{"id":271,"date":"2005-01-11T22:48:36","date_gmt":"2005-01-11T22:48:36","guid":{"rendered":"\/?p=271"},"modified":"-0001-11-30T00:00:00","modified_gmt":"-0001-11-30T04:00:00","slug":"a-little-tiny-baby-information-calamity","status":"publish","type":"post","link":"https:\/\/www.identityblog.com\/?p=271","title":{"rendered":"A little tiny baby information calamity"},"content":{"rendered":"<p><font face=Verdana,Geneva,Arial,Helvetica,Sans-Serif>I was also glad to see <a href=\"http:\/\/www.burtongroupblogs.com\/jamielewis\/2005\/01\/hackers_steal_i.html\" class=\"broken_link\">Jamie Lewis blogging about the security breach<\/a> at George Mason University&#8230;  The <a href=\"http:\/\/news.com.com\/Hackers+steal+ID+info+from+Virginia+university\/2100-7349_3-5519592.html?part=rss&amp;tag=5519592&amp;subj=news.7349.20\" class=\"broken_link\">full story is on News.com<\/a>.  Basically,<\/font> <\/p>\n<blockquote dir=ltr style=\"MARGIN-RIGHT: 0px\">\n<p><font face=Verdana,Geneva,Arial,Helvetica,Sans-Serif>George Mason University confirmed on Monday that the personal information of more than 30,000 students, faculty and staff had been nabbed by online intruders. <\/font><\/p>\n<p><font face=Verdana,Geneva,Arial,Helvetica,Sans-Serif>The attackers broke into a server that held details used on campus identity cards, the university said. Joy Hughes, the school&#39;s vice president for information technology, said in an internal e-mail sent over the weekend and seen by CNET News.com that &#8220;the server contained the <em>names, photos, Social Security numbers and (campus ID) numbers<\/em> of all members of the Mason community who have identification cards.&#8221;<\/font><\/p>\n<\/blockquote>\n<p>Jamie had told me recently how much he liked the piece in which I worried that the British Identity Card &#8211; as proposed in its initial draft &#8211; is an<a href=\"https:\/\/www.identityblog.com\/2004\/12\/28.html\" class=\"broken_link\"> information-disaster-waiting-to-happen<\/a>.  His reaction to the George Mason affair is:<\/p>\n<blockquote dir=ltr style=\"MARGIN-RIGHT: 0px\">\n<p><strong>As identity systems aggregate information, they also aggregate risk<\/strong>. And the custodians of those stores must take the proper precautions, including risk and threat assessments and the implementation of a reasonable protection posture.<\/p>\n<\/blockquote>\n<p dir=ltr>I love the formulation that as identity systems aggregate information, they aggregate risk.  I want to put that into the second law since it is really key to what I was trying to express.<\/p>\n<p dir=ltr>However, as much as I love to see Jamie exhuding unbridled optimism &#8211; I would be surprised if the custodians had not done risk and threat assessments, or somehow failed to act responsibly to protect the information.  So this part rings hollow.<\/p>\n<p dir=ltr>We need to base our approach to these scenarios on the idea that one day, the store <strong>will be<\/strong> <strong>penetrated<\/strong>.  We need then to reduce information in the store to the minimum required.  We need to distribute information so breaking into one system gives away as little as possible.  And more than anything, we need unidirectional identifiers such that only access to a metasystem allows assembly of cross-aspect information.<\/p>\n<p dir=ltr>For example, there was no need for George Mason&#39;s ID system to contain social security numbers.  Nor, bizarrely, is there probably any reason for it to contain student identification numbers.  It could &#8211; I know this sounds primitive &#8211; just contain single-purpose <strong>identity card numbers<\/strong>.  A metadirectory &#8211; which itself contained no substantive information &#8211; could provide glue to other identification contexts for those who merit it &#8211; and on a case by case rather than carte blanche basis.  This allows many more controls and balances to be built into the system.  (All of this is Law 4)<\/p>\n<p dir=ltr>George Mason had been moving in the right direction.<\/p>\n<blockquote dir=ltr style=\"MARGIN-RIGHT: 0px\">\n<p dir=ltr><font face=Verdana,Geneva,Arial,Helvetica,Sans-Serif>Last year, George Mason said it would cease to print Social Security numbers on campus ID cards and would instead generate unique &#8220;G numbers&#8221; for each student and each member of faculty and staff. <\/font><\/p>\n<\/blockquote>\n<p dir=ltr>So the SSNs were now redundant (ouch!  Law 2).  