http://www.eastvalleytribune.com/index.php?sty=37537 EMILY BEHRENDT March 7, 2005 The Tempe-based University of Advancing Technology will be "wardriving" around Valley neighborhoods this year. Although it sounds hostile, it's actually for the benefit of Valley residents. Wardriving is a term for finding unsecured wireless access points, which are locations where an outsider could hack into a home computer system because the wireless signal extends beyond the walls of the house. Any laptop that comes in range of the signal would be able to connect to the home computers and potentially create all kinds of mischief, including identify theft or other Internet crimes. Most people who have wireless computer networks inside their homes are not even aware they are at risk, said Raymond Todd Blackwood, IT manager for the university. The school's students have begun working on a research project to find home computers that are vulnerable and try to increase awareness of the problem in the community. "What we are not doing is, we are not connecting at all," Blackwood said. "All we are doing is looking for those signals being broadcast." For the project, the Valley has been split into four grids, with Central Avenue and Camelback Road dividing the quadrants. The students are responsible for covering their assigned area within four weeks, and their data are collected monthly. Their findings are then put into a database, and the unsecured access points are plotted on a map. When the students wardrive, they use an IBM laptop running the Linux operating system, a program called Kismet and a global positioning system locator. The locator is a hand-held device that plugs into the laptop through a serial port and logs the specific coordinates. The students drive around neighborhoods, apartment complexes and business areas, and the Kismet program will tell them when a wireless frequency is present. "This would kind of be equivalent to a person walking around and checking to make sure people's front doors are locked," Blackwood said. During the first two weeks of the project, students discovered 16,000 unsecured access points, and they had only covered one third of the Valley. The students will collect the data every month for one year. Once all the data are collected and logged, the school will determine the highest concentrations of unsecured wireless access points. They will then launch a campaign in those neighborhoods to educate people about the potential risks. "We want to know how popular wireless is, and how much do people know about it." Blackwood said, "We are trying to provide clear, easy to understand information, and increase sophistication and awareness in the community." Securing a network is simple. Under the network settings, there is a button to "enable wireless encryption protocol." Simply clicking that button will encrypt the signal and secure the network, Blackwood said. The default option leaves the network unsecured. _________________________________________ Bellua Cyber Security Asia 2005 - http://www.bellua.com/bcs2005
This archive was generated by hypermail 2.1.3 : Tue Mar 08 2005 - 00:33:14 PST