{"id":3365,"date":"2011-08-16T13:00:32","date_gmt":"2011-08-16T18:00:32","guid":{"rendered":"http:\/\/techcitement.com\/?p=3365"},"modified":"2011-08-16T12:51:00","modified_gmt":"2011-08-16T17:51:00","slug":"cops-play-computer-security-experts-with-new-toy-from-fluke","status":"publish","type":"post","link":"https:\/\/techcitement.com\/hardware\/cops-play-computer-security-experts-with-new-toy-from-fluke\/","title":{"rendered":"Cops Play Computer Security Experts With New Toy From Fluke"},"content":{"rendered":"

Amidst the ever-escalating battle against computer crime, law enforcement receives a new tool. The Aircheck<\/a>, by Fluke, is a WiFi tester for network professionals. Its capabilities include detecting all 2.4 Ghz and 5 Ghz wireless networks in the vicinity and indicating the presence of traffic on those networks (as opposed to interference in the same frequency range), identifying the type of wireless security used (if any), and performing basic network diagnostic functions such as ping and DHCP requests for an IP address.<\/p>\n

At the Crimes Against Children<\/a> conference, Fluke announced the issuance of these devices to police. With their “one button interface”, Fluke claims they enable police to drive by a suspect’s location and identify any WiFi networks in use, determine if a given WiFi network is secured with a password, more confidently enter a suspect’s residence if they’ve determined the WiFi networ\"\"<\/a>k in use is secured (knowing illegal content is actually being downloaded at that residence), and track a suspect’s location when an unsecured wireless signal is found. The thought that justifies this entry into houses by police is the chance a non-resident is borrowing the connection, nearby, to download child porn or do other illegal activities.<\/p>\n

I have several problems with this strategy. First of all, police are not network professionals. Fluke’s simplistic explanation of the usefulness of the Aircheck glosses over some of the facts. Secured WiFi networks may be borrowed by neighbors or others in the vicinity, if those individuals successfully hacked their passwords.\u00a0 WEP encryption is often used in residential WiFi setups where older hardware doesn’t support the more secure WPA protocol, and WEP is trivial to hack<\/a>. Basic information gleaned by police wielding an Aircheck does not constitute proof or even strong evidence that they’ve determined the source of illegal internet traffic. Sergeant Dave Mathers of the Electronic Crimes Unit of the City of Martinez, CA says, “It provides us an additional layer of certainty that the person we are targeting is, in fact, the suspect that we are looking for. We don’t have to go in blindly anymore.” That I can agree with, but it leads me to my second problem with this arrangement. How much taxpayer money should we spend for that additional layer of certainty?\u00a0 The Fluke device retails for roughly $2,000, while devices like the Canary HS-20<\/a> are available for around $50 at Amazon. Surely, police departments can get a better deal than I can. Even though the Fluke is clearly built in a more industrial-strength enclosure and may be a little more user-friendly to operate, a cash-strapped police department can buy forty Canary hotspot detectors for the price of just one Fluke!<\/p>\n

Perhaps the police should concentrate more on their core proficiencies and hire actual computer security experts to analyze technical situations. Every true computer security specialist I know already owns a laptop or netbook capable of identifying and analyzing WiFi signals without needing a dedicated handheld device for the task. Expecting regular officers to carry WiFi diagnostic devices on their belts to make snap decisions about the source of illegal internet traffic is no more practical than letting computer security specialists borrow police cruisers and pairs of handcuffs to make arrests when the situation arises.<\/p>\n

 <\/p>\n","protected":false},"excerpt":{"rendered":"

Amidst the ever-escalating battle against computer crime, law enforcement receives a new tool. The Aircheck, by Fluke, is a WiFi tester for network professionals. I have several problems with this strategy. First of all, police are not network professionals.<\/p>\n","protected":false},"author":9,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[905,31,908],"tags":[1078,1076,1074,1077,1072,1075,972,212,1073,232,222],"_links":{"self":[{"href":"https:\/\/techcitement.com\/wp-json\/wp\/v2\/posts\/3365"}],"collection":[{"href":"https:\/\/techcitement.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/techcitement.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/techcitement.com\/wp-json\/wp\/v2\/users\/9"}],"replies":[{"embeddable":true,"href":"https:\/\/techcitement.com\/wp-json\/wp\/v2\/comments?post=3365"}],"version-history":[{"count":4,"href":"https:\/\/techcitement.com\/wp-json\/wp\/v2\/posts\/3365\/revisions"}],"predecessor-version":[{"id":3373,"href":"https:\/\/techcitement.com\/wp-json\/wp\/v2\/posts\/3365\/revisions\/3373"}],"wp:attachment":[{"href":"https:\/\/techcitement.com\/wp-json\/wp\/v2\/media?parent=3365"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/techcitement.com\/wp-json\/wp\/v2\/categories?post=3365"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/techcitement.com\/wp-json\/wp\/v2\/tags?post=3365"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}