I'm glad mine has a pretty good password and nobody in range:
http://arstechnica.com/tech-policy/2...-wifi-network/
SWAT team throws flashbangs, raids wrong home due to open WiFi network
Printable View
I'm glad mine has a pretty good password and nobody in range:
http://arstechnica.com/tech-policy/2...-wifi-network/
SWAT team throws flashbangs, raids wrong home due to open WiFi network
Whoops! I've felt the effects of an FB, those things suck! Video games kinda come close, but it hurts so bad- and I have tinnitus so it makes for the ringing to last even longer and worse. Pretty crazy, but glad no one was hurt. I always secure my connection using a complex 16 character encrypted password! [Beer]
Those swat douchebags
I leave a open wifi hotspot running with minimal bandwidth and some (easily avoided) site blocking. I'll take the risk. Given I've blocked mac addresses due to torrent use I think I have other much larger risks than a swat team. The bigger concern there is that a SWAT team raided someone based solely on computer use traced back to an IP used by that house. A) since when does computer use warrant swat response? B) shouldn't there be some evidence beyond an IP address? (especially before swat is involved)
It's long overdue for SWAT teams to have clearly established Rules of Engagement. When they have all that cool ninja equipment and do all the training there must be an overwhelming desire to try it out.
It can be done. Years ago the police would just jump into high speed chases. It led to a lot of dead people in accidents caused by this. Over time they came of with rules for this and other ways to dealing with it. SWAT raids need to be limited to where a real danger is shown.
Steve
Make sure your WiFi has WPA (WPA2) and not WEP either...[Beer]
I white list MAC addresses. It's a pain but it ensures even if someone is brute forcing my key, they can't do anything once they've wasted days getting it.
Some investigation.
That said, leaving your access points unsecured, you're more likely to get a nastygram from your internet provider accusing you of serving up copyrighted porn via bi-torrent.
Home network is MAC filtered with a WPA2 key to boot(got sick of the neighbor leeching wifi and sucking bandwidth. Wide open here at the shop, for our customers to use.
This story is full of stupid.
no knock warrants suck dick
Actually the lesson here is if you're up to no good DON'T secure your WiFi as it'll make the cops go easier on you.Quote:
Secure Your Wifi - Or Else!
Quote:
Because most people aren't stupid enough to make obvious threats from their own home Internet connection, the corollary principle also holds: if a home does have an open WiFi connection, investigators might want to ease away from the flashbangs-and-SWAT-team approach; the threat of getting it wrong is a real one.
The simple fact is that as long as police are protected from prosecution, law suits or even dismissal for acting on bad intel, they'll continue to do it and not care who's rights they stomp on or how many household pets they murder.
Think about it for more than a couple of seconds and you will see why MAC filters don't actually add any extra security..
Hint: everything in wireless is a broadcast.. So I see all the legit Macs anyway. Changing a MAC to match is much more trivial than banging your WPA keys.
Welcome to the Police States of Amerika.
Passwords for wi-fi are like locking the doors on your convertible...
it keeps the honest ones honest, if I really want into your network, there are too many ways to pull the password right out of the air.
Mac address filtering?.. OK, it's gonna take another minute.
When I set up customers modems, I always make sure the wifi is locked down or turned off.