Security

GoGo in-flight WiFi creates man-in-the-middle diddle

Join the mile-high club by getting screwed with fake certs

9 Got Tips?

In-flight wifi service GoGo, once accused of facilitating excessive interception access for US law enforcement, has now been spotted using fake Google SSL certificates to spy on net traffic and prevent passengers from accessing video streaming services.

Google engineer Adrienne Porter Felt (@__apf__) noticed the fake SSL certificate which masqueraded as orginating from her employer and publicly called on the company to explain its actions.

Chief technology officer Anand Chari said only that it used the certificates to block streaming services while it upgraded network capacity and did not collect user data.

"Right now, Gogo is working on many ways to bring more bandwidth to an aircraft. Until then, we have stated that we don't support various streaming video sites and utilise several techniques to limit or block video streaming," Chari said in a statement.

"One of the recent off-the-shelf solutions that we use proxies secure video traffic to block it.

"Whatever technique we use to shape bandwidth, it impacts only some secure video streaming sites and does not affect general secure internet traffic."

But there were as Felt said "better ways to do it" other than creating a man-in-the-middle attack against users.

The company's willingness to exceed the mandatory requirements for the provision of telecommunications interception discovered by American Civil Liberties Union technologist Chris Soghoian and detailed by Wired extended the concerns beyond a debate on the legitimate use of bogus SSL certficates.


In September last year the company revealed in a letter (pdf) submitted to the Federal Communications Commission that it exceeded the requirements of the Communications Assistance for Law Enforcement (CALEA)

Gogo said at the time that an additional capability seemingly the use of CAPTCHA to prevent remote access was an apparent lone function that was not related to traffic monitoring.

The news should serve as a warning to onboard users wishing to keep their data out of government hands. ®

Sign up to our NewsletterGet IT in your inbox daily

9 Comments

Keep Reading

FCC boss orders probe into 'unacceptable' T-Mobile US outage after carrier plays dog-ate-my-homework card

Yup, the old 'leased fiber line broke' excuse

As nice as Pai: FCC chairman comes out in favour of Ligado Networks' 5G proposal, despite criticism from airlines and military

Updated Backing for use of L-Band spectrum for 5G

FCC lines up $16 billion for broadband across entire US. Well, except New York because, screw them, right?

They’ve got money, explains American watchdog that just can’t help itself

FCC sucks its teeth, clicks its tongue, says: Yeah, AT&T, Sprint, T-Mobile US, Verizon gleefully sold your location data. Guess we should fine them?

How much you make, Randy? Wanna cough up, I dunno, twice that or something?

Your mobile network broke the law by selling location data and may be fined millions... or maybe not, shrugs FCC

US watchdog struggles to do its job over illegal sale of folks' whereabouts

Congress to FCC: Where’s the damn report on mobile companies selling location data?

Energy and Commerce Committee Democrats not happy with Ajit Pai

FCC boosts broadband competition by, er, banning broadband competition in buildings

Analysis George Orwell's got nothing on this lot with doublespeak

White House creates 'Team Telecom' to probe whether foreign telcos should be allowed near US networks

Speedier license applications possible, uncertainty remains for many

The latest FCC plan to boost US broadband? Prevent competition in apartment blocks

Ajit Pai turns logic on its head while doing Big Cable's bidding

Huawei with you! FCC's American Pai proposes rip-and-replace of scary Chinese comms kit

ZTE also on hit list

Tech Resources

Driving Immediate Value with a Cloud SIEM

A natively cloud SIEM is purpose-built to get your team up and running quicker than ever before

Latency is the New Outage

More organizations are tying their future success to digital and online business.

The Definitive Guide to Sharing Threat Intelligence

Sharing threat intelligence is gradually becoming an accepted component in information security defense but there are still ways we can gain more.

SANS Report: Factoring Enterprise IoT into Detection and Response

In this report, learn about the growth of IoT devices inside corporate networks