By Kamini Kandica Abdool
These days torture and mayhem has entered our environment in a detrimental way. Cyber threats that used to be just piracy has taken on a new endeavor to attack the general population of the world. The new terroristic weaponry these days is the wireless network that are prevalent in every environment these days.
“Some words to the wise: if you have a wireless Internet or network connection, make sure you’ve got the best possible security measures in place. And don’t delay.
Why? We’ve recently learned that the basic protection against intruders—Wireless Encryption Protocol, or WEP—is increasingly vulnerable to accomplished hackers.” (FBI)
Wireless networks are already prone to hacking and infiltration at a distance of 60 feet outside the parameter of the building where it is housed. Because of this strong security and passwords are required. But the unassuming businesses sometimes neglect to stop there network from divulging itself to these hackers. This makes then not only susceptible to the hacking our terrorists and other online pirates but it also enhances the equipment in the building causing mild burning and electrical static cling.
These days even if the business runs a mainframe server with hard coding, there is usually a wireless attachment that comes but is normally unaware of. This poses a problem and becomes the source f heavy traffic and invaders. These invaders as pirates steal financial information primarily but these days the threat is much more with network that includes terrorists. Terrorists use the network these days to silently create an atmosphere where your equipment, computers included eventually attack you. Right now the danger zone is very evident and a cyber war zone is apparent. The US government at this point, with NATO have discussed the threat of this new type of terrorism and have made strategies to try and protect the population. The problem here is that the realization of the extent of this catastrophe hasn’t yet been noticed efficiently and the unaware citizens are becoming the victims.
Another highly used form of wireless traffic comes from cell phones with internet access, iPods, and iPhones. The pose a threat that many are not aware of and expose viruses in the hardware that use the cell phone wireless signal to attract the wireless modem on your router.
How do you know if your place of business is affected? Well the most evident sign is dust accumulation. Dust accumulation present around breaker stations and security alarms are a definite sign of hacking attacks and piracy. Why do we know this? Because the output of electricity is not normal and creates an intense amount of static that attract a significant amount of dust from the floor and resembles a fabric made of dust with noticeable threading.
“There’s a lot of information out there about making your wireless system more secure,” says James E. Finch, assistant director of our Cyber Division. “We recommend taking a layered security approach. That is, throw as many locks on the computer to thwart these hackers as possible.” (Finch quoted by FBI)
I wanted to say two days ago that cleaning away the dust mites that accumulate will resolve the problem but it doesn’t. It just hides the problem and it continues to facilitate a growing current in the environment. The best way here to lessen this problem and minimize the risk to the business, associates and clients is to monitor and investigate the reach of the wireless network. Contact your IT providers immediately and discuss the capabilities of your environemt. Try to reduce or close all wireless ports if your business depend on a mainframe server solely. Use a firewall to block incoming traffic that is not business appropriate. Also curtail the use of websites that provide past-times that include gambling, sex and pornography, spamming, toolbar, fantasy and torture. Limit the use of cell phones, iPods and iPhones in your work environment and try to eliminate the wireless connections that it creates.
Many cell phone companies extend there network to give wireless signals everywhere and these days, the signal accumulates to such an extent that we all walk in electricity without even knowing. This dilemna is left to IT professional like myself to raise the issue with the cell phone companies themselves. T-Mobile was one company that have this extreme type of static and have now been taken over by AT&T who has more experience with cell phone and telephone networking to control this type of accumulation. According to sources, they are currently working with Bell Atlantic, not to be confused with Verizon, to curtail this risk that affects us all and create noise pollution and electrical walls throughout our communities. Another effort to curtail this are the green projects and new park structures that are appearing in our city areas and lesson housing and warehouse developments.
This has been an ongoing problem that affects all Americans these. It cause injuries that include electrical burns, headaches, extreme sunburn that begin from static accumulation and painful joints and sometimes extreme toothaches. If this occurs frequently when you are at work or around several computers of electrical wiring, including street wiring, contact your physician immediately and try to treat the symptoms. In addition contact the FBI cyber unit immediately and describe scenarios that show that you are a possible victim.
The best solution at this point is to protect your businesses from piracy and hacking to reduce the risk of terrorism attacks in your place of work. Believe it or not, this will reduce the risk for persons at home.
Be aware users and companies that this threat really exists. Research for yourselves with the FBI and Homeland security the measure to take to stop this type of terrorism if you investigate and find that you are a victim.
http://www.fbi.gov/news/stories/2007/may/wireless_050407 ; FBI article, 2011.