-Caveat Lector- www.ctrl.org DECLARATION & DISCLAIMER ========== CTRL is a discussion & informational exchange list. Proselytizing propagandic screeds are unwelcomed. Substance—not soap-boxing—please! These are sordid matters and 'conspiracy theory'—with its many half-truths, mis- directions and outright frauds—is used politically by different groups with major and minor effects spread throughout the spectrum of time and thought. That being said, CTRLgives no endorsement to the validity of posts, and always suggests to readers; be wary of what you read. CTRL gives no credence to Holocaust denial and nazi's need not apply.

Let us please be civil and as always, Caveat Lector. ======================================================================== Archives Available at:

http://www.mail-archive.com/[EMAIL PROTECTED]/ <A HREF="">ctrl</A> ======================================================================== To subscribe to Conspiracy Theory Research List[CTRL] send email: SUBSCRIBE CTRL [to:] [EMAIL PROTECTED]

To UNsubscribe to Conspiracy Theory Research List[CTRL] send email: SIGNOFF CTRL [to:] [EMAIL PROTECTED]

Om

--- Begin Message ---
-Caveat Lector-

http://www.thefeature.com/article?articleid=100663&ref=1179035
Security: Knocking Out Wireless Networks with a PDA
By Mark Frauenfelder, Fri May 21 21:15:00 GMT 2004

Over the shelf equipment as inexpensive as Wi-Fi PDAs or a cheap laptop can
be used to take down a Wi-Fi base station. Time to shore up your home or
office network.

Some PhD students at the Queensland University of Technology's Information
Security Research Center have discovered a way to use an off-the-shelf PDA
to temporarily disable wireless security cameras. This Wi-Fi based system
can also be used to "jam all wireless devices within a one kilometer radius
using any wireless-enabled computing device and can take down an entire
network in seconds if the base station is within range."

Furthermore, this kind of mischief is almost impossible to trace, and even
to identify, since it looks like network congestion. Associate Professor
Mark Looi, deputy head of Queensland University of Technology's School of
Software Engineering and Data Communications, said, "Any organization that
continues to use the standard wireless technology, 802.11b, to operate
critical infrastructure could be considered negligent."

According to the researchers, no special software is needed. You just have
to know which commands to send using the software that comes with the PDA.
How soon before this nasty little hack hits the street, or airwaves?

===========================
http://theage.com.au/articles/2004/05/17/1084646114738.html
Attack jams spy cameras
By Adam Turner
May 18, 2004
Next

An electronic invisibility cloak generated by nothing more than an
off-the-shelf PDA would allow intruders to elude wireless security cameras
using vulnerabilities in the most common wireless technologies.

There is no defence against such a Mission Impossible-style attack, revealed
last week, which can be used to knock out wireless networks and possibly
transfer unwitting users to a spoofed wireless network.

Accidentally discovered last year by PhD students at the Queensland
University of Technology's Information Security Research Centre, the exploit
presents obvious applications for terrorism and espionage.

The vulnerability is "trivial" to exploit and only took 30 minutes to
master, says Associate Professor Mark Looi, deputy head of QUT's School of
Software Engineering and Data Communications.

"It just uses off-the-shelf hardware and you don't need to write specific
software, you just need to know the correct commands to use with the
software that's supplied. On a difficulty rating of one to 10, it's probably
a two," Looi says.

The vulnerability exists in all flavours of the 802.11b wireless protocol
and some types of 802.11g, including Apple's Airport Extreme technology. It
affects equipment from all manufacturers, running with all operating
systems.

The exploit allows users to jam all wireless devices within a one kilometre
radius using any wireless-enabled computing device and can take down an
entire network in seconds if the base station is within range. The source of
such an attack would be extremely difficult to trace and network recovery is
immediate, making it appear to administrators as simply network congestion.

A hand-held device could be used to temporarily jam wireless security
cameras or disrupt a wireless network at a critical moment to create a
diversion or cover unauthorised activity. Such a device could be
pre-programmed or activated remotely using GPRS.

As the exploit can be targeted at specific networks, it could be used to
hijack users by jamming a wireless network and causing wireless devices to
automatically detect and connect to a fake network, the default setting for
most wireless devices.

"Any organisation that continues to use the standard wireless technology,
802.11b, to operate critical infrastructure could be considered negligent,"
Looi says.

Encryption and Medium Access Control address filtering is powerless to stop
such an attack, which targets devices using Direct Sequence Spread Spectrum
technology.

The vulnerability takes advantage of the collision avoidance feature used to
minimise the likelihood of two devices transmitting simultaneously. It
causes all devices and access points within range to behave as if the
channel is always busy and defer data transmission.

"Normal frequency jamming needs high-powered, non-consumer grade equipment,
but we're using existing wireless network infrastructure," Looi says.
"Rather than jamming the whole frequency, we're tricking the network into
thinking the network is unavailable."

The Information Security Research Centre has been working with Australia's
national computer emergency response team, AusCERT, to alert manufacturers
since the discovery was made last November. After six months, a defence is
yet to be found.





------------------------ Yahoo! Groups Sponsor ---------------------~-->
Make a clean sweep of pop-up ads. Yahoo! Companion Toolbar.
Now with Pop-Up Blocker. Get it for free!
http://us.click.yahoo.com/L5YrjA/eSIIAA/yQLSAA/TySplB/TM
---------------------------------------------------------------------~->

-__ ___ _ ___ __ ___ _ _ _ __
/-_|-0-\-V-/-\|-|-__|-|-|-/-_|
\_-\--_/\-/|-\\-|-_||-V-V-\_-\
|__/_|--//-|_|\_|___|\_A_/|__/

 SPY NEWS is OSINT newsletter and discussion list associated to
Mario's Cyberspace Station - The Global Intelligence News Portal
 http://mprofaca.cro.net

######## CAUTION! #########
 Since you are receiving and reading documents, news stories,
comments and opinions not only from so called (or self-proclaimed)
"reliable sources", but also a lot of possible misinformation collected
by Spy News moderator and subscribers and posted to Spy News
for OSINT purposes - it should be a serious reason (particularly to
journalists and web publishers) to think twice before using it for their
story writing, further publishing or forwarding throughout Cyberspace.

To unsubscribe:
mailto:[EMAIL PROTECTED]

*** FAIR USE NOTICE: This message contains copyrighted material whose use has not been 
specifically authorized by the copyright owner. Spy News is making it available 
without profit to SPY NEWS eGroup members who have expressed a prior interest in 
receiving the included information in their efforts to advance the understanding of 
intelligence and law enforcement organizations, their activities, methods, techniques, 
human rights, civil liberties, social justice and other intelligence related issues, 
for non-profit research and educational purposes only. We believe that this 
constitutes a 'fair use' of the copyrighted material as provided for in section 107 of 
the U.S. Copyright Law. If you wish to use this copyrighted material for purposes of 
your own that go beyond 'fair use,' you must obtain permission from the copyright 
owner.
For more information go to:
http://www.law.cornell.edu/uscode/17/107.shtml

 -----------------------------------------------

 SPY NEWS home page:
 http://groups.yahoo.com/group/spynews

 Mario Profaca
 http://mprofaca.cro.net/
Yahoo! Groups Links

<*> To visit your group on the web, go to:
     http://groups.yahoo.com/group/spynews/

<*> To unsubscribe from this group, send an email to:
     [EMAIL PROTECTED]

<*> Your use of Yahoo! Groups is subject to:
     http://docs.yahoo.com/info/terms/



www.ctrl.org
DECLARATION & DISCLAIMER
==========
CTRL is a discussion & informational exchange list. Proselytizing propagandic
screeds are unwelcomed. Substanceâ??not soap-boxingâ??please!   These are
sordid matters and 'conspiracy theory'â??with its many half-truths, mis-
directions and outright fraudsâ??is used politically by different groups with
major and minor effects spread throughout the spectrum of time and thought.
That being said, CTRLgives no endorsement to the validity of posts, and
always suggests to readers; be wary of what you read. CTRL gives no
credence to Holocaust denial and nazi's need not apply.

Let us please be civil and as always, Caveat Lector.
========================================================================
Archives Available at:

http://www.mail-archive.com/[EMAIL PROTECTED]/
<A HREF="http://www.mail-archive.com/[EMAIL PROTECTED]/">ctrl</A>
========================================================================
To subscribe to Conspiracy Theory Research List[CTRL] send email:
SUBSCRIBE CTRL [to:] [EMAIL PROTECTED]

To UNsubscribe to Conspiracy Theory Research List[CTRL] send email:
SIGNOFF CTRL [to:] [EMAIL PROTECTED]

Om

--- End Message ---

Reply via email to