Just as an FYI, here is the correspondence I had with the genius that wrote this story....
___________________________________________
Chris, Thanks for taking the time to write. You are referring to a
follow up report to a series of special reports I did on the insecurity
of improperly installed home wireless computer networks and people who
are out there to exploit them. I assure you that I consulted with more
than a few sources for my reports. I have reviewed some of the web
sites and organizations you mention. It may come as no surprise to you
that without exception the law enforcement, computer security and
computer/IT support professionals I spoke with view war drivers very
differently than war drivers view them selves.
I appreciate your e-mail and time. I look forward to seeing your book.
Thank you,
Rich Van Wyk
rvanwyk@wthr.com
317-655-5793
-----Original Message-----
From: roamer [mailto:roamer@worldwidewardrive.org]
Sent: Tuesday, February 24, 2004 9:02 AM
To: Richard G. Van Wyk
Subject: Your Story (Police on the lookout for cyber crimes)
Mr. Van Wyk,
My name is Chris Hurley. I am also known as roamer in the Wireless
Security community. I am a Security Engineer working in the Washington
DC
are and am the author of the forthcoming book "WarDriving: Drive,
Detect,
Defend. A Guide to Wireless Security" to be published by Syngress
Publishing on April 1st.
I recently became aware of your story Police on the lookout for cyber
crimes (http://www.wthr.com/Global/story.as...mp;nav=9TahKyMs).
I found your story very disturbing as it is apparent that you listened
to
one source, Eric Klinkowski, to arrive at your erroneous definition of
WarDriving.
The proper (and generally accepted within the security community)
definition of WarDriving is:
"WarDriving is the act of moving around a specific area and mapping the
population of wireless access points for statistical purposes. These
statistics are then used to raise awareness of the security problems
associated with these types of networks (typically wireless). The
commonly
accepted definition of WarDriving among those who are actually
practitioners is that WarDriving is not exclusive of surveillance and
research by automobile - WarDriving is accomplished by anyone moving
around a certain area looking for data."
As you can see, this is a far cry from the "cyber thieves" that you make
WarDrivers out to be.
I run the WorldWide WarDrive (www.worldwidewardrive.org) an annual event
where members of the wireless security community participate in
attempting
to raise an awareness of many of the problems that are noted in your
story
such as unsecured wireless networks and wireless access points deployed
with default settings.
You should also be aware that warchalking is largely looked at in the
wireless community as a falsehood. I spoke at the DefCon Security
conference last year about the WorldWide WarDrive to an audience of
about
800 WarDrivers. I asked the question if ANYONE in the room had ever
seen
an actual warchalking symbol. As expected, only one person had, and it
turned out to be at a Starbucks...that had marked their OWN wireless
hotspot.
Please feel free to read through the Frequently Asked Questions document
at the WorldWide WarDrive site
(http://www.worldwidewardrive.org/faq.html)
to get a better idea of what WarDrivers actually are.
Please feel free to join in discussions with ACTUAL WarDrivers at the
NetStumbler Forums (http://forums.netstumbler.com/) or the WorldWide
WarDrive Forums (http://www.c2security.org/forums/wwwd/).
Also, a repository of information is available at WarDriver Central
(http://www.wardrivercentral.org/).
By perusing any of these links, and actually talking to the
practitioners
of WarDriving, many of whom are current and or former law enforcement
and
government employees, you will see that you have made an error in your
characterization of WarDrivers as thieves when in reality, they are the
exact opposite.
Thank you,
Chris Hurley (aka Roamer)
roamer@worldwidewardrive.org
___________________________________________
Chris, Thanks for taking the time to write. You are referring to a
follow up report to a series of special reports I did on the insecurity
of improperly installed home wireless computer networks and people who
are out there to exploit them. I assure you that I consulted with more
than a few sources for my reports. I have reviewed some of the web
sites and organizations you mention. It may come as no surprise to you
that without exception the law enforcement, computer security and
computer/IT support professionals I spoke with view war drivers very
differently than war drivers view them selves.
I appreciate your e-mail and time. I look forward to seeing your book.
Thank you,
Rich Van Wyk
rvanwyk@wthr.com
317-655-5793
-----Original Message-----
From: roamer [mailto:roamer@worldwidewardrive.org]
Sent: Tuesday, February 24, 2004 9:02 AM
To: Richard G. Van Wyk
Subject: Your Story (Police on the lookout for cyber crimes)
Mr. Van Wyk,
My name is Chris Hurley. I am also known as roamer in the Wireless
Security community. I am a Security Engineer working in the Washington
DC
are and am the author of the forthcoming book "WarDriving: Drive,
Detect,
Defend. A Guide to Wireless Security" to be published by Syngress
Publishing on April 1st.
I recently became aware of your story Police on the lookout for cyber
crimes (http://www.wthr.com/Global/story.as...mp;nav=9TahKyMs).
I found your story very disturbing as it is apparent that you listened
to
one source, Eric Klinkowski, to arrive at your erroneous definition of
WarDriving.
The proper (and generally accepted within the security community)
definition of WarDriving is:
"WarDriving is the act of moving around a specific area and mapping the
population of wireless access points for statistical purposes. These
statistics are then used to raise awareness of the security problems
associated with these types of networks (typically wireless). The
commonly
accepted definition of WarDriving among those who are actually
practitioners is that WarDriving is not exclusive of surveillance and
research by automobile - WarDriving is accomplished by anyone moving
around a certain area looking for data."
As you can see, this is a far cry from the "cyber thieves" that you make
WarDrivers out to be.
I run the WorldWide WarDrive (www.worldwidewardrive.org) an annual event
where members of the wireless security community participate in
attempting
to raise an awareness of many of the problems that are noted in your
story
such as unsecured wireless networks and wireless access points deployed
with default settings.
You should also be aware that warchalking is largely looked at in the
wireless community as a falsehood. I spoke at the DefCon Security
conference last year about the WorldWide WarDrive to an audience of
about
800 WarDrivers. I asked the question if ANYONE in the room had ever
seen
an actual warchalking symbol. As expected, only one person had, and it
turned out to be at a Starbucks...that had marked their OWN wireless
hotspot.
Please feel free to read through the Frequently Asked Questions document
at the WorldWide WarDrive site
(http://www.worldwidewardrive.org/faq.html)
to get a better idea of what WarDrivers actually are.
Please feel free to join in discussions with ACTUAL WarDrivers at the
NetStumbler Forums (http://forums.netstumbler.com/) or the WorldWide
WarDrive Forums (http://www.c2security.org/forums/wwwd/).
Also, a repository of information is available at WarDriver Central
(http://www.wardrivercentral.org/).
By perusing any of these links, and actually talking to the
practitioners
of WarDriving, many of whom are current and or former law enforcement
and
government employees, you will see that you have made an error in your
characterization of WarDrivers as thieves when in reality, they are the
exact opposite.
Thank you,
Chris Hurley (aka Roamer)
roamer@worldwidewardrive.org
Comment