Verizon catches flak for bragging about value of spying on customers [Telecom]

Verizon catches flak for bragging about value of spying on customers by Kevin Fogarty October 18, 2012 8:10 PM

Compared to free public wireless networks at coffee shops, airports, and other public places, the encrypted, proprietary, heavily secured cellular networks carriers offer to companies look like Fort Knox.

In a coffee shop, all it takes for a hacker to eavesdrop on "private" network connections is a WiFi device and a piece of freeware that takes the work out of snatching, storing and analyzing packets of data from other latte sippers.

Logging in to a cell network requires hardware- and software-based authentication, a device that can speak politely to a specific carrier's network and powers of hackery great enough to overcome security that prevents end-user devices from talking to each other or anything else that isn't a carrier-owned switch or router, military grade encryption and password-cracking apps and the time to make it all work.

[...]

Verizon Wireless combs and cleans that data, combines it with information on customer shopping habits, age, gender and other demographic data purchased from third-party data brokers, and packages the results for sale to customers with a source of high-volume, real-time data on how customers behave.

The result is a massive invasion of customers' privacy and possibly a new violation of federal wiretap laws for every customer whose Internet activity is monitored, according to Electronic Frontier Foundation staff attorney Hanni Fakhoury.

[...]

{ full article at above URL }

***** Moderator's Note *****

AFAIK, cellphones aren't encrypted.

Bill Horne Moderator

Reply to
Thad Floryan
Loading thread data ...

GSM is encrypted at the option of the carrier. But it's a 64-bit encryption system that's 21 years old, and was weak (at the behest of the French government, who didn't want it to be something they couldn't crack) even when it was new. Cracks have been known for some time, and "By the year 2011 a mainstream PC having one high end graphics processor and some terabytes of flash memory is sufficient to break the encryption of a A5/1 GSM session in a few seconds with a probability above 90%, except in the (in 2011) rare cases where plaintext randomization is applied." [Wikipedia]

Reply to
Dave Garland

Cabling-Design.com Forums website is not affiliated with any of the manufacturers or service providers discussed here. All logos and trade names are the property of their respective owners.