[140415] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: 23,000 IP addresses

daemon@ATHENA.MIT.EDU (Michael Painter)
Tue May 10 21:54:58 2011

From: "Michael Painter" <tvhawaii@shaka.com>
To: "NANOG list" <nanog@nanog.org>
Date: Tue, 10 May 2011 15:53:16 -1000
Errors-To: nanog-bounces+nanog.discuss=bloom-picayune.mit.edu@nanog.org

Deepak Jain wrote:
> For examples, see the RIAA's attempts and more recently the criminal investigations of child porn downloads from 
> unsecured access
> points. From what I understand (or wildly guess) is that ISPs with remote diagnostic capabilities are being asked if 
> their
> provided access point is secure or unsecure BEFORE they serve their warrants to avoid further embarrassments. [It'll 
> probably
> take another 6 months and more goofs before they realize that customers are perfectly capable of poorly installing their 
> own
> access points behind ISP provided gear].

Exactly...what about those who choose WEP/WPA-TKIP for their 'secured' access point?
I can just imagine being in front of a judge/jury after having been arrested for, as you say, "child porn downloads " and 
listening to my law^H^H^H public defender explain the mechanisms of how the access point was 'cracked' and may have been 
used by someone sitting in their car down the street.<shudder> 



home help back first fref pref prev next nref lref last post