AOH :: ISN-2665.HTM

Authorities warn of wireless cyber pirates




Authorities warn of wireless cyber pirates
Authorities warn of wireless cyber pirates



http://www.9news.com/acm_news.aspx?OSGNAME=KUSA&IKOBJECTID=1db245df-0abe-421a-019d-d112657c4feb&TEMPLATEID=0c76dce6-ac1f-02d8-0047-c589c01ca7bf 

By Ward Lucas  
I-Team Reporter 
6/28/2006 

DOUGLAS COUNTY - The Sheriff's Department says it's going to start
warning computer users that their networks may be vulnerable to
hackers.

It may be one of the first law enforcement agencies in the country to
do so.

Wireless computer equipment and home computer networks are everywhere
these days. Almost all new computers sold are used by consumers to
network in one way or another to other computers.

However, that wireless capability may be making those computers
vulnerable to hackers.

"If someone is driving by on the street they could easily use your
internet access to commit a crime, whether it's fraudulent credit card
transactions or surfing child porn or something else," said Brian
Radamacher, a member of the Douglas County Sheriff's Special
Investigations Unit.

Wireless computer equipment sends out signals that sometimes broadcast
for up to a mile.

Other computer users can home in on those signals and use them to
access the internet.

Radamacher says hackers can use stolen Internet access to make
fraudulent credit card purchases or bank transfers.

He also says hackers can upload or download such things as child
pornography.

That activity would be completely invisible to the legitimate owner of
that network.

However, it could make innocent computer users vulnerable to having
their computers confiscated during police investigations.

"The unfortunate thing is when we go to issue the warrants or
something else you may end up getting your computer seized because of
it," said Radamacher. "A lot of times it can take months to get your
computer back after the processing."

The Sheriff's Department plans to equip several of its community
service and patrol cars with devices that detect unprotected computer
networks.

In cases where investigators can figure out who owns the networks,
they'll try to warn of potential security issues. They'll also drop
off brochures with instructions to computer users on how to password
protect their networks.

Copyright by KUSA-TV, All Rights Reserved



_________________________________
Attend the Black Hat Briefings and
Training, Las Vegas July 29 - August 3
2,500+ international security experts from 40 nations,
10 tracks, no vendor pitches.
www.blackhat.com 

Site design & layout copyright © 1986-2014 CodeGods