Tuesday, March 14, 2006

Hidden Markings

The markings left by the warchalkers reminded me straight away of something from the Blade movies.

In the films the vampires use hidden markings to identify safe houses to other vampires. The markings themselves are referred to as glyphs. One of the techniques the filmmakers use to portray these markings is by having them painted in UV, i.e. only visible under a black light.

I thought this threw up some really nice visuals. I have had a look for an example and have yet to find one as my thieving housemates have nicked me copy of the film.

As soon as I find some I’ll throw them in a post to show.

Anyway, as for the piece of media we have to produce for this project Chris had the idea of an alternative graphical representation showing the data clouds over an urban environment. I thought that either incorporated within this or as a separate piece it would be nice to show these ‘warchalks’ in this kinda way.

Maybe similar to the video game GTA San Andreas and its ‘tags’ that can be found around the cities. I can show ya one of these…



I’ll have a think and get back…..

CNN run with the ball

Here is an article from CNN about Chris Hurley, a wardriver himself:
(full article can be found here)

Chris Hurley is a man with a mission. He wants you to know how to steer clear of people like him. People with his equipment, anyway.

Hurley is a wardriver -- a tech geek who, as a hobby, loads a laptop, a network detector and a GPS locator into his 1994 Mustang GT and roams the streets of Baltimore, Maryland, sniffing the air for unprotected wireless computer networks. He doesn't connect to the networks he finds (that's illegal), he just makes a note of them and their security settings.

This summer Hurley and a group of some 600 like-minded wardrivers sniffed out and mapped 228,537 wireless networks in 41 states, 17 countries and 4 continents, in an eight-day "Worldwide War Drive" (WWWD). It was the fourth in a series of worldwide efforts Hurley has organized to raise awareness of vulnerable wireless networks. He's also written a book on the subject, called "Wardriving: Drive, Detect, Defend. A Guide to Wireless Security."

The popularity of wireless networking -- sometimes called Wi-Fi -- has surged in recent years, but many of the new networks do not use even the most basic security precautions.

WWWDers check networks they find for two of the simplest protections: a unique SSID (a name that identifies a network) and some kind of encryption. Twenty-eight percent of the networks spotted in WWWD4 were operating without either of these options. That makes them easy prey for even the most casual criminal.

"People are so excited to get the new technology and get it up and running ... they're not even thinking about security," says Brian Grimm, marketing director for the Wi-Fi Alliance, an industry group.
Four steps to a secure network

Wireless networks are uniquely vulnerable because they don't have the same physical boundaries that wired networks have. Instead of cords, a wireless network uses a radio signal to connect the different parts of the network. That signal doesn't necessarily end at your front door -- it may reach the sidewalk or your neighbor's house, or even across the street.

That means that wireless households could unwittingly share their broadband connection with a neighbor or someone who sends spam e-mail or worse, then drives away to keep from being tracked. Shared files are also available to anyone who can connect to the network.

Accessing a corporate network while using wireless can be a danger, too, said Patrick Gray, a retired FBI agent who specialized in computer crime. Gray is now a director with Atlanta-based Internet Security Systems and heads the ISS team responding to external or internal network-related emergencies.

"If you bring that laptop from corporate home and access your wireless router, you are no longer under the sanctity of the corporate environment, you're out there in the wind," Gray said. "And once a bad guy finds your box, he will then follow the permissions of that laptop. And that means once he gets into your computer via your wireless router, when you plug that computer back into a VPN, tunneling back into your corporate environment, you're taking the bad guy with you."

Hurley, who by day is an Internet security professional with a Maryland firm called Assured Decisions, recommends four simple steps wireless networkers can take to keep their networks to themselves:

1. Change the SSID. That's the name that identifies a network. The default settings that come out of the box are well known. Use the name of your favorite song or something else you will remember. Don't use Social Security or phone numbers or any identifiable number. Also, if possible, use non-printable characters (for example, smiley faces or vowels with umlauts) in your SSID. Some equipment used to detect SSIDs does not recognize these characters.
2. Enable MAC address filtering. This lets you specify precisely which computers may connect to your network.
3. Disable SSID broadcast. The most common network scanner won't see your network if you disable broadcasting.
4. Enable encryption. There are two types of encryption technology for wireless networks: WEP and WPA. WEP is flawed, but it is much better than nothing. If your equipment is WPA compatible, make sure your password is at least 40 characters long and includes upper and lowercase letters, special characters (!,* and & for example) and numbers.

