Results 1 to 9 of 9

Thread: Channel State Information used to detect Wi-Fi device tampering

  1. #1
    HEXUS.admin
    Join Date
    Apr 2005
    Posts
    31,709
    Thanks
    0
    Thanked
    2,073 times in 719 posts

    Channel State Information used to detect Wi-Fi device tampering

    Looking at wireless signal patterns you can clearly see evidence of physical tampering.
    Read more.

  2. #2
    Senior Member
    Join Date
    Dec 2013
    Posts
    3,526
    Thanks
    504
    Thanked
    468 times in 326 posts

    Re: Channel State Information used to detect Wi-Fi device tampering

    Can it distinguish between normal people and employes of GCHQ?

    If it can't it seems a bit pointless as if the IPB gets passed into law it would be a crime to reveal the existence of government hacking.

  3. #3
    RIP Peterb ik9000's Avatar
    Join Date
    Nov 2009
    Posts
    7,704
    Thanks
    1,840
    Thanked
    1,434 times in 1,057 posts
    • ik9000's system
      • Motherboard:
      • Asus P7H55-M/USB3
      • CPU:
      • i7-870, Prolimatech Megahalems, 2x Akasa Apache 120mm
      • Memory:
      • 4x4GB Corsair Vengeance 2133 11-11-11-27
      • Storage:
      • 2x256GB Samsung 840-Pro, 1TB Seagate 7200.12, 1TB Seagate ES.2
      • Graphics card(s):
      • Gigabyte GTX 460 1GB SuperOverClocked
      • PSU:
      • NZXT Hale 90 750w
      • Case:
      • BitFenix Survivor + Bitfenix spectre LED fans, LG BluRay R/W optical drive
      • Operating System:
      • Windows 7 Professional
      • Monitor(s):
      • Dell U2414h, U2311h 1920x1080
      • Internet:
      • 200Mb/s Fibre and 4G wifi

    Re: Channel State Information used to detect Wi-Fi device tampering

    or maybe at 21 mins someone just sat in the arm chair by the router?

  4. #4
    The late but legendary peterb - Onward and Upward peterb's Avatar
    Join Date
    Aug 2005
    Location
    Looking down & checking on swearing
    Posts
    19,378
    Thanks
    2,892
    Thanked
    3,403 times in 2,693 posts

    Re: Channel State Information used to detect Wi-Fi device tampering

    Quote Originally Posted by Corky34 View Post
    Can it distinguish between normal people and employes of GCHQ?

    If it can't it seems a bit pointless as if the IPB gets passed into law it would be a crime to reveal the existence of government hacking.
    I think the civil servants employed at GCHQ might be upset to be thought that they are not normal people.
    (\__/)
    (='.'=)
    (")_(")

    Been helped or just 'Like' a post? Use the Thanks button!
    My broadband speed - 750 Meganibbles/minute

  5. #5
    RIP Peterb ik9000's Avatar
    Join Date
    Nov 2009
    Posts
    7,704
    Thanks
    1,840
    Thanked
    1,434 times in 1,057 posts
    • ik9000's system
      • Motherboard:
      • Asus P7H55-M/USB3
      • CPU:
      • i7-870, Prolimatech Megahalems, 2x Akasa Apache 120mm
      • Memory:
      • 4x4GB Corsair Vengeance 2133 11-11-11-27
      • Storage:
      • 2x256GB Samsung 840-Pro, 1TB Seagate 7200.12, 1TB Seagate ES.2
      • Graphics card(s):
      • Gigabyte GTX 460 1GB SuperOverClocked
      • PSU:
      • NZXT Hale 90 750w
      • Case:
      • BitFenix Survivor + Bitfenix spectre LED fans, LG BluRay R/W optical drive
      • Operating System:
      • Windows 7 Professional
      • Monitor(s):
      • Dell U2414h, U2311h 1920x1080
      • Internet:
      • 200Mb/s Fibre and 4G wifi

    Re: Channel State Information used to detect Wi-Fi device tampering

    Quote Originally Posted by peterb View Post
    I think the civil servants employed at GCHQ might be upset to be thought that they are not normal people.
    Quite.

  6. #6
    Senior Member
    Join Date
    Dec 2013
    Posts
    3,526
    Thanks
    504
    Thanked
    468 times in 326 posts

    Re: Channel State Information used to detect Wi-Fi device tampering

    Quote Originally Posted by peterb View Post
    I think the civil servants employed at GCHQ might be upset to be thought that they are not normal people.
    I'm not saying their bug eyed monsters, but in strictly legal terms when it comes to hacking they ain't.

    EDIT: Just so there's no disambiguate "employes of GCHQ" means when carrying out their work for GCHQ.
    Last edited by Corky34; 21-12-2015 at 04:00 PM.

  7. #7
    Member
    Join Date
    Sep 2012
    Posts
    139
    Thanks
    0
    Thanked
    7 times in 6 posts

    Re: Channel State Information used to detect Wi-Fi device tampering

    Doesn't a camera work just as well?

    Could even have it triggered by PIR, job done?

  8. #8
    The late but legendary peterb - Onward and Upward peterb's Avatar
    Join Date
    Aug 2005
    Location
    Looking down & checking on swearing
    Posts
    19,378
    Thanks
    2,892
    Thanked
    3,403 times in 2,693 posts

    Re: Channel State Information used to detect Wi-Fi device tampering

    Quote Originally Posted by Corky34 View Post
    I'm not saying their bug eyed monsters, but in strictly legal terms when it comes to hacking they ain't.

    EDIT: Just so there's no disambiguate "employes of GCHQ" means when carrying out their work for GCHQ.
    It's just work, just as a forensic investigator 'hacks' a seized computer as part of a criminal investigation.
    (\__/)
    (='.'=)
    (")_(")

    Been helped or just 'Like' a post? Use the Thanks button!
    My broadband speed - 750 Meganibbles/minute

  9. #9
    Senior Member
    Join Date
    Dec 2013
    Posts
    3,526
    Thanks
    504
    Thanked
    468 times in 326 posts

    Re: Channel State Information used to detect Wi-Fi device tampering

    Quote Originally Posted by peterb View Post
    It's just work, just as a forensic investigator 'hacks' a seized computer as part of a criminal investigation.
    Yes it's just work but it probably would have seemed odd if i said normal people and GCHQ, that's unless GCHQ has grown legs and can walk up to WiFi hotspots.

    What GCHQ, as an organisation, do is nothing like a forensic investigator 'hacking' a seized computer as part of a criminal investigation, in the case of the forensic investigator there's reasonable grounds to suspect that single computer may contain information relevant to the investigation, what GCHQ is gather information on both the innocent and guilty in a scattergun approach solely designed for the purpose of ‘fishing’ for information without any idea of what might be revealed.

Thread Information

Users Browsing this Thread

There are currently 1 users browsing this thread. (0 members and 1 guests)

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •