There are basically three areas of risk:
By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
- Terms of service when using a third party
- Vulnerabilities in the application programming interface (APIs) used to interface with the service
- Images providing sensitive information.
The first area of risk has caused a lot of debate and misunderstanding. Various governments, including those of the Dutch and Australians, and military personnel have expressed concern over how easy it is to get detailed imagery of military bases, government buildings, airports and ports, which could aid terrorists in planning and conducting an attack. Google does blur images of some buildings, like the U.S. Capitol Building, but this type of information is not unique to Google Earth, and commercial high-resolution satellite and aerial imagery of every country in the world is already in the public domain or widely available from numerous sources.
The second area of risk involves mash-ups, which are developed by integrating data from internal and external sources. Information mashed together with Google Maps can support a wide range of applications, such as routing and customer analysis. However, organizations implementing mash-ups using external sources need to consider the reliability of that data. How good is the quality of the information? Are there copyright or other restrictions on its use? What level of data availability is guaranteed? Do the APIs create security holes in the internal applications? APIs that have been deprecated instead of deleted have caused problems in the past for developers integrating applications with MySpace, for example. There is a risk that third-party data could come from hackers or other unknown sources, and DoD data and servers could be compromised. These factors could pose an unacceptable risk for business-critical applications at the DoD.
Finally, according to Google Earth's terms of service, section 11.1 states that Google retains the right to reproduce, adapt, modify, translate, publish, publicly display and distribute any content which is displayed on or through its services. Google's irrevocable right to use its data would certainly be an issue for the DoD.
Dig Deeper on Web application and API security best practices
Related Q&A from Michael Cobb
Can two-factor authentication be applied to a mobile device that's used as a 2FA factor? Michael Cobb explores the different knowledge factors and ...continue reading
Running a private certificate authority can pose significant risks and challenges to meet baseline requirements. Michael Cobb explores what ...continue reading
A recently discovered Android app permissions flaw can expose users to attacks. Michael Cobb explains what the risks are and how Android O security ...continue reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.