It looks like you're using an Ad Blocker.
Please white-list or disable AboveTopSecret.com in your ad-blocking tool.
Thank you.
Some features of ATS will be disabled while you continue to use an ad-blocker.
Originally posted by CanadaMaster
Originally posted by Havick007
reply to post by THE_PROFESSIONAL
But it all depends on who is trying to trace your connection and whether or not they have the capability of breaking the encryption.
Although it's not an easy task for the average person or even a hacker, there are government agencies (NSA) and even private companies that have the capability. What if a federal agency went to the phone carrier and asked for the details of the person connected at the time and approx place, as long as they had the right type of warrant it could be done, especially with all the new privacy/security laws passed in the past few years.
Although it's public Wifi, there is always some type of link or trace that you were there, all they would need is an IMEI or Sim-card number register.
edit on 22-6-2011 by Havick007 because: (no reason given)
Actually a SIM card is not needed as he is not referring to a cell phone network, he is referring to an 802.11a/b/g/n wireless network types that operates at 2.4 GHz RF space. All that is needed is the client's wireless Ethernet device's MAC (Media Access Control) address (example of a MAC address: 00:0A:AC:65:67:AF). Even though, they wont initially catch him, they will depend on future connection made by the client (laptop/PC/etc) since MAC address will always be the same, all what they will have do to is pin point locations, seeing which of their many access-points/repeaters/etc is receiving connections from the MAC address in question, then if necessary, use a portable access-point configured to connect to the same public wifi network and park your self to the area where you think might be the epi-center where the client with the MAC address your are looking for might be located and hope that their next connection to this public free wifi network be done through the portable wifi access point that the investigator has on their hands (all that is needed to create a portable access point that leap frogs to another wireless network is a Linksys or any compatible router that is compatible with the open source DD-WRT firmware).
After the client makes connection to the investigator's "prepared" router, the investigator can then login to his 'portable' router's DD-WRT gateway page and then go to the wifi client's page to look for the correct MAC address that will be listed there and the signal strength. At this point, all that the investigator needs to do is drive slowly to see if the client's device signal strength diminishes or improves, if it does improve it means that the investigator is getting closer to the physical location of target. By using this "squaring" technique it is possible to finally pin point the exact address where that MAC address is coming from and perform a search warrant to locate exact device with MAC address in question, once found, then do an arrest.
See? very simple for the technologically minded investigator, and if in such police department doesn't have any technologically minded person that knows these things, they all they need to do is hire people like my self to walk them through the whole operation.
Now, it is possible for the CLIENT to be truly anonymous by changing their MAC address. There is a special freeware software that allows you do change your wireless adapter's MAC address to any other value you manually specify, if you do this, then, and THEN there is no way that any one can technically find you, one you change your MAC address, you will be seen by the network as a bran new client just connecting to it. But of course, less than 1% of these "hackers" knows that the MAC address is changeable, let alone are aware of the existence of MAC addresses and its implications for them, they only rely on IP address, they think that by making sure that they dont use their ISP's public IP address that they are anonymous, but they fail to understand the other part, one that is a tad less serious than the IP address, their unique MAC address.edit on 11/6/22 by CanadaMaster because: (no reason given)
Originally posted by wayno
Their attack on PBS was targeted and intentional; not random. It served a purpose beyond lulz.
Just an example. It is possible to have a conscience and be a prankster.
The dazed 19-year-old - charged yesterday by cops probing the hacking of major corporations and security agencies - got so wasted he could barely speak.
After sinking cans of lager, he sucked in can after can of potentially lethal butane gas - each giving him a gasping "high" lasting a couple of minutes - during a half-hour binge.
Read more: www.thesun.co.uk...
Originally posted by BiGGz
reply to post by THE_PROFESSIONAL
I'm actually glad. I'm not a fan of Anonymous and lulzsec. They're going to ruin the internet for us all. I'm glad someone stopped them and their terrorist attacks against websites.
ter·ror·ism/ˈterəˌrizəm/
Noun: The use of violence and intimidation in the pursuit of political aims.
Originally posted by ShaunHatfield
reply to post by THE_PROFESSIONAL
Do you have anything intelligent to add? You state false opinions as facts.... Is this a flaw of yours, or are you simply a troll?
Yesterday The Daily Telegraph revealed that the British government had extradited more than twice as many people to America in the past five years – 56 compared with 26 people sent from America to Britain.