Each of Hurley's four recommendations is a standard option available on most wireless home networking gear. For the most part, enabling security involves no more than clicking a checkbox or typing in a new name.

But the procedure can differ on products from different manufacturers, so setting up security on all the pieces of a network can mean that home users have to reinvent the wheel at every turn.
A simple goal

To simplify the process, the Wi-Fi Alliance has undertaken a standardization initiative for enabling security features. "If the process were the same for everything, the learning curve wouldn't be so steep," Grimm says.

Some manufacturers, too, are making efforts to help consumers step up their security. Linksys, a company that makes some of the most popular Wi-Fi gear, has partnered with Broadcom and Intel to make security set-up wizards for wireless networks that are automatic and "as absolutely simple as possible," says Malachy Moynihan, Linksys vice president for engineering and product marketing.
story.warchalking.gif
Wardrivers sometimes mark wireless hot spots with symbols. Known as warchalking, this symbol represents an open hot spot.


D-Link Systems, another manufacturer of home wireless networking equipment, puts security prompts in its configuration routine and includes security pointers in its installation manual.

But manufacturers are quick to point out that while security is certainly a concern, it is not because wireless networks are constant victims of attacks.

Not one of the calls D-Link's technical support line has received over the years has been about loss of information through a wireless hack, spokesman Darek Connole says. "It's like seatbelts," he says. "Everybody knows you should put them on, but if you haven't heard of anyone who's been hurt, you won't do it."

"People are more scared as a concept than as a reality," says Moynihan. "I'm not saying people shouldn't secure their wireless networks, but they are probably more vulnerable when they are receiving e-mails."

Even so, Hurley says a little precaution never hurt anybody. "You don't want to be a target of convenience," he says. "If a thief sees your network has a unique SSID and enabled encryption, why would he bother when he can drive a mile down the road and find a security-free one?"

Media Coverage

Here are some excepts from a BBC article, the full article can be found here.

This low-tech approach to finding wireless internet connections is fast becoming a global phenomenon. The idea has become so popular that it has even spawned a line of clothing.

In late June web designer Matt Jones came up with the idea of using chalk marks on pavements and walls to reveal the existence of wireless networks anyone could use to surf the net.

He designed a basic set of symbols that summarised the types of wireless networks people would find, gave it the name "warchalking" and published his ideas on his weblog.

The rest is rapidly becoming history.

Big idea

The idea of "warchalking" derives from the early days of computer networks when curious hackers would engage in "wardialling" expeditions which involved phoning lots of numbers to see which ones answered with a data, rather than a dial, tone.

The advent of wireless computer networks that let people connect up to the net via a radio link has given birth to a new hobby among curious hackers.

London warchalk, Matt Sephton
Oxford Street is warchalked
Now instead of "wardialling" they go on "wardriving" or "warwalking" expeditions.

On these trips they carry a laptop or handheld computer fitted with software that can spot wireless networks and plot where they are.

Mr Jones said that the numbers of wireless networks was proliferating and many were being created as free nets that serve anyone who wants to use them.

Warchalks are a good way to let people know of their existence and zero in on their exact location, said Mr Jones.

"Being recognised for the public good you are providing is one of the good feedbacks we have had from this," Mr Jones told the BBC programme Go Digital.

The warchalking website has been a big hit on the web and slowly people have taken up the idea.

A few wild warchalks are starting to appear in places such as Maryland, Copenhagen, London and San Jose. The idea is slowly catching on.

"It's one thing for it to be popular on the internet and it's another for it to break out in the real world," he said.

Real world web

Now a company is producing warchalking clothing and the practice of using a wireless network for free internet access has even made it to the panels of the respected Doonesbury cartoon.

The 21 June edition of the strip features one character using another's home wireless net to surf the web.

