NNSquad - Network Neutrality Squad

NNSquad Home Page

NNSquad Mailing List Information

 


[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[ NNSquad ] "Highly Illogical": The Hysteria Over Google's Wi-Fi Scanning


        "Highly Illogical": The Hysteria Over Google's Wi-Fi Scanning

                 http://lauren.vortex.com/archive/000718.html


Greetings.  I don't find many opportunities (nor do I have much
inclination) to channel characters from "Star Trek" -- but I can only
imagine Mr. Spock's likely bemusement related to the shrill and
illogical brouhaha over Google's Street View Wi-Fi scanning.

To quote the ungrammatical Mr. Bumble, a reprehensible yet
occasionally insightful character in Charles Dicken's 
"Oliver Twist" -- sometimes "the law is a ass--a idiot."

Such is the case -- as far as I'm concerned -- when it comes to laws
and controversies regarding the scanning of open Wi-Fi networks.

Let's start with a basic truth -- an open Wi-Fi network is, duh ...
open!

While the number of open Wi-Fi networks has been falling relative to
nets secured at least with weak WEP crypto, or much better with WPA
(or better yet, WPA2), there are still vast numbers of open Wi-Fi
networks that pop up without prompting all over the world.

Raise your hand if you've never seen an open Wi-Fi net when attempting
to connect your laptop to the Internet.  Very few hands raised out
there, I'll wager.

Now raise your hand if you've ever opportunistically connected to an
open Wi-Fi net, without permission.  Lots of hands raised now.

And have you ever driven around your neighborhood with "wardriving
software" ( http://bit.ly/9eksus [Wardrive.net] ) enabled on your
laptop or phone, listening to the "pings" as Wi-Fi sites registered at
nearly every home or business you passed -- and perhaps you saved the
data and created Wi-Fi maps to use and share? ( http://bit.ly/bbfZsI
[GPS Visualizer] )

This is not just a hobbyist activity.  Companies like Skyhook Wireless
have built entire businesses around geolocation systems that involve
the scanning of Wi-Fi signals.

And why not?  Wi-Fi networks are essentially as obvious to outside
observers, walking down the sidewalk or driving up the street, as are
porch lights, or the flickering TV screens visible through curtains
after dark.

Even when Wi-Fi access points are configured with their "SSID" beacons
disabled -- which tends to cause various user complications -- Wi-Fi
routers and hotspots are about as secret as a full moon on a cloudless
night, and pretty much just as impossible to actually hide.

You can still pass laws to ban Wi-Fi scanning of course -- just as the
order can be given to ignore the fact that the emperor actually is
parading down the central square stark naked.  But reality generally
triumphs over nonsensical laws in the long run.

Laws related to Wi-Fi scanning don't exist in a vacuum, and seem to
often be related to laws that attempt to ban photography of imagery
that can be easily seen by observers from public places.  Such illogic
has been used to attack Google's Street View photos, in much the same
way that Google is now being chastised for Wi-Fi scanning associated
with Street View vehicles.

Amusingly -- in a sick kind of way -- the fact is that the same
government entities who tend to push forth a dramatic show of disdain
for Street View -- and now Google's Wi-Fi scanning -- are often the
same ones rapidly deploying massive real-time CCTV (closed circuit TV)
surveillance systems, with vast amounts of real-time imagery data
pouring into government servers to be used in often unspecified ways
for indefinite periods of time.  Some of these entities have also
conducted mass and sometimes illegal surveillance of their telephone
and Internet networks.

Their complaining about Street View and Wi-Fi therefore seems highly
disingenuous -- but obviously politically expedient.

Google did made mistakes -- they've publicly taken responsibility for
these -- related to the Wi-Fi Street View controversy.  It probably
would have been wise to publicly announce their Wi-Fi scanning
capabilities before beginning the project, so that various
governmental entities could register any concerns based on their
associated national laws -- however ridiculous those laws might be in
this sphere, given the ease with which anyone with simple tools can
scan Wi-Fi anywhere.

But since Google's "adversaries" now "pile on" at every opportunity,
proactive discussion of the Wi-Fi aspects of Street View might have
avoided a fair amount of the current controversy.

The ostensibly more dramatic aspect of Google's Wi-Fi situation
relates to their revelation that their Wi-Fi scanning systems were
unintentionally collecting highly fragmentary "payload" data from open
Wi-Fi nets, in addition to locationally-related (e.g., SSID) data.

Google critics have been screaming -- how could this possibly happen
by accident?  "What kind of nightmarish, nefarious plot is 
in play?" -- they demand to know.

First, contrary to some of the accusatory claims being made, it's
extremely unlikely that any banking or similarly sensitive data was
exposed even in fragmentary form, for the simple reason that virtually
all sites dealing with such data use SSL/TLS security systems (https:)
that would provide typical encryption protections regardless of the
open, unencrypted nature of (extremely unwisely configured) underlying
Wi-Fi systems.

And while clearly the collection of Wi-Fi payload data by Google was a
significant oversight, it's the kind of mistake that is actually very
easy to make.

It's completely ordinary for network diagnostic tools and related
software to include mechanisms for the viewing and collection not only
of "envelope" data but also of test data "payload" traffic flows.
Virtually every Linux user has a tool for this purpose that can
provide these functions -- the ubiquitous "tcpdump" command.

In Google's case, it seems highly likely that a procedural 
breakdown -- not criminal intent of any kind -- led to the payload data 
capture portion of the Wi-Fi scanning tools not being appropriately 
disabled.  Such procedural problems are naturally to be avoided, but for 
critics to try balloon such an issue into fear mongering and conspiracy
theories just doesn't make sense.

And given the very high capacity of inexpensive disk drives today,
it's simple to see how even relatively large amounts of data -- like
accidentally collected payload data -- could collect unnoticed in an
obscure directory somewhere deep in a file system over long periods of
time.

Like I said, I'm not a lawyer.  Other heads will thrash out the legal
aspects of this situation.

In my own view, the entire saga has been blown out of proportion, largely
by forces primarily interested in unfairly and inappropriately scoring
points against Google, rather than treating the situation -- both as
relates to Google's Wi-Fi scanning and more broadly to Street View 
itself -- in a logical and evenhanded manner.

But then, that's pretty much what we've come to expect from you humans.

--Lauren--
Lauren Weinstein
lauren@vortex.com
Tel: +1 (818) 225-2800
http://www.pfir.org/lauren
Co-Founder, PFIR
   - People For Internet Responsibility - http://www.pfir.org
Co-Founder, NNSquad
   - Network Neutrality Squad - http://www.nnsquad.org
Founder, GCTIP - Global Coalition 
   for Transparent Internet Performance - http://www.gctip.org
Founder, PRIVACY Forum - http://www.vortex.com
Member, ACM Committee on Computers and Public Policy
Lauren's Blog: http://lauren.vortex.com
Twitter: https://twitter.com/laurenweinstein