Follow Slashdot blog updates by subscribing to our blog RSS feed

 



Forgot your password?
typodupeerror
×
News

Secret Service Goes War Driving 142

JSC writes "Looks like the Secret Service is taking a page from the WarDriving handbook. Your tax dollars at work includes springing for the Pringles can for the antenna."
This discussion has been archived. No new comments can be posted.

Secret Service Goes War Driving

Comments Filter:
  • Is there a comprehensive guide to wardriving on the net? Where can I learn to do the markings?
  • Counterattack (Score:1, Insightful)

    by Anonymous Coward
    Wardriving honeypots?
  • by Dancin_Santa ( 265275 ) <DancinSanta@gmail.com> on Monday September 30, 2002 @12:39AM (#4357138) Journal
    They are planning on informing companies that they have leaky wireless networks. They aren't doing it to leach bandwidth like most wardrivers.
    • by Anonymous Coward
      Yet more subsidies.

      So my tax dollars are being spent on sending the secret service to do a private business's job for them?

      What's next? Do I have to pay the government to go in and help companies decide what pleasing colors to paint their hallways and do ergonomics checks?
    • If companies want security let them hire someone to secure them and audit their security. How is this something that should come from taxes? It makes great sense to audit themselves or anything of key importance but just random wardriving sounds like a waste of $$$.
      • by Anonymous Coward
        What is good for business is good for America. If you want companies to pull the plug on wireless networks because they are perceived as being insecure, then continue complaining about government spending. Just don't complain when the prices for wireless hardware goes up because you aren't getting the business subsidy.
        • Price goes up either way. Method A) you pay in taxes, method B) you pay on your own if you want wireless.

          I'd rather make my own decisions on what my money is spent on, kthx.
      • Now... I didn't read the *entire* article, but I would think that they would check for leaks in places like Congressional offices. God knows we don't want a leaked love letter from a secretary to a Congressman.

        I believe al-Quada has a secret lab developing their own pringle can antenna to war-camel-ride the D.C. area.

      • by mamba-mamba ( 445365 ) on Monday September 30, 2002 @01:24AM (#4357307)
        From the article:

        Chris McFarland, head of the Secret Service's Electronic Crimes Task Force, said his agents have begun evaluating computer security along with other concerns when they scout out a place where the president or other protected dignitary will go.

        McFarland said, for example, that agents have had extensive discussions with officials at George Washington Hospital about improving its wireless network security.

        While the agents plan to offer their expertise to anyone who asks, they are focusing on places most important to their mission of protecting public officials. The hospital is several blocks from the White House and treated Vice President Dick Cheney ( news - web sites) during his heart problems.

        [emphasis added]
        MM
        --
  • by capnjack41 ( 560306 ) <spam_me@crapola.org> on Monday September 30, 2002 @12:41AM (#4357148)
    I bet they paid way too much for those Pringles cans (like their $400 hammers and $600 toilet seats).
  • So? (Score:4, Funny)

    by ConsumedByTV ( 243497 ) on Monday September 30, 2002 @12:44AM (#4357155) Homepage
    I do it.
    Why should I care if the SS does it :)

    Right Kyle?
  • by kbroom ( 258296 ) on Monday September 30, 2002 @12:44AM (#4357156) Homepage
    (...)These networks are becoming common in airports, universities, coffee houses, businesses, homes and even some public squares. But they are sold with no security measures (...)
    Actually, most vendors advertise WEP as a security mechanism for these wireless networks, but as we all know, it is pretty much useless [sourceforge.net]. I wonder if the writers of the article wrote the above statement knowing this fact, or if they just got lucky.

    • Just bear in mind that the amount of patience and time required to collect enough packets for AirSnort may take you awhile.

      I have yet to find anyone who has really been able to bust a WEP key in a period of less than 4 hours...and this is in a high-traffic lab environemnt. I tried for 2 days in my home lab without success...then gave up.

      Several vendors have patched their firmware so no FFs appear in the initialization vector, so Airsnort's use is somewhat limited on those networks to transmissions from other notebooks...and if the site is running Cisco hardware with LEAP, forget about it.

      Unless you plan to put a laptop in somewhere and leave it for a few days, don't get your hopes up too much on getting enough packets.
    • The "writers of the article" didn't get lucky. :)


      I wrote it, and I know how insecure WEP is. I don't even bother with it for my home network, so I didn't consider it a viable security measure. I prefer MAC filtering, and that's what the Secret Service suggests. But MAC filtering is a bit too techie to get into an article for the intended (non-Slashdot) audience.


