Feeds

Wireless access point triggers bomb scare

Wronged geek speaks

  • alert
  • submit to reddit

Internet Security Threat Report 2014

An Australian man whose wireless access point triggered a bomb scare has spoken of his shock at been treated like a potential terrorist.

Student Bobby T, 20, set up a Dlink 2100AP wireless access point outside his home in the suburbs of Sydney to act as a node in a community wireless network. But the kit ("a Dlink 2100AP wireless AP, removed of its casing and with the PCB siliconed onto a black weatherproof electronics box") was only up and running for 10 hours before he was visited by two NSW state police and two local police acting on a tip-off from worried neighbours this Monday (25 October).

Police dug up cables in his garden and quizzed him on other users of the wireless LAN, while denying him the opportunity to make a phone call, Bobby T told The Register. "I was never formally arrested or taken away. Everything happened in my home. Apparently the case is now closed. They thought it was a bomb, but found it was not," he said. Police later told Bobby T's friend that they were "about to evacuate half the suburb and call in the bomb squad".

The police handling of the alert has left Bobby T fuming. "Everyone that I've told about this story laughed their head off but I've never managed to find it funny - only scary, threatening, and intimidating. I had a very good impression of the police until that incident. Now I feel violated, insulted, and with my rights trampled upon," he said.

Bobby T harbours no ill feeling towards his neighbours over the incident. "Community ignorance is very understandable especially considering all the fear that's been instilled upon them. I didn't mind the cops reacting to calls but I'm just not happy with the attitude with which they handled the matter," he added. ®

Related stories

Wi-Fi 'sniper rifle' debuts at DEFCON
Aussie telco moots payphone Wi-Fi hotzones
Blanket Wi-Fi smothers Amsterdam (community wireless)

Internet Security Threat Report 2014

Whitepapers

Designing and building an open ITOA architecture
Learn about a new IT data taxonomy defined by the four data sources of IT visibility: wire, machine, agent, and synthetic data sets.
How to determine if cloud backup is right for your servers
Two key factors, technical feasibility and TCO economics, that backup and IT operations managers should consider when assessing cloud backup.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Website security in corporate America
Find out how you rank among other IT managers testing your website's vulnerabilities.