Warchalk in the US, Mike Lee
Maryland's first Warchalk
In the UK the idea of chalking up networks could be given a boost by the decisions of companies such as BT and Megabeam to set up wireless networks that people can use, albeit for a price.

The London School of Economics has set up a wireless network that students can use for web access while near its buildings.

One warchalker has already discovered that some of the kiosks dotting London's Oxford Street contain wireless nodes that anyone can use.

But this success has caused problems for Mr Jones who never intended to become the co-ordinator of an international movement.

"The real thing that I want to be able to do is to turn it over to someone else," he said. "It's becoming a bit of a monster."

Mr Jones is looking for help from people who run, or are setting up, community wireless networks.

He said the site could act as a repository of expert advice to help people who want to set the networks up, keep them running and attract a regular user community.

Warchalking

The term "warchalking" comes from combination of "WAR" plus "chalk", "WAR" means "Wireless Access Revolution" and "chalk" is a tool usually used to draw these symbols on streets.

Wardivers travel to different locations and once a venerable WiFi network has been found chalk is used to identify it. This chalk can be found on pavements or walls often in conspicuous places around the area. Some examples are shown below:
















There are different symbols which mean different restrictions have been placed upon the network.

OPEN NODE symbol means, that one can use Wi-Fi (Wireless LAN) in given area without restriction. ssid is the name of the network and under the symbol available bandwidth is (sometimes) placed.

CLOSED NODE symbol means, that there is a WLAN network in vicinity but it is closed to access for external users. It means secure network.

WEP NODE symbol means, that the network is closed with WEP encryption technique (WEP = Wireless Equivalent Privacy). For clever users however this method of security is not a big problem and they are able to use such WLAN network.






This has raised a lot of debate on the ethics of such an activity and also promoted higher securities on both business and personal networks.

information taken from:
http://mobile.msmobiles.com/i.php?id=50
en.wikipedia.org/wiki/Wardriving

images taken from:
http://www.visuallee.com/weblog/images/chalking_mica.jpg
http://msmobiles.com/archives/2003.6.29_133519/warchalking.jpg
http://news.bbc.co.uk/media/images/38150000/jpg/_38150559_warchalk-150.jpg
http://news.bbc.co.uk/media/images/38150000/jpg/_38150554_wchalk-300.jpg
http://i.a.cnn.net/cnn/2004/TECH/internet/10/18/wireless.security/story.warchalking.gif
http://suburbia.sindominio.net/IMG/jpg/warchalking.jpg
http://www.tidbits.com/resources/664/macwarehouse.jpg

War Tactics

I’ve been doing a little research on a bit of a tangent all stemming from Chris’s post on ‘Unintended and intended use of Wi-Fi by outsiders’.

I was interested firstly in the stealing on bandwidth by unauthorised users of unsecured WiFi networks and found that there is actually a massive movement involved in this.

It’s called ‘Wardrving’ (“Wireless Access Revolution’ driving). Wardriving is an activity consisting of driving around with a Wi-Fi-equipped computer, such as a laptop or a PDA, in one's vehicle, detecting Wi-Fi wireless networks. It is also known (as of 2002) as "WiLDing" (Wireless Lan Driving), originating in the U.S. with the Bay Area Wireless Users Group (BAWUG). It is similar to using a scanner for radio. Many wardrivers will use GPS devices to measure the location of the network find and log it on a website.

Some use home made devices to boost signal strength such as a Pringle can antenna. See below…






Once a suitable location has been found it is then posted onto websites such as www.wardrive.org.uk, where other users can log on and then travel to these locations to exploit the free internet access. One of favorite tools of wardrivers is a software called "Netstumbler", that is also available for some Wi-Fi cards for Pocket PCs. Info can be found on www.netstumbler.com

Also an interesting phenomenon called ‘Warchalking’ has arisen from wardriving. This is a more manual approach to identifying users to a WiFi location. I will explain this in more detail in my next post.

information taken from:
http://mobile.msmobiles.com/i.php?id=50
en.wikipedia.org/wiki/Wardriving

images taken from:
http://suburbia.sindominio.net/IMG/arton127.jpg
http://suburbia.sindominio.net/IMG/jpg/pringles.jpg

Monday, March 13, 2006

Danger of the Unseen



As you can see WiFi is growing from strength to strength and is certainly going to be part of the new generation Internet for the foreseeable future. But what of the impact physically on the population?

