Wardriving: Problemo o No Problemo?
But imagine you are an NSA employee. Or the CEO of a noted defense contractor. Or holder of some other high-profile job where the nation's prosperity is dependent on your secrecy (like USC's head football coach). Then if a hacker knows where you live or work, it could be a problem even if your WiFi is encrypted. Maybe.
The topic is of interest to the author after a recent discussion with a person who is, in fact, an employee of a noted defense contractor. The author's position is that Wardriving could be a problem. His position is that it isn't.
Yours truly's scenario lays out as follows. Important Person gets on an airplane. Important Person opens her laptop and dutifully attaches her laptop privacy screen. After browsing adult videos for an hour (that's what Important People really do behind those screens, isn't it?), Important Person does a little bit of work, all the while ensuring that she doesn't connect to the airline's potentially-unsecure WiFi.
What Important Person may be unaware of is her laptop is revealing her location. Check out the capture of probe request frames I got on a recent MCO-LAX (WiFi-enabled) flight:
Highlighted in that Wireshark screenshot is a probe request frame looking for the SSID of "BHNTG862G2332". That means that somebody somewhere connected to a WiFi network with that SSID some time prior to fleeing Orlando.
If an enterprising hacker were to take advantage of wardrivers' data, an enterprising hacker could pin down the location of this Important Person's home or work. Check out what Wigle shows when querying the SSID of "BHNTG862G2332":
Eso mapa (returning to our Mayo de Mejico theme) tells us that somebody on the author's flight lives pretty darned close to 2450 Euston Road, Winter Park, FL 32789.
The argument that wardriving doesn't matter boils down to this: What's the hacker do now? The hacker possibly has no idea which person has the probing device. And even if the hacker does, additional information would be required to make this a National Security issue.
Still, "nadie sufre mas que un hombre pobre o una mujer fea" (I tried to find the Spanish cliché equivalent of "it's better to be safe than sorry", with no luck). If you don't like the idea that someone can find out where you work or live and you think that wardriving is un problemo, then you can do the following:
- Disable WiFi when it's not in use. (Because no WiFi means no probing.)
- Broadcast your SSIDs. (Because most non-Android devices only probe for Hidden SSIDs. With Android devices you're unsecure no matter what.)
- Avoid unique SSIDs. (If our flyer on his/her way to America's finest [or second-finest, depending how much you like Milwaukee] city had used a generic SSID like "Radius" at home, then a bunch of wardriving results would've popped up on Wigle. That makes it near impossible for a hacker to narrow down a home or work location.)
Preventing your WiFi devices from revealing your location via wardriving data requires such simple steps. Home users can just log in to their wireless routers/modems and make sure they have a generic SSID that is broadcasting. Changes an enterprise's WiFi configuration to make it tougher for hackers to know where your office is may take some work, but it's a good idea to at least make that part of the plan the next time the WLAN gets an update.
Of course, all of this is moot if you're an Android user. Android smartphones and tablets probe for all saved WiFi networks, whether hidden or broadcasting. With Android phones, the only way to keep hackers from get information that could reveal the location of su casa is to keep the WiFi turned off when it's not in use.