{"id":12349,"date":"2018-05-19T10:45:03","date_gmt":"2018-05-19T18:45:03","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2018\/05\/19\/news-6118\/"},"modified":"2018-05-19T10:45:03","modified_gmt":"2018-05-19T18:45:03","slug":"news-6118","status":"publish","type":"post","link":"https:\/\/www.palada.net\/index.php\/2018\/05\/19\/news-6118\/","title":{"rendered":"A Location-Sharing Disaster Shows How Exposed You Really Are"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/media.wired.com\/photos\/5aff47679b3a517fcaece13b\/master\/pass\/LocationServices-M6T94H-(1)-w.jpg\"\/><\/p>\n<p><strong>Credit to Author: Brian Barrett| Date: Sat, 19 May 2018 11:00:00 +0000<\/strong><\/p>\n<p><span class=\"lede\">There are plenty <\/span>of <a href=\"https:\/\/www.wired.com\/2017\/12\/digital-security-guide\/\">guides available on how to protect your data<\/a>, how to <a href=\"https:\/\/www.wired.com\/2017\/02\/famed-hacker-kevin-mitnick-shows-go-invisible-online\/\">secure yourself online<\/a>, and how to <a href=\"https:\/\/www.wired.com\/story\/facebook-privacy-apps-ads-friends-delete-account\/\">stop digital snoops from tracking you<\/a> across the web and then profiting from that intrusion. (Sorry, \u201cmonetization\u201d.) You should do these things. But if a cascading series of revelations this past week has taught us anything, it&#x27;s that all of those steps amount to triage. The things you can control add up to very little next to the things you can\u2019t.<\/p>\n<p>It\u2019s an obvious point, especially if you follow the privacy headlines. But a recent example of location-tracking gone wrong\u2014in fairness, it rarely goes right\u2014that unfolded over the last week or so underscores the severity of what you\u2019re up against.<\/p>\n<p class=\"paywall\">On May 10, a <a href=\"https:\/\/www.nytimes.com\/2018\/05\/10\/technology\/cellphone-tracking-law-enforcement.html\" target=\"_blank\">New York Times report<\/a> detailed a service, called Securus, that allegedly allowed a former sheriff to track people\u2019s location, practically in real-time, without a court order. Securus technically requires legal documentation that authorizes use of its services. But senator Ron Wyden (D &#8211; Oregon) <a href=\"https:\/\/www.wyden.senate.gov\/imo\/media\/doc\/wyden-securus-location-tracking-letter-to-att.pdf\" target=\"_blank\">says<\/a> Securus told his office that the company \u201cnever checks the legitimacy of those uploaded documents,\u201d and that it does not feel obligated to do so. It offers a rubber stamp, then, to letting people know where virtually anyone in the US is standing at any given moment.<\/p>\n<p class=\"paywall\">On the heels of that report, <a href=\"https:\/\/www.zdnet.com\/article\/us-cell-carriers-selling-access-to-real-time-location-data\/\" target=\"_blank\">ZDNet detailed<\/a> how all four major US carriers sell location data to companies you\u2019ve never heard of, without your explicit permission. In this specific case, Securus bought its access from a location aggregator called LocationSmart, which in turn bought it from the telecoms. All of these corporate relationships are arguably legal.<\/p>\n<p class=\"paywall\">&quot;We don\u2019t really have federal laws that are focused on that backend sale of personal data,&quot; says Alan Butler, senior counsel at the Electronic Privacy Information Center. &quot;A lot this is just the Wild, Wild West, honestly. That\u2019s why the companies do whatever they want.&quot;<\/p>\n<p>&#x27;If they\u2019re going to have this data and a claim to use it, then they absolutely have a responsibility to make sure it\u2019s locked up tighter than Fort Knox.&#x27;<\/p>\n<p name=\"inset-left\" class=\"inset-left-component__el\">Robert Xiao, Carnegie Mellon University<\/p>\n<p class=\"paywall\">That alone would be cause enough for alarm. There\u2019s no opt-out for any of this location sharing. It happens simply by dint of having a cell phone plan. In a very real sense, you\u2019re powerless to prevent your location being used as chattel. Google knows where you are most of the time too, but at least it lets you <a href=\"https:\/\/support.google.com\/accounts\/answer\/3118687?hl=en\" target=\"_blank\">turn off location tracking<\/a>, and to delete your history. The company also ostensibly uses the information to help Google Maps, search, and other services that benefit consumers to some degree. The only value AT&amp;T and Verizon create by selling location data to brokers lands on their bottom line.