• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

Electrical Engineering News and Products

Electronics Engineering Resources, Articles, Forums, Tear Down Videos and Technical Electronics How-To's

  • Products / Components
    • Analog ICs
    • Battery Power
    • Connectors
    • Microcontrollers
    • Power Electronics
    • Sensors
    • Test and Measurement
    • Wire / Cable
  • Applications
    • 5G
    • Automotive/Transportation
    • EV Engineering
    • Industrial
    • IoT
    • Medical
    • Telecommunications
    • Wearables
    • Wireless
  • Learn
    • eBooks / Handbooks
    • EE Training Days
    • Tutorials
    • Learning Center
    • Tech Toolboxes
    • Webinars & Digital Events
  • Resources
    • White Papers
    • Educational Assets
    • Design Guide Library
    • Digital Issues
    • Engineering Diversity & Inclusion
    • LEAP Awards
    • Podcasts
    • DesignFast
  • Videos
    • EE Videos and Interviews
    • Teardown Videos
  • EE Forums
    • EDABoard.com
    • Electro-Tech-Online.com
  • Bill’s Blogs
  • Advertise
  • Subscribe

Hackers Breach UC Berkeley Computer Database

May 11, 2009 By JASON DEAREN, Associated Press Writer

 

SAN FRANCISCO (AP)  – University of California, Berkeley, officials said Friday that hackers infiltrated restricted computer databases, putting at risk health and other personal information on 160,000 students, alumni and others.

The university said data include Social Security numbers, birth dates, health insurance information and some medical records dating back to 1999. Personal medical records — such as patient diagnoses, treatments and therapies — were not compromised, officials said. The databases also included personal information of parents, spouses and Mills College students who used or were eligible for Berkeley’s health services. In all, 97,000 Social Security numbers were stolen, said Shelton Waggener, UC Berkeley’s associate vice chancellor for information technology and its chief information officer.

Social Security numbers can be used by identity thieves to access a person’s current credit history, or bank and credit card accounts, according to the California Office of Privacy Protection. The numbers can also be used to open new bank and credit accounts, or even get a driver’s license in the victim’s name, privacy-protection officials warn. The school has identified 160,000 total names in the database and contacted everyone regardless of whether their Social Security number also was compromised.

The server breach occurred on Oct. 6, 2008, and lasted until April 9, when campus staff performing routine maintenance found messages the school said were left by the hackers. “The indications are that the hackers left messages to the system administrator taunting the system administrator that they had broken in,” Waggener said. “It’s a common hacker approach for identifying themselves.”

The school said it had traced the hackers’ computers to a number of overseas locations, including China, and turned that information over to the FBI and campus police. An outside Internet security firm has also been hired to conduct an audit of the school’s systems and its information security measures.

Although the breach was discovered April 9, former and current students did not receive e-mail notification of the hacks until Friday morning. The university said it took forensic technology experts until April 21 to figure out which databases were hacked. “Since then a team of more than 20 people from across the campus have been working seven days a week to determine the exact scope and nature of the breach,” the school said.

It established a Web site at https://datatheft.berkeley.edu to answer questions about the incident.

Graduate student Kate Monroe, 27, said she was taking the school’s warning seriously and planned to have a free fraud alert added to her credit report. “My mom has dealt with identity theft and it’s no joke,” Monroe said. “Getting her identity cleaned up has been nearly impossible.” The school said Friday it had not received any reports of identity theft from any students who were notified.

In March 2005, a thief walked into a UC Berkeley office and swiped a computer laptop containing personal information on nearly 100,000 alumni, graduate students and past applicants. Officials said that laptop was recovered before any personal information was breached.

Six months earlier, a computer hacker gained access to UC Berkeley research being done for the state Department of Social Services. Those files contained personal information of about 600,000 people.

___

On the Net:

https://datatheft.berkeley.edu

 

You Might Also Like

Filed Under: Uncategorized

Primary Sidebar

EE Engineering Training Days

engineering

Featured Contributions

Five challenges for developing next-generation ADAS and autonomous vehicles

Robust design for Variable Frequency Drives and starters

Meeting demand for hidden wearables via Schottky rectifiers

GaN reliability milestones break through the silicon ceiling

From extreme to mainstream: how industrial connectors are evolving to meet today’s harsh demands

More Featured Contributions

EE Tech Toolbox

“ee
Tech Toolbox: 5G Technology
This Tech Toolbox covers the basics of 5G technology plus a story about how engineers designed and built a prototype DSL router mostly from old cellphone parts. Download this first 5G/wired/wireless communications Tech Toolbox to learn more!

EE Learning Center

EE Learning Center
“ee
EXPAND YOUR KNOWLEDGE AND STAY CONNECTED
Get the latest info on technologies, tools and strategies for EE professionals.
“bills
contribute

R&D World Podcasts

R&D 100 Episode 10
See More >

Sponsored Content

Advanced Embedded Systems Debug with Jitter and Real-Time Eye Analysis

Connectors Enabling the Evolution of AR/VR/MR Devices

Award-Winning Thermal Management for 5G Designs

Making Rugged and Reliable Connections

Omron’s systematic approach to a better PCB connector

Looking for an Excellent Resource on RF & Microwave Power Measurements? Read This eBook

More Sponsored Content >>

RSS Current EDABoard.com discussions

  • 'HERIC' pairs of IGBTs essential for Mains inverters
  • How to start a startup in VLSI
  • UART Basic Before Writing Code
  • Single ended measuring ports and balanced antenna
  • Thermal modelling of repetitive power pulse

RSS Current Electro-Tech-Online.com Discussions

  • Fun with AI and swordfish basic
  • Simple LED Analog Clock Idea
  • Microinverters and storeage batteries?
  • PIC KIT 3 not able to program dsPIC
  • Is AI making embedded software developers more productive?
Search Millions of Parts from Thousands of Suppliers.

Search Now!
design fast globle

Footer

EE World Online

EE WORLD ONLINE NETWORK

  • 5G Technology World
  • Analog IC Tips
  • Battery Power Tips
  • Connector Tips
  • DesignFast
  • EDABoard Forums
  • Electro-Tech-Online Forums
  • Engineer's Garage
  • EV Engineering
  • Microcontroller Tips
  • Power Electronic Tips
  • Sensor Tips
  • Test and Measurement Tips

EE WORLD ONLINE

  • Subscribe to our newsletter
  • Teardown Videos
  • Advertise with us
  • Contact us
  • About Us

Copyright © 2025 · WTWH Media LLC and its licensors. All rights reserved.
The material on this site may not be reproduced, distributed, transmitted, cached or otherwise used, except with the prior written permission of WTWH Media.

Privacy Policy