Abstract

On 27 December 2013, the US Court of Appeals for the Ninth Circuit issued an opinion that intercepting data from unencrypted wireless local area networks--Wi-Fi sniffing--can violate the US Wiretap Act. The case centers on a Wi-Fi sniffer that was present in Google Street View vehicles that roamed the US between 2008 and 2010 and that were permanently recording every unencrypted Wi-Fi frame that they intercepted. Although the Wiretap Act has a broad exemption for intercepting radio communications that are generally accessible to the public, the Court ruled that Wi-Fi is not a radio communication. The ruling, if it stands, will significantly impact computer security education, in which Wi-Fi sniffing is a common student exercise; security practitioners, who frequently sniff for security assessments; and computer security research, which has traditionally used collection in the wild as a way of finding vulnerabilities.

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.