That allowed them to perform content screening even in apparently secure Google searches. Until last year, Gogo was also issuing its own certificates for some secure websites-including Google. Gogo then implemented those functionalities into its system design."īoth Gogo and Global Eagle appear to block some commercial VPN traffic. Nevertheless, Gogo worked with federal agencies to reach agreement regarding a set of additional capabilities to accommodate law enforcement interests. The Commission’s ATG rules do not require licensees to implement capabilities to support law enforcement beyond those outlined in CALEA. Gogo’s network is fully compliant with the Communications Assistance for Law Enforcement Act (“CALEA”). "In designing its existing network, Gogo worked closely with law enforcement to incorporate functionalities and protections that would serve public safety and national security interests. And Gogo designed its network specifically with law enforcement needs in mind, as its executives explained in a 2012 letter to the Federal Communications Commission arguing against FCC-imposed monitoring requirements: Advertisementīut some in-flight networks break privacy even harder and introduce more potential ways to attack devices using them, because they either inadvertently or purposely block some of the most basic networking security tools: secure HTTP and some virtual private networks. Since there's no password protection on the Wi-Fi connection, there's no privacy protection for the raw traffic that is carried on the Wi-Fi network's packets, and anyone listening in can intercept all of what gets passed through the wireless access point to and from the Internet. In-flight Wi-Fi services like Gogo Wireless (the service Petrow used on his flight) and Global Eagle Entertainment (the service available on Southwest Airlines and some other carriers) are in many ways just like the public Wi-Fi available at any coffee shop, mall, hotel, or other location where access is granted through a "captive portal"-that login screen that pops up in a browser window requiring either payment or acknowledgement of terms of service before you can reach the Web. And as might have happened to Petrow, old-school POP/SMTP e-mail messages could be practically read off the wire. For example, in previous tests (such as the ones we conducted with NPR), we saw iPads and iPhones that identified themselves to the network by their owner's name, and Web requests to websites and mobile app traffic (some including personal data) were also visible. When you're on any public Wi-Fi, you're bound to give up some personal information to anyone who might be watching the traffic (whether that be the company providing the service, for marketing purposes, or someone with more malicious intent). It's something that could easily be fixed, but in-flight Internet providers are in no hurry to do so, because it's not in their interest. But none of these really addresses how he got "hacked"-the in-flight Wi-Fi provided a perfect environment for an attacker to undermine the security of other passengers' communications. Petrow offered a bunch of advice on how to protect privacy on mobile devices (strong passwords, password managers, and encrypted communications apps). Following an American Airlines flight, Petrow was approached by a man who claimed to have gained access to the content of his e-mails, which showed communication with sources for a story Petrow was writing. But it's possible to do all sorts of things to fellow passengers-as USA Today columnist Steven Petrow recently found out. Safety: Bird strikes | No-fly list proposal | Could you land a plane? | Whale vs.There's a certain degree of doubt about whether it's possible to hack into an airplane's avionics from the in-flight Wi-Fi, as one security researcher claimed last year.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |