DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

WarDriving, Coming to a Queensland street near you!!!

Posted on March 24, 2012 by Lee J

Australian police have sadly announced plans to start what is commonly known as “wardriving”, driving around in a vehicle that’s got  equipment decked out to grab and log the details and location of any wireless hotspots. ![](https://images.smh.com.au/2012/03/23/3156996/art-cat–420×0.jpg) Now the report says that the Queensland police force plans to use this to help people protect systems, but really is this legal at all? While they are doing this they will be able to not only map open networks but all WiFi networks that are broadcasting. No doubt they will be catching and saving mac address’s, geo locations, SSID’s and other possible information depending on the scope of how deep they are scanning. Now its not the first time they have made this announcement, all the way back in 2009 was a similar announcement from the exact same squad, making claim to fame that they would be the [first ones in australia  do carry out “war driving”.](https://www.smh.com.au/technology/security/the-great–wifi-robbery-police-to-patrol-down-your-street-20090721-drqb.html) Original Police [statement](https://qpsmedia.govspace.gov.au/2012/03/22/war-driving-project-to-help-prevent-identity-theft/):
> National Consumer Fraud Week is now underway and Queensland Police are launching a new project aimed at encouraging the public to protect their identity and personal information online. The State Crime Operations Command’s Fraud and Corporate Crime Group have announced the rollout of the ‘War Driving Project’, which will focus on prompting the community to check their wireless internet connection and ensure it’s secure. Detective Superintendent Brian Hay said police have identified a large number of homes and businesses within the greater Brisbane area with wireless connections that are not secure or have limited protection. These people may as well put their bank account details, passwords and personal details on a billboard on the side of the highway. “Unprotected or unsecured wireless networks are easy to infiltrate and hack. Criminals can then either take over the connection and commit fraud online or steal the personal details of the owner. This is definitely the next step in identity fraud.” The War Driving Project involves police conducting proactive patrols of residential and commercial areas to identify unprotected connections. Police will follow this up with a letterbox drop in the targeted area with information on how to effectively secure your connection. “Officers from the Hi Tech Crime Investigation Unit will patrol the Brisbane area (residential and commercial), but we are encouraging the public to not sit back and wait for this contact. Check your connection tonight and make sure it is protected,” Detective Superintendent Hay said. The biggest concern for police is ‘open’ wireless connections (access points). An open or unprotected connection or point allows anyone to use your internet, monitor your activity, or steal your identity information. Another concern for police is access points that use ‘WEP’ (Wired Equivalent Privacy) encryption as their sole means of security. This is an older form of security or encryption and offers a limited protection. “Having WEP encryption is like using a closed screen door as your sole means of security at home. The WPA or WPA2 security encryption is certainly what we would recommend as it offers a high degree of protection,” Detective Superintendent Hay said. For more information on the War Driving Project or tips on how to secure your connection, visit the Queensland Police Service website https://www.police.qld.gov.au/safewifi Anyone with information which could assist police with their investigations should contact Crime Stoppers anonymously via 1800 333 000 or crimestoppers.com.au 24hrs a day.

Security expert Paul Ducklin, of Sophos, said he liked the idea. "It’s fun, low cost, low impact, and will help to raise awareness of just how public unencrypted Wi-Fi really is," he said. So really, is this legal or what, can the police just go out and make a map of the surrounding networks? Join the face book posts and get your voice heard if you are worried about this, speak up and help stop it from happening.

Category: Breach Incidents

Post navigation

← 2011 Sees 855 hacking incidents, 174 million compromised records, Verizon Yearly Summary
Northrop Grumman (SSES) contract dump →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • WestJet investigates cyberattack disrupting internal systems
  • Plastic surgeons often store nude photos of patients with their identity information. When would we call that “negligent?”
  • India: Servers of two city hospitals hacked; police register FIR
  • Ph: Coop Hospital confirms probe into reported cyberattack
  • Slapped wrists for Financial Conduct Authority staff who emailed work data home
  • School Districts Unaware BoardDocs Software Published Their Private Files
  • A guilty plea in the PowerSchool case still leaves unanswered questions
  • Brussels Parliament hit by cyber-attack
  • Sweden under cyberattack: Prime minister sounds the alarm
  • Former CIA Analyst Sentenced to Over Three Years in Prison for Unlawfully Transmitting Top Secret National Defense Information

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Anne Wojcicki Wins Bidding for 23andMe
  • Would you — or wouldn’t you?
  • New York passes a bill to prevent AI-fueled disasters
  • Synthetic Data and the Illusion of Privacy: Legal Risks of Using De-Identified AI Training Sets
  • States sue to block the sale of genetic data collected by DNA testing company 23andMe
  • AI tools collect and store data about you from all your devices – here’s how to be aware of what you’re revealing
  • 23andMe Privacy Ombudsman Urges User Consent Pre-Data Sale

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.
Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report