<\/p>\n<p class=\"paywall\">Also, it gets worse.<\/p>\n<p class=\"paywall\">By Wednesday, hackers breached Securus, passing some of the data on its servers\u2014including usernames, email addresses, and hashed passwords\u2014along <a href=\"https:\/\/motherboard.vice.com\/en_us\/article\/gykgv9\/securus-phone-tracking-company-hacked\" target=\"_blank\">to tech site Motherboard<\/a>. On Thursday, <a href=\"https:\/\/krebsonsecurity.com\/2018\/05\/tracking-firm-locationsmart-leaked-location-data-for-customers-of-all-major-u-s-mobile-carriers-in-real-time-via-its-web-site\/\" target=\"_blank\">security reporter Brian Krebs revealed<\/a> that LocationSmart had a security meltdown of its own; while the company says it abides by privacy best practices, including <a href=\"https:\/\/www.locationsmart.com\/company\/news\/location-data-privacy-locationsmart-best-practices\" target=\"_blank\">a requirement<\/a> that someone give consent before being tracked, Carnegie Mellon researcher Robert Xiao discovered that a bug on its web site allowed anyone to locate around 200 million people in the US without their knowledge.<\/p>\n<p class=\"paywall\">\u201cLocationSmart is committed to continuous improvement of its information privacy and security measures and is incorporating what it has learned from this incident into that process,\u201d the company said in a statement Friday. LocationSmart says also that the bug has been fixed, and that it had not been exploited prior to Xiao\u2019s discovery. When asked how they were sure that Xiao was the first to exploit the bug, LocationSmart told WIRED that it \u201creviewed its historical logs.\u201d<\/p>\n<p class=\"paywall\">Xiao urges some skepticism regarding that last claim. \u201cI would be curious to know how they know that,\u201d he says. \u201cThe attack flow looks fairly normal. If they looked at their server logs, it would be hard to distinguish what I was doing from normal use.\u201d<\/p>\n<p class=\"paywall\">Regardless, the absence of exploits wouldn\u2019t excuse the sloppiness that created the bug in the first place. Xiao says it took only about 15 minutes of prodding to discover it, and that it stems from an unused feature that the company apparently never bothered to secure. It\u2019s an unconscionable lapse, especially given the sensitive nature of LocationSmart\u2019s business.<\/p>\n<p class=\"paywall\">\u201cI\u2019d almost prefer that they didn\u2019t have access to this in the first place, that this business model didn\u2019t exist,\u201d says Xiao. \u201cBut if they\u2019re going to have this data and a claim to use it, then they absolutely have a responsibility to make sure it\u2019s locked up tighter than Fort Knox.\u201d<\/p>\n<p class=\"paywall\">It\u2019s a responsibility LocationSmart, and so many others who hold onto your data, abdicated. \u201cBecause they value profits above the privacy and safety of the Americans whose locations they traffic in, the wireless carriers and LocationSmart appear to have allowed nearly any hacker with a basic knowledge of websites to track the location of any American with a cell phone,\u201d Senator Wyden said in a statement Friday. \u201cThe dangers from LocationSmart and other companies are limitless. If the FCC refuses to act after this revelation then future crimes against Americans will be the commissioners&#x27; heads.\u201d (An FCC spokesperson says that &quot;the matter is being referred to the Enforcement Bureau,&quot; with no further comment.)<\/p>\n<p class=\"paywall\">Wyden\u2019s office also confirmed that none of the four major carriers have responded to letters he sent last week, asking each of them to audit what third parties have access to location information, if and how their customers consented, and urging safeguards to better manage the fallout of these incidents.