Security Basics mailing list archives

Re: Wireless Security (Part 2)


From: "Robb Wait" <waitb () telus net>
Date: Wed, 17 May 2006 12:13:06 -0700

With respect for your valid concerns,

I really think that you have to simplify the problem.

As I see it, somehow someone has 'stumbled unintentionally' into your 'residence' uninvited but un-impeded.

Unfortunately for them they had stepped in something that made their 'tracks' visible and you have been able to retrace their steps and have discovered their 'residential address'.

The question is:

"Do you as a private citizen have the right to enter their 'house' at that 'address' to see if they took anything or to find 'evidence' of who they are or what they may be up to otherwise?"

I think anyone who has read the Constitution and reviewed legal decisions in a history class can tell you the answer.

Only under extreme circumstances, allegedly, can the government - without a search warrant, do this this.

Why would you ever think that your written word, on a 'sign post' at your residence, would give you the color of right to go into someone else's 'residence' without legal authority and a valid lawful 'search warrant'?

Now, if you catch them inside your 'house', you could, if you had to, detain them, or, in extreme situations, legally use 'deadly force' to protect you and yours but again only while they are 'on your property'.

Sending a 'death ray' over a wireless connection could certainly be classed as 'indiscriminate mayhem' and a feat that the government would call 'virus propagation' and is therefore unlawful.

And ... You can't chase them down the street shooting at them, you can only follow until you get to their 'door'. Then you have to call in the 'law'.

You been watching too many movies and taking them too seriously, you are not a 'law unto yourself'..unless you are 'a country of one'.

But.... If someone were to 'intentionally break into an 'infectious lab' with appropriate warnings posted and 'secured doors' and 'catches' a 'virulent strain' that somehow hurts them or 'their property' after they leave, now this could be viewed as self mutilation', 'immolation', or 'maybe even suicide'.

Best regards
Robb Wait

----- Original Message ----- From: "Bob Radvanovsky" <rsradvan () unixworks net> To: "Craig Wright" <cwright () bdosyd com au>; <hfebelingjr () lycos com>; <security-basics () securityfocus com>
Sent: Tuesday, May 16, 2006 11:02 AM
Subject: RE: Wireless Security (Part 2)


Standard warning banner disclaimer that works at ALL levels:

!!!!!!  W A R N I N G  !!!!!!

THIS IS A PRIVATE COMPUTER SYSTEM.
UNAUTHORIZED ACCESS IS STRICTLY PROHIBITED.

This computer system including all related equipment, network devices
(specifically including Internet access), are provided only for authorized use.
All computer systems may be monitored for all lawful purposes, including to
ensure that their use is authorized, for management of the system, to facilitate
protection against unauthorized access, and to verify security procedures,
survivability and operational security. Monitoring includes active attacks by authorized personnel and their entities to test or verify the security of the
system. During monitoring, information may be examined, recorded, copied and
used for authorized purposes. All information including personal information,
placed on or sent over this system may be monitored. Uses of this system,
authorized or unauthorized, constitutes consent to monitoring of this system. Unauthorized use may subject you to criminal prosecution. Evidence of any such
unauthorized use collected during monitoring may be used for administrative,
criminal or other adverse action. Use of this system constitutes consent to
monitoring for these purposes.


----- Original Message -----
From: Craig Wright [mailto:cwright () bdosyd com au]
To: hfebelingjr () lycos com, security-basics () securityfocus com
Subject: RE: Wireless Security (Part 2)



Hello,
CERT, SANS and the IEEE all have detailed taxonomies.

CARNEGIE MELLON UNIVERSITY has a few dissertations available on the
topic.

Craig

-----Original Message-----
From: Ebeling, Jr., Herman Frederick [mailto:hfebelingjr () lycos com]

Sent: Tuesday, 16 May 2006 7:34 AM
To: security-basics () securityfocus com
Subject: Wireless Security (Part 2)



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

A few months back we had a discussion going about whether or not a
person who has setup a Wi-Fi network for their and their families
use.  And IF someone illegally connects to said network if the person
who setup the network has the right to go into the other person's
computer to find out who they are.  The consensus is/was that sadly
no the person who setup the Wi-Fi network doesn't have the right to
go into the intruder's computer to find out who they are.

What IF the person who sets up the Wi-Fi network has a web page, or a
dialog box that is displayed that says the following whenever a new
computer signs onto the network:

WARNING

   You have connected to a PRIVATE COMPUTER NETWORK

IF you were NOT invited to join the network then leave now.
IF you continue to use the network, know that by doing so
you consent to having your computer inspected for the purpose
of finding out who you are so that the proper authorities can
be notified.
IF you leave now no actions will be taken, but IF you continue
then the appropriate actions WILL be taken, you have been WARNED.
This is your ONLY warning, leave NOW.
Also know that along with your name your computers MAC address will
also be recorded, and blocked in the future.

If the above is setup as a web page then the capitalized words
would
be in bold as well as red to catch the person's attention.  Also with
the above they wouldn't be able to say that they weren't warned,
correct?

- -----
Herman
Live Long and Prosper
 ___________________          _-_
 \==============_=_/ ____.---'---`---.____
             \_ \    \----._________.----/
               \ \   /  /    `-_-'
           __,--`.`-'..'-_
          /____          ||-
               `--.____,-'

-----BEGIN PGP SIGNATURE-----
Version: PGP 8.0.3
Comment: Space the Final Frontier

iQA/AwUBRGjzqx/i52nbE9vTEQL2VgCfa6k5g7v+iXyLAWn8x0C4puoejFIAnA0l
pyeqL5W4eOfzDQCLuHEk31Q/
=c+u5
-----END PGP SIGNATURE-----




Liability limited by a scheme approved under Professional Standards
Legislation in respect of matters arising within those States and
Territories of Australia where such legislation exists.

DISCLAIMER
The information contained in this email and any attachments is confidential.
If you are not the intended recipient, you must not use or disclose the
information. If you have received this email in error, please inform us
promptly by reply email or by telephoning +61 2 9286 5555. Please delete the
email and destroy any printed copy.


Any views expressed in this message are those of the individual sender. You
may not rely on this message as advice unless it has been electronically
signed by a Partner of BDO or it is subsequently confirmed by letter or fax
signed by a Partner of BDO.

BDO accepts no liability for any damage caused by this email or its
attachments due to viruses, interference, interception, corruption or
unauthorised access.




Current thread: