Four months ago , amidst a rebound from authorities regulators and privacy advocates , Google stopped collecting Wi - Fi data with its Street View cable car . But that does n’t mean Google has stopped collect wireless data altogether , and neither have other companionship such as Apple .

or else of send out out machine to sniffle out wireless mesh , Google is now crowdsourcing the operation , with users of its Android phones and locating - cognisant mobile applications doing the reconnaissance mission work for it . In the past few months , Apple has restfully started build a similar database , leveraging its turgid cornerstone of user to lumber basic Wi - Fi datum . There are others : A Boston company , Skyhook Wireless , has been logging wireless entree point for years , as has its rival , Navizon of Miami Beach , Florida .

It ’s a trend that ’s been spur by the acute interest in applications such as FourSquare and Facebook Places . As it becomes progressively important for programme that pass on your phone to know precisely where you are — to be locating - aware in diligence parlance — having a direction of enter out exactly where you are becomes vital . But the society collecting this data point have n’t come under much examination , many users do not infer how the data is being compile or why , and security expert are just now starting to give away some of the ways that this information could be misused .

Article image

The need for wireless

There are three direction that placement - aware political program can do this : They can take GPS ( Global Positioning System ) readings , get a rough guessing of where you are by figuring out what cell pillar you ’re using , or look at the Wi - Fi meshwork in your contiguous vicinity . jail cell tugboat datum is pretty shadowy — there can be miles between prison cell towers in rural areas . GPS is very precise , but GPS devices need a open line of lot to a satellite for work , so it does n’t work well indoors or in dense urban environments . In the city , it ’s gruelling to beat geolocation via Wi - Fi .

The job is that many consumer are spooky about widespread collection of wireless data point . Google pulled the plug on its Street View Wi - Fi data collection after it was forced to admit that its cars were log a destiny more information than most people — Google included — had realized . And now the company is in trouble with European regulators , state attorneys universal and legion test lawyers , who have convey class - activeness lawsuits against Google for logging the astray - open “ payload ” data that can be see on unbarred wireless web . This data could include eastward - ring armour content , passwords , or anything sent without encoding on a wireless internet .

The sensitivity has made it difficult to figure out exactly who is gather up wireless data and what they are log . Microsoft , for example , declined to comment for this story . Earlier this class , Microsoft announced a deal with Navizon , which maintains a database of Wi - Fi electronic internet and cell tower and GPS data compose by user of the Navizon software . Apple did n’t provide any information on its plans , despite repeated postulation , and Research in Motion provided only a abbreviated atomic number 99 - chain armor financial statement , saying , “ RIM use its own location positioning technology that leverages cell tower positioning to complement GPS . ”

Three company that were willing to suffice questions about wireless data collection — Google , Skyhook and Navizon — said that they are not collecting any of the freight data that got Google into bother to begin with this yr . Wireless data appeal experts say it would be extremely difficult to build a fluid twist that did this type of sniffing . It would simply take too much power for a mobile sound to always sniff for all open Wi - Fi traffic and then send that back to Google .

But it is decipherable that Apple , Google , Navizon and Skyhook are collecting MAC ( Media Access Control ) addresses , which can be used to identify wireless routers . They are also collecting data about the web ’s signaling lastingness and then linking the Wi - Fi data with other information , such as cellular phone tug and GPS readings , to get a very clear idea of where their users are locate .

The companies that crowdsource their Wi - Fi data point accumulation are deliberate to get the consent of users , but critics say that users may not understand that they are helping to represent out the wireless routers used by their neighbour when they give consent to run a locating - aware software . Privacy advocates and lawgiver have paid attention to the ways that this localization data point could be misused to harm mobile gadget users . What has n’t received as much tending , however , is how this information collection might affect the possessor of wireless routers — who have had their introductory wireless data logged without consent .

A worrying hack

Because their databases disinvest out in person identifiable info , the data collectors say that they are safe . But as hacker Samy Kamkar discovered earlier this year , these database can be misused . Kamkar , well have a go at it for writing a worm that shortly shut out down MySpace in 2005 , find a way to apply Google ’s database of locating information to on the Q.T. count on out people ’s reference .

Kamkar could n’t figure out everybody ’s address , butin a talk he return at a security group discussion last month , he demo how he could take advantage of a canonical programing misplay in sealed types of home Wi - Fi routers to get them to reveal their MAC address . Armed with that info , he then showed how he could employ a publically accessible Google geolocation database to figure out where the great unwashed survive . If someone visits his Website from a buggy router depart with nonpayment entree restraint configurations , he can image out where they are situate .

Google apparently made its database in public accessible so that internet browser such as Chrome and Firefox can send position information to websites , but Kamkar ’s demonstration shows how this information can be misused , at least in some case .

