Why data protection is necessary.

From Wired News: What They (Don’t) Know About You. When Richard Smith got his FBI file, he learned a lot of interesting things about himself. He found out that he had died in 1976 and that he may have previously been married to a woman named Mary….

From Wired News: What They (Don’t) Know About You. When Richard Smith got his FBI file, he learned a lot of interesting things about himself. He found out that he had died in 1976 and that he may have previously been married to a woman named Mary. He also discovered that he may be known as “Ricky Smith” or “Rickie Smith” — aliases he shares with a couple of convicts doing hard time in Texas. En fin, Smith — who is the chief technology officer of the Privacy Foundation — found that his FBI file contained more errors than correct data.

EU: Workshop on safer use of new interactive technologies.

From Richard Swetenham’s Quicklinks list: The European Commission is organising a workshop on safer use of new interactive technologies in Luxembourg on 11 and 12 June. […] The objective of the workshop is to produce a report which analyses new …

From Richard Swetenham’s Quicklinks list: The European Commission is organising a workshop on safer use of new interactive technologies in Luxembourg on 11 and 12 June. […] The objective of the workshop is to produce a report which analyses new means of content delivery from the angle of illegal and harmful content/contact. The report should contain requirements and options for future EU action.

Scan of the Month: May 2001.

The Honeynet Project has an easy forensic challenge as May’s Scan of the Month: Identify and recover a deleted rootkit from a compromised Linux system. Nice exercise for starters! (If you are looking for a more sophisticated exercise in incident h…

The Honeynet Project has an easy forensic challenge as May’s Scan of the Month: Identify and recover a deleted rootkit from a compromised Linux system. Nice exercise for starters! (If you are looking for a more sophisticated exercise in incident handling, look at their Forensic Challenge. The solutions have been posted, but you can still just try to solve it, before reading what others have done.)