Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

The Feds can own your WLAN too
tom's networking ^ | March 31, 2005 | Humphrey Cheung

Posted on 04/05/2005 11:34:01 AM PDT by atomic_dog

Millions of wireless access points are spread across the US and the world. About 70% percent of these access points are unprotected—wide open to access by anyone who happens to drive by. The other 30% are protected by WEP (Wired Equivalent Privacy) and a small handful are protected by the new WPA (Wi-Fi Protected Access) standard.

At a recent ISSA (Information Systems Security Association) meeting in Los Angeles, a team of FBI agents demonstrated current WEP-cracking techniques and broke a 128 bit WEP key in about three minutes. Special Agent Geoff Bickers ran the Powerpoint presentation and explained the attack, while the other agents (who did not want to be named or photographed) did the dirty work of sniffing wireless traffic and breaking the WEP keys.

(Excerpt) Read more at mirrordot.org ...


TOPICS: Culture/Society; Government; News/Current Events
KEYWORDS: fbi; hacking; wifi; wireless
Navigation: use the links below to view more comments.
first 1-2021-4041-6061-80 ... 121-129 next last
Guess they don't need a warrant either. If you broadcast it, it's fair game.

pwned by the fbi!

1 posted on 04/05/2005 11:34:01 AM PDT by atomic_dog
[ Post Reply | Private Reply | View Replies]

To: Ramius

FYI...


2 posted on 04/05/2005 11:36:22 AM PDT by ecurbh (All I've ever wanted was an honest week's pay for an honest day's work.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: atomic_dog

Another one of the reasons I would never, ever use wireless LAN / internet access.

Running ethernet through a home or office can be a pain, but once it's up and running, you have a lot less to worry about.


3 posted on 04/05/2005 11:38:45 AM PDT by flashbunny (Every thought that enters my head requires its own vanity thread.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: atomic_dog
THey can have my WLAN when they pry it from my cold dead fingers, now what's a WLAN?
4 posted on 04/05/2005 11:41:10 AM PDT by CzarNicky (The problem with bad ideas is that they seemed like good ideas at the time.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: atomic_dog

I didn't realize the WEP could be so easily & quickly compromised.


5 posted on 04/05/2005 11:45:43 AM PDT by Texas_Jarhead (http://www.freerepublic.com/focus/news/1366853/)
[ Post Reply | Private Reply | To 1 | View Replies]

To: atomic_dog

Anyone dumb enough to not use better security deserves to have their system monitored or hacked. Just driving from the airport to my home, about 25 miles, I picked up hundreds of unprotected WLANs, all of which were on major thoroughfares. I could have stopped, tapped into their network, did all sorts of things, then drove on home and no one would have known. If you don't know what you are doing, DON'T DO IT!


6 posted on 04/05/2005 11:46:23 AM PDT by TommyDale
[ Post Reply | Private Reply | To 1 | View Replies]

To: CzarNicky

Wireless Local Area Network


7 posted on 04/05/2005 11:46:30 AM PDT by ReeWalker (Whatever!!)
[ Post Reply | Private Reply | To 4 | View Replies]

To: atomic_dog

Maybe this explains the black van that's been parked across the street all week. Oh never mind, they're leaving now...


8 posted on 04/05/2005 11:50:12 AM PDT by Jack of all Trades
[ Post Reply | Private Reply | To 1 | View Replies]

To: TommyDale

WEP in combination with MAC address limitations (only allow specific MAC addresses) and TURNING OFF THE BROADCAST OF THE SSID will help. Most people do none of these, and they automatically use the default channel 6, set at the factory. Really stupid stuff.


9 posted on 04/05/2005 11:53:48 AM PDT by TommyDale
[ Post Reply | Private Reply | To 6 | View Replies]

To: Texas_Jarhead
>> I didn't realize the WEP could be so easily & quickly compromised.
Indeed, here is a post that I found interesting that was posted on a Linux help forum. I have not yet verified it due to lack of time but it seems pretty genuine to me.
RE: how to secure data on HDD Vs FBI, CIA MI5

As for encryption, it's laughable how crappy pretty much all commercially-available encryption are. Even with the strongest encryption you can find, if they have access to the hard drive, and there's *any* pattern to the encryption scheme (which you need to be able to decrypt the data), then with enough patience they can decrypt it. Period. Depending on the strength of your encryption, it takes more or less time, but as long as you're using an off-the-shelf encryption algorithm, it can be brute forced. In Internet terms, 128-bit encryption is basically the standard. On really top-of-the-line "quantum" encryption, you're looking at 1-4 kilobit encryption. To have any chance of keeping people from decrypting your data before the statute of limitations runs out, you'd need terabit encryption, and even then, there's a chance that somebody brute-forcing the key will get lucky. Unless you have a PhD in cryptography, and are *really* motivated, you basically don't have a chance of encrypting your data such that it can't be decrypted. You can probably deter any recreational hackers, but if somebody knows what they're doing and has a reason to believe that you have something they want, you're an open book.




