Privacy group calls Google Latitude a 'danger' to security
Upgrade to Google Maps lets friends, family, employers know one's every move
Computerworld - A privacy group is calling Google Inc.'s new mapping application an "unnecessary danger" to users' security and privacy.
The criticism comes just a day after Google Inc. unveiled Google Latitude, an upgrade to Google Maps that allows people to track the exact location of friends or family through their mobile devices. Google Latitude not only shows the location of friends, but it can also be used to contact them via SMS, Google Talk or Gmail.
Today, Privacy International is raising a red flag about the technology.
"Many people will see Latitude as a cool product, but the reality is that Google has yet again failed to deliver strong privacy and security," said Simon Davies, director of London-based Privacy International, in a statement. "The company has a long way to go before it can capture the trust of phone users. As it stands right now, Latitude could be a gift to stalkers, prying employers, jealous partners and obsessive friends. The dangers to a user's privacy and security are as limitless as the imagination of those who would abuse this technology."
Google, responding to Computerworld questions in an e-mail, said their engineers and designers took privacy and security concerns into account when they created Google Latitude.
"Concerns have been raised about the possibility of the product being installed onto someone's mobile phone covertly," said a Google spokeswoman. "While many of the scenarios that have been described are unlikely, we take this issue seriously and always listen to feedback from our users. We already have a safety feature working on certain mobile devices that actively alerts users that Latitude is running, and we are in the process of extending this notification to other mobile platforms supporting Google Latitude, which will be ready within a week."
Privacy International, in an online posting, expressed concern that Google Latitude lacks sufficient safeguards to keep someone from surreptitiously opting into the tracking feature on someone else's device. The problem arises when someone can gain physical access to another person's cell phone.
The privacy group added that the only way to reduce this threat is to have a regular message pop up on the phone, reminding the user that Latitude is in use.
Google's spokeswoman noted that the message that pops on BlackBerry devices is engaged when Latitude has been installed but not been used for a while.
That doesn't appear to be an adequate safeguard for the privacy group, which said in a written statement, "If the tracked party is unaware that her phone has been enabled, the Latitude settings could indefinitely be set to continuous tracking, thus ensuring that the alert message is never sent from Google."
In an interview on Tuesday, Dan Olds, an analyst at Gabriel Consulting Group Inc., said the Google tool is interesting even if there are obvious potential privacy issues when people know your every move.
Olds added that people need to think through who can access such personal information. "Users need to understand how to do it and why they probably don't want to constantly broadcast their locations to the world at large," he said.
- Review: Google Latitude puts phones in their place
- Dan Tynan: Is Google taking too much "Latitude"
- Google Latitude lets you track friends, employees
- FAQ: How Google Latitude locates you
- Privacy group calls Google Latitude a 'danger' to security
- Eric Lundquist: Google Latitude, the corporate spin
- Seth Weintraub: Google Latitude -- Ten uses
- Steven J. Vaughan-Nichols: You can't hide from location-based apps
Read more about Privacy in Computerworld's Privacy Topic Center.
- Big Data, Big Mess: Sound Risk Intelligence Through Complete Context This paper examines the insecurity of the small businesses in the supply chain and offers tips to close those backdoors into the enterprise.
- Using Cyber Insurance and Cybercrime Data to Limit Your Business Risk This paper examines the challenges of understanding cyber risks, the importance of having the right cyber risk intelligence, and how to use this...
- 5 Tips to Secure Small Business Backdoors in the Enterprise Supply Chain This paper examines the insecurity of the small businesses in the supply chain and offers tips to close those backdoors into the enterprise.
- Confront consumerization with convergence Virtualization expert Elias Khnaser spotlights the security, compliance, and governance issues that arise when enterprise users "consumerize" with shadow IT and public cloud...
- Data Protection and Disaster Recovery with iSCSI and VMware Get this on demand webcast now
- NSS Labs & Cisco Present: Evaluating Leading Breach Detection Systems Today's constantly evolving advanced malware and APTs can evade point-in-time defenses to penetrate networks. Security professionals must evolve their strategy in lockstep to... All Privacy White Papers | Webcasts
Our new bimonthly Internet of Things newsletter helps you keep pace with the rapidly evolving technologies, trends and developments related to the IoT. Subscribe now and stay up to date!