{"id":1104,"date":"2010-05-30T22:22:49","date_gmt":"2010-05-31T06:22:49","guid":{"rendered":"\/?p=1104"},"modified":"2010-06-19T23:25:32","modified_gmt":"2010-06-20T07:25:32","slug":"clarke-appropriating-home-network-identifiers-is-the-real-issue","status":"publish","type":"post","link":"https:\/\/www.identityblog.com\/?p=1104","title":{"rendered":"Clarke: Appropriating home network identifiers is the real issue"},"content":{"rendered":"<p>Here\u00a0is some background\u00a0on the Google\u00a0Street View WiFi issue by <a href=\"http:\/\/www.rogerclarke.com\/\">Roger Clarke<\/a>,\u00a0a well known Australian privacy expert.\u00a0 Roger\u00a0points out that Peter Schaar, Germany&#39;s Federal Commissioner for Freedom of Information, was concerned about misuse of network identifiers from the very beginning.\u00a0<\/p>\n<p style=\"padding-left: 30px;\"><span style=\"mso-spacerun: yes;\">I agree that the identifiers of users&#8217; devices is the real issue.<\/span><\/p>\n<p style=\"padding-left: 30px;\">And your invocation of &#8220;It reminds me of an old skit by &#8220;Beyond the Fringe&#8221; where a police inspector points out that &#8220;Once you have identified the criminal&#39;s face, the criminal&#39;s body is likely to be close by&#8221; does hit the spot very nicely!<\/p>\n<p style=\"padding-left: 30px;\">You ask why the payload is\u00a0getting all the attention.\u00a0\u00a0After all, it was the device-addresses that Peter Schaar first drew attention to.\u00a0 As I wrote <a href=\"http:\/\/www.rogerclarke.com\/DV\/PrivCorp.html#Goo10\">here<\/a>,<\/p>\n<p style=\"padding-left: 60px;\">The third mistake came to light on 22 April 2010, when <a href=\"http:\/\/www.theregister.co.uk\/2010\/04\/22\/google_streetview_logs_wlans\/\">The Register reported<\/a> that &#8220;[Google&#39;s] Street View service is under fire [from the German Data Protection Commissioner, Peter Schaar] for scanning private WLAN networks, and recording users&#8217; unique [device] addresses, as the car trundles along&#8221;.<\/p>\n<p style=\"padding-left: 30px;\">As soon as Peter Fleischer [Google&#39;s European privacy advisor &#8211; Kim]\u00a0 published his document of 27 April, I wrote to Schaar, saying:<\/p>\n<p style=\"padding-left: 60px;\">&#8220;Fleischer&#39;s document doesn&#39;t say anything about whether the surveillance apparatus in the vehicle detects other messages from the router, and messages from other devices&#8230;<\/p>\n<p style=\"padding-left: 60px;\">&#8220;In relation to messages other than beacons, on the surface of it, Fleischer might seem to be making an unequivocal statement that Google does *not* collect and store <a href=\"http:\/\/en.wikipedia.org\/wiki\/MAC_address\">MAC addresses<\/a>.<\/p>\n<p style=\"padding-left: 60px;\">&#8220;But:<\/p>\n<ol style=\"padding-left: 90px;\">\n<li>If Google&#39;s surveillance apparatus is in a Wifi zone, how does it avoid &#8216;collecting&#8217; the data?\u00a0 [Other statements make clear that it does in fact collect that data]<\/li>\n<li>[In the statement &#8220;Google does not collect or store payload data&#8221;,] the term &#8216;payload data&#8217; would most sensibly be interpreted as meaning the content, but not including the headers.<\/li>\n<li>The MAC-addresses are in the headers.<\/li>\n<li>So Fleischer&#39;s statement is open to the interpretation that header data of messages other than beacons *is* collected, and *is* stored.<\/li>\n<\/ol>\n<p style=\"padding-left: 60px;\">&#8220;Google has failed to make the statement that connected-device MAC-addresses are *not* collected and stored.<\/p>\n<p style=\"padding-left: 60px;\">&#8220;Because Google has had ample opportunity to make such a statement, and has avoided doing so, I therefore make the conservative assumption that Google *does* collect and store MAC addresses of any devices on networks, not just of routers.