Feeds

Google's Wi-Fi snoop nabbed passwords and emails

French inspection

Top 5 reasons to deploy VMware with Tegile

The Wi-Fi traffic collected by Google's world-roving Street View cars included passwords and email, according to a report citing a preliminary study from the French data protection authority.

IDG reports that the French National Commission on Computing and Liberty (CNIL) has examined part of the data, after it was turned over by Google. "It's still too early to say what will happen as a result of this investigation," CNIL told IDG.

"However, we can already state that [...] Google did indeed record e-mail access passwords [and] extracts of the content of email messages."

On May 14, contradicting previous assertions, Google said that its Street View cars had spent three years collecting payload data from unsecured W-Fi network across the globe. Previously, the company had said that in scanning open Wi-Fi networks, the cars were collecting only the SSIDs that identified the networks and MAC addresses that identified particular network hardware, including routers. Google uses this data in products that rely on location data, such as Google Maps.

In admitting it intercepted payloads as well, Google said that it only collected "fragments" of data, adding that its cars "are on the move" and that its in-car Wi-Fi equipment automatically changes channels roughly five times a second. But according to the CNIL – an independent authority that oversees the country's data laws – at least some (very) personal data was captured intact.

Google captured data in thirty different countries. Some countries asked the company to delete the data – and in some cases, it complied – while others have requested that the data be kept for the time being so that the situation could be investigated. On June 4, Google shared the data its cars had collected in France with the CNIL. The CNIL told IDG that it was the first country to receive data from Google. Spain and Germany have also requested the data captured within their borders. ®

Internet Security Threat Report 2014

More from The Register

next story
'Kim Kardashian snaps naked selfies with a BLACKBERRY'. *Twitterati gasps*
More alleged private, nude celeb pics appear online
Home Depot ignored staff warnings of security fail laundry list
'Just use cash', former security staffer warns friends
Hackers pop Brazil newspaper to root home routers
Step One: try default passwords. Step Two: Repeat Step One until success
UK.gov lobs another fistful of change at SME infosec nightmares
Senior Lib Dem in 'trying to be relevant' shocker. It's only taxpayers' money, after all
Who.is does the Harlem Shake
Blame it on LOLing XSS terroristas
Snowden, Dotcom, throw bombs into NZ election campaign
Claim of tapped undersea cable refuted by Kiwi PM as Kim claims extradition plot
Freenode IRC users told to change passwords after securo-breach
Miscreants probably got in, you guys know the drill by now
THREE QUARTERS of Android mobes open to web page spy bug
Metasploit module gobbles KitKat SOP slop
BitTorrent's peer-to-peer chat app Bleep goes live as public alpha
A good day for privacy as invisble.im also reveals its approach to untraceable chats
prev story

Whitepapers

Secure remote control for conventional and virtual desktops
Balancing user privacy and privileged access, in accordance with compliance frameworks and legislation. Evaluating any potential remote control choice.
Intelligent flash storage arrays
Tegile Intelligent Storage Arrays with IntelliFlash helps IT boost storage utilization and effciency while delivering unmatched storage savings and performance.
WIN a very cool portable ZX Spectrum
Win a one-off portable Spectrum built by legendary hardware hacker Ben Heck
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Beginner's guide to SSL certificates
De-mystify the technology involved and give you the information you need to make the best decision when considering your online security options.