Feeds

Nike + iPod poses threat to personal security

Could aid stalking and burglary

Boost IT visibility and business value

One of this year's must-have gadgets for music-crazy runners is a security nightmare that could help someone track your movements with relative ease, according to researchers at the University of Washington.

The Nike + iPod device transmits data from a gizmo in a runner's shoe to an iPod, where software crunches the numbers to come up with information such as how far someone has run, and how fast, in real time. But the researchers have found that it could well be broadcasting that data to others too.

"A bad person could use this information to compromise your personal privacy and safety. We describe specific example scenarios, like stalking, in our paper," said a statement from researchers Scott Saponas, Jonathan Lester, Carl Hartung and Tadayoshi Kohno of the Department of Computer Science and Engineering at the University of Washington.

The gadget in the runner's shoe contains a radio frequency identification (RFID) chip which sends the data to a receiver connected to the iPod. The information itself is encrypted, but enough information is broadcast to a range of up to 60 feet to pose a security risk.

"When you walk or run the Nike + iPod sensor in your shoe will transmit messages using a wireless radio," said the researchers. "These messages contain a unique identifier that can be detected from 60 feet away. This information is potentially private because it can reveal where you are, even when you'd prefer for a bad person to not know your location."

They found that small computer equipment could be used to read the unique identifier. Some of this was small enough to hide in the user's environment. Placed on that person's front door or in bushes beside the entrance the machine could be used to read and record every time the shoe gadget passed it by.

That could allow a person using the tracking equipment to log when the user was home and when he was out of the house. This could be vital information for burglars.

If a person built a network of these sensors they could map the movements of a person or any number of people through a whole area, and could plot that movement on online mapping services such as Google Maps.

The researchers said that building a surveillance network would be "neither hard nor expensive". "Our prototype shows that a bad person could build a full-featured, WiFi-enabled Nike + iPod surveillance device for under $250," they said.

Copyright © 2006, OUT-LAW.com

OUT-LAW.COM is part of international law firm Pinsent Masons.

The essential guide to IT transformation

More from The Register

next story
Apple takes blade to 13-inch MacBook Pro with Retina display
Shaves price, not screen on mid-2014 model
Top Gun display for your CAR: Heads-up fighter pilot tech
Sadly Navdy kit doesn't include Sidewinder missile to blast traffic
iPhone 6 flip tip slips in Aussie's clip: Apple's 'reversible USB' leaks
New plug not compatible with official Type-C, according to fresh rumors
FEAST YOUR EYES: Samsung's Galaxy Alpha has an 'entirely new appearance'
Wow, it looks like nothing else on the market, for sure
YES YES YES! Apple patents mousy, pressure-sensing iVibrator
Fanbois prepare to experience the great Cupertin-O
Steve Jobs had BETTER BALLS than Atari, says Apple mouse designer
Xerox? Pff, not even in the same league as His Jobsiness
TV transport tech, part 1: From server to sofa at the touch of a button
You won't believe how much goes into today's telly tech
Things are looking up in Flappy Bird sequel
'Swing Copters' offers the same gameplay but in a different direction
NVIDIA claims first 64-bit ARMv8 SoC for Androids
Mile-High 'Denver' Tegra K1 successor said to rival PC performance
prev story

Whitepapers

Endpoint data privacy in the cloud is easier than you think
Innovations in encryption and storage resolve issues of data privacy and key requirements for companies to look for in a solution.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Solving today's distributed Big Data backup challenges
Enable IT efficiency and allow a firm to access and reuse corporate information for competitive advantage, ultimately changing business outcomes.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.