State AGs question Google about Street View Wi-Fi snooping
IDG News Service - Law enforcement officials from 38 states have sent a letter to Google, asking the company whether it tested its Street View mapping software before discovering it was snooping on Wi-Fi networks as the Street View cars drove through neighborhoods.
The letter, organized by Connecticut Attorney General Richard Blumenthal, also asks Google if the company's Street View cars recorded any Wi-Fi data for more than 0.2 seconds. The letter, sent to a Google attorney Wednesday, asks the company how it was unaware that the code in the software was able to collect data from unencrypted Wi-Fi networks.
Google revealed in May that its Street View cars were collecting data from Wi-Fi networks. The company said the collection of Wi-Fi network's payload data was a mistake. Since then, U.S. residents have filed several class-action lawsuits against the company, with the lawsuits alleging that the company violated federal wiretap laws.
Blumenthal may consider legal action against Google, he said in a press release.
"Google's responses continue to generate more questions than they answer," Blumenthal said in a statement. "Consumers have a right to expect that data transmitted over personal and business wireless networks remains confidential. Our multistate investigation will determine whether laws were broken and whether legislation is necessary to prevent future privacy breaches."
The letter asks Google to list the states where Wi-Fi snooping occurred. It also asks the company to name the employee who created the code allowing for interception of Wi-Fi network data, and it asks why Google has not been able to determine the places where the Wi-Fi data was collected.
Law enforcement officials from Texas, New York, Washington and North Carolina were among those joining Blumenthal's investigation.
"Our potent partnership -- 38 states and counting -- will vigorously and aggressively investigate Google's Street View cars' unauthorized collection of data transmitted over wireless networks," Blumenthal said. "Google must come completely clean, fully explaining how this invasion of personal privacy happened and why."
Google is working with law enforcement authorities to answer their questions and concerns, a company spokeswoman said. "As we've said before, it was a mistake for us to include code in our software that collected payload data, but we believe we did nothing illegal," she said.
Grant Gross covers technology and telecom policy in the U.S. government for The IDG News Service. Follow Grant on Twitter at GrantusG. Grant's e-mail address is firstname.lastname@example.org.
This pilot fish is a contractor at a military base, working on some very cool fire-control systems for tanks. But when he spots something obviously wrong during a live-fire test, he can't get the firing-range commander's attention.
- IT Certification Study Tips
- Register for this Computerworld Insider Study Tip guide and gain access to hundreds of premium content articles, cheat sheets, product reviews and more.
- Reduce federal infrastructure risk with compliance management and situational awareness
- IBM continuous monitoring and management solutions deliver real-time situational awareness to help federal agencies understand vulnerabilities, and protect the infrastructure.
- How Four Citrix Customers Solved the Enterprise Mobility Challenge
- Managing mobile devices, data and all types of apps-Windows, datacenter, web and native mobile- through a single solution.
- 8 Steps to Fill the Mobile Enterprise Application Gap
- Traveling executives and Millennials alike expect to communicate, collaborate and access their important work applications and data from anywhere on whatever device they...
- Seattle Children's Accelerates Citrix Login Times by 500% with Cross-Tier Insight
- Seattle Children's is a leading research hospital with a large and growing Citrix XenDesktop deployment. With ExtraHop, the IT team at Seattle Children's...
- McKesson Makes Application Hosting for Hospitals Faster, More Efficient
- With ExtraHop, McKesson identified the root cause of slow Citrix XenApp application launches and adopted a more intelligent, proactive IT operations model that... All Government IT White Papers
- Keep Servers Up and Running and Attackers in the Dark An SSL/TLS handshake requires at least 10 times more processing power on a server than on the client. SSL renegotiation attacks can readily...
- On Demand: Mastering the Art of Mobile Content Management Mobile device usage in the enterprise has skyrocketed, and it continues to escalate. IT must answer to users who demand access to their...
- DevOps with PureApplication System: Reduce cost and speed delivery with an integrated IBM Cloud solution Join this webcast to hear what ING Netherlands has been able to achieve while deploying DevOps tools from IBM Rational. An ING executive...
- NSS Labs & Cisco Present: Evaluating Leading Breach Detection Systems Today's constantly evolving advanced malware and APTs can evade point-in-time defenses to penetrate networks. Security professionals must evolve their strategy in lockstep to...
- Will the Real Endpoint Threat Detection and Response Please Stand Up? This webinar explores new technologies & process for protecting endpoints from advanced attackers as well as the innovations that are pushing the envelope...
- All Government IT Webcasts