But as if to underline my point,<\/p>\n<blockquote dir=ltr style=\"MARGIN-RIGHT: 0px\">\n<p><font face=Verdana,Geneva,Arial,Helvetica,Sans-Serif>&#8220;We felt that the information there was secure,&#8221; George Mason spokesman Daniel Walsch said on Monday. <\/font><\/p>\n<\/blockquote>\n<p dir=ltr>And now, fasten your seat belts for the obvious:<\/p>\n<blockquote dir=ltr style=\"MARGIN-RIGHT: 0px\">\n<p><font face=Verdana,Geneva,Arial,Helvetica,Sans-Serif>George Mason is not alone among universities in suffering a security breach. Two years ago, online intruders <\/font><a title=\"Data thieves strike Georgia Tech -- Monday, Mar 31, 2003\" href=\"http:\/\/news.com.com\/Data+thieves+strike+Georgia+Tech\/2100-1002_3-994821.html?tag=nl\" class=\"broken_link\"><font face=Verdana,Geneva,Arial,Helvetica,Sans-Serif color=#b23e3e>broke into<\/font><\/a><font face=Verdana,Geneva,Arial,Helvetica,Sans-Serif> a server containing the credit card numbers of some 57,000 patrons of a Georgia Institute of Technology arts and theater program, while others <\/font><a title=\"Data thieves nab 55,000 student records -- Thursday, Mar 6, 2003\" href=\"http:\/\/news.com.com\/Data+thieves+nab+55%2C000+student+records\/2100-1002_3-991413.html?tag=nl\" class=\"broken_link\"><font face=Verdana,Geneva,Arial,Helvetica,Sans-Serif color=#b23e3e>lifted<\/font><\/a><font face=Verdana,Geneva,Arial,Helvetica,Sans-Serif> more than 55,000 Social Security numbers from computers at the University of Texas at Austin. Last year, more than 1 million California residents had their personal information leaked thanks to a pair of incidents <\/font><a title=\"UCLA laptop theft exposes ID info -- Thursday, Jun 10, 2004\" href=\"http:\/\/news.com.com\/UCLA+laptop+theft+exposes+ID+info\/2100-1029_3-5230662.html?tag=nl\" class=\"broken_link\"><font face=Verdana,Geneva,Arial,Helvetica,Sans-Serif color=#b23e3e>at UCLA<\/font><\/a><font face=Verdana,Geneva,Arial,Helvetica,Sans-Serif> and <\/font><a title=\"Online attack puts 1.4 million records at risk -- Wednesday, Oct 20, 2004\" href=\"http:\/\/news.com.com\/Online+attack+puts+1.4+million+records+at+risk\/2100-1029_3-5420149.html?tag=nl\" class=\"broken_link\"><font face=Verdana,Geneva,Arial,Helvetica,Sans-Serif color=#b23e3e>the University of California at Berkeley<\/font><\/a><font face=Verdana,Geneva,Arial,Helvetica,Sans-Serif>. <\/font><\/p>\n<\/blockquote>\n<p dir=ltr>Put these all together, go up to the national scale, make the system available on-line, add every piece of identifying information &#8211; physical, biometric, educational, employer-related.  Then you have a really nice target &#8211; I mean <strong>TARGET<\/strong> &#8211; don&#39;t you?  Inside job or outside?  <\/p>\n<p dir=ltr>And you can probably just &#8220;dribble&#8221; a lot of information out of the system before anyone is any the wiser if you have the right background and access.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>I was also glad to see Jamie Lewis blogging about the security breach at George Mason University&#8230; The full story is on News.com. Basically, George Mason University confirmed on Monday that the personal information of more than 30,000 students, faculty and staff had been nabbed by online intruders. The attackers broke into a server that &hellip; <a href=\"https:\/\/www.identityblog.com\/?p=271\" class=\"more-link\">Continue reading <span class=\"screen-reader-text\">A little tiny baby information calamity<\/span><\/a><\/p>\n","protected":false},"author":68,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[2],"tags":[],"_links":{"self":[{"href":"https:\/\/www.identityblog.com\/index.php?rest_route=\/wp\/v2\/posts\/271"}],"collection":[{"href":"https:\/\/www.identityblog.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.identityblog.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.identityblog.com\/index.php?rest_route=\/wp\/v2\/users\/68"}],"replies":[{"embeddable":true,"href":"https:\/\/www.identityblog.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=271"}],"version-history":[{"count":0,"href":"https:\/\/www.identityblog.com\/index.php?rest_route=\/wp\/v2\/posts\/271\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.identityblog.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=271"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.identityblog.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=271"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.identityblog.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=271"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}