Let us please be civil and as always, Caveat Lector. ======================================================================== Archives Available at:
http://www.mail-archive.com/[EMAIL PROTECTED]/ <A HREF="">ctrl</A> ======================================================================== To subscribe to Conspiracy Theory Research List[CTRL] send email: SUBSCRIBE CTRL [to:] [EMAIL PROTECTED]
To UNsubscribe to Conspiracy Theory Research List[CTRL] send email: SIGNOFF CTRL [to:] [EMAIL PROTECTED]
Om
--- Begin Message ----Caveat Lector- http://www.thefeature.com/article?articleid=100663&ref=1179035 Security: Knocking Out Wireless Networks with a PDA By Mark Frauenfelder, Fri May 21 21:15:00 GMT 2004Over the shelf equipment as inexpensive as Wi-Fi PDAs or a cheap laptop can be used to take down a Wi-Fi base station. Time to shore up your home or office network. Some PhD students at the Queensland University of Technology's Information Security Research Center have discovered a way to use an off-the-shelf PDA to temporarily disable wireless security cameras. This Wi-Fi based system can also be used to "jam all wireless devices within a one kilometer radius using any wireless-enabled computing device and can take down an entire network in seconds if the base station is within range." Furthermore, this kind of mischief is almost impossible to trace, and even to identify, since it looks like network congestion. Associate Professor Mark Looi, deputy head of Queensland University of Technology's School of Software Engineering and Data Communications, said, "Any organization that continues to use the standard wireless technology, 802.11b, to operate critical infrastructure could be considered negligent." According to the researchers, no special software is needed. You just have to know which commands to send using the software that comes with the PDA. How soon before this nasty little hack hits the street, or airwaves? =========================== http://theage.com.au/articles/2004/05/17/1084646114738.html Attack jams spy cameras By Adam Turner May 18, 2004 Next An electronic invisibility cloak generated by nothing more than an off-the-shelf PDA would allow intruders to elude wireless security cameras using vulnerabilities in the most common wireless technologies. There is no defence against such a Mission Impossible-style attack, revealed last week, which can be used to knock out wireless networks and possibly transfer unwitting users to a spoofed wireless network. Accidentally discovered last year by PhD students at the Queensland University of Technology's Information Security Research Centre, the exploit presents obvious applications for terrorism and espionage. The vulnerability is "trivial" to exploit and only took 30 minutes to master, says Associate Professor Mark Looi, deputy head of QUT's School of Software Engineering and Data Communications. "It just uses off-the-shelf hardware and you don't need to write specific software, you just need to know the correct commands to use with the software that's supplied. On a difficulty rating of one to 10, it's probably a two," Looi says. The vulnerability exists in all flavours of the 802.11b wireless protocol and some types of 802.11g, including Apple's Airport Extreme technology. It affects equipment from all manufacturers, running with all operating systems. The exploit allows users to jam all wireless devices within a one kilometre radius using any wireless-enabled computing device and can take down an entire network in seconds if the base station is within range. The source of such an attack would be extremely difficult to trace and network recovery is immediate, making it appear to administrators as simply network congestion. A hand-held device could be used to temporarily jam wireless security cameras or disrupt a wireless network at a critical moment to create a diversion or cover unauthorised activity. Such a device could be pre-programmed or activated remotely using GPRS. As the exploit can be targeted at specific networks, it could be used to hijack users by jamming a wireless network and causing wireless devices to automatically detect and connect to a fake network, the default setting for most wireless devices. "Any organisation that continues to use the standard wireless technology, 802.11b, to operate critical infrastructure could be considered negligent," Looi says. Encryption and Medium Access Control address filtering is powerless to stop such an attack, which targets devices using Direct Sequence Spread Spectrum technology. The vulnerability takes advantage of the collision avoidance feature used to minimise the likelihood of two devices transmitting simultaneously. It causes all devices and access points within range to behave as if the channel is always busy and defer data transmission. "Normal frequency jamming needs high-powered, non-consumer grade equipment, but we're using existing wireless network infrastructure," Looi says. "Rather than jamming the whole frequency, we're tricking the network into thinking the network is unavailable." The Information Security Research Centre has been working with Australia's national computer emergency response team, AusCERT, to alert manufacturers since the discovery was made last November. After six months, a defence is yet to be found. ------------------------ Yahoo! Groups Sponsor ---------------------~--> Make a clean sweep of pop-up ads. Yahoo! Companion Toolbar. Now with Pop-Up Blocker. Get it for free! http://us.click.yahoo.com/L5YrjA/eSIIAA/yQLSAA/TySplB/TM ---------------------------------------------------------------------~-> -__ ___ _ ___ __ ___ _ _ _ __ /-_|-0-\-V-/-\|-|-__|-|-|-/-_| \_-\--_/\-/|-\\-|-_||-V-V-\_-\ |__/_|--//-|_|\_|___|\_A_/|__/ SPY NEWS is OSINT newsletter and discussion list associated to Mario's Cyberspace Station - The Global Intelligence News Portal http://mprofaca.cro.net ######## CAUTION! ######### Since you are receiving and reading documents, news stories, comments and opinions not only from so called (or self-proclaimed) "reliable sources", but also a lot of possible misinformation collected by Spy News moderator and subscribers and posted to Spy News for OSINT purposes - it should be a serious reason (particularly to journalists and web publishers) to think twice before using it for their story writing, further publishing or forwarding throughout Cyberspace. To unsubscribe: mailto:[EMAIL PROTECTED] *** FAIR USE NOTICE: This message contains copyrighted material whose use has not been specifically authorized by the copyright owner. Spy News is making it available without profit to SPY NEWS eGroup members who have expressed a prior interest in receiving the included information in their efforts to advance the understanding of intelligence and law enforcement organizations, their activities, methods, techniques, human rights, civil liberties, social justice and other intelligence related issues, for non-profit research and educational purposes only. We believe that this constitutes a 'fair use' of the copyrighted material as provided for in section 107 of the U.S. Copyright Law. If you wish to use this copyrighted material for purposes of your own that go beyond 'fair use,' you must obtain permission from the copyright owner. For more information go to: http://www.law.cornell.edu/uscode/17/107.shtml ----------------------------------------------- SPY NEWS home page: http://groups.yahoo.com/group/spynews Mario Profaca http://mprofaca.cro.net/ Yahoo! Groups Links <*> To visit your group on the web, go to: http://groups.yahoo.com/group/spynews/ <*> To unsubscribe from this group, send an email to: [EMAIL PROTECTED] <*> Your use of Yahoo! Groups is subject to: http://docs.yahoo.com/info/terms/ www.ctrl.org DECLARATION & DISCLAIMER ========== CTRL is a discussion & informational exchange list. Proselytizing propagandic screeds are unwelcomed. Substanceâ??not soap-boxingâ??please! These are sordid matters and 'conspiracy theory'â??with its many half-truths, mis- directions and outright fraudsâ??is used politically by different groups with major and minor effects spread throughout the spectrum of time and thought. That being said, CTRLgives no endorsement to the validity of posts, and always suggests to readers; be wary of what you read. CTRL gives no credence to Holocaust denial and nazi's need not apply. Let us please be civil and as always, Caveat Lector. ======================================================================== Archives Available at: http://www.mail-archive.com/[EMAIL PROTECTED]/ <A HREF="http://www.mail-archive.com/[EMAIL PROTECTED]/">ctrl</A> ======================================================================== To subscribe to Conspiracy Theory Research List[CTRL] send email: SUBSCRIBE CTRL [to:] [EMAIL PROTECTED] To UNsubscribe to Conspiracy Theory Research List[CTRL] send email: SIGNOFF CTRL [to:] [EMAIL PROTECTED] Om
--- End Message ---