      Not to say I've never gotten lucky.

  • Check the Lottery (Score:5, Interesting)

    by I_am_Rambi ( 536614 ) on Monday September 30, 2002 @12:46AM (#4357164) Homepage
    Peterson recently drove down a major Washington street and found over 20 wireless networks, many of which had no security at all. Peterson said his probes are part of good police work, like a patrolman driving through a neighborhood.

    I know of someone who drove downtown in my hometown and picked up many wireless networks. This included 4 laptops with pringle can antennas. Among one of these networks he noticed the name was the state Lottery, thats right, the lottery. As he looked up, he was passing the building for the state lottery. It is interesting to see how many open wireless networks that there are in a town.

    He also informed one company of the open network (he knew the network admin) and immediatly lost his ip for that network.

    Is it illegal to pick up the wireless network as you drive by, if you don't do anything with it? Or is it illegal to pick it up and browse the net or both?
    • Seems to me that if there is a legitimate law enforcement use (checking for security) that is being performed by law enforcement agents, then private citizens can do it under the same pretence. Like a neighbourhood watch.
      • by Anonymous Coward
        With a neighborhood watch, though, residents are aware that there is a watch. Some schmuck driving through the neighborhood scanning for open networks isn't quite the same.
    • Is it illegal to pick up the wireless network as you drive by, if you don't do anything with it?

      I don't know. But I'm sure it is illegal for the person's email you just forged over their wireless network. With all the things you could do to someone, this type of revenge appears to be the most evil things a person could do...
  • by lannocc ( 568669 ) <lannocc@yahoo.com> on Monday September 30, 2002 @12:49AM (#4357178) Homepage
    I find it interesting that when the Secret Service goes around wardriving and alerting network owners of insecure networks it's okay, but then Joe "gray"-hat hacker does the same thing these same network owners attempt to prosecute the individual.
    • I find it interesting that police officers can drive over the speed limit and run through red lights with their sirens on, but if Joe "gray" hat driver does the same thing, he gets a ticket or goes to jail. Give me a break dude.
      • Police officers are allowed to do it when it's necessary for their job AND they have to have their siren going. Otherwise, they're liable for the same traffic laws as anyone else.
        • true in theory, but are you going to make a citizen's arrest if you see a cop go 85 without his lights on, or (as is common) he turns his siren on just to blast through a red light?

          Let's get realistic about this - The SS is doing this because they can. They have a huge budget and lots of nifty toys. They're supposed to know "what's going on" around DC, so they have license to snoop around to an extent. Their basic job description probably leaves many of them plenty of free time. Someone probably read an article in Wired, and thought it was cool. That's kind of what happens when you empower virtually unaccountable branches of the government; in this dept the SS has nothing on the CIA, for example....

      • I find it interesting that police officers can drive over the speed limit and run through red lights with their sirens on, but if Joe "gray" hat driver does the same thing, he gets a ticket or goes to jail. Give me a break dude.
        On the other hand, to use several often-touted analogies, a police officer can't walk into my house at will and fill his Thermos from my coffee pot, he can't just trot into my office and start using the company's T3, and unless he has damned good reason, he'd better not be walking up to my back porch and jiggling the doorknob. Doing any of the above without a warrant or some other valid reason to make entry would quickly get him in trouble if not fired.

        I know these analogies are flawed, but so is yours. A police officer (at least around here) isn't allowed to go 90mph or fly through a red light unless he's responding to an emergency call or pursuing a known felon. I don't believe anyone called up Agent Peterson and asked him to come check out their WAP on the double; it seems much more to me like he's just poking around. He's doing it under official directive, without a doubt, but that doesn't necessarily make it right.

        Why is it that it's OK if Agent Peterson goes wardriving and maybe does a bit of snooping to probe a network, but if we do it, we could be sued or perhaps even branded as hackers (or terrorists, or whatever word they're using nowadays) and tossed into the clink? Why is that Agent Peterson can throw together a decent gain antenna made out of a Pringles can and look like a genius for using limited resources, but if we do that, we're frowned upon since we used a few raw materials for something other than their obvious purpose? Why is it that Agent Peterson is likely praised among his peers and the D.C. community for "protecting" government and corporate interests, yet you or I would wind up facing stiff penalties under the DMCA for using the Pringles can as a "circumvention device" to gain "unauthorized access" to this or that network, even if we had the same basic ideals (improving security) in mind?

