Information Security News mailing list archives

Secret Service patrolling for unsecured wireless networks


From: InfoSec News <isn () c4i org>
Date: Mon, 30 Sep 2002 01:19:18 -0500 (CDT)

Forwarded from: William Knowles <wk () c4i org>

http://www.nandotimes.com/technology/story/555541p-4378549c.html

By D. IAN HOPPER, AP Technology Writer 
 
WASHINGTON (September 29, 2002 1:56 p.m. EDT) - Secret Service agents 
are putting a high-tech twist on the idea of a cop walking the beat. 

Using a laptop computer and an antenna fashioned from a Pringles 
potato chip can, they are looking for security holes in wireless 
networks in the nation's capital. 

The agency best known for protecting the president and chasing down 
counterfeiters has started addressing what it calls one of the most 
overlooked threats to computer networks. 

"Everybody wants wireless, it's real convenient," Special Agent Wayne 
Peterson said. "Security has always been an afterthought." 

The effort is part of a new government plan to build relationships 
with businesses so that they will feel more comfortable reporting 
hacking attempts to authorities. Recent anti-terrorism legislation 
gave the FBI and Secret Service joint jurisdiction over electronic 
crimes. 

Wireless networks are cheap; a small one can start at less than $200. 
They make it easy for workers to wander around with their laptop or 
handheld computers and for visiting employees with their own computers 
to get on to the local office network. 

These networks are becoming common in airports, universities, coffee 
houses, businesses, homes and even some public squares. But they are 
sold with no security measures, and protecting a wireless network from 
hackers takes more knowledge than what network installation guides 
typically offer. 

Because of security concerns, the White House recently proposed 
banning some wireless networks in federal agencies. Faced with 
industry protests, the administration dropped the idea when it 
released a draft version of its cybersecurity plan this month. 

That has led some independent security researchers to drive - or even 
use a private plane to fly - through cities to map networks. Those 
maps, which are usually posted on the Internet, show where a person 
can get a free Internet connection on a private network. 

The Secret Service wants to let businesses know that their Internet 
connections and private networks might be at risk. Companies informed 
about security holes can reconfigure their networks to make them more 
secure. 

Peterson's tools are a laptop, a wireless network card and one of 
three antennae mounted on his car. One is a small metal antenna; the 
second is a large, white, 2-foot-tall tube; the third is a homemade 
antenna made out of a Pringles can. They boost the reception of his 
wireless network card, allowing the agent to point them in different 
directions to get the best signal. 

A Pringles can is ideal because of its shape - a long tube that lets 
someone to point it at specific buildings - and its aluminum inner 
lining. It acts like a satellite dish, collecting signals and bouncing 
them to the receiver, which is then wired into a laptop. 

Peterson recently drove down a major Washington street and found over 
20 wireless networks, many of which had no security at all. Peterson 
said his probes are part of good police work, like a patrolman driving 
through a neighborhood. 

"I feel it is part of crime prevention to knock on the door," Peterson 
said. 

The act of "wardriving," a term taken from older "wardialing" programs 
that called random telephone numbers looking for unlisted modems, has 
become so prevalent that enthusiasts are using chalk marks on streets 
and sidewalks to point out networks in public places. 

Peterson said there has not been any reported "warchalking" in the 
Washington area yet, but if one was found, agents would alert the 
network owner. 

Chris McFarland, head of the Secret Service's Electronic Crimes Task 
Force, said his agents have begun evaluating computer security along 
with other concerns when they scout out a place where the president or 
other protected dignitary will go. 

McFarland said, for example, that agents have had extensive 
discussions with officials at George Washington Hospital about 
improving its wireless network security. 

While the agents plan to offer their expertise to anyone who asks, 
they are focusing on places most important to their mission of 
protecting public officials. The hospital is several blocks from the 
White House and treated Vice President Dick Cheney during his heart 
problems. 

Agents also checked out computer systems at the Salt Lake City 
Olympics, last year's Super Bowl and the World Bank in advance of 
weekend protests. 

"People can wreak havoc with these systems very easily," McFarland 
said. "It's almost like triage." 


 
*==============================================================*
"Communications without intelligence is noise;  Intelligence
without communications is irrelevant." Gen Alfred. M. Gray, USMC
================================================================
C4I.org - Computer Security, & Intelligence - http://www.c4i.org
*==============================================================*



-
ISN is currently hosted by Attrition.org

To unsubscribe email majordomo () attrition org with 'unsubscribe isn'
in the BODY of the mail.


Current thread: