Stay up to date with notifications from The Independent

Notifications can be managed in browser preferences.

Company secrets fall straight in a hacker's lap

Sunday 14 October 2001 00:00 BST
Comments

Your support helps us to tell the story

From reproductive rights to climate change to Big Tech, The Independent is on the ground when the story is developing. Whether it's investigating the financials of Elon Musk's pro-Trump PAC or producing our latest documentary, 'The A Word', which shines a light on the American women fighting for reproductive rights, we know how important it is to parse out the facts from the messaging.

At such a critical moment in US history, we need reporters on the ground. Your donation allows us to keep sending journalists to speak to both sides of the story.

The Independent is trusted by Americans across the entire political spectrum. And unlike many other quality news outlets, we choose not to lock Americans out of our reporting and analysis with paywalls. We believe quality journalism should be available to everyone, paid for by those who can afford it.

Your support makes all the difference.

Prowling Paul is not the only IBM computer security consultant trying to break into client premises. However, most of his burgling brethren use what the computer industry might consider more sophisticated techniques. That is, they deploy cyber methods.

One of his "partners in crime" on the cyber front is IBM security consultant Daniel Keely, who specialises in finding holes in the latest form of computing – wireless.

Technologies that allow workers to tap into corporate networks and databases using radio, infra-red or other airwave connections from computers and other devices are proliferating. Companies implement them to cut down on wiring hassles within their premises, and to support remote access.

But a downside is that wireless computing can be alarmingly porous, and Mr Keely is out to prove that point. Like Prowling Paul, he says his challenge is often too easy.

A typical day for Mr Keely or for one of his team would entail sitting in a client's car park or roaming its perimeter with a laptop computer, attempting to tap into the company's wireless networks.

Companies which implement wireless "LANs" (local-area networks) scatter receiving antennae around their premises. According to Mr Keely, these will let in just about anyone in range with standard wireless computer technology, unless the company installs security software in the electronic access stations attached to antennae.

"If they haven't implemented any security at all, we can get through in 10 seconds,'' claims Mr Keely, who is part of IBM's Global Services division.

As with Prowling Paul, his wireless snooping is sanctioned by the client, as part of a computer security assessment. He says IBM's break-in success ratio is "very high".

During a briefing at IBM's international wireless security centre outside the French city of Nice last week, Mr Keely and other IBMers painted a computing world very vulnerable to wireless infiltration. They pictured wireless cyber baddies not just roaming car parks but also:

* sitting in cafés using Bluetooth wireless connections to infiltrate the laptop computers in use at the table in the corner (once in, the hacker could snoop laptop files, ride the laptop connection into a corporate network, or simply run down the machine's battery to effect a crude "denial of service" attack);

* reading their competitors' wireless email in acts of industrial espionage;

* committing the most rudimentary form of wireless crime – stealing laptops to gain access to the information stored in them or to which they are connected.

That scenario is partially the spin of a company which wants a piece of the wireless security market, estimated by International Data Corporation to hit $21bn (£14m) by 2005.

However, it is steeped in the reality that progress – in this case the emergence of unwired any time, anywhere connections – often comes with its own set of problems.

Join our commenting forum

Join thought-provoking conversations, follow other Independent readers and see their replies

Comments

Thank you for registering

Please refresh the page or navigate to another page on the site to be automatically logged inPlease refresh your browser to be logged in