        "Because he works for the Secret Service" is not really much of an answer IMO. I can't go around murdering people I don't like, but neither can Secret Service agents; membership in the law enforcement community is not a carte blanche. If it had been a Secret Service agent who discovered and pondered publishing the flaw in HP's Tru64, would HP still have threatened with the DMCA [slashdot.org]? You're damned right they wouldn't have.

        My point is that it's all perception. If ABC Corp. gets a call from the Secret Service saying "Your wireless network is insecure, I could use it to do something nefarious," the IT goober is notified; and either the network is locked down or the incompetent IT manager is fired, tout de suite. If ABC Corp. gets that same phone call from a curious layperson, ABC Corp. gets on the phone with its legal team, subpoenas the phone records, and files suit against the "terrorist hacker perpetrator."

        This is wrong, and the underlying perception is one that we're going to have to work very hard to change.

        Shaun

        P.S. Hi USSS, are you still reading? My homepage hasn't had any hits from eop.gov lately, I feel neglected :)
      • that they are allowed to do this withthe sirens OFF. Fucking speeding cops.
  • Pringles Can Antenna (Score:5, Informative)

    by p00kiethebear ( 569781 ) on Monday September 30, 2002 @12:51AM (#4357184)
    Ive been wanting to make one of these for awhile now. You can find some absolutely splendiferous pictures here: http://verma.sfsu.edu/users/wireless/pringles.php [sfsu.edu]
  • Isn't the FCC gonna be on their ass?
  • by packeteer ( 566398 ) <packeteer@sub d i m e n s i o n . com> on Monday September 30, 2002 @12:52AM (#4357188)
    Im glad my tax dollars are going to someything like this. Not that they are war driving but they are using pringles cans. I mean i personally wouldn't spend my money on a nice antannea so why should the govt. spend my money on one. if a pringles can is good enough for me than its good enouh for the govt.
    • As long as it's not the afformentioned $400 pringles can then yes. It's nice to see that the government is taking an active role in wireless security - shows they recognise the issues - and that they do sometimes realize that a $2000 extension antenna from online is sometimes not as good as a do-it-yourself pringles can setup. Maybe some of them read slashdot. Actually, a lot of them probably read slashdot... they're probably reading this comment right now.

      Of course, I'm Canadian. I think the government here still thinks a toilet costs $9000 - phorm
      • Although they are still spending plenty of cash on the expensive antennas too:
        "Peterson's tools are a laptop, a wireless network card and one of three antennae mounted on his car. One is a small metal antenna; the second is a large, white, 2-foot-tall tube; the third is a homemade antenna made out of a Pringles can"
  • by God! Awful ( 181117 ) on Monday September 30, 2002 @12:53AM (#4357192) Journal
    A quasi-mainstream news source called warchalkers "independent security researchers." That's gotta be a first.

    -a
  • Network Security (Score:3, Interesting)

    by Aurelfell ( 520560 ) on Monday September 30, 2002 @12:54AM (#4357195)
    Maybe this publicity will create some market for a security product to be used for wireless. A lot of companies don't realize that wireless networks allow potential hackers an easy way around a firewall, and as such, there's little demand for a product to prevent such a breach. If the SS can bring that to light with their Pringles can, maybe that will change. And maybe Pringles will get into network hardware too. That'd be ironic.
    • Im sure the government would pay more for empty Pringles cans.

      I can see the headline now:

      "Procter & Gamble, Cisco Systems form strategic alliance."
    • Ok... let me see - I have a linksys v.2 baby connecting my ibook and my desktop pc. I made the SSID not broadcast, which I am sure is about as effective as WEP, which I don't have on. How do I secure this network? I keep seeing things saying how bad WEP is, but no real solutions to the problem.
  • The Article. (Score:1, Informative)

    by Anonymous Coward
    Yahoo! News Sun, Sep 29, 2002
    Search for Advanced
    Agency Probes D.C. Wireless Network
    Sun Sep 29, 1:37 PM ET

    By D. IAN HOPPER, AP Technology Writer

    WASHINGTON (AP) - Secret Service agents are putting a high-tech twist on the idea of a cop walking the beat. Using a laptop computer and an antenna fashioned from a Pringles potato chip can, they are looking for security holes in wireless networks in the nation's capital.

    The agency best known for protecting the president and chasing down counterfeiters has started addressing what it calls one of the most overlooked threats to computer networks.

    "Everybody wants wireless, it's real convenient," Special Agent Wayne Peterson said. "Security has always been an afterthought."

    The effort is part of a new government plan to build relationships with businesses so that they will feel more comfortable reporting hacking attempts to authorities. Recent anti-terrorism legislation gave the FBI ( news - web sites) and Secret Service joint jurisdiction over electronic crimes.

    Wireless networks are cheap; a small one can start at less than $200. They make it easy for workers to wander around with their laptop or handheld computers and for visiting employees with their own computers to get on to the local office network.

    These networks are becoming common in airports, universities, coffee houses, businesses, homes and even some public squares. But they are sold with no security measures, and protecting a wireless network from hackers takes more knowledge than what network installation guides typically offer.

    Because of security concerns, the White House recently proposed banning some wireless networks in federal agencies. Faced with industry protests, the administration dropped the idea when it released a draft version of its cybersecurity plan this month.

    That has led some independent security researchers to drive -- or even use a private plane to fly -- through cities to map networks. Those maps, which are usually posted on the Internet, show where a person can get a free Internet connection on a private network.

    The Secret Service ( news - web sites) wants to let businesses know that their Internet connections and private networks might be at risk. Companies informed about security holes can reconfigure their networks to make them more secure.

    Peterson's tools are a laptop, a wireless network card and one of three antennae mounted on his car. One is a small metal antenna; the second is a large, white, 2-foot-tall tube; the third is a homemade antenna made out of a Pringles can. They boost the reception of his wireless network card, allowing the agent to point them in different directions to get the best signal.

    A Pringles can is ideal because of its shape -- a long tube that lets someone to point it at specific buildings -- and its aluminum inner lining. It acts like a satellite dish, collecting signals and bouncing them to the receiver, which is then wired into a laptop.

    Peterson recently drove down a major Washington street and found over 20 wireless networks, many of which had no security at all. Peterson said his probes are part of good police work, like a patrolman driving through a neighborhood.

    "I feel it is part of crime prevention to knock on the door," Peterson said.

    The act of "wardriving," a term taken from older "wardialing" programs that called random telephone numbers looking for unlisted modems, has become so prevalent that enthusiasts are using chalk marks on streets and sidewalks to point out networks in public places.

    Peterson said there has not been any reported "warchalking" in the Washington area yet, but if one was found agents would alert the network owner.

    Chris McFarland, head of the Secret Service's Electronic Crimes Task Force, said his agents have begun evaluating computer security along with other concerns when they scout out a place where the president or other protected dignitary will go.

    McFarland said, for example, that agents have had extensive discussions with officials at George Washington Hospital about improving its wireless network security.

    While the agents plan to offer their expertise to anyone who asks, they are focusing on places most important to their mission of protecting public officials. The hospital is several blocks from the White House and treated Vice President Dick Cheney ( news - web sites) during his heart problems.

    Agents also checked out computer systems at the Salt Lake City Olympics, last year's Super Bowl and the World Bank ( news - web sites) in advance of weekend protests.

    "People can wreak havoc with these systems very easily," McFarland said. "It's almost like triage."

    ___

    On the Net: Secret Service: http://www.usss.treas.gov
  • by EvilStein ( 414640 ) <.ten.pbp. .ta. .maps.> on Monday September 30, 2002 @12:59AM (#4357212)
    *munch*munch*munch**munch*munch*munch**munch*munch *munch*

    "Hey Agent 423.. got any more Pringles?"

    *munch*munch*munch**munch*munch*munch**munch*mun ch *munch*

    "No, but I could sure use another Coke.."

    *munch*munch*munch**munch*munch*munch**munch*mun ch *munch*

  • by BinBoy ( 164798 ) on Monday September 30, 2002 @01:05AM (#4357239) Homepage
    Stories about wardialing are popping up everywhere now. So how do you prevent unauthorized access to your wireless LAN? I have 128-bit encryption enabled. Is that enough to prevent bandwidth stealing/snooping or is there something else?
    • Whatever you use to connect to the wireless network is something on its own. Security however is not equivalent to encryption.

      Most of these offices have a firewall, and behind that, every resource on the network is free for all... read write etc.
      Security comes in depth. Single point of failure are bad.. etc etc....

      Mang, sometimes I'm just baffled at how the same things get rehashed over and over and over... and nobody takes note of them. Both on /. and in the world in general.

      sigh.
    • Linksys has a fairly good knowledge base article for securing their APs: Here [linksys.com]
    • Thanks for the tips.

      BTW, don't why the message was moderated as a troll.

    • Easy, first you firewall your machine to only allow ssh out. Then you create a subnet with only your AP. Then you create a VPN server on another subnet. Install vpn over ssh, train the firewall that is between these subnets and you are on your local network, via a 1024 bit rsa encrypted pipe.

      No web, no bullshit. No-one else can use your wireless to get to the internet or communicate to your machine.

      Thanks,

      Steve

      PS You CANNOT rely on the security of these pieces of shit. Most all AP's come with fucked up open ports that you cannot shut down (Web int is one although I have seen that the piece of shit Netgear AP has 3 open ports, one is snmp which is probably open to the snmp trap bug that was out about 4 months ago.)

      Seems to me that the manufactures of these peices of crap dont have a clue about security and decided not to give you the option of security either. Netgear of all place (Banyan Vines right?) should know, but when I called them, all I got was some fucked up off-shore help desk (in INDIA of all places) I sat on the phone working through language barriers to finally find out that the tech of course had no fucking idea of what I was saying. They eventually called me back to tell me that there is no way to turn these services off..... My next stop was the store to return their junk. That is when I decided to buy the piece of shit Linksys that i now have (Although it is better if you ask me, and they support linux). No matter what though, you will have a hard time finding one that is truly secure. Take it into your own hands though. I did. In fact, im writing this from my notebook in my bed, wirelessly.
  • by jerryasher ( 151512 ) on Monday September 30, 2002 @01:07AM (#4357247)
    How many hacking cases in the past few years have just been for just port scanning -- a knock on the door?

    Peterson recently drove down a major Washington street and found over 20 wireless networks, many of which had no security at all. Peterson said his probes are part of good police work, like a patrolman driving through a neighborhood.

    "I feel it is part of crime prevention to knock on the door," Peterson said.

    So that's what port scans are, just knocking on the door, part of crime prevention, and not malicious in and of itself.

    • In the article they say that this "...is part of a new government plan to build relationships with businesses so that they will feel more comfortable reporting hacking attempts to authorities". I'm sorry, but if your in a company and you get a Secret Service guy literally knocking on your door and telling you he's been scanning your network, how does this improve relations. I'd guess most people would run a mile!
    • Peterson recently drove down a major Washington street and found over 20 wireless networks, many of which had no security at all. Peterson said his probes are part of good police work, like a patrolman driving through a neighborhood.

      yeah i found this quote interesting too. the analogy sounds a little off though. seems to me it's more like a policeman walking through a neighborhood, checking to see whose front doors are unlocked. which is, of course, not what id want the police to be doing to my house. then again, i dont make a habbit of leaving my front door unlocked anyway...
      • I agree that it depends on who is doing the knocking. The image I conjure up from Peterson is that of the old irish cop, late 1880s, walking through the business district late at night, rattling the door knobs. Who would argue with that?

        I myself don't like port scanning of my systems unless I have authorized it myself. I don't mind an occasional knock on the door regardless of who it is from. But I'm not willing to criminalize port scans.

        I recall several times in the past years many cases of hacking in which nothing more than port scans were literally made into federal offenses. I don't recall any specifically, and I my recollection may be faulty.

        I don't mind throwing the book at criminals, but I don't want to see legitimate activities criminalized. I don't want to see reasonable activities made unreasonable through silly prosecutions and precedent.

        Occasionally I have used telnet to telnet to a machine infected with CodeRed or Nimda. Not to bring it down, but just to see the HTML stream. That's been argued on /. as both a reasonable and criminal thing to do. And justified with the knock on the door metaphor.

