DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Possible security breach involving Xavier University?

Posted on January 29, 2011 by Dissent

On January 26, Jennifer Baker of the Cincinnati Enquirer reported that Miller Beckham III, 32, of Springfield Township was charged with demanding $20,000 from Xavier University in exchange for not publicly releasing personal student documents.

On January 27, Cliff Peal of the same paper reported that students had not been notified of any breach and that the university reported it was “still investigating” the situation.

On January 28, the paper reported:

An alleged extortion case at Xavier University involved personal information of a “limited number” of students and parents, a university spokeswoman said Friday, and there is no evidence the information was misused or that any university databases were breached.

The university sent a message to students and staff Friday alerting them of the Jan. 25 arrest of Miller Beckham III, 32, of Springfield Township on a felony extortion charge. Beckham allegedly demanded $20,000 from the university Jan. 14 in exchange for personal student documents.

The “nature of the information and how it was obtained” remain under investigation by Cincinnati police, said University spokeswoman Deb del Valle. She could not say Friday how many students may have been victims, but said those individuals have been contacted directly.

Beckham has never worked for the university. He remained jailed Friday on $10,000 bond. His next court appearance is Feb. 4, according to jail records.

I fail to understand how people can say that “no information was misused” when it was used for an extortion attempt. How is that not misuse?

There is no statement on the university’s web site as of the time of this posting. Since the extortion attempt was directed to them, it seems reasonable to hypothesize that the student and parent information was obtained from them somehow, even if they have found no evidence that any database was breached. Are they defining “breached” only as a hack? Have they really ruled out an employee downloading information and giving it to the accused?

If anyone received the letter or has additional information on this, please let me know.

Related posts:

  • Forbes Breach Email Statistics
  • OH: Candidate for world’s dumbest criminal pleads guilty to attempting to extort Xavier University
  • Springfield Psychological Provides Notice of a Security Incident
  • Township of Maplewood, NJ Provides Media Notification of Data Security Incident
Category: Breach IncidentsEducation SectorU.S.

Post navigation

← Veterans Administration December report to Congress
Minnesota Education Department improperly releases transcripts from online charter school →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Hacker helped kill FBI sources, witnesses in El Chapo case, according to watchdog report
  • Texas Centers for Infectious Disease Associates Notifies Individuals of Data Breach in 2024
  • Battlefords Union Hospitals notifies patients of employee snooping in their records
  • Alert: Scattered Spider has added North American airline and transportation organizations to their target list
  • Northern Light Health patients affected by security incident at Compumedics; 10 healthcare entities affected
  • Privacy commissioner reviewing reported Ontario Health atHome data breach
  • CMS warns Medicare providers of fraud scheme
  • Ex-student charged with wave of cyber attacks on Sydney uni
  • Detaining Hackers Before the Crime? Tamil Nadu’s Supreme Court Approves Preventive Custody for Cyber Offenders
  • Potential Cyberattack Scrambles Columbia University Computer Systems

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Hacker helped kill FBI sources, witnesses in El Chapo case, according to watchdog report
  • Germany Wants Apple, Google to Remove DeepSeek From Their App Stores
  • Supreme Court upholds Texas law requiring age verification on porn sites
  • Justices nix Medicaid ‘right’ to choose doctor, defunding Planned Parenthood in South Carolina
  • European Commission publishes its plan to enable more effective law enforcement access to data
  • Sacred Secrets: The Biblical Case for Privacy and Data Protection
  • Microsoft’s Departing Privacy Chief Calls for Regulator Outreach

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.