[AusNOG] Wifi Security and Interception
Bevan Slattery
Bevan.Slattery at staff.pipenetworks.com
Wed Jun 9 16:27:53 EST 2010
> > I think the real issue here is that people on this list think it's
> > "fair game" to intercept and record a communication (ie.
> payload) if
> > the last part of the path happens to be over an unencrypted
> Wifi network.
>
> Bevan, I think if you're going to make that accusation you
> should be naming those people so they can defend themselves.
Yeah. Good point. I probably just assumed they clearly articulated
their position to the list and it was pretty self evident. Will try to
keep this in mind.
> > There
> > are reasons why the TIA is why it is. And that is it's BAD (and
> > possibly illegal) to INTERCEPT (and record) a COMMUNICATION (not
> > talking about ethernet/Wifi/L2 but a communication under the TIA)
> > regardless of bearer if you are NOT the INTENDED RECIPIENT. Period.
> >
>
> If you're going to make that assertion, then I think you're
> overlooking both lawful intercept, and carrier staff being
> allowed to capture network traffic for network performance /
> troubleshooting reasons.
I'm pretty sure I explained lawful interception as an exemption in
previous posts when I was directly referring to the TIA. I also
probably assumed many people on this list would understand their
position with respect to lawful interception (versus unlawful
interception) as a general principle under the TIA (outside the fact
whether the last mile/B side is a wifi access point).
Whilst it's obvious to me and others I probably should have re-state the
qualification of lawful interception exemptions. However, if you are on
AUSNOG, being a newtork operators list and you actually have no clue
about your legal position on intercepting a communication then that's
just scary.
Good (and constructive) points Mark.
Thanks
[b]
More information about the AusNOG
mailing list