        I find it interesting to see that the secret service in this instance uses the knock on the door metaphor to indicate the benign behavior. Now, what if that had been you, port scanning whitehouse.gov?
        • are they actually using port scanning to do this? i haven't read much on war(driving|chalking) (other than the occassional mainstream article and the spiffy chart of chalk symbols), so i'm not informed as to how people go about doing it. i suppose i should read more on it.

          i've read many stories about the legal fallout from port scanning. how's this for an analogy: having open ports on a machine is like people leaving their bedroom window blinds open in their highrise apartments at night. sure, the person probably (IANAL) has a legal expectation of privacy, and those peeping in from the next building over could be charged with something. but really, if you want to do something without worrying about people peeking in, why leave the blinds open? you'll not likely catch the guy with the telescope sitting in his unlit apartment, so why give him the chance? unless, of course, that kind of thing turns you on, so you leave the blinds open on purpose. then you invite others to watch.
          • I don't know what they are doing, but it sounds as though they are sniffing packets at the least. Do they try to connect? Dunno.

            I try not to get into metaphor games. I see the value of having an understandable metaphor, but I am jaded from having seen lots of lawyers fight battles of the metaphor in an attempt to sway people away from facts and/or common sense. So now metaphors just confuse me. Similes are even worse. My poor brain.

            Having said that I've always felt that as far as wireless signals go (radio, cell, cordless, TV, ...) I've always felt that if someone is going to broadcast their signal through my living space, that I should be allowed to do anything I want (i.e. decrypt it and view it/listen to it) to view and anayze that signal. So for instance I have always felt it was lame and counterproductive to make it law that folks cannot listen in or tape cordless/cell phone calls.
  • They are probably just following the war chalking marks around town.
  • I can't believe that Secret Service agents are being used for this when our southern border is being completely overrun [rense.com]!

    This is total government waste, and it makes me sick. The government's job is to protect our borders, and the corporations should be in charge of securing their own networks and hiring their own wardrivers, not making joe taxpayer foot the bill.
    • The government's job is to protect our borders

      Actually that's only part of the govt's job, a small part at that (thoughtfully named "Border Patrol" so they wouldn't be confused with the "Secret Service.")

      the corporations should be in charge of securing their own networks and hiring their own wardrivers, not making joe taxpayer foot the bill.

      I agree with that fully, but not because I'm afraid of the country being taken over by people who come here to be cooks and gardners. The dude who wrote the letter to the article you linked is smoking crack. National emergency - give me a break. This guy claims to respect the Bill of Rights yet he advocates a mass expulsion, Milosevic-style. Keep your pants on, man, you're talking about a large disenfranchised and easily exploitable pool of cheap labor -- a problem, perhaps, but hardly a "massive army of invasion and occupation." Get real.

    • A big part of your/our countries problem is that schools do not teach civics anymore. The job of the Secret Service is the investigation, prevention, and prosecution of economic crimes. Taken from the mission statement of the Secret Service: The Secret Service is also responsible for the enforcement of laws relating to counterfeiting of obligations and securities of the United States, investigation of financial crimes including, but not limited to access device fraud, financial institution fraud, identity theft, computer fraud, telecommunications fraud, and computer based attacks on our nation's financial, banking, and telecommunications infrastructure. SS Mission Statement" [secretservice.gov]
  • by failrate ( 583914 ) on Monday September 30, 2002 @01:39AM (#4357350) Homepage
    Once upon a time, the military-government-corporate-et cetera complex had ALL the cool toys. Now, they are ripping off tricks that are widely posted by juveline nerdophiles. Now, if the government could only figure out how to clone gold, we could get out of our national debt. Best they go to the nearest MUD forum and get a crack off of some script-kiddies.
  • All the Kidding asie. I belevie this is one of the best things The Secret Service is doing. The amount of Damage one regoue person can do be warcralking is reduced because these people are making the system admim's aware of the problem.

    Another question is that What if the secret service informed a Sys Admin that his Network was "open". and he was susequently hacked is this sys admin liable for the damage caused??
  • Of course the secret service is war-driving.. Do they really want to repeat the embaressment of being caught [lycosasia.com]
    looking at Britney Spears websites?(lycosasia.com)
  • Too hard? (Score:3, Informative)

    by phyxeld ( 558628 ) <phyx@lo s t i n t h e n o i se.net> on Monday September 30, 2002 @02:05AM (#4357421) Journal
    from the article: But they are sold with no security measures, and protecting a wireless network from hackers takes more knowledge than what network installation guides typically offer.

