Feeds

Half a million PCs can access Schengen's 'secure' database

Big network, big danger

Top 5 reasons to deploy VMware with Tegile

The number of computers with access to the Schengen Information System has doubled to 500,000 thanks to the extension of the EU.

SIS is a shared information system used by police and border guards across Europe. Although the UK and Ireland declined to sign up fully, they still use the system.

The figure of 500,000 computers came from documents seen by the Observer. France is proposing to take over the running of the database, which will shortly be upgraded to Schengen II.

The paper quotes Statewatch director Tony Bunyan: "It is well known that the greater the points of access, the greater the number of people who have access and the greater the chance that data will be misplaced, lost or illegally accessed. The idea that mass databases can be totally secure and that privacy can be guaranteed is a fallacy."

Bunyan said Statewatch was aware of a case in Belgium where an official with access to the database offered information to a criminal gang.

Schengen files include names, addresses, distinguishing marks and possible aliases for individuals as well as documents on missing firearms, vehicles and missing documents. ®

Choosing a cloud hosting partner with confidence

More from The Register

next story
MI6 oversight report on Lee Rigby murder: US web giants offer 'safe haven for TERRORISM'
PM urged to 'prioritise issue' after Facebook hindsight find
I'll be back (and forward): Hollywood's time travel tribulations
Quick, call the Time Cops to sort out this paradox!
Megaupload overlord Kim Dotcom: The US HAS RADICALISED ME!
Now my lawyers have bailed 'cos I'm 'OFFICIALLY' BROKE
BT said to have pulled patent-infringing boxes from DSL network
Take your license demand and stick it in your ASSIA
Right to be forgotten should apply to Google.com too: EU
And hey - no need to tell the website you've de-listed. That'll make it easier ...
Assange™ slumps back on Ecuador's sofa after detention appeal binned
Swedish court rules there's 'great risk' WikiLeaker will dodge prosecution
prev story

Whitepapers

Designing and building an open ITOA architecture
Learn about a new IT data taxonomy defined by the four data sources of IT visibility: wire, machine, agent, and synthetic data sets.
5 critical considerations for enterprise cloud backup
Key considerations when evaluating cloud backup solutions to ensure adequate protection security and availability of enterprise data.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Business security measures using SSL
Examines the major types of threats to information security that businesses face today and the techniques for mitigating those threats.