DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

WarDriving, Coming to a Queensland street near you!!!

Posted on March 24, 2012 by Lee J

Australian police have sadly announced plans to start what is commonly known as “wardriving”, driving around in a vehicle that’s got  equipment decked out to grab and log the details and location of any wireless hotspots. ![](https://images.smh.com.au/2012/03/23/3156996/art-cat–420×0.jpg) Now the report says that the Queensland police force plans to use this to help people protect systems, but really is this legal at all? While they are doing this they will be able to not only map open networks but all WiFi networks that are broadcasting. No doubt they will be catching and saving mac address’s, geo locations, SSID’s and other possible information depending on the scope of how deep they are scanning. Now its not the first time they have made this announcement, all the way back in 2009 was a similar announcement from the exact same squad, making claim to fame that they would be the [first ones in australia  do carry out “war driving”.](https://www.smh.com.au/technology/security/the-great–wifi-robbery-police-to-patrol-down-your-street-20090721-drqb.html) Original Police [statement](https://qpsmedia.govspace.gov.au/2012/03/22/war-driving-project-to-help-prevent-identity-theft/):
> National Consumer Fraud Week is now underway and Queensland Police are launching a new project aimed at encouraging the public to protect their identity and personal information online. The State Crime Operations Command’s Fraud and Corporate Crime Group have announced the rollout of the ‘War Driving Project’, which will focus on prompting the community to check their wireless internet connection and ensure it’s secure. Detective Superintendent Brian Hay said police have identified a large number of homes and businesses within the greater Brisbane area with wireless connections that are not secure or have limited protection. These people may as well put their bank account details, passwords and personal details on a billboard on the side of the highway. “Unprotected or unsecured wireless networks are easy to infiltrate and hack. Criminals can then either take over the connection and commit fraud online or steal the personal details of the owner. This is definitely the next step in identity fraud.” The War Driving Project involves police conducting proactive patrols of residential and commercial areas to identify unprotected connections. Police will follow this up with a letterbox drop in the targeted area with information on how to effectively secure your connection. “Officers from the Hi Tech Crime Investigation Unit will patrol the Brisbane area (residential and commercial), but we are encouraging the public to not sit back and wait for this contact. Check your connection tonight and make sure it is protected,” Detective Superintendent Hay said. The biggest concern for police is ‘open’ wireless connections (access points). An open or unprotected connection or point allows anyone to use your internet, monitor your activity, or steal your identity information. Another concern for police is access points that use ‘WEP’ (Wired Equivalent Privacy) encryption as their sole means of security. This is an older form of security or encryption and offers a limited protection. “Having WEP encryption is like using a closed screen door as your sole means of security at home. The WPA or WPA2 security encryption is certainly what we would recommend as it offers a high degree of protection,” Detective Superintendent Hay said. For more information on the War Driving Project or tips on how to secure your connection, visit the Queensland Police Service website https://www.police.qld.gov.au/safewifi Anyone with information which could assist police with their investigations should contact Crime Stoppers anonymously via 1800 333 000 or crimestoppers.com.au 24hrs a day.

Security expert Paul Ducklin, of Sophos, said he liked the idea. "It’s fun, low cost, low impact, and will help to raise awareness of just how public unencrypted Wi-Fi really is," he said. So really, is this legal or what, can the police just go out and make a map of the surrounding networks? Join the face book posts and get your voice heard if you are worried about this, speak up and help stop it from happening.


Related:

  • Large medical lab in South Africa suffers multiple data breaches
  • Doctor Alliance Data Breach: 353GB of Patient Files Allegedly Compromised, Ransom Demanded
  • NHS providers reviewing stolen Synnovis data published by cyber criminals
  • Fourth Circuit Weighs in on Standing in Data Breach Class Actions
  • Is your cyberinsurance paid up? Are you sure?
  • Software dev accidentally leaks Australian govt documents
Category: Breach Incidents

Post navigation

← 2011 Sees 855 hacking incidents, 174 million compromised records, Verizon Yearly Summary
Northrop Grumman (SSES) contract dump →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Village of Golf Manor considering paying ransom amid cyberattack (1)
  • Teen who allegedly stole millions of personal data records arrested in Spain
  • Akira ransomware: FBI tallies 250 million in payouts
  • IE: HSE confirms second ransomware attack but ‘no evidence’ patient data was stolen
  • Examining impact of federal relief program after major healthcare cyberattack — Research Brief
  • Justice Department Announces Actions to Combat Two Russian State-Sponsored Hacking Groups
  • Should entities be required to disclose the name of a vendor if the breach was at the vendor’s?
  • The Hidden Risks of Information Disclosure: A Costly Lesson from Cornwall
  • Defense Bill Would Require New Cyber Requirements for Some DoD Telecom Contracts
  • Tell the truth, or someone will tell it for you — Trumbull County, Ohio edition (1)

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • U.S. Plans to Scrutinize Foreign Tourists’ Social Media History
  • ANNOUNCEMENT: EFF Launches Age Verification Hub as Resource Against Misguided Laws
  • FTC Denies Petition from SpyFone App CEO to Vacate 2021 Order
  • Privacy concerns raised as Grok AI found to be a stalker’s best friend
  • PRIVACY—S.D. Cal.: Employee did not waive privacy right in personal email data on company provided laptop, (Dec 5, 2025)

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net
Security Issue: security[at]databreaches.net
Mastodon: Infosec.Exchange/@PogoWasRight
Signal: Dissent.73
DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.