Vulnerability Development mailing list archives

Re: Wireless Legality- Netstumbler and kin


From: "Eduardo Cruz" <eduardo.cruz () tsg com>
Date: Sun, 17 Mar 2002 06:08:55 +0100

The frequencies used are all open to the public.

AFAIK the frequencies of a radar trap are open to the public.

Again, this goes against the classic issue with the house with the open
door.
Police use this example for anything related with hackers and systems with
bugs.
And probably there will be an implication in if even they are a bunch of
public frequencies you
are not supposed to sniff/getinto anything in what you dont have any
permission.

edu.



----- Original Message -----
From: "Ralf Dreibrodt" <ralf () dreibrodt de>
To: "ZeroBreak" <ZeroBreak () softhome net>
Cc: "Security Focus - Vulnerability Development"
<vuln-dev () securityfocus com>
Sent: Saturday, March 16, 2002 8:23 PM
Subject: Re: Wireless Legality- Netstumbler and kin


Hi,

one example:

ZeroBreak wrote:
The frequencies used are all open to the public.

AFAIK the frequencies of a radar trap are open to the public.

 > It does not send out any
probes, it sits in promiscuous mode and pulls in packets and gives an
output like netstumbler. That goes a step further than netstumbler. Your
card isn't sending anything at all it's just listening.

a radar warning system is only listenig to the "pakets" and gives an
alarm.

in the meanwhile in germany every policemen is allowed to seize a radar
warning system, if he sees one. it even doesn't have to be switched on.

perhaps there is any lawyer on the list?!?

i will see one in about one month, perhaps i can ask for his opinion
about sniffing in an unprotected wireless lan, but i think at least in
germany it is not allowed.

bye
Ralf



Current thread: