Wifi Security ProjectA project devoted to helping people build and maintain secure, open, wireless hotspots.Wifi extortionist caught- June 26, 2004 Security Focus reports on how the FBI caught a white collar extortionist using Wifi hotspots to cover his identity. Though he went to some lengths to make himself untraceable technically, past altercations between Tereshchuk and the company made him the prime suspect from the start, according to court records. The clearest sign came when he issued the seventeen million dollar extortion demand, and instructed the company to "make the check payable to Myron Tereshchuk." The FBI began following..http://wifi.qaddisin.com/2004_06_20_archive.html#108826114088124123 WiFi Hacking for secure voice commnications- June 11, 2004 Global Guerrillas on anonymous wifi. I keep an eye on this site, some of the items are a stretch. But open access points, discussed in this entry, can be used for anonymous VoIP calls. Who the hell would use a wok as an antenna though Pringles can maybe - wok no...http://wifi.qaddisin.com/2004_06_06_archive.html#108695942046220359 The Internet: 'A Dirty Mess'- June 9, 2004 Famed Sci-Fi author Bruce Sterling says the Internet is going to hell in a handbasket. Keynoting a morning session of Gartner's 10th Annual IT Security Summit here, Sterling said, "This is the birth of a genuine, no kidding, for-profit, electronic, multi-national criminal world. The global criminal world of oil, narcotics and guns now has broadband." And, according to Sterling, they are fully utilizing the technology. "These are not all old-school hackers. This is organized crime activity..http://wifi.qaddisin.com/2004_06_06_archive.html#108679345585776193 Welcome to the anonymous internet- June 3, 2004 Kelly Martin hits the nail on the head. We've all known this for quite some time, but no one has spelled it out so bluntly. There are simply too many ways to be anonymous on the Internet, and more so today than ever before. You don't even need to spoof IP addresses these days; there are too many ways to have perfect stealth, starting with an untraceable MAC address on a borrowed IP address, linked into a wireless router down the street which has access logging disabled and you tunnel through...http://wifi.qaddisin.com/2004_05_30_archive.html#108627389791998097 |