Feeds

Snowden: Canadian spooks used free airport WiFi to track travellers

Report says sniffing was probably illegal as local Spookhaus defends actions

Boost IT visibility and business value

Another day, another item of news about unwarranted state surveillance from the desk of one E. Snowden, late of Moscow.

This time the allegation is that Communications Security Establishment Canada (CSEC) slurped information about the owners of wireless devices from the free WiFi service in one of the nation's airports. With that data in hand, the agency is said to have then tracked travellers for “days” after they left the airport.

The Canadian Broadcasting Corporation (CBC) has the story and says it comes from “A top secret document retrieved by U.S. whistleblower Edward Snowden and obtained by CBC News”.

Snowden's documents apparently say anyone that passed through an airport could be tracked, although it is not clear if login to the free WiFi service was required. Logging in wouldn't necessarily be required to track someone: a device set to detect the presence of WiFi networks is likely to reveal its MAC address. If spooks sniffed WiFi routers for MAC addresses of connecting devices, then looked for that MAC address popping up elsewhere, they could easily plot a device's movement.

(Yes, we know that MAC addresses an oddity because they are supposed to be unique but can also be changed to a value used in another device. Changing MAC address is therefore a fine way to make it harder to identify a device, but is not the kind of thing most people who pass through airports would know about.)

The usual oohing and aahing that follows a Snowden release is now rippling across the Web. CESC is pointing out that it is allowed to collect communications metadata (which explains now sniffing a MAC address in an airport could translate into wider tracking). Canadians are expressing shock that their own government spied on them.

Making things more interesting is that the head of CSEC recently said the agency does not surveil Canadians. If CSEC was able to sort citizens from visitors at an airport just by sniffing WiFi-enabled devices, that could be the most damaging revelation of all! ®

Securing Web Applications Made Simple and Scalable

More from The Register

next story
Brit celebs' homes VANISH from Google's Street View
Tony Blair's digs now a Tone-y Blur
German government orders local CIA station chief to pack his bags
Sour Krauts arrest second local in domestic spy ring probe
Snowden leaks latest: NSA, FBI g-men spied on Muslim-American chiefs
US Navy veteran? Lawmaker? Academic? You're all POTENTIAL TERRORISTS
LibreSSL crypto library leaps from OpenBSD to Linux, OS X, more
First cross-platform version of cleaned-up OpenSSL fork
UK's emergency data slurp: IT giants panicked over 'legal uncertainty'
PM says rushed-through DRIP law will 'plug holes' in existing legislation
Russian MP fears US Secret Service cuffed his son for Snowden swap
Seleznev Jnr is 'prolific trafficker in stolen credit card data', it is alleged
Teensy card skimmers found in gullets of ATMs
Hi-tech fraudsters treading more softly, but gas still yielding bang for buck
Weaponised Flash flaw can pinch just about anything from anywhere
This is a 'patch now or regret it sooner-rather-than-later' mess for you and webmasters
Victim of Tor-hidden revenge smut site sues Tor Project developers
But EFF lawyer says deep-web team 'no more liable' than web server makers
prev story

Whitepapers

Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.
Maximizing your infrastructure through virtualization
Virtualization continues to be one of the most effective ways to consolidate, reduce cost, and make data centers more efficient.
Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.