&#8221;<\/p>\n<p style=\"padding-left: 30px;\">The document sent to the Commissioners added fuel to the fire, by saying &#8220;The equipment is able to receive data from all broadcast frames [i.e. not only beacons are intercepted; any traffic may be intercepted.] This includes, from the header data, SSID and <a href=\"http:\/\/en.wikipedia.org\/wiki\/MAC_address\">MAC addresses <\/a>[i.e. consistent with the analysis above, the MAC-addresses of all devices are available to Google&#39;s surveillance apparatus.] However, all data payload from data frames are discarded, so Google never collects the content of any communications.<\/p>\n<p style=\"padding-left: 30px;\">Subsequently, on 14 May, investigations by Hamburg Commissioner Caspar led to the unavoidable conclusion that Fleischer&#39;s post on April 27 had been incorrect in a key respect. As Eustace put it, &#8220;It&#39;s now clear that we have been mistakenly collecting samples of payload data [i.e. message content] from open (i.e. non-password-protected) WiFi networks&#8221;.<\/p>\n<p style=\"padding-left: 30px;\">So I think there are a couple of reasons why the payload aspect is getting most of the press:<\/p>\n<ol style=\"padding-left: 60px;\">\n<li>The significance of identifiers isn&#39;t readily apparent to most people, whereas &#8216;payload&#8217;, like people&#39;s Internet Banking passwords, is easier to visualise. (Leave aside that only highly insecure services send authenticators unencrypted. Low-tech reporters have to (over-) simplify stories to communicate to low-tech readers<\/li>\n<li>A\u00a0corporation appeared to have been caught telling fibs, constructively misleading the public and the media, and regulators<\/li>\n<li>That&#39;s what catapulted it into the news, and reporters feed off one another&#39;s work, so it&#39;s the payload they all focus on<\/li>\n<li>A final factor is that breaches of telecommunications laws may be easier to prove in the case of content than of device-identifiers.<\/li>\n<\/ol>\n<p style=\"padding-left: 30px;\">The<a href=\"http:\/\/www.privacy.org.au\/\"> Australian Privacy Foundation (APF) <\/a>stepped up the pressure in Australia late this week.<\/p>\n<p style=\"padding-left: 30px;\">Firstly, we directly requested Google not to delete the data, and <a href=\"http:\/\/www.privacy.org.au\/Papers\/GoogleWifi-100527.pdf\">gave them notice <\/a>that we were considering using a little-known part of the TIAA to launch an action.\u00a0 That was promptly followed by the NYT&#39;s report of the Oz Privacy Commissioner saying that the Australian data is in the USA.\u00a0 (The first useful utterance she&#39;s made on the topic &#8211; a month after this story broke, there&#39;s no mention of the matter on her web-site).<\/p>\n<p style=\"padding-left: 30px;\">Secondly, we<a href=\"http:\/\/www.privacy.org.au\/Papers\/GoogleWifi-ACMA-PC-100528.pdf\"> wrote to the relevant regulators<\/a>, and requested them to contact Google to ensure that the data is not deleted, and to investigate whether Google&#39;s actions breached Australian laws.<\/p>\n<p style=\"padding-left: 30px;\">\u00a0<\/p>\n","protected":false},"excerpt":{"rendered":"<p>But breaches of telecommunications laws may be easier to prove in the case of content than of device-identifiers&#8230;<\/p>\n","protected":false},"author":68,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[6,17,3,77],"tags":[],"_links":{"self":[{"href":"https:\/\/www.identityblog.com\/index.php?rest_route=\/wp\/v2\/posts\/1104"}],"collection":[{"href":"https:\/\/www.identityblog.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.identityblog.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.identityblog.com\/index.php?rest_route=\/wp\/v2\/users\/68"}],"replies":[{"embeddable":true,"href":"https:\/\/www.identityblog.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=1104"}],"version-history":[{"count":0,"href":"https:\/\/www.identityblog.com\/index.php?rest_route=\/wp\/v2\/posts\/1104\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.identityblog.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=1104"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.identityblog.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=1104"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.identityblog.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=1104"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}