"If hackers can bring down the power grid in several cities as reported by the CIA, how easy would it be for them to create havoc with an unsecured baggage system," said Sri Sundaralingam, senior director of product management at AirTight. "Imagine the ripple effect at an airport like Heathrow or O'Hare if someone could work their way into the baggage transiting system and reroute luggage all over the world. It could bring the system to a grinding halt with both economic and security consequences."
Despite incidents like the one mentioned above, the massive TJX data breach and the case of an Indiana University student who was able to generate fake boarding passes, AirTight's findings appear to demonstrate that retailers, airlines and providers of critical systems at airports are still not taking a long hard look at cyber security or understanding the additional risks that wireless introduces.
The study also discovered that fully ten percent of the laptops detected during the scans were infected with a viral (ad-hoc) Wi-Fi Network, making the users vulnerable to data leakage and identity theft.
"It is ironic that the traveler passes through a phalanx of physical security to only to be sitting at a gate and be vulnerable to cybercrime," continued Sundaralingam "Both network administrators and business travelers recognize the benefits of mobility and anywhere, anytime computing but it is time for all of these constituencies to recognize the risks as well and implement best practices."
How the study was conducted
The traces were collected using off-the-shelf (consumer) Wi-Fi cards and publicly available data collection tools. Four hundred seventy eight access points and 585 Wi-Fi clients were scanned. The scans were typically collected at gate or airport lounge areas.