DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Update: Four years later, is MCCCD still trying to cover up alleged security failures?

Posted on May 8, 2018 by Dissent

Sometimes it’s easy to forget that although a breach may be in the headlines for the proverbial 15 minutes, the impact of some breaches and resulting litigation may go on for years.

Maricopa Community Colleges

Back in 2011 and and 2013, DataBreaches.net reported on breaches involving the Maricopa County Community College District (MCCCD).  The earlier breach appeared to be a relatively small one that I had learned about through a paste showing multiple entities’ data for sale. But the second breach, the one disclosed in 2013, was big. In fact, it appeared to be the largest breach ever reported by a post-secondary educational institution in this country, and I think it probably still holds that unfortunate record. But the proverbial dung hit the fan when it came out that the second breach might have been totally avoidable had MCCCD properly remediated the first breach.

Eventually, this blogger  filed an FTC complaint against MCCCD under the Gramm-Leach-Bliley Act, asking the FTC to investigate the college’s security failures (as revealed by documentation this site had obtained from a variety of sources). EPIC also filed a complaint asking the FTC to investigate MCCCD’s alleged data security failures under its GLBA authority. As far as I know, the FTC never investigated. Whether they declined to investigate due to lack of resources or for some other reason is unknown to me.

I recently learned, however, that a former employee of MCCCD, Miguel Corzo, is still tied up in litigation against MCCCD. MCCCD had appeared to have pretty much thrown him under the bus, trying to blame the 2013 breach on him.

Screenshot from Oracle report that MCCCD would later claim they never received.

And I suppose that I shouldn’t be so surprised, but it sounds like the college is still claiming ignorance of a number of reports and warnings they had allegedly been given before the 2013 breach.

Back in 2014, as part of DataBreaches.net’s investigation into the MCCCD breach, this blogger interviewed or exchanged email communications with a number of then-current and former MCCCD employees and contractors. This site also obtained state audits from public records searches as well as copies of reports prepared by external contractors and/or employees.

Screenshot from file allegedly handed to Chancellor and Vice-Chancellor’s group in January, 2013.

Among the files and reports  this site obtained were some very bluntly written reports warning MCCCD of what would likely happen if they didn’t take certain actions.  Some of those reports were sent to me with a statement that the reports  had been handed directly to the then-Chancellor and “all members of his Vice Chancellor group” at the beginning of 2013.

The reports obtained by this site included four Word files named, “OnGoing Risks,” “Risks_Associated_With_No_Action,” “Key Transformation Success Factors,” and “Transformation Readiness Questions,” as well as other files titled, “MCCCD – Incident Response Consulting 2011 – Tactical Project Recommendations” (a consulting report from Stach & Liu), “Maricopa_Risk_Assessment_v3 (a PowerPoint file prepared by Oracle), “Maricopa – Security insight Slides2 (a PowerPoint slide), and “First Draft – Information Security Program – 06012011” (a Word file).

Screenshot of file allegedly handed to MCCCD Chancellor and Vice-Chancellor’s group, January, 2013.

Other relevant reports are mentioned in a partial chronology published in this post and in this post.

For the most part, DataBreaches.net did not publish the reports this site obtained, for fear that publication at that time  might provide criminals with a roadmap for how to successfully attack MCCCD (again) if MCCCD still had not remediated certain vulnerabilities. But the fact that this site didn’t publish all the reports or name the former employees or contractors who provided this site with reports and statements doesn’t mean that the reports do not exist or that they were never given to MCCCD prior to the large 2013 breach.

It’s time for any cover-up to stop.


Related:

  • KT Chief to Resign After Cybersecurity Breach Resolution
  • Cyber-Attack On Bectu’s Parent Union Sparks UK National Security Concerns
  • Attorney General James Announces Settlement with Wojeski & Company Accounting Firm
  • JFL Lost Up to $800,000 Weekly After Cyberattack, CEO Says No Patient or Staff Data Was Compromised
  • Hackers Say They Have Personal Data of Thousands of NSA and Other Government Officials
  • John Bolton Indictment Provides Interesting Details About Hack of His AOL Account and Extortion Attempt
Category: Breach IncidentsCommentaries and AnalysesEducation SectorHackU.S.

Post navigation

← Russians posed as IS hackers, threatened US military wives
MO: Global University notifies students whose information was exposed by misconfigured database →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Checkout.com Discloses Data Breach After Extortion Attempt
  • Washington Post hack exposes personal data of John Bolton, almost 10,000 others
  • Draft UK Cyber Security and Resilience Bill Enters UK Parliament
  • Suspected Russian hacker reportedly detained in Thailand, faces possible US extradition
  • Did you hear the one about the ransom victim who made a ransom installment payment after they were told that it wouldn’t be accepted?
  • District of Massachusetts Allows Higher-Ed Student Data Breach Claims to Survive
  • End of the game for cybercrime infrastructure: 1025 servers taken down
  • Doctor Alliance Data Breach: 353GB of Patient Files Allegedly Compromised, Ransom Demanded
  • St. Thomas Brushed Off Red Flags Before Dark-Web Data Dump Rocks Houston
  • A Wiltshire police breach posed possible safety concerns for violent crime victims as well as prison officers

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • OpenAI fights order to turn over millions of ChatGPT conversations
  • Maryland Privacy Crackdown Raises Bar for Disclosure Compliance
  • Lawmakers Warn Governors About Sharing Drivers’ Data with Federal Government
  • As shoplifting surges, British retailers roll out ‘invasive’ facial recognition tools
  • Data broker Kochava agrees to change business practices to settle lawsuit

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net
Security Issue: security[at]databreaches.net
Mastodon: Infosec.Exchange/@PogoWasRight
Signal: +1 516-776-7756
DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.