Feeds

London Oyster card - a tool for spouse stalkers?

Marriages down the tubes...

Beginner's guide to SSL certificates

Transport for London's (TfL) 'ID card lite', the Oyster travelcard, is already being illicitly used to snoop on people's movements, according to the Independent on Sunday. The problem stems from the fact that TfL records the journeys made using the card, and gives owners easy internet access to their personal audit trail. But it's perhaps too easy.

TfL itself logs individual journeys in order, it claims, to plan its network better. Yes, one can see how, with slightly higher programming skills than TfL has apparently got, one could produce data of similar utility without logging point to point journeys of individual cards, but TfL claims that it does not associate the journey data with named individuals. TfL does however provide the police with journey data for named individuals on request, and the ability to track named individual's movements is obviously of considerable use to the security services. Oyster cards have already figured in a number of serious crime investigations.

Giving individuals access to their own journey data seems of doubtful utility, considering most of them will have a fair idea of where they've been, and you can probably view this feature as a marketing tool intended (as will be the case with respect to allowing individuals access to their National Identity Register entry) to give the user the erroneous impression that they are the ones controlling their own data. The IoS claims that Oyster journey data can be extracted at a ticket machine using the card, or online by keying the serial number of the card. As far as The Register is aware, however, internet access is slightly more secure than this, requiring a username and password or the serial number, and mother's maiden name or similar, from the application form. These are not, however, insuperable hurdles for the suspicious spouse or close friend, and access to the individual's email account would probably be enough for a snooper to change passwords and gain access to the account itself.

It is possible to obtain an anonymous pay as you go Oyster card, but most users will either have filled in a form or registered online, so TfL has their name, address, and some personal details.

Currently, Oyster's extremely basic security only seems likely to cause trouble in fairly limited circumstances, but if TfL's plans to make it an 'e-cash' card for retail payments as well, Oyster will become a more attractive target for criminals (as far as we can gather, as criminals seem not to pay their fares anyway, stealing season tickets is pointless). An RFID card, used by the majority of commuting Londoners for travelling and shopping, could well be worth a spot a high-tech snooping, cloning and skimming, well ahead of the national ID card achieving similar status. So how good will the security on Oyster V2 be? We're not sure we'd put money on it... ®

*Apropos of nothing, seeing we're doing TfL, were The Register inclined to revolutionary action we'd be finding and publishing the home address of the Zombie Announcer Woman who (we've timed it) can fire out deafening "Ladies and gentelemen..." audionags at 20 second intervals. If TfL is not at the very least forced to turn down the volume for health and safety reasons, we feel sure she'll be first up against the wall when the revolution comes.

Security for virtualized datacentres

More from The Register

next story
Phones 4u slips into administration after EE cuts ties with Brit mobe retailer
More than 5,500 jobs could be axed if rescue mission fails
Israeli spies rebel over mass-snooping on innocent Palestinians
'Disciplinary treatment will be sharp and clear' vow spy-chiefs
Apple CEO Tim Cook: TV is TERRIBLE and stuck in the 1970s
The iKing thinks telly is far too fiddly and ugly – basically, iTunes
Huawei ditches new Windows Phone mobe plans, blames poor sales
Giganto mobe firm slams door shut on Microsoft. OH DEAR
Phones 4u website DIES as wounded mobe retailer struggles to stay above water
Founder blames 'ruthless network partners' for implosion
Found inside ISIS terror chap's laptop: CELINE DION tunes
REPORT: Stash of terrorist material found in Syria Dell box
Show us your Five-Eyes SECRETS says Privacy International
Refusal to disclose GCHQ canteen menus and prices triggers Euro Human Rights Court action
prev story

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
Saudi Petroleum chooses Tegile storage solution
A storage solution that addresses company growth and performance for business-critical applications of caseware archive and search along with other key operational systems.
Security and trust: The backbone of doing business over the internet
Explores the current state of website security and the contributions Symantec is making to help organizations protect critical data and build trust with customers.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.