11:24 AM
Connect Directly

Reopen Google Wi-Fi Investigation, Say Lawmakers

Two Congressmen call on the Department of Justice to investigate whether Google's wardriving practices violate wiretapping laws.

Google Drive: 10 Alternatives To See
Google Drive: 10 Alternatives To See
(click image for larger view and for slideshow)
Two U.S. Congressmen have called on the Department of Justice to reopen its investigation into Google, after revelations that the company's Street View vehicles recorded large amounts of unencrypted Wi-Fi data. Although Google had maintained that the data collection was accidental, last month a new report revealed that the data collection was, in fact, by design.

"In light of this, we are writing to request that the Department [of Justice] evaluate ... whether it would be appropriate to re-open its investigation to assess whether Google's conduct may in fact have violated the law," wrote Frank Pallone Jr. (D-NJ) and John Barrow (D-Ga.) Thursday in a letter to Attorney General Eric Holder. "By ensuring that this matter is investigated to the fullest extent, we can understand what happened and how it can be prevented from ever happening again."

Google has long maintained that although the data collection might have been inappropriate, it wasn't illegal. "We have always been clear that the leaders of this project did not want or intend to use this payload data. Indeed Google never used it in any of our products or services," a Google spokesman said via email. "Both the DoJ and the FCC have looked into this closely--including reviewing the internal correspondence--and both found no violation of law."

[ Read Google Wardriving: How Engineering Trumped Privacy. ]

The Federal Trade Commission in October 2010 also declined to fine Google following its Street View investigation, although the FTC received assurances from Google that it would delete all inadvertently collected Wi-Fi payload data. Google also said that it had already put new business processes in place to help prevent similar incidents from reoccurring. In May 2011, meanwhile, the Department of Justice declined to prosecute Google after investigating whether the company had violated the Wiretap Act.

Last month, however, the FCC released a report that included testimony from Google employees who had direct knowledge of the Street View program. Although Google had long maintained--and executives might have believed--that the Wi-Fi data collection was accidental, the report disclosed that "the data collection resulted from a deliberate software design decision by one of the Google employees working on the Street View project," and was detailed in a design document approved by managers.

In other words, Google actively engaged in wardriving, which is the practice of driving around and looking for accessible wireless networks or wireless data traffic, then sniffing and storing the data they're sending and receiving. But it's not clear whether this practice would have violated any U.S. laws.

In the wake of the report, European investigators are reportedly considering reopening their Google Street View investigations. Notably, although Canada and multiple European countries found that Google had violated their privacy laws, they let the matter rest after Google agreed to delete collected data and revise its privacy practices. France, meanwhile, also hit Google with a record privacy fine.

The FCC also fined Google $25,000 for having obstructed its investigation, but not for violating communications, wiretapping, or any other U.S. laws or regulations. Still, according to the FCC's report, "significant factual questions" remained unanswered, owing to the engineer who added the war-driving capabilities to Street View having "invoked his Fifth Amendment right against self-incrimination and declined to testify."

Might Google be called on to now answer those factual questions?

Mobile Connect addresses the strategic direction that will define enterprise IT for the next decade--building and managing information systems that run on a mobile platform. Mobile Connect will bring together enterprise mobility thought leaders to discuss the innovations in mobile, and how forward-thinking companies are getting the technology to work for them, providing unprecedented business value. It happens in Boston, June 18-20. Register today.

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
Number 6
Number 6,
User Rank: Apprentice
5/29/2012 | 8:16:29 PM
re: Reopen Google Wi-Fi Investigation, Say Lawmakers
They're just annoyed that a corporation is doing what they've already permitted the NSA to do.

All your data are belong to us.

