. 24/7 Space News .
Wireless World: WiFi 'Vampires' Attack

What makes things even more complicated is although most open networks are public, more and more suburbanites and urbanites are installing WiFi access in their homes, and paying a subscription fee for it. Because most people are not very literate technically, they may not know how to set up encryption or other security features.
by Gene J. Koprowski
Chicago (UPI) July 15, 2005
If a squatter moved in next door, and ran electrical extension cords from his living room to an outlet on your patio, you might object to his obvious pirating of your electricity - because his actions would be obvious.

Many computer criminals around the country likewise may be stealing, but in this case the commodity is broadband WiFi access. Because the thefts occur over invisible wireless networks, however, most victims do not know about it, experts told UPI's Wireless World.

"Having your WiFi signal stolen is a real risk today," said Janet Kumpu, president and chief executive officer of Fortress Technologies in Tampa, Fla., a networking software developer. "It's not just hackers who want to break into an e-mail account. They want to use your network for their own broadband connection."

A suspect was arrested recently in Florida allegedly for doing just that. Police arrested Benjamin Smith III, age 41, reportedly for accessing a computer network without authorization - a third-degree felony.

According to the police in St. Petersburg, Fla., the suspect was sitting in his SUV using a laptop computer outside the home of Richard Dinon.

This kind of thing, cyber-squatting, is more common than a casual observer may suspect, experts said.

"Years ago, before I had a clue how WiFi worked, and when I lived in a condo, my bandwidth was always dog slow," said Robert Siciliano, an ID theft expert and security consultant in Boston.

"Then my computer geek friend came over and discovered that my neighbor was running a peer-to-peer program - Kazaa - next door off of my wireless connection."

Sometimes, the piracy may be unintentional.

"Recently, I rented a vacation condo that included WiFi access," said Ted Demopoulos, an IT consultant and professional speaker in Durham, N.H. "There were two equally strong and wide open signals. Which one was I supposed to use?"

WiFi networks are generally set up in one of three ways, experts said. Sometimes, they may be visible and open - and require no password to access. They also may be visible and password protected, or may be hidden and password protected.

What makes things even more complicated is although most open networks are public, more and more suburbanites and urbanites are installing WiFi access in their homes, and paying a subscription fee for it. Because most people are not very literate technically, they may not know how to set up encryption or other security features.

"The hackers go there," said Wayne Burkan, vice president of marketing at Interlink Networks in Ann Arbor, Mich., a WiFi security company. "They know that the networks of companies are protected, but those of homeowners are not."

There are Internet sites for hackers such as wigle.net, which aggregate data for the computer criminals and let them know what networks in what neighborhoods may be vulnerable, Burkan said. "My guess is that 50-70 percent of networks are not protected."

Burkan said that the risks of hacking into a WiFi network are greater for consumers than those posed by hacking into a landline network. That is because the passwords and user names are transmitted wirelessly for particular accounts and therefore can be grabbed.

When someone acquires that information, "they can log into any Internet account as if they are you," Burkan said. "These people are information vampires - ready to suck the life out of you."

Some experts doubt whether criminal prosecution of any WiFi offenders will succeed, however.

Attorney Evan Barr, formerly the chief of the major crimes unit at the U.S. Attorney's office for the Southern District of New York, and now a lawyer with Steptoe & Johnson, said the courts long have held it is not illegal to intercept calls placed by users of cordless and mobile phones.

"That's because people who use these devices do not have any reasonable expectation of privacy under the Fourth Amendment," Barr said. "WiFi basically operates on the same principle as these devices, so it seems unlikely that a prosecution for stealing a WiFi signal could withstand judicial scrutiny."

Gene Koprowski is a 2005 Lilly Endowment Award Winner for his columns for United Press International. He covers networking and telecommunications for UPI Science News.

Related Links
SpaceDaily
Search SpaceDaily
Subscribe To SpaceDaily Express

LockMart Contracted By US Army To Develop Next-Gen Army Knowledge Online
Manassas VA (SPX) Jul 15, 2005
Lockheed Martin has been awarded a $152 million contract to lead the development, integration and maintenance of Army Knowledge Online (AKO), the U.S. Army's primary internal web portal.



Thanks for being here;
We need your help. The SpaceDaily news network continues to grow but revenues have never been harder to maintain.

With the rise of Ad Blockers, and Facebook - our traditional revenue sources via quality network advertising continues to decline. And unlike so many other news sites, we don't have a paywall - with those annoying usernames and passwords.

Our news coverage takes time and effort to publish 365 days a year.

If you find our news sites informative and useful then please consider becoming a regular supporter or for now make a one off contribution.
SpaceDaily Contributor
$5 Billed Once


credit card or paypal
SpaceDaily Monthly Supporter
$5 Billed Monthly


paypal only














The content herein, unless otherwise known to be public domain, are Copyright 1995-2016 - Space Media Network. All websites are published in Australia and are solely subject to Australian law and governed by Fair Use principals for news reporting and research purposes. AFP, UPI and IANS news wire stories are copyright Agence France-Presse, United Press International and Indo-Asia News Service. ESA news reports are copyright European Space Agency. All NASA sourced material is public domain. Additional copyrights may apply in whole or part to other bona fide parties. Advertising does not imply endorsement, agreement or approval of any opinions, statements or information provided by Space Media Network on any Web page published or hosted by Space Media Network. Privacy Statement All images and articles appearing on Space Media Network have been edited or digitally altered in some way. Any requests to remove copyright material will be acted upon in a timely and appropriate manner. Any attempt to extort money from Space Media Network will be ignored and reported to Australian Law Enforcement Agencies as a potential case of financial fraud involving the use of a telephonic carriage device or postal service.