Google stops sniffing Wi-Fi data after privacy gaffe
IDG News Service - Google has decided to stop its Street View cars from sniffing wireless networking data after an embarrassing privacy gaffe.
The company revealed Friday that Street View vehicles had been sniffing the content of users' Internet communications on open wireless networks, despite the company's earlier statements to the contrary.
Google has since discovered that it has been mistakenly collecting the content of communications from non-password-protected Wi-Fi networks, the company said in a statement posted to its blog Friday afternoon.
Google Street View cars are best known for driving around cities and logging snapshots of the area, which are then posted online and integrated with Google Maps. Google cars had been sniffing some network data -- SSID (Service Set Identifier) information and MAC (Media Access Control) addresses -- that was then used to help the company get a better fix on the locations of things in order to improve its Web products. Google had said that it wasn't sniffing other data sent over the networks, but it turned out that this wasn't true.
Google says it was all a mistake.
"In 2006 an engineer working on an experimental Wi-Fi project wrote a piece of code that sampled all categories of publicly broadcast Wi-Fi data," Google said, "A year later, when our mobile team started a project to collect basic Wi-Fi network data like SSID information and MAC addresses using Google's Street View cars, they included that code in their software -- although the project leaders did not want, and had no intention of using, payload data."
Google discovered its error after auditing its Street View Wi-Fi data at the request of the Hamburg, Germany, data protection authority.
The company will now hire a third party to audit the software that Street View used and ensure that all potentially sensitive data was deleted.
"In addition, given the concerns raised, we have decided that it's best to stop our Street View cars collecting Wi-Fi network data entirely," Google added.
Because the Street View cars are usually in motion, they probably would have recorded only snippets of information from open networks, but they could have picked up sensitive data from unencrypted Web sites, including Google's own Gmail service, which only recently started requiring encrypted (HTTPS) Web connections.
"Next week we will start offering an encrypted version of Google Search," Google said.
Google's sniffing is only a problem for people who used open, unencrypted networks. Google wouldn't have been able to log any comprehensible data from networks that used encryption technologies such as WEP (Wired Equivalent Privacy) or WPA (Wi-Fi Protected Access).
"The engineering team at Google works hard to earn your trust," Google said. "And we are acutely aware that we failed badly here."
- The Business Value of Continuous Delivery Download this whitepaper to learn more about the business value of Continuous Delivery and see why it could be a game changer for...
- Ten Factors Shaping the Future of Application Delivery Download this research report conducted by Enterprise Management Associates (EMA) to learn how those that are seeking to accelerate application delivery are leveraging...
- Software Asset Management: Ensuring Today's Assets Today's trends like BYOD and SaaS are new and exciting in terms of how they will help make our jobs more productive but...
- Trends Shaping Software Management: 2014 Most IT executives recognize the relationship between mobile computing and worker productivity, and have long issued notebook computers and other mobile devices to...
- Data Protection and Disaster Recovery with iSCSI and VMware Get this on demand webcast now
- On-demand webinar - 7 Keys to Service Catalog Implementation Success Watch this webinar to learn 7 crucial keys to make your service catalog a success! All Privacy White Papers | Webcasts
Our new bimonthly Internet of Things newsletter helps you keep pace with the rapidly evolving technologies, trends and developments related to the IoT. Subscribe now and stay up to date!