Feeds

Oz states count cars using Bluetooth

Traffic studies bring out tinfoil hats

5 things you didn’t know about cloud backup

The government of Australia's Capital Territory (ACT) has issued a statement about the use of Bluetooth-sniffing technology for traffic studies.

The issue arose as the result of grassroots activism from Canberra-centric news service The-RiotACT, which has its take on events here.

RiotACT considers the Bluetooth collection to be analogous to Google's StreetView data slurp in which the Chocolate Factory decided that open WiFi access points were fair game for data sniffs. The organisation goes so far as to accuse the ACT government's Territory and Municipal Services – the agency in charge of roads and therefore running the traffic studies – of breaching Australia's Telecommunications Interception Act.

TAMS has responded that its activities are nothing nefarious and that it doesn't collect “personally identifiable” information. In this brief statement, the agency says Bluetooth provides a useful gauge of travel times and route decisions. The agency says the technology is in use “around Australia”, although El Reg was only able to document this for NSW.

While RiotACT's reaction seems overblown, The Register wonders whether recent research into how easily “anonymous” movement data can be tied to an individual would have privacy implications in this setting.

Bluetooth traffic technology doesn't attempt to capture communication data from passing devices, but merely records a “signature” (most probably the device ID, MAC address or name offered over the link) as a car enters and leaves the footprint of the measuring device. ®

The essential guide to IT transformation

More from The Register

next story
One HUNDRED FAMOUS LADIES exposed NUDE online
Celebrity women victimised as Apple iCloud accounts reportedly popped
Rubbish WPS config sees WiFi router keys popped in seconds
Another day, another way in to your home router
Goog says patch⁵⁰ your Chrome
64-bit browser loads cat vids FIFTEEN PERCENT faster!
NZ Justice Minister scalped as hacker leaks emails
Grab your popcorn: Subterfuge and slur disrupts election run up
HP: NORKS' cyber spying efforts actually a credible cyberthreat
'Sophisticated' spies, DIY tech and a TROLL ARMY – report
NIST to sysadmins: clean up your SSH mess
Too many keys, too badly managed
Scratched PC-dispatch patch patched, hatched in batch rematch
Windows security update fixed after triggering blue screens (and screams) of death
Attack flogged through shiny-clicky social media buttons
66,000 users popped by malicious Flash fudging add-on
New Snowden leak: How NSA shared 850-billion-plus metadata records
'Federated search' spaffed info all over Five Eyes chums
prev story

Whitepapers

Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Endpoint data privacy in the cloud is easier than you think
Innovations in encryption and storage resolve issues of data privacy and key requirements for companies to look for in a solution.
Why cloud backup?
Combining the latest advancements in disk-based backup with secure, integrated, cloud technologies offer organizations fast and assured recovery of their critical enterprise data.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?