Why Google should be allowed to 'harvest' your Wi-Fi data
The hysteria around the Google 'WiSpy' case is based on an irrational double standard
Computerworld - The Federal Communications Commission cleared Google of wrongdoing in the so-called "WiSpy" case. It was the right decision.
Why? Because Google didn't do anything wrong.
Two years ago, Google said its Street View cars had been "harvesting" information from Wi-Fi networks, including personal home networks, as a matter of course.
In some cases, data gathered included passwords, e-mail messages and browser information.
The data gathering was accidental. Google as an organization didn't mean to collect this information. But even if it had meant to, there would be nothing wrong with doing so. I'll tell you why later.
The FCC did charge Google a pathetic $25,000 fine for taking too long to respond to requests for information during the investigation. But it didn't levy any fine for the actual data harvesting. Inconvenient truth: In a country ruled by law, you can't legally punish people or companies when they haven't in fact broken an actual law.
Still, critics are coming out of the woodwork to denounce both Google and the FCC.
"FCC's Ruling that Google's Wi-Fi Snooping is Legal Sets Horrible Precedent," said PC World's John P. Mello Jr. "Google Breaches Highlight Need for Regulation," said Jason Magder of the Montreal Gazette.
And as they tend to do in such cases, the pandering politicians are trying to get in front of the parade.
For example, U.S. Rep. Edward J. Markey (D-Mass.) this week issued a statement that says "The circumstances surrounding Google's surreptitious siphoning of personal information leave many unanswered questions. I believe Congress should immediately hold a hearing to get to the bottom of this serious situation."
Other countries, including Germany, France and Australia, concluded (unlike the FCC) that Google was guilty of wrongdoing.
Australian Minister for Communications Stephen Conroy called the it the "largest privacy breach in the history across western democracies." The Australian government forced Google to publicly apologize.
France made Google pay a $142,000 fine.
The global consensus is that Google's so-called "snooping" was an invasion of privacy, accidental or otherwise.
Unfortunately, this consensus is based on emotion and knee-jerk populism, rather than facts and reason.
Let's try something different. Let's analyze what actually happened.
Wi-Fi is radio broadcast over the public airwaves
The hyperbolic accusations against Google imply that the company electronically reached into people's homes, breached their Wi-Fi systems, took data and stored it in a database.
That's not what happened.
Google did not harvest data from inside people's homes. Google plucked data from the public airwaves -- data that was voluntarily broadcast into those airwaves by the owners of that data.
In the U.S., the airwaves belong to the public.
Wi-Fi devices that people use for home networking have radios built in. And it's via radio waves that the miracle of wireless networking takes place.
A home Wi-Fi device generates radio waves that are sent out in 360 degrees, like the ripples that radiate across the surface of a pond when you throw a rock into it. These radio waves go right through the walls of the house, and out into the world at high speed.
At some point in their journey, Wi-Fi radio waves breach the private-public barrier. They wash over your privately owned lawn before continuing on over the publicly owned sidewalk and street.
A person walking or driving by is physically penetrated by these waves. (Some studies have suggested that the waves may increase the risk of cancer; they probably don't.) The radio waves enter people's bodies, are conveyed through their bodies, and then continue on their journey on the other side.
Wi-Fi radio waves also trespass onto other peoples' private property. If your laptop can see the name of your neighbor's Wi-Fi, that means he is broadcasting radio waves over your property line, through the walls of your house and into your home.
What's interesting about this broadcasting of electromagnetic radiation is that it's nothing new. People do it all the time with other parts of the electromagnetic spectrum.
Shining light on Wi-Fi 'snooping'
Let's say you took your big-screen TV and put it in your home's front window facing out so that people could see the screen from the sidewalk or the street.
Then let's say you connected your laptop to it, then made a PowerPoint slide so that in large letters, the TV displayed the following phrase: "My password is bond007."
- 15 Non-Certified IT Skills Growing in Demand
- How 19 Tech Titans Target Healthcare
- Twitter Suffering From Growing Pains (and Facebook Comparisons)
- Agile Comes to Data Integration
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- Is Your Big Data Solution Production-Ready? Read "Is Your Big Data Solution Production-Ready?" now, and discover best practices and actionable steps to implementing a production-ready big data solution.
- Pay-as-you-Grow Data Protection: IBM Tivoli's Full-featured Data Protection Suite for Small to Medium Businesses IBM Tivoli Storage Manager Suite for Unified Recovery gives small and medium businesses the opportunity to start out with only the individual solutions...
- Streamline Data Protection with IBM Tivoli Storage Manager Operations Center IBM Tivoli Storage Manager (TSM) has been an industry-standard data protection solution for two decades. But, where most competitors focus exclusively on Backup...
- Simplify and Consolidate Data Protection for Better Business Results Learn about IBM® Tivoli® Storage Manager Operations Center, which provides advanced visualization, built-in analytics and integrated workflow automation features that leapfrog traditional backup...
- Data Protection and Disaster Recovery with iSCSI and VMware Get this on demand webcast now
- Webinar: Building a Big Data solution that's production-ready Big data solutions are no longer just a nice-to-have. All Privacy White Papers | Webcasts