Feeds

Yorkshire cops fail to grasp principle behind BT Fon Wi-Fi network

'Prevent people that are passing by to hook up to your network', pleads plod

Remote control for virtualized desktops

Bungling cops in Yorkshire have called upon householders to lock down their Wi-Fi after mistaking a free hotspot user for a piggybacking connection thief.

A Reg reader from Heckmondwike claims that a local busybody called the police after seeing him access the internet using BT's Fon service, which allows customers to access more than 5 million hotspots around the country. Most of these are ordinary BT residential routers which intentionally offer a service to Fon users passing by in addition to the householder.

But local cops nonetheless wrote to local residents and issued an online warning, claiming that Wi-Fi connection thieves were on the loose, intent on using other people's networks for "illegal activities and downloads".

The police letter said:

"It has been brought to the attention of Police that unsecured wireless broadband/internet access are currently being used by members of the public, particularly around the Nunroyd area of Heckmondwike."

It goes on:

Do not allow anyone connect to your wireless internet connection without your authorisation, people that connect to your network may use it for illegal activities and downloads. By changing your password this will prevent people that are passing by to hook up to your network [sic] and prevent your access point from ending up on the hot spot list.

Our man in the north, who does not want to be named for fear of sparking a parochial World War III, said the police letter was definitely sparked by his (completely legitimate) Fon use. He writes:

"One particular local householder (who is known for obnoxiously flaunting the cross of St George) threw a fit after catching me reading the Register on my tablet, using a BT Fon hotspot.

"After a rant about stealing internet access, he must have phoned the police because our local plod then sent letters to all the householders advising them that someone is stealing internet access, so they should change their passwords," he added.

"Ironically, changing the password will do sweet FA to actually turn off [a Fon] hotspot, which just goes to show how thick our dear plods are. You would have hoped that the office plod in charge might just know how BT achieves the 5 million hotspots it claims.

"I hope they aren't this incompetent when it comes to stopping people who want to blow us up."

Inspector Neil Money of the Batley and Spen Neighbourhood Policing Team stuck to his guns when contacted by the Register for comment.

The good inspector said:

"I would once again repeat the advice that people follow basic security steps to protect their internet access - including password protecting the service.

"This was a general warning put out to offer residents simple security advice."

For the record, BT Fon is a "crowdsourced Wi-Fi" service which works by reserving a small portion of every BT user's Wi-Fi network capacity for use by passing roamers. Most BT internet customers get the service for free. Changing one's password will not, of course, "prevent people that are passing by to hook up to your network" [sic] if they are Fon users and your router is part of the Fon service.

A BT spokesman told householders there was no danger in allowing passing folk to use BT Fon to access your network.

“Sharing a proportion of your wi-fi with Fon is safe and secure as any external usage is sent through a separate channel on your BT Home Hub meaning your activity stays private," he said. ®

Top 5 reasons to deploy VMware with Tegile

More from The Register

next story
Regin: The super-spyware the security industry has been silent about
NSA fingered as likely source of complex malware family
Why did it take antivirus giants YEARS to drill into super-scary Regin? Symantec responds...
FYI this isn't just going to target Windows, Linux and OS X fans
Privacy bods offer GOV SPY VICTIMS a FREE SPYWARE SNIFFER
Looks for gov malware that evades most antivirus
Home Office: Fancy flogging us some SECRET SPY GEAR?
If you do, tell NOBODY what it's for or how it works
HACKERS can DELETE SURVEILLANCE DVRS remotely – report
Hikvision devices wide open to hacking, claim securobods
'Regin': The 'New Stuxnet' spook-grade SOFTWARE WEAPON described
'A degree of technical competence rarely seen'
Syrian Electronic Army in news site 'hack' POP-UP MAYHEM
Gigya redirect exploit blamed for pop-rageous ploy
Astro-boffins start opening universe simulation data
Got a supercomputer? Want to simulate a universe? Here you go
prev story

Whitepapers

10 ways wire data helps conquer IT complexity
IT teams can automatically detect problems across the IT environment, spot data theft, select unique pieces of transaction payloads to send to a data source, and more.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
How to determine if cloud backup is right for your servers
Two key factors, technical feasibility and TCO economics, that backup and IT operations managers should consider when assessing cloud backup.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Mitigating web security risk with SSL certificates
Web-based systems are essential tools for running business processes and delivering services to customers.