“ Nobody imagine of that MAC address to be a private man of information , ” he said . “ The fact that you’re able to query Google at any time and figure out where someone is … I intend that ’s a privacy business . ”

Google has been careful to ascertain that users of its Android roving phone love when covering are trying to use this type of fix information , but the people whose MAC reference are being log are not so lucky . Wi - Fi substance abuser have no path of hump when their MAC address is added to Google ’s database , and it ’s not clear how they might opt out .

In an due east - mailed statement , Google say , “ It ’s of import to commemorate that MAC address are a simple computer hardware ID put by the manufacturer . We do not pile up any info about householders , nor can we name an somebody from the MAC address datum . This data is publicly broadcast , and it ’s identical to what any person could watch by walk near the location with a Wi - Fi - enabled twist . At no point does Google publically divulge MAC addresses from its database . ”

But the fact that there seem to be other ways of tease out a user ’s MAC addresses and then misapply this information is a case of some care .

“ I ’m sure most hoi polloi are incognizant that if they move to avoid a sneak and take their memory access point with them , they may be giving their new fix away via Google , ” said Nate Lawson , founder of the security consultancy Root Labs , in an tocopherol - mail interview .

There are other potentially troubling scenario too , according to Lawson . For example , if a laptop was tether to a mobile speech sound , acting as a wireless internet , the mobile sound ’s MAC savoir-faire and locating could be sum up to the database and then used to cut through people without consent , he said .

‘All we’re doing is collecting waves that are in the open.’

Skyhook Wireless mesh more than 400 vehicles that push around the U.S. logging wireless data , much like Google ’s Street View cars used to . Unlike Street View , however , Skyhook has never logged anything more than MAC speech , location persuasiveness , and GPS and cell tower data , according to Skyhook founder and CEO Mike Shan . Skyhook still uses the elevator car , in accession to logging information from devices , because the troupe believes that it get higher - tone data point using this proficiency .

Shan charge out that for wireless web to work , they must pass around the character of data point that his fellowship collects . “ We ’re not doing anything to dishonor your secrecy , ” he said . “ All we ’re doing is collecting wave that are in the exposed spectrum . ”

Skyhook gets possibly five requests per class from the great unwashed who need their wireless router removed from the database , Shan order . They honor these request .

With location - cognizant programs becoming ever more important , the case of wireless data amass by Apple , Skyhook and Google is only go to become more valuable . In fact , until latterly , Apple used Skyhook ’s data , but starting in April 2010 , the company started building its own database , presumably because it meet this as a strategical necessity .

Apple did not react to requests for gossip on its wireless collecting policies , but itspelled out information about its database of cell tower and Wi - Fi access points in a July 12 , 2010 , letterto representatives Edward Markey , a Democrat from Massachusetts , and Joe Barton , a Texas Republican . In the letter , Apple say it stores MAC addresses and signaling strength information and links them to GPS coordinates and cell pillar information . “ Apple does not collect the exploiter - assigned name of the Wi - Fi access point ( recognise as the ‘ SSID , ” or servicing determine identifier ) or information being transmitted over the Wi - Fi electronic connection ( get laid as ‘ payload data ’ ) . ”

The database is “ approachable only by Apple , ” the letter states .

Made untrusting by the Google Wi - Fi dirt , privateness advocates are concerned . Part of the job is that there ’s so piffling public awareness of what ’s kick the bucket on , said John Simpson , an counsel with Consumer Watchdog , a mathematical group that ’s been extremely critical of Google in the past times . “ If I buy a cellular telephone headphone , do I look to be map people ’s Wi - Fi locations for the company that sell me the earpiece ? ” he ask . “ My answer to that is I ’d kind of be get hold of aback . ”

“ Part of the problem with this applied science is that people just do n’t sleep together what ’s move on , ” he contribute .

surely most wireless user do not realize that the location of their router is being logged into databases , and that at least one of these databases — Google ’s — can be accessed by anyone over the Internet . Whether this becomes a bigger job for the data point collectors will depend on whether more hoi polloi like Kamkar can come up up with unexpected elbow room to use — or misuse — this data .

But is that really a big deal ? Nobody is forcing mass to use wireless data , but peradventure the job is that citizenry are setting up wireless networks without in full understand what they ’re sustain into .

Brad Haines , an main advisor who has spent a raft of time consider wireless security , says that it ’s amazing that even though wireless technology has been mainstream for almost a decade , many users are still ignorant of how it works . “ Frankly , if you ’re terrified of this , then why are you using a wireless internet ? ” he call for . “ This is public info because you ’re broadcasting it over an open frequency . ”

SimpleGeo CEO Matt Galligan agree that a lot of the wireless fears are overblown . But Galligan , whose ship’s company sells developer tools for location - aware coating , says that the multitude establish these technology need to develop the users . “ If somebody really wants to find out anything about you , they can go to a mass mailing marketer and regain out about your interests , ” he state . “ in person , I do n’t consider that it should be a groovy concern . ”

[ Robert McMillancovers computer security and general technology break news for IDG News Service . ]