Looking at the graphical representation of the data cloud created by WiFi signals covering downtown Salt Lake City, UT I must admit it looks a little daunting.

If this was smoke or pollution that was visible I think people would be outraged, I know I would be. But how do we know that these signals don’t have a physical affect on us. What’s to say this invisible information pollution won’t affect us in the long term.

Well after looking into this area it appears the fact of the matter is that these signals are most probably harmless. For instance the 2.4 GHZ range include WiFi, microwave ovens, house cordless phones
and more.

So this new WiFi phenomenon probably won’t be increasing the health risks from EMF (electromagnetic field) in any substantial way. That’s not to say however this means there isn’t a risk, I shall have a look to see if I can source any studies that may exist about the results long-term exposure of low watt radiation in the 2.4 GHZ range.

However this is not the feeling of some groups, a Canadian university has just banned wireless Internet access in and around the campus. Officials at the school, Lakehead University, have banned WiFi, saying that they want to avoid "potential chronic exposure for our students." The officials point out that the "jury’s out" on the health risks from EMF generated by WiFi transmissions, and liken the risks of WiFi to those of second-hand tobacco smoke, which were not immediately apparent to researchers.

I shall delve further to see what I can find on this controversial area….



info taken from:
http://lists.nycwireless.net/pipermail/nycwireless/2002-April/005277.html
http://www.engadget.com/2006/02/22/wifi-is-dangerous-not-dangerous-a-new-saga/
http://digg.com/technology/Canadian_school_bans_Wi-Fi

Friday, March 03, 2006

Data Clouds

Ok so just trying to work out what a data cloud actually is and I've so far managed to find one interpretation.

Wireless networks can be found in pretty much every major city here in the UK along with the US and many other developed countries are now using the technology. In this context a data cloud is used to describe the signals that gather around these inter twining wireless networks.

An assistant professor at Arizona State University’s Department of Geography called Dr. Paul M. Torrens is conducting research into the invisible geography of wireless "wifi" Internet signals over downtown Salt Lake City, UT. He has produced an image that represents this graphically shown below and is part of ongoing work to map "urban data clouds" in an effort to study the geography of new emerging technologies and their impact on dense urban environments.


image illustrating the invisible geography of wireless "wifi" Internet signal blanketing downtown Salt Lake City, UT.


information taken from http://www.geosimulation.org/geosim/wifi.htm

Virtual Enviroments - Outline of Brief

Examine a given communication technology in relation to a pre-selected quotation.

Throughout history there has been a turbulent relationship between technology and cultural, political, sociological, philosophical and ideological views of the world and humankind.

In order to fulfil the requirements of this brief you are expected to research and critically evaluate issues deriving from a synthesis of the technology and quote. This should result in a unique presentation with a personal agenda. Working in pairs, or indivdually, you are expected to create a distinct piece of Multimedia to house your research and your ideas. You will be marked both on the design and functionality of your digital presentation as well as the spoken content and conceptual framework.

Within this project you must also make and present a piece of work to supplement your perspective. This should be housed within the framework you design and build. This could be conceived as video, animation, 3D environment, web link, interactive shockwave element or audio piece.

Carefully consider the most appropriate method for presenting your ideas, as you will be marked on the suitability of your choice. For example, if this involves additionally sending a letter to all members of the group, you will be marked on the written content of that letter as well as the digital presentation you give.

All students should be prepared to answer any questions at the end of their presentation.

.........................................................................................................................................................................

For this particular brief as mentioned above we have been given a quote and a technology in order to research and explore to produce a presentation to include a written section, and a piece of work to accompany it.

'The Sun Never Sets On The Cyberspatial Empire' is our quote.

It is taken from the book; 'The Robot in the Garden: Telerobotics and Telepistemology in the age of the internet'.

Data Clouds is our technology.

Both Chris (my partner for this project) and myself will use this blog as a journal to document our research into these areas.