IT Admin: No Time to Save Time?
[ad] Do you spend too much time patching machines or cleaning up after virus attacks? With automation controlled from a central IT management console accessible anytime, anywhere – you can save time for bigger tasks. Try simple IT management from GFI Cloud and start saving time today!
Free Forrester analysis of CRM solutions
[ad] In this 25 page report, independent analyst house Forrester evaluates 18 significant products in the customer relationship management space from a broad range of vendors, detailing its findings on how CRM suites measure up and plotting where they stand in relation to each other. Download it for free now.
Great articles on other sites
- IBM’s Australian MD says more job cuts likely
- Vodafone takes fight to Telstra over regional mobile funding
- Police race to roll out tablets before state rivals
- Vandals break Basslink fibre cable
- WA Sport CIO looks forward to life without data centres
- Labor attempts to force NBN fibre rollout in Tasmania
- Foxtel’s long-standing CIO departs
- Welcome to the era of two-speed IT
- Businesslink review misses January deadline
- Firefighters save cash with Chrome OS
Analysis - Written by External Contributor on Thursday, April 5, 2012 15:29 - 9 Comments
Wardriving & surviving: Who’s using your Wi-Fi?
The “wardriving” project involves police driving the streets of Queensland, searching for unsecured Wi-Fi coming from houses and businesses. (Given Wi-Fi signals can have a range of up to 100 metres, a family’s Wi-Fi connection can be accessible from well outside the home.) When an open or poorly secured Wi-Fi access point is found, it is logged by Queensland Police, who will later send a letter with information on how to secure Wi-Fi access points (such as routers).
What does “unsecured Wi-Fi” mean? Well, it means there is no password set and that open access to the Wi-Fi access point is available to anyone with a compatible device. “Poorly secured” Wi-Fi refers to access points that are set up using older security measures, such as Wired Equivalent Privacy (WEP). WEP is an encryption system that utilises a security technique developed in 1999 and which was outdated and replaced in 2003 by Wi-Fi Protected Access (WPA).
As Detective Superintendent Brian Hay said in a statement for the Queensland Police Service News: “Having WEP encryption is like using a closed screen door as your sole means of security at home. The WPA or WPA2 security encryption is certainly what we would recommend as it offers a high degree of protection.”
According to Hay, the consequences of not acting could be significant: “Unprotected or unsecured wireless networks are easy to infiltrate and hack,” he said. “Criminals can then either take over the connection and commit fraud online or steal the personal details of the owner. This is definitely the next step in identity fraud.” Furthermore, a person that has access to open residential Wi-Fi can use this connection to browse the web or or illegally download movies, music or – at the extreme end – child pornography.
As Nicolas Suzor, a law lecturer at Queensland University of Technology, highlighted in the Sydney Morning Herald, the homeowner could be landed with responsibility: “It could be quite difficult to prove that it wasn’t in fact you [downloading copyrighted or illegal material].”
This is potentially a major problem for residential Wi-Fi users and one that the Queensland Police has decided to reduce by committing resources from the Fraud and Corporate Crime Group. Another concern is that Wi-Fi users often have mobile devices and computers connected to the one broadband connection. As a result, when someone gains access to their open Wi-Fi they can access all of the devices and computers on that home network.
A long drive
The Queensland Police wardriving effort is certainly not the first of its kind. In fact, wardriving has been occurring since the inception of Wi-Fi in the 1990s.
In 2010, Google Australia was found to be collecting Wi-Fi information by cars sent out to record street views. At the time, Communications Minister Stephen Conroy claimed Google’s actions constituted “the largest privacy breach in the history of Western democracies”.
The Queensland Police have commenced the project and to ensure they do not commit a breach of privacy have configured their systems to collect only limited information; just enough to be able to identify open or poorly secured Wi-Fi so the owner can be notified.
And when you look at the statistics, it seems there are a lot of homeowners that need to be notified. In a test done across Sydney in July 2011, the Sydney Morning Herald identified “unsecured Wi-Fi networks in ten out of 20 residential locations … In total, 328 networks were detected with 2.6% operating without password protection.”
Needless to say, the problem of unsecured Wi-Fi is not an exclusively Australian problem. In December 2004, students worked to map Wi-Fi in Seattle over a few weeks and found 5,225 Wi-Fi access points, of which 44% were secured with WEP encryption, 52% were open, and 3% were pay-for-access. The wardriving by students in Seattle was legal, but several issues – such as privacy, security and people downloading pornography – were identified.
The information collected by students identified that in areas with large numbers of overlapping Wi-Fi access points, signals can cause interference and open wireless networks can cause security risks. Students found some of the Wi-Fi access points had names “Open to share, no porn please” and “Free access, be nice”.
Tools of the trade
Over the years, many tools have been developed to assist in the capture of Wi-Fi details during a wardrive. One classic wardriving tool is NetStumbler. Other, more modern, tools can be found at wardrive.net. After Wi-Fi access point information is collected using one of the above tools, the data can be uploaded to an online map, such as those featured on wigle.net.
The results from Queensland Police’s wardriving efforts are yet to be seen but in the meantime, it would be wise to make sure your Wi-Fi is being used by you, and no-one else.
For more information on the War Driving Project or tips on how to secure your connection, visit the Queensland Police Service website.
Enterprise IT, Featured, News - Mar 10, 2014 15:24 - 0 Comments
More In Enterprise IT
- IT security as a service explodes in Australia
- Microsoft criticises AG Dept’s cloud rules
- NSW Trade + Investment wants to go full cloud
- Madness? Govt considers ERP shared services scheme that failed states
- News Corp Australia dumps Exchange for Gmail
News, Politics, Telecommunications - Mar 10, 2014 14:14 - 7 Comments
More In Telecommunications
- Why no consumer voices for Turnbull’s ministerial council?
- “Witch hunt”? Turnbull opens Labor NBN policy review
- Will hidden taxes and competitive pressures make the NBN unsustainable?
- Tasmania’s NBN tangle is a shocking mess
- Turnbull’s MTM CBN should not be a monopoly
Blog, Industry - Mar 6, 2014 11:55 - 19 Comments
More In Industry
- Hyde quit NEC to run HP’s Enterprise division
- Connecting to Australia’s first digital technology curriculum
- IBM Australia to reportedly slash 500 staff
- UNSW, GoGet working on self-driving car
- Optus, AAPT lose CEOs; Huawei Australia gains one
Blog, Digital Rights - Mar 10, 2014 16:39 - 2 Comments
More In Digital Rights
- Telstra publishes four page “transparency” report
- First-time Labor MP backs fair use copyright reform
- SA Police want face recognition CCTV everywhere
- AUSTRAC tracks every AUD-Bitcoin conversion
- Foxtel launches movies on demand, cheaper Game of Thrones