Goes to show you that all it takes is for one worker-bee to screw up.
User Rank: Apprentice
5/25/2012 | 11:29:53 PM
re: Reopen Google Wi-Fi Investigation, Say Lawmakers
"If you can't work out a backroom deal" sounds like the standard methods used in Greece, Italy, and a few other mediterranean bordering countries. Is their economic state of affairs what you would propose we use as a model of excellence? The point is not the unencrypted data as much as it is the active harvesting of that information and undisclosed use. Until next to the WiFi enabled signs there is a disclosure that reminds people they are using unsecured networks, I'm assuming that most individuals are not aware/uninformed which is separate and distinct from the majority which read and post comments to InformationWeek articles.
retired, not
retired, not,
User Rank: Apprentice
5/25/2012 | 5:35:58 PM
re: Reopen Google Wi-Fi Investigation, Say Lawmakers
"unencrypted Wi-Fi data" Say it with me "UN EN CRYPTED WI FI DATA". Doesn't the DOJ have more important things to do like go after online poker players? Congress has MUCH more important issues to deal with, as does the DOJ. If networks choose (or are too stupid not to) run their nets PUBLICLY - then so be it - the info is available to ANYONE that cares to let their computer connect to random networks.
User Rank: Apprentice
5/25/2012 | 4:23:22 PM
re: Reopen Google Wi-Fi Investigation, Say Lawmakers
Hey Congress, are you just wanna be Europeans. How about supporting American companies instead of jumping on the bandwagon. This is another one for the "If I wanted to destroy America" series. If you can't work out a backroom deal with an American corporation, then you don't deserve to be in office. And, oh yeah Pallone, I live in N.J. Want to bet which way I'll be voting the next time you run for office? I think all elected officials should be under constant investigation because when the spot light is focused, many of them are revealed as self-serving hypocrites if not criminals.
Register for Dark Reading Newsletters
Partner Perspectives
What's This?
In a digital world inundated with advanced security threats, Intel Security seeks to transform how we live and work to keep our information secure. Through hardware and software development, Intel Security delivers robust solutions that integrate security into every layer of every digital device. In combining the security expertise of McAfee with the innovation, performance, and trust of Intel, this vision becomes a reality.

As we rely on technology to enhance our everyday and business life, we must too consider the security of the intellectual property and confidential data that is housed on these devices. As we increase the number of devices we use, we increase the number of gateways and opportunity for security threats. Intel Security takes the “security connected” approach to ensure that every device is secure, and that all security solutions are seamlessly integrated.
Featured Writers
White Papers
Current Issue
Dark Reading's October Tech Digest
Fast data analysis can stymie attacks and strengthen enterprise security. Does your team have the data smarts?
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
Published: 2014-10-23
Untrusted search path vulnerability in Hamster Free ZIP Archiver allows local users to execute arbitrary code and conduct DLL hijacking attacks via a Trojan horse dwmapi.dll that is located in the current working directory.

Published: 2014-10-23
Open redirect vulnerability in the header function in adclick.php in OpenX 2.8.10 and earlier allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via a URL in the (1) dest parameter to adclick.php or (2) _maxdest parameter to ck.php.

Published: 2014-10-23
Cross-site request forgery (CSRF) vulnerability in Shenzhen Tenda Technology Tenda A32 Router with firmware 5.07.53_CN allows remote attackers to hijack the authentication of administrators for requests that reboot the device via a request to goform/SysToolReboot.

Published: 2014-10-23
Open redirect vulnerability in the Click-Through feature in Newtelligence dasBlog 2.1 (2.1.8102.813), 2.2 (2.2.8279.16125), and 2.3 (2.3.9074.18820) allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via a URL in the url parameter to ct.ashx.

Published: 2014-10-23
Multiple cross-site scripting (XSS) vulnerabilities in OpenMRS 2.1 Standalone Edition allow remote attackers to inject arbitrary web script or HTML via the (1) givenName, (2) familyName, (3) address1, or (4) address2 parameter to registrationapp/registerPatient.page; the (5) comment parameter to all...

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Follow Dark Reading editors into the field as they talk with noted experts from the security world.