DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Computer Breach Could Have Exposed Trauma Victims to Further Anguish

Posted on September 14, 2016 by Dissent

Jim Dwyer provides additional details and commentary on a breach involving research participants’ data held by the New York State Psychiatric Institute.

[The research participants] included, among others, schoolchildren directly exposed to the events of Sept. 11; Puerto Rican youth; severely emotional disturbed young people in Westchester County and their caretakers; people in the Bronx suffering from post-traumatic stress who have family in the criminal justice system; students at three schools in Queens and four others in Washington Heights, Manhattan, whose mental health needs were being assessed.

It was a hack with different fingers, infiltrating two servers operated by the State of New York and plucking out information of varying calibers. For about 9,000 people, it captured the kind of data that is sold to identity thieves, like names, addresses and so forth.

But also stored in the servers was what people had to say about trauma, and how they were tossed about by the many storms of human existence — or weathered them. This is useful and powerful information for researchers.

From Dwyer’s report, it sounds like the institute was using certain protocols to de-identify the participants. But was it enough to protect them?

Perhaps. What would have made the data far more difficult to read than simple coding would be encryption, a digital lockbox that is very hard to pick. It thwarts hackers the same way a house safe can stymie burglars: They can break in but cannot get away with the valuables. The state contends that encryption is not practical for active research, though it is used in many fast-paced businesses.

Of additional concern, Dwyer reports that the state learned of the breach from federal authorities. He does not explain how the federal authorities became aware of the breach. Did they find the data up for sale on the Dark Web? Were they monitoring a forum where someone bragged about the breach?

Read more on the New York Times.


Related:

  • Private Investigator And Former NYPD Officer Arrested In Bribery Scheme To Obtain Reports From Federal Law Enforcement Database
  • Justice Department Announces Five Cases as Part of Recently Launched Disruptive Technology Strike Force
  • Leon County Schools vendor's data leak exposed 368,000 current and former FLVS students' details, LCS teacher data, and more
  • Justice Department Charges 12 Chinese Contract Hackers and Law Enforcement Officers in Global Computer Intrusion Campaigns
  • NY A.G. Schneiderman Announces Takedown Of Identity-Theft Ring Targeting Bank Customers Across NYC And Surrounding Counties
Category: HackHealth DataU.S.

Post navigation

← Challenger Podlodowski discovers open door into state’s voter database
Trump’s campaign mute about data security #fail? →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • HHS’ Office for Civil Rights Settles HIPAA Investigation of MMG Fusion, LLC Breach Affecting 15 Million Individuals
  • NL: Suspects report themselves via new reporting form
  • Nigerian Communication Commission Orders Telecoms to Report Cyber Threats Within 4 Hours
  • Russian Ransomware Administrator Pleads Guilty to Wire Fraud Conspiracy
  • LeakBase seized, arrests made as part of global action
  • Coruna: The Mysterious Journey of a Powerful iOS Exploit Kit
  • 1,700 Dutch police officers get reminder not to access files without legitimate purpose
  • Israeli spies ‘hacked every traffic camera in Tehran to plot killing of Iran’s Ayatollah Ali Khamenei’
  • Congress finds data brokers cost consumers tens of billions of dollars
  • Evoke Wellness at Hilliard updates its breach notification

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Allstate must face privacy lawsuit over cellphone tracking of drivers
  • Spain fines FC Barcelona €500,000 for failing biometric data protection assessment
  • Polish doctors jailed for denying woman abortion
  • France’s Highest Administrative Court Upholds CNIL’s Standard On Anonymization
  • Dutch police reminded not to snoop in files without legitimate purpose

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: Dissent.73

Contact Me

Email: info[at]databreaches.net
Security Issue: security[at]databreaches.net
Mastodon: Infosec.Exchange/@PogoWasRight
Signal: Dissent.73
DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.