Webcasts