<\/p>\n<p>&#x27;No individual consumer has any power to do anything about it. And where in the system does the solution come from?&#x27;<\/p>\n<p name=\"inset-left\" class=\"inset-left-component__el\">Alan Butler, EPIC<\/p>\n<p class=\"paywall\">You couldn\u2019t hope for a much better encapsulation of the hopeless state of data privacy in the US today. You can see the same casual security sloppiness with which LocationSmart and Securus treated your location in the countless <a href=\"https:\/\/www.wired.com\/2017\/03\/want-stop-big-data-breaches-start-databases\/\">exposed databases<\/a>\u2014revealing everything from <a href=\"https:\/\/www.wired.com\/story\/amazon-s3-data-exposure\/\">personal information<\/a> to <a href=\"https:\/\/www.wired.com\/story\/voter-records-exposed-database\/\">voter records<\/a>\u2014or in the extremely, entirely, <a href=\"https:\/\/www.wired.com\/story\/equifax-breach-no-excuse\/\">embarrassingly preventable Equifax breach<\/a>. The same system that allows AT&amp;T, Verizon, T-Mobile, and Sprint to sell your location to companies you\u2019ve never heard of also allows thousands of barely regulated, <a href=\"https:\/\/www.cnn.com\/2018\/03\/26\/opinions\/data-company-spying-opinion-schneier\/index.html\" target=\"_blank\">shadowy data brokers<\/a> to know everything about not just where you are but <em>who<\/em> you are, and what you do online. And lack of tangible progress, the sense that this has all happened before and will happen again, the resignation; that\u2019s the cumulative effect of years of breaches and leaks and carelessness that make this all feel so futile. This keeps happening, and keeps not getting fixed.<\/p>\n<p class=\"paywall\">&quot;No one takes the lead,&quot; says Butler. &quot;People acknowledge that it\u2019s a problem, but no individual consumer has any power to do anything about it. And where in the system does the solution come from?&quot; Laws do restrict what consumer-facing companies can do with your data, but the data broker industry has largely slipped through the cracks. And without a centralized agency taking the lead on privacy in the US, or an <a href=\"https:\/\/www.wired.com\/story\/europes-new-privacy-law-will-change-the-web-and-more\/\">omnibus law like Europe&#x27;s GDPR<\/a> to act as a wider safety net, that&#x27;s not going to change.<\/p>\n<p class=\"paywall\">None of which means you should give up. You should still follow those guides, and adjust those settings. But you should also know that better privacy can only come if and when companies respect you enough to grant it. And if they continue not to, your only option is to yell loudly enough\u2014at the FCC, at lawmakers, at anyone who will listen\u2014that they no longer have a choice.<\/p>\n<p class=\"related-cne-video-component__dek\">Thanks to an assist from Congress, your cable company has the legal right to sell your web-browsing data without your consent. This is how to protect your data from preying eyes.<\/p>\n<p><a href=\"https:\/\/www.wired.com\/story\/locationsmart-securus-location-data-privacy\" target=\"bwo\" >https:\/\/www.wired.com\/category\/security\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/media.wired.com\/photos\/5aff47679b3a517fcaece13b\/master\/pass\/LocationServices-M6T94H-(1)-w.jpg\"\/><\/p>\n<p><strong>Credit to Author: Brian Barrett| Date: Sat, 19 May 2018 11:00:00 +0000<\/strong><\/p>\n<p>The failures of Securus and LocationSmart to secure location data are the failures of an entire industry.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10378,10607],"tags":[714],"class_list":["post-12349","post","type-post","status-publish","format-standard","hentry","category-security","category-wired","tag-security"],"_links":{"self":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/12349","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=12349"}],"version-history":[{"count":0,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/12349\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=12349"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=12349"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=12349"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}