Feeds

Wi-Fi terror menaces Vancouver

City cops braced for laptop jihad

Top 5 reasons to deploy VMware with Tegile

International terrorists with a grudge against the winter sports community are believed to be clearing their diaries in preparation for the 2010 Winter Olympic Games, to be held in Vancouver.

It is feared that the miscreants may be plotting nefarious uses for the city's mooted free/low-cost wireless network.

The Vancouver Sun reports that much of the municipal infrastructure is to make use of the proposed net, including "gas meters, bus services...and traffic signals", hinting at a possible Italian Job-style gridlock caper.

The Vancouver police are worried, too. Computer crime investigator Detective Mark Fenton is quoted as saying: "Putting those vital links on the same network, you are opening yourself up to terrorist attack...it's not just conceivable, it has happened." Fenton works for the computer investigative support unit of the city's financial crimes section.

Some security specialists are also alarmed, with the Vancouver Sun quoting British Columbia-based net security specialist O J Jonasson, who said "a concerted terrorist effort is a real concern...it's like 9/11".

Other security heavyweights, however, displayed a more blasé attitude. Bruce Schneier called the Wi-Fi catastrophe warnings a "movie plot threat", and "impressive idiocy". He stated that Fenton is "overestimating how important the 2010 Winter Olympics is".

However, Detective Fenton said: "If you have an open wireless system across the city, as a bad guy I could sit on a bus with a laptop and do global crime."

The Vancouver Sun endorsed this, posting a picture of a man with a laptop to warn the public. It was captioned "anyone with a laptop and wireless access could commit a terrorist act, police warn".

Even the most sceptical analyst couldn't argue with that. ®

Intelligent flash storage arrays

More from The Register

next story
Knock Knock tool makes a joke of Mac AV
Yes, we know Macs 'don't get viruses', but when they do this code'll spot 'em
Feds seek potential 'second Snowden' gov doc leaker – report
Hang on, Ed wasn't here when we compiled THIS document
Shellshock over SMTP attacks mean you can now ignore your email
'But boss, the Internet Storm Centre says it's dangerous for me to reply to you'
Why weasel words might not work for Whisper
CEO suspends editor but privacy questions remain
DEATH by PowerPoint: Microsoft warns of 0-day attack hidden in slides
Might put out patch in update, might chuck it out sooner
BlackEnergy crimeware coursing through US control systems
US CERT says three flavours of control kit are under attack
prev story

Whitepapers

Why and how to choose the right cloud vendor
The benefits of cloud-based storage in your processes. Eliminate onsite, disk-based backup and archiving in favor of cloud-based data protection.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
New hybrid storage solutions
Tackling data challenges through emerging hybrid storage solutions that enable optimum database performance whilst managing costs and increasingly large data stores.
Website security in corporate America
Find out how you rank among other IT managers testing your website's vulnerabilities.