    Every access point I've ever setup had simple instructions for enabling WEP. Granted, WEP isn't the end-all of wireless security, but I'll bet that the the SS's definition of "secure" and "not secure" is equivilent to "wep" or "no wep". Granted, most of the networks I see wardriving (airboxing!) have a default ssid like "linksys" or "WLAN", so I guess a lot of users probably never even attempt to configure their AP. But it certainly doesn't require "more knowledge than network installation guides typically offer".
  • Don't we have bigger law enforcement issues than to protect management types who don't want to be inconvenienced by passwords or cables from hackers? It seems to me that if companies want to put money into wireless networking, they should pay for the necessary security infrastructure themselves.

    For physical crime, you simply cannot protect yourself easily: there is no low-cost, convenient technology to protect yourself from a bullet or a fist.

    But you have complete and easy control over most kinds of cyber crimes: if anything, you save money by going with the safer solution.

    In different words, it looks to me like our tax dollars are making up for software deficiencies created by companies that rush products to market and by companies that install technology without understanding it.

  • Nokia (Score:1, Funny)

    by Anonymous Coward
    Has Nokia accused them of piracy yet?

  • I have not a single time used someone elses AP for access, yet I have collected over 4300 here in the LA area... check out my picture repository: http://wardrive.eyecannon.com
  • works much better.
  • with 53,000 faked access points: http://www.blackalchemy.to/Projects/fakeap/fake-ap .html
  • after the USD5000 toilet seat the USD5000 pringle can? administration at work...
  • "...and we're here to help you." Is a phrase that ought to strike fear into anybody's heart! Dollars to doughnuts this is not the "helpful" measure it is being made out to be.

    Be careful out there!
  • I don't think that it is their job to go around and tell people that their network is open to the public.
    On the other hand, maybe the builders of these items will start including some real default security in their products.
    Or maybe people will wake up and start taking some responiblity for their actions! (yeah, right...)
    • Re:I like this, but (Score:2, Interesting)

      by fizban ( 58094 )
      If your job is to protect national security and there are government agencies with networks that are wide open, then yes, you should be doing this...

      People will only wake up when they become aware of the issue. Most people don't realize the severity of lax security on computers.
  • ...this being done by or under the NSA? After all, this sounds exactly like what their charter calls for. I am confused as to why the SS is involved with performing these tests as it is clearly the NSA's domain. On top of all that, I'm not really sure that this is a role I want to see our goverment actively persuing.
  • "I feel it is part of crime prevention to knock on the door," Peterson said.


    No, its acting like an annoying neighbor to knock on the door. It doesn't even occur to this guy that he might just be annoying people who have open networks on purpose.
  • It's nice to see how well your tax dollars are at work,
    as others have commented.



    It's probably important to point out however, that is this by no
    means the SS's first foray into matters having very little to do with
    what we traditionally expect of them, nor into so-called "cyberspace."



    Look here [eff.org]
    for the article entitled "STEVE JACKSON GAMES WINS LAWSUIT AGAINST
    U.S. SECRET SERVICE" on the Electronic [eff.org]
    Frontier Foundation's Legal [eff.org]
    Cases archive.



    Alternatively, look at the summary [sjgames.com]
    on the Steve Jackson Games site itself, where the answer to "Why was
    SJ games raided?" is answered... "guilt by remote association".



    How many of us know someone who would also fall under the "guilt
    by remote association" blanket? (Have you watched the evening news
    recently?)



    Perhaps the moral is: Beware of men with dark clothes and sunglasses
    eating commercial potato chips these days. (Their initials may be more
    than just coincidental, eh?)



    The only up side to this that I can see is that this incident led to
    the creation of the [eff.org]
    EFF itself.



  • I'm here at marist college in NY and they block p2p programs too. some can connect, but cant download. others cant connect at all. But there is one program that works. http://www.slsk.org its called soul seek and it seems to get through the network.
  • In the beginning there was data. The data was without form and
    null, and darkness was upon the face of the console; and the Spirit of
    IBM was moving over the face of the market. And DEC said, "Let there
    be registers"; and there were registers. And DEC saw that they
    carried; and DEC separated the data from the instructions. DEC called
    the data Stack, and the instructions they called Code. And there was
    evening and there was morning, one interrupt.
    -- Rico Tudor, "The Story of Creation or, The Myth of Urk"

    - this post brought to you by the Automated Last Post Generator...

Love may laugh at locksmiths, but he has a profound respect for money bags. -- Sidney Paternoster, "The Folly of the Wise"

Working...