I was offline for 95% of the xmas break, instead investing my keyboard time into: (a) the exercises in Structure and Interpretation of Computer Programs and (b) writing some stuff on the implications of the Sony debacle for my home network security architecture.
I'm going to start posting the latter articles in an out-of-order sequence, with this post: InfoSec risks of android travel applications
1. Airline checkin & Travel apps- demand so many privileges that you can't trust corporate calendar/contact data to stay on the devices. Nor, in the absence of audit logs, can you tell if the information has leaked.
2. Budget Airline applications are the least invasive, "premium" airlines demand access to confidential calendar info.
3. Even train timetable apps like to know things like your contact list.
However hard you lock down your network infrastructure, mandate 26 digit high-unicode passwords rolled monthly, mandate encrypted phones and pin-protected SIM cards, if those phones say "android" when they boot you can't be confident that sensitive corporate data isn't leaking out of those phones if the users expect to be able to use their phones to check on buses, trains or airplanes.
Normally the fact that Android apps can ask and get near-unlimited data access is viewed as a privacy concern. It is for home users. Once you do any of the following, it becomes an InfoSec issue:
- Synchronise calendar with a work email service.
- Maintain a contact list which includes potentially confidential contact/customers
- Bond to a work Wifi network which offers network access to HTTP(S) sites without some form of auth.
- Do the same via VPN
Demands of Applications
Noticing that one application update needed to want more information than I was expected, I went through all the travel apps on my android phone and looked at what permissions they demanded. These weren't explicitly installed for the experiment, simply what I use to fly on airlines, and some train and bus ones in the UK. I'm excluding tripit on the basis that their web infrastructure requests (optional) access to your google emails to autoscan for trip plans, which is in a different league from these.
|British Airways||confidential, participants||No||Yes||Precise|
|United Airlines||confidential, participants||No||Yes; view network connections||Precise|
|National Rail||Add, modify, participants||No||Yes||Precise|
|National Express Coach||No||Yes||Yes; view network connections & wifi||Precise|
|First Great Western trains||No||No||Yes||Precise|
|trainline||No||No||Yes; view network connections||Precise|
|First Bus||No||No||Yes; view network connections||Precise|
When you look at this list, its appalling. Why does the company that I use to get a bus to LHR need to know my contact list? Why does BA need my confidential appointment data? Why does the UK National Rail app need to be able to enumerate the calendar and send emails to participants without the owner's knowledge?
British Airways: wants access to confidential calendar info and full network access. What could possibly go wrong?
United: wants to call numbers, take photos and access confidential calendar info
National Express Bus Service
This is a bus company. How can they justify reading my contact list -business as well as personal?
UK National Rail
Pretty much total phone control, though not confidential appointment info. Are event titles considered confidential though?
Google's business model is built on knowing everything about your personal life -but this isn't about privacy, it is about preventing data leakage from an organisation. If anyone connects to your email services from an android, your airline checkin apps get to see the title, body and participants in all calendar appointments, whether that is "team meeting" or "plans for takeover of Walmart" where the participants include Jim Bezos and Donald Trump(*).
What could be done?
- Log accesses. I can't see a way to do this today, yet it would seem a core feature IT security teams would like to know. Without it you can't tell what information apps have read.
- Track provenance of calendar events and restrict calendar access only to events created by the airline apps themselves. This would require the servers to add event metadata; as google own gmail they could add a new BigTable column with ease.
- Restrict network access HTTPS sites on specific subdomains. Requiring HTTPS is good for general wifi security, and stops (most) organisations from playing DNS games to get behind the firewall.
In the absence of that feature, if you want to be able to check in on your android phone on a non-budget airline, you have to give up expectations of the security of your confidential calendar data and contact list.
And in a world of BYOD, where the IT dept doesn't have control of the apps on a phone, that means they can't stop sensitive calendar/contact data leaking at all.
(*) FYI, there are no appointments in my calendar discussing taking over Walmart that include both Jim Besos and Donald Trump. I cannot confirm or deny any other meetings with these participants or plans for Walmart involving other participants. Ask British Airways or UAL if you don't believe me.