Feeds

Snowden: Canadian spooks used free airport WiFi to track travellers

Report says sniffing was probably illegal as local Spookhaus defends actions

The Essential Guide to IT Transformation

Another day, another item of news about unwarranted state surveillance from the desk of one E. Snowden, late of Moscow.

This time the allegation is that Communications Security Establishment Canada (CSEC) slurped information about the owners of wireless devices from the free WiFi service in one of the nation's airports. With that data in hand, the agency is said to have then tracked travellers for “days” after they left the airport.

The Canadian Broadcasting Corporation (CBC) has the story and says it comes from “A top secret document retrieved by U.S. whistleblower Edward Snowden and obtained by CBC News”.

Snowden's documents apparently say anyone that passed through an airport could be tracked, although it is not clear if login to the free WiFi service was required. Logging in wouldn't necessarily be required to track someone: a device set to detect the presence of WiFi networks is likely to reveal its MAC address. If spooks sniffed WiFi routers for MAC addresses of connecting devices, then looked for that MAC address popping up elsewhere, they could easily plot a device's movement.

(Yes, we know that MAC addresses an oddity because they are supposed to be unique but can also be changed to a value used in another device. Changing MAC address is therefore a fine way to make it harder to identify a device, but is not the kind of thing most people who pass through airports would know about.)

The usual oohing and aahing that follows a Snowden release is now rippling across the Web. CESC is pointing out that it is allowed to collect communications metadata (which explains now sniffing a MAC address in an airport could translate into wider tracking). Canadians are expressing shock that their own government spied on them.

Making things more interesting is that the head of CSEC recently said the agency does not surveil Canadians. If CSEC was able to sort citizens from visitors at an airport just by sniffing WiFi-enabled devices, that could be the most damaging revelation of all! ®

Build a business case: developing custom apps

More from The Register

next story
14 antivirus apps found to have security problems
Vendors just don't care, says researcher, after finding basic boo-boos in security software
'Things' on the Internet-of-things have 25 vulnerabilities apiece
Leaking sprinklers, overheated thermostats and picked locks all online
iWallet: No BONKING PLEASE, we're Apple
BLE-ding iPhones, not NFC bonkers, will drive trend - marketeers
Only '3% of web servers in top corps' fully fixed after Heartbleed snafu
Just slapping a patched OpenSSL on a machine ain't going to cut it, we're told
How long is too long to wait for a security fix?
Synology finally patches OpenSSL bugs in Trevor's NAS
Secure microkernel that uses maths to be 'bug free' goes open source
Hacker-repelling, drone-protecting code will soon be yours to tweak as you see fit
Israel's Iron Dome missile tech stolen by Chinese hackers
Corporate raiders Comment Crew fingered for attacks
Tor attack nodes RIPPED MASKS off users for 6 MONTHS
Traffic confirmation attack bared users' privates - but to whom?
Roll out the welcome mat to hackers and crackers
Security chap pens guide to bug bounty programs that won't fail like Yahoo!'s
prev story

Whitepapers

Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Backing up Big Data
Solving backup challenges and “protect everything from everywhere,” as we move into the era of big data management and the adoption of BYOD.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Why and how to choose the right cloud vendor
The benefits of cloud-based storage in your processes. Eliminate onsite, disk-based backup and archiving in favor of cloud-based data protection.