Man Arrested for Stealing Wi-Fi Access...Among Other Things
Dexter
Vancouver, BC Canada
Toronto police laid a theft of communications charge after busting a man driving the wrong way down a one-way street, downloading child porn using stolen wireless Internet signals. The slow moving car was pulled over around 5 a.m. on Wednesday by a police officer who allegedly found the pantsless driver watching a movie of a 10-year-old girl performing fellatio on an adult on his laptop. Police allege the man downloaded the movie using an Internet connection he intercepted from a nearby house.
Source: Canoe.caStealing Internet is becoming more common among perverts trying to avoid online detection. It's also a way they invade someone else's computer which could have serious ramifications for unsuspecting wireless Internet subscribers, police say.
0
Comments
I couldn't help but laugh at this part. Besides the child porn part. Pantsless wrong way-wardriver.
People really need to learn how to encrypt their wireless networks. My friend at UCLA could access multiple networks at a time in his apt. complex if he chose to do so, none of them encrypted and some with shared folders and devices.
Gobbles
Furthermore, WPA (WEP's successor) is almost impossible to break, because it's a 128/256 bit WEP key that the USER chooses cycling every minute or so. It's a technical impossibility at this time to:
A) Break the current key and inject a payload in under a minute
or
B) Find a pattern and tap into it. Because the user picks the first key, people can't use known WPA patterns.
Even with "weak" technologies like WEP, if people just turned it on wireless would be A LOT more secure. I went out with netstumbler around my town and a laptop just for fun (picking up SSID beacons doesnt break any laws! even tho this teacher tried to tell me I was doing something illegal..) and I found 250+ APs and I think maybe 12 of them were using WEP and most of them using it were pay access points in some coffee shops around town that charge visitors a fee to get the access code to get on their wireless node. If everyone with wireless APs in their homes just used WEP which is so simple to set up and disabled their SSID beacons after initial setup then their networks would be so much more secure, but, people are lazy and they just toss it out of the box and go.
Everyone goes to Best Buy, purchases a WAP, comes home, plugs it in, and never pays attention to it again.
They don't enable WEP, disable SSID beacon, change key indexes.. Nothing.
The wireless insecurity issue is born right out of the fact that people are, for the most part, electronically retarded.
because the WEP keys on the access point has to match the cards and the user makes up the key string to use, and if it came enabled with a default key, people could easily found out what it was
Just curious, how long does it take to 'break' into a wireless network that's only using MAC filtering?