U.S. flag

An official website of the United States government, Department of Justice.

NCJRS Virtual Library

The Virtual Library houses over 235,000 criminal justice resources, including all known OJP works.
Click here to search the NCJRS Virtual Library

Mobile and Wireless Technologies: Security and Risk Factors

NCJ Number
217151
Author(s)
Gregor Urbas; Tony Krone
Date Published
November 2006
Length
6 pages
Annotation
This article explores the security and risk factors associated with mobile and wireless technologies.
Abstract
While there are many benefits related to wireless and mobile communication technologies, such as flexibility and mobility, there are also many risks associated with their use. Wireless users are vulnerable to intrusion and exploitation by other technology users. Wireless users who use unsecured or poorly secured wireless networks are vulnerable to accidental or intentional invasion, leaving individuals and organizations open to data theft, corruption of system integrity, hacking, sabotage, and even espionage. The three steps involved in deliberate wireless exploitation are described and include: (1) discovery, in which wireless networks are probed for their accessibility; (2) connecting, in which unauthorized access is obtained to the wireless network, commonly referred to as LAN-jacking; and (3) exploiting the access for personal gain. Invasions can be active or passive in nature. Active attacks include ID spoofing, message modification, and replay attacks while passive attacks involve eavesdropping and traffic analysis. Law enforcement responses to the security problems of wireless networks are discussed and generally fall into the areas of prevention, detection and investigation, and prosecution. The Australian High Tech Crime Centre exemplifies the police response to wireless technology crimes. This approach relies on a close working relationship with private sector personnel to identify vulnerabilities and detect invasions. Three cases of wireless hacking and wireless spamming are presented, one of which involved the theft of credit card records from a Michigan Lowes’ wireless network. Table, references

Downloads

No download available

Availability