Now, since I feel like getting sidetracked, and I happen to enjoy cryptography, there is an encryption scheme that cannot be broken short of somebody intercepting the key. The problem is that this particular encryption scheme is incredibly bulky, and the moment you try to port it to a computer-based encryption/decryption, it's no longer unbreakable. I'm talking, of course, of a two-point encryption scheme, where you and I have identical books, each with hundreds of thousands of keys. On the order of 5 keys per page, 2,000 pages per volume, 10+ volumes. Each key different (how many permutations of 50 different characters are there?). In order to encrypt a message, I choose a page and a volume number, which gets sent with the message unencrypted. For each letter of the message (including spaces and punctuation), I use a different key, chosen sequentially. For you to decrypt the message, you *must* know which page to start on, otherwise, you cannot employ traditional cipher-breaking on it.

See, codebreaking, for substitution codes, relies on probability, and a little advance knowledge. In the English language, for example, the letter "E" is the most common, followed by "R", "T", and "S". In order to break a substitution code, I need a frequency table for each character in the encrypted message, and I need to make a few best-guesses based on the frequency of letters, until I get a short word or two that make sense. Other giveaways in English happen when you get a one-letter word. In English, there's exactly two one-letter words, so if your encrypted message has a one-letter word, you know that that character is either "A" or "I". Pretty much every language out there has similar patterns.

When each letter of an encrypted message is encoded using a different encryption key, such decryption method becomes useless, for obvious reasons. :) Incredibly bulky, but it's a way to guarantee that only two people can read the message. Of course, if a copy gets made of the decryption books, or if the books get stolen, you're still screwed.

10 posted on 04/05/2005 11:56:04 AM PDT by Brian328i
[ Post Reply | Private Reply | To 5 | View Replies]

To: Brian328i

Forgot link: http://www.linuxquestions.org/questions/showthread.php?s=&threadid=298889


11 posted on 04/05/2005 11:56:56 AM PDT by Brian328i
[ Post Reply | Private Reply | To 10 | View Replies]

To: atomic_dog

Someone with a laptop and wi-fi, can really mess stuff up, when accessing from a crowded, public place like the airport. Virtually impossible to find the culprit.


12 posted on 04/05/2005 12:00:15 PM PDT by stuartcr
[ Post Reply | Private Reply | To 1 | View Replies]

To: stuartcr

You mean like broadcast a virus or worm, through an unprotected WLAN?


13 posted on 04/05/2005 12:06:45 PM PDT by TommyDale
[ Post Reply | Private Reply | To 12 | View Replies]

To: stuartcr
Interesting that this is posted. Saturday I met with some acquaintances from Minnesota, one of which had a laptop. They were not staying at a motel, but needed to send and receive e-mails. They drove around until they saw a motel that had a sign advertising high speed internet and then parked in their parking lot. The person with the laptop was able to conduct all his business from the motel parking lot and went back several times in the next few days to get on the net.
14 posted on 04/05/2005 12:23:22 PM PDT by CedarDave ("...extraordinarily serene" - words that describe the Pope but not Terri Schiavo in their last hours)
[ Post Reply | Private Reply | To 12 | View Replies]

To: CedarDave

"Interesting that this is posted. Saturday I met with some acquaintances from Minnesota, one of which had a laptop. They were not staying at a motel, but needed to send and receive e-mails. They drove around until they saw a motel that had a sign advertising high speed internet and then parked in their parking lot. The person with the laptop was able to conduct all his business from the motel parking lot and went back several times in the next few days to get on the net."

A younger coworker in my office lives in the city. He and his wife enjoy high-speed wireless connectivity courtesy of their neighbor's unprotected WiFi modem/router. He has no plans to shell out the bucks for his own DSL/Cable Modem connection. He feels he's free-riding rather than steeling because it neither increases the cost nor decreases the service for his neighbor (I doubt the second point--if they're both downloading music or video at the same time they'll both likely have slower speeds).


15 posted on 04/05/2005 12:29:18 PM PDT by mondonico (Peace through Superior Firepower)
[ Post Reply | Private Reply | To 14 | View Replies]

To: TommyDale

Yep, someone could do a lot of cyber damage, from public-access wi-fi, and it would be extremely hard to trace it.


16 posted on 04/05/2005 12:31:21 PM PDT by stuartcr
[ Post Reply | Private Reply | To 13 | View Replies]

To: ShadowAce

Ping


17 posted on 04/05/2005 12:33:13 PM PDT by Born Conservative ("Mr. Chamberlain loves the working man, he loves to see him work" - Winston Churchill)
[ Post Reply | Private Reply | To 1 | View Replies]

To: CedarDave

Just think if they were bad guys.


18 posted on 04/05/2005 12:33:28 PM PDT by stuartcr
[ Post Reply | Private Reply | To 14 | View Replies]

To: stuartcr

Hopefully, an airport wasn't stupid enough to let something like that on their system. I think a lot of this panic is nothing more than hype to sell newer hardware, newer encryption and newer software. I sell a product that actually traces rogue access points, finds unsecured networks, and actually capture traffic with the ID of the culprit. I have found very few really unsecured networks, except for the "Joe Homeowner" who doesn't know what he is doing.


19 posted on 04/05/2005 12:36:19 PM PDT by TommyDale
[ Post Reply | Private Reply | To 16 | View Replies]

To: Texas_Jarhead

They just looked under the keyboards for the WEP keys


20 posted on 04/05/2005 12:37:06 PM PDT by AppyPappy (If You're Not A Part Of The Solution, There's Good Money To Be Made In Prolonging The Problem.)
[ Post Reply | Private Reply | To 5 | View Replies]


Navigation: use the links below to view more comments.
first 1-2021-4041-6061-80 ... 121-129 next last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson