You have just arrived at the hotel after a delayed flight and a half-hour wrangle with the car-hire firm — and then you remember that you have forgotten to pay last month’s credit card bill, and there will be an interest charge if you wait until you are back at base.
But —- hey —- you can do it online and help is at hand. The receptionist is welcoming and helpful. They have Wi-Fi and it is free.
Relieved, you ask for the password. “Oh, you don’t need one,” he replies. “Just type in your room number and click the box.”
Phew! Problem solved. Er, not necessarily.
At this point the human race divides into two groups. Call them sheep and goats.
Sheep are sweet, trusting folks who like to think well of their fellow humans. Surely that helpful receptionist would not knowingly offer a dangerous service.
Also, they find digital technology baffling and intimidating. And they cannot imagine why anything they do online might be of interest to anyone.
Goats, on the other hand, have nasty, suspicious minds. They believe that many of their fellow humans may be up to something. They believe that, in this networked world, only the paranoid survive.
So when they see an open, free Wi-Fi network they smell a rat. And they would never, ever send confidential information via such a channel.
Sadly, in this particular context, the goats are wiser than the sheep.
They know that hotel chains have become a coveted target of hackers.
Many of the industry’s biggest operators have reported data breaches in recent years, including big names such as Hilton, InterContinental, Marriott and Hyatt.
Most of these attacks, according to Bloomberg, are focused on the property management systems (PMS) used by hotel chains to take reservations, issue room keys and store credit card data.
The Bloomberg report, written by Patrick Clark, was based on the exploits of a team of “white hat” hackers, employed to test the security of a particular system.
After plugging the Internet cable from a bedroom’s smart TV into a laptop they got into the hotel’s PMS, which led to the chain owner’s corporate system.
In doing so they gained access to credit card information for several years’ worth of transactions in dozens of hotels — and if they had been crooks the team could have sold the information on the black market, where a Visa card with a high credit limit can fetch up to US$20.
Why are hotels such tempting targets? Partly because their systems are easy to penetrate, technically.
“Hospitality companies long saw technology as antithetical to the human touch that represented good service. The industry’s admirable habit of promoting from the bottom up means it’s not uncommon to find IT executives who started their careers toting luggage. Former bellboys might understand how a hotel works better than a software engineer, but that doesn’t mean they understand network architecture,” Clark wrote.
The vulnerability is also a reflection of an occupational culture. After all, the hotel business is about welcoming guests and trying to anticipate — and satisfy — their needs.
Nowadays, everybody expects to have free Wi-Fi, so why not give them that in the most hassle-free way imaginable? No messing with passwords and cumbersome log-in procedures; just type in the room number and click “OK.”
From a hacker’s perspective, therefore, the hospitality industry looks like a prime opportunity: easy pickings from hotels’ booking records, plus juicy items of personal information from sheep using insecure Wi-Fi networks.
And it is not just hackers who are attracted to these honeypots, by the way.
The director of any intelligence service that has not been inside the internal systems of Trump’s Washington hotel since his election, for example, ought to be summarily fired for incompetence.
In the meantime, what can traveling holidaymakers do to protect themselves? The short answer is to invest in — and install — virtual private network (VPN) software on any device that travels with you.
A VPN functions as an encrypted tunnel to a special server located somewhere on the Internet.
If you connect to the Observer through a VPN, for example, then the VPN server connects to the paper on your behalf, and because all the traffic is encrypted it is gobbledegook to any snooper, which means that you can safely use hotel (and cafe) Wi-Fi networks wherever you go.
The only downside is that such unlimited protection does not come free, alas, so expect to pay an annual fee. (There are some free services, but they have restrictions on data usage or the number of devices or services you can access.)
TechRadar provides a useful guide to the best VPNs.
Remember that only the paranoid survive. And enjoy the rest of your holiday.
Congratulations to China’s working class — they have officially entered the “Livestock Feed 2.0” era. While others are still researching how to achieve healthy and balanced diets, China has already evolved to the point where it does not matter whether you are actually eating food, as long as you can swallow it. There is no need for cooking, chewing or making decisions — just tear open a package, add some hot water and in a short three minutes you have something that can keep you alive for at least another six hours. This is not science fiction — it is reality.
A foreign colleague of mine asked me recently, “What is a safe distance from potential People’s Liberation Army (PLA) Rocket Force’s (PLARF) Taiwan targets?” This article will answer this question and help people living in Taiwan have a deeper understanding of the threat. Why is it important to understand PLA/PLARF targeting strategy? According to RAND analysis, the PLA’s “systems destruction warfare” focuses on crippling an adversary’s operational system by targeting its networks, especially leadership, command and control (C2) nodes, sensors, and information hubs. Admiral Samuel Paparo, commander of US Indo-Pacific Command, noted in his 15 May 2025 Sedona Forum keynote speech that, as
In a world increasingly defined by unpredictability, two actors stand out as islands of stability: Europe and Taiwan. One, a sprawling union of democracies, but under immense pressure, grappling with a geopolitical reality it was not originally designed for. The other, a vibrant, resilient democracy thriving as a technological global leader, but living under a growing existential threat. In response to rising uncertainties, they are both seeking resilience and learning to better position themselves. It is now time they recognize each other not just as partners of convenience, but as strategic and indispensable lifelines. The US, long seen as the anchor
Kinmen County’s political geography is provocative in and of itself. A pair of islets running up abreast the Chinese mainland, just 20 minutes by ferry from the Chinese city of Xiamen, Kinmen remains under the Taiwanese government’s control, after China’s failed invasion attempt in 1949. The provocative nature of Kinmen’s existence, along with the Matsu Islands off the coast of China’s Fuzhou City, has led to no shortage of outrageous takes and analyses in foreign media either fearmongering of a Chinese invasion or using these accidents of history to somehow understand Taiwan. Every few months a foreign reporter goes to