Posted on 04/24/2011 3:27:11 PM PDT by The Magical Mischief Tour
You know where this is going. They got the wrong guy. Someone else had used Coverts wireless connection to download child porn.
Law enforcement officials say the case is a cautionary tale.
It sure is. I can certainly think of some lessons we might draw. One might be: Maybe the cops should check to see if a suspects wireless network is secure, and therefore that they have the right guy, before they break into his home and point their guns at his head.
Another lesson: Maybe its not such a good idea to send the SWAT team after someone suspected of downloadingnot even manufacturingchild porn in the first place. Are people who download kiddie porn known to be heavily armed?
As you might suspect, these arent the lessons the police drew from their violent, mistaken raid on Barry Covert. This is:
Their advice: Password-protect your wireless router.
Probably good advice, given that they dont seem particularly concerned about their own mistakes in this case.
(Excerpt) Read more at theagitator.com ...
Lots of hypocrites in the Freeper “Law-And_Order-At-Any-Cost” Crowds...
When you’re a hammer the world is a nail.
When you got a high-tech, million-dollar hammer sitting in your toolbox, everything starts to look like a nail.
I thought YouTube did not allow such garbage
Law enforcement officials say the case is a cautionary tale...........................................................................This did not happen, it is a fairy tale, a fable, nothing more.
Law and order don’t come that way. A man should check his words twice before releasing the trigger on them, and then he should train himself to be careful in speech. I say that, of course, but I too often find myself shooting to kill with words I released unchecked. It’s not an easy duty.
The thing that I’ll NB here is that:
1. With the right tools, a hacker can recover the WEP/WPA-PSK key for any wireless network. All they need is enough traffic and a sufficiently powerful computer to regenerate the key from the traffic. If I want to crack your wireless network, all I will need, worst case, is probably about two days’ worth of your encrypted traffic. The heavier a user of the ‘net you are, the less time it takes me to gather the required amount of traffic to reverse generate your key.
2. Once the key has been recovered, a hacker can either use the network, or attack hosts on the network.
3. There are additional levels of security that people aren’t employing besides putting keys on their routers. People should also hide the SSID, they should lock down the MAC addresses that the router will allow onto the network. Locking down MAC addresses won’t stop a hacker for long, but if your hacker/attacker is jamming ARP and stealing your MAC address, you should see the problem on your local network reasonably quickly..
4. Botnets have infected millions of computers across the world, and the users have no idea what their computers are actually doing. People should close down a great many ports that they don’t need on their networks so outbound connections cannot be initiated.
The best defense for people these days is to not only encrypt their networks, but rotate through a reasonably large set of keys. Crypto keys are something that become both more valuable and weaker with increased use. For people who want a really secure network, they should think about rotating through long keys at least twice/day.
People should also encrypt their hard drives on their computers. While it doesn’t prevent LEO’s from decrypting your hard drive if they bring enough resources to bear, it does slow down the planting of evidence.
If you need that kind of security, then not using wireless is really the best option.
That’s true as well. There is an increasing proportion of the population, however, who get their ISP service over point-to-point wireless connections. For them, the choice is “wireless or no IP.”
WPA2 people!
SWAT teams and the courts never make mistakeslistening to some people here!
Click the link to be added to the "Whoops. Sorry, citizen. We thought you were someone else" PING list.
Did you read the article, idiot? No wonder FR is portrayed to look like a bunch of Hitleresque extremists.
What’s your point?
LOL...
Compare and contrast?
So I guess you're half right, at a minimum.
Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.