Feeds

Smartmobe Wi-Fi blabs FAR TOO MUCH about us, warn experts

Londoners unknowingly tracked by phones' network chatter

Top 5 reasons to deploy VMware with Tegile

Smartphones leak far more personal information about their users than previously imagined, according to new research.

Security researchers at Sensepost were able to track and profile punters and their devices by observing the phones' attempts to join Wi-Fi networks. Daniel Cuthbert and Glenn Wilkinson created their own distributed data interception framework, dubbed Snoopy, that profiled mobiles, laptops and their users in real-time.

Smartphones tend to keep a record of Wi-Fi base stations their users have previously connected to, and often poll the airwaves to see if a friendly network is within reach. Although this is supposed to make joining wireless networks seamless for punters, it also makes it too easy for the researchers to link home addresses and other information to individually identifiable devices.

"We tested in numerous countries and during one rush-hour period in central London," Cuthbert told El Reg. "We saw over 77,000 devices and as a result, were able to map device IDs to the last 5 APs they connected to. Then using geo-location, we were able to map them out to physical locations."

"Apple devices were the noisiest based upon our observations," he added.

This phase of the project involved only passively listening to Wi-Fi network requests, rather than complete interception, making it legal under UK law. To help the pair process the huge volume of data collected, the researchers used a visualisation tool called Maltego Radium developed by third-party developers Paterva.

Cuthbert and Wilkinson set up Wi-Fi access points that collected probe requests of smartphones and other wireless devices before deploying a few of these around London, and using Maltego Radium to make sense of the data collected in real-time. "We could work out the most common movement patterns using the SSID probes sent out from their mobile phones," Cuthbert explained.

A similar system could be used by the unscrupulous to carry out targeted attacks.

"If we wanted to do illegal activities, we could pretend to be one of those networks, route all traffic through our central server and then perform analysis on the traffic," Cuthbert explained. "This would allow us to dump all credentials, strip down SSL connections, injecting malicious code into all web pages requested, grab social media credentials etc."

The research established that smartphones leak a lot more information than even tech-savvy people would imagine. "Apple, Google and so on do not have any documentation about how noisy their devices are," Cuthbert said.

The security bod advised users to use more common sense and disabling Wi-Fi scanning until they needed to actually access the web. "We will click on anything, and rarely turn bits off when outside, for example," Cuthbert explained. "People are more used to ensuring their laptops are secure."

The two researchers embarked on the six-month surveillance project as governments stepped up efforts to monitor of citizens’ internet-based communications - such as recording websites visited and emails sent - under the guise of countering terrorism.

Several private organisations, such as Palantir, have developed technologies to identify undesirable activities from collected data, or perhaps - according to the more paranoid - to profile all citizens.

Cuthbert and Wilkinson outlined the fruits of their research in a well-received presentation titled Terrorism, tracking, privacy and human interactions at the recent 44con conference in London. A first-hand account of this talk can be found here. A Naked Security podcast featuring an interview with the Sensepost team and banking insecurity expert Ross Anderson can be found here [MP3]. ®

Internet Security Threat Report 2014

More from The Register

next story
'Kim Kardashian snaps naked selfies with a BLACKBERRY'. *Twitterati gasps*
More alleged private, nude celeb pics appear online
Home Depot ignored staff warnings of security fail laundry list
'Just use cash', former security staffer warns friends
Hackers pop Brazil newspaper to root home routers
Step One: try default passwords. Step Two: Repeat Step One until success
UK.gov lobs another fistful of change at SME infosec nightmares
Senior Lib Dem in 'trying to be relevant' shocker. It's only taxpayers' money, after all
Spies would need SUPER POWERS to tap undersea cables
Why mess with armoured 10kV cables when land-based, and legal, snoop tools are easier?
Who.is does the Harlem Shake
Blame it on LOLing XSS terroristas
Snowden, Dotcom, throw bombs into NZ election campaign
Claim of tapped undersea cable refuted by Kiwi PM as Kim claims extradition plot
Freenode IRC users told to change passwords after securo-breach
Miscreants probably got in, you guys know the drill by now
THREE QUARTERS of Android mobes open to web page spy bug
Metasploit module gobbles KitKat SOP slop
prev story

Whitepapers

Secure remote control for conventional and virtual desktops
Balancing user privacy and privileged access, in accordance with compliance frameworks and legislation. Evaluating any potential remote control choice.
Intelligent flash storage arrays
Tegile Intelligent Storage Arrays with IntelliFlash helps IT boost storage utilization and effciency while delivering unmatched storage savings and performance.
WIN a very cool portable ZX Spectrum
Win a one-off portable Spectrum built by legendary hardware hacker Ben Heck
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Beginner's guide to SSL certificates
De-mystify the technology involved and give you the information you need to make the best decision when considering your online security options.