Feeds

US comms watchdog probes Google Street View Wi-Fi slurp

'Public disclosure' opened door for investigation

The essential guide to IT transformation

Google’s Street View service is being probed by the US Federal Communication Commission to determine whether the company’s “worrisome” Wi-Fi data slurp broke any laws.

The ad broker said in October that it was “mortified” that Google’s Street View cars had inadvertently collected payload data including emails and passwords from unencrypted Wi-Fi networks.

"In light of their public disclosure, we can now confirm that the Enforcement Bureau is looking into whether these actions violate the Communications Act," said FCC enforcement bureau boss Michele Ellison yesterday.

Google repeated its apology about the data slurp on Wednesday and said it was working with watchdogs on the matter.

"We want to delete the data as soon as possible and will continue to work with the authorities to determine the best way forward, as well as to answer their further questions and concerns," a Google spokesman told Reuters.

In June the FCC said that Google’s interception of data was “worrisome”, after the internet giant admitted its Street View cars in more than 30 countries secretly sniffed chunks of web traffic as it travelled over unencrypted Wi-Fi networks.

Google, which had previously assured users the network payloads weren't collected, later admitted that the sniffing had been "accidental".

“Whether intentional or not, collecting information sent over Wi-Fi networks clearly infringes on consumer privacy,” said FCC official Joe Gurin earlier this year.

At the start of November, the UK Information Commissioner’s Office changed its mind about Google's Street View and decided that it was after all in breach of the Data Protection Act.

It had initially cleared Google’s collection of WiFi data by insisting it contained no personal information. The ICO – attacked by MPs for being “lily-livered” about the data slurp – later re-opened its probe, following tough action by other privacy bodies around the world. ®

5 things you didn’t know about cloud backup

More from The Register

next story
Munich considers dumping Linux for ... GULP ... Windows!
Give a penguinista a hug, the Outlook's not good for open source's poster child
UK fuzz want PINCODES on ALL mobile phones
Met Police calls for mandatory passwords on all new mobes
e-Borders fiasco: Brits stung for £224m after US IT giant sues UK govt
Defeat to Raytheon branded 'catastrophic result'
EU justice chief blasts Google on 'right to be forgotten'
Don't pretend it's a freedom of speech issue – interim commish
Yes, but what are your plans if a DRAGON attacks?
Local UK gov outs most ridiculous FoI requests...
Detroit losing MILLIONS because it buys CHEAP BATTERIES – report
Man at hardware store was right: name brands DO last longer
Snowden on NSA's MonsterMind TERROR: It may trigger cyberwar
Plus: Syria's internet going down? That was a US cock-up
UK government accused of hiding TRUTH about Universal Credit fiasco
'Reset rating keeps secrets on one-dole-to-rule-them-all plan', say MPs
Caught red-handed: UK cops, PCSOs, specials behaving badly… on social media
No Mr Fuzz, don't ask a crime victim to be your pal on Facebook
prev story

Whitepapers

5 things you didn’t know about cloud backup
IT departments are embracing cloud backup, but there’s a lot you need to know before choosing a service provider. Learn all the critical things you need to know.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.
Rethinking backup and recovery in the modern data center
Combining intelligence, operational analytics, and automation to enable efficient, data-driven IT organizations using the HP ABR approach.
Next gen security for virtualised datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.