NNSquad - Network Neutrality Squad

NNSquad Home Page

NNSquad Mailing List Information

 


[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[ NNSquad ] Google's Wi-Fi Crucifixion, an Open Mike, and Public Is As Public Does



    Google's Wi-Fi Crucifixion, an Open Mike, and Public Is As Public Does

                http://lauren.vortex.com/archive/000720.html


Greetings.  As I noted recently in "'Highly Illogical': The Hysteria
Over Google's Wi-Fi Scanning," the unseemly and opportunistic
attacks, lawsuits, and now perhaps even criminal prosecutions of
Google over their accidental recording of unencrypted Wi-Fi payload
data seem to call into question the overall rationality of our
species ( http://bit.ly/9680wb [Lauren's Blog]).

After all, these were unencrypted transmissions being broadcast on
public airwaves, and Google's accidental capturing of data snippets
can hardly compare with the risks to those Wi-Fi owners of bad guys
purposely collecting that data to actually use for evil purposes (but
even then, we're only talking about data that wasn't protected above
the Wi-Fi layer by mechanisms such as SSL/TLS).

On the other hand, it's obviously to be expected that Google's
adversaries (including some governments with somewhat irrationally
conflicted views over public vs. private data, imagery, etc.) would
seize on any slip to try stake Google out for the wolves.

But ultimately, public is public.  Information that is disseminated in
unencrypted forms is always going to be vulnerable to purposeful or
accidental interception, and the solution to this situation is
encryption, not legislation.

I had an interesting personal incident occur recently that may be at
least a bit illuminating in this "what is public?" discussion.

For several years, I've sometimes dictated the initial drafts of
particularly long papers or reports into an inexpensive hand-held
digital recorder.  I blab my thoughts into this thing wherever I am,
later dump the audio data files via USB, then run them through
speech-to-text software (usually "Naturally Speaking") --
typically with highly satisfactory results.

Brief Aside: Speech recognition systems have long been one of my areas
of interest.  The availability of speech-to-text systems today always
strikes me as a true science fiction concept brought to fruition.
(Here's a one-minute video clip I threw together featuring two 20th
century science fiction TV show concepts of "futuristic voice
dictation" - from 1979's original "Battlestar Galactica," and -- a bit
more tongue-in-cheek -- from "Star Trek" in 1968: 
http://bit.ly/cV5bJg [YouTube])

Anyway, one day a few months ago when I examined the automatically
transcribed results of the last week's dictation dump, I was startled
to find (sometimes garbled, sometimes intelligible) snippets of
conversations in the resulting text, that had nothing to do with what
I had dictated!

What the ...?  I went back and listened to the original audio files,
which I normally didn't do (my standard protocol is to simply upload
the audio data files and later inspect the resulting text).

The problem's source was immediately apparent.  There were other
voices in the background of some recordings, that had been picked up
in the vicinity of where I had been dictating in stores, fast food
eateries, and so on.  Many of these voices were clear enough that the
speech software had tried -- often successfully to a considerable
degree -- to transcribe these along with my intended verbiage.  I
deleted the original audio files as is my standard practice, and
edited out the erroneously collected text snippets.

The "foreign" remarks were all pretty much meaningless bits and 
pieces -- a few words here and there -- but why had this suddenly occurred
and how had it gone on for days unnoticed?  After all, I've been using
this recorder for years, often in public places, and it had never
picked up anything from other conversations before.

I found the reason.  On the back of the recorder is a tiny little
flush switch, that I had never knowingly altered, that selected
between high and low microphone sensitivity.  I had always left it on
the "low" setting, which caused the unit to effectively ignore all but
my own voice.  Somehow that switch had moved to the "high sensitivity"
position, causing the unit to pull in surrounding voices as well as my
own.  There was no obvious indication of this, and I didn't even
notice the switch since I carry the recorder in a small case.

You know where I'm going with this.  The accidental recording of very
short ambient background speech snippets doesn't represent a real risk
to anyone, just as Google's accidental recording of unencrypted Wi-Fi
payload snippets was an unfortunate oversight, not an evil plot.

We need to understand the fact that unless we take steps to protect
what we consider to be "confidential data" in public spaces, that data
is vulnerable to be overheard not only accidentally as in both of
these cases described above, but also by bad actors who truly have
nefarious goals -- and it's the latter group that we really need to be
concerned about.

This holds true in the world of Wi-Fi, and in the more mundane
environs of the local burger joint ordering queue.

Trying to treat public spaces as if they were somehow legislatively
"private on demand" is ultimately a fool's game.

--Lauren--
Lauren Weinstein
lauren@vortex.com
Tel: +1 (818) 225-2800
http://www.pfir.org/lauren
Co-Founder, PFIR
   - People For Internet Responsibility - http://www.pfir.org
Co-Founder, NNSquad
   - Network Neutrality Squad - http://www.nnsquad.org
Founder, GCTIP - Global Coalition 
   for Transparent Internet Performance - http://www.gctip.org
Founder, PRIVACY Forum - http://www.vortex.com
Member, ACM Committee on Computers and Public Policy
Lauren's Blog: http://lauren.vortex.com
Twitter: https://twitter.com/laurenweinstein