ILNews

Start Page: Not so wonderful wireless comes with hitches

Kim Brand
September 11, 2013
Back to TopCommentsE-mailPrintBookmark and Share

Kim BrandThe last personal computer you bought probably wasn’t a PC. It was a ‘mobile’ device – a tablet or laptop or smartphone. The common denominator of these devices is their dependence on wireless connectivity to your local area network and/or the Internet. The ‘jack’ is gone.

Wireless Fidelity, or WiFi, has become an expectation at coffee shops, car dealers and college campuses. The modern law office too. But the technology invented in 1999 has succeeded beyond its inventors’ expectations. So like our phone system, nobody was quite prepared for the uses to which it has been put.

A marvel of technology, the radios in almost every device seem to auto-magically connect to networks wherever you may roam. Once you connect, they remember your logon information and make your laptop, tablet or smartphone a part of your host’s network. This is a great convenience if you need to check your email, browse the Internet or update your Facebook page, but as with most digital conveniences today you bear the risk of use.
 

wifi.jpg The ubiquitous logo of the Wi-Fi Alliance: http://www.wi-fi.org/

Some WiFi providers offer Internet as an amenity. It would be odd to walk into a Starbucks today and observe the majority of their guests actually talking with one another. Mobile devices demand connectivity and WiFi is the way that is done. The service is offered on an ‘as-is’ basis and the vendor is usually unwilling or unable to offer tech support, so the typical wireless configuration is ‘Open.’ That means there is no password required and no encryption enabled. Basically, anyone sharing the same connection can snoop on what you send and receive over the host network. As an attorney this should give you pause if you are doing anything other than ordering another pair of shoes from Zappos.

The thing to know about Internet service offered as an amenity is there can be no assurance that anything you do is private. The opportunity for the host to monitor your traffic is obvious – they control the network and may have a duty to prevent certain types of activities: browsing pornography, conducting illicit hacking, spewing SPAM across the Internet, to name a few. Indeed, operators of open wireless networks have been charged with the acts of unscrupulous users. That’s why you often see ‘Terms of Service’ pages that you must click through. It gives the operator cover in the event the FBI shows up to investigate who may have a predilection for illicit materials.

The first layer of security offered by the IEEE 802.11 standard developed by the Institute of Electrical and Electronics Engineers applied a fairly rudimentary encryption algorithm to the information you pass over the wireless connection called WEP: Wireless Equivalent Privacy. It wasn’t. The standard (since 2003) has become WPA2: Wireless Protected Access II. This allows connected devices to encrypt data in a far more secure way. This method introduced more robust passwords and more secure networks. You should still be concerned.

Most law firms want to offer wireless access to their staff and guests. This demands a more complex configuration than simply plugging in a WiFi router from Fry’s. The best systems employ login names and passwords that are managed by your server – but these are expensive. The advantage of this system is that an individual user can be ‘deauthorized’ without everyone else suffering the need to change their credentials. The minimum standard is to isolate the private from the public network by providing a different password to staff than you do to your guests. You should change the guest password frequently.

Another problem with WiFi is coverage. A small office may be well served by a single Wireless Access Point. But a firm with 10 or more offices will almost certainly need two or more. Larger networks require ‘Mesh’ technologies that operate like cell phone towers and hand off users from one WAP to another and share the load. More WAPs can produce congested radio traffic which is hard to mitigate. It gets very complicated very quickly.

WiFi was designed to use standard radio frequencies. The problem with that is that many other devices do too. Cordless phones, motion detectors, microwave ovens and remote control toys all play a part in the general noise within these radio frequency bands. If your WiFi connection always fails around lunch time, ask your colleagues to stop using the microwave. If your wireless network is in an area with lots of other WiFi networks (say an office building) expect the clutter to produce interference too.

Adding ‘bandwidth limiting’ features to prevent ‘WiFi hogs’ from consuming your Internet access is becoming a modern necessity. In today’s world you can never get enough Internet.•

__________

Kim Brand is a technology expert and president of Computer Experts, Inc. in Indianapolis. He is the inventor of FileSafe, the only on-premises file server priced like a cloud service. He is also an adjunct professor of legal informatics at IUPUI. Contact Kim at info@ComputerExpertsIndy.com or call 317-833-3000. Opinions expressed are those of the author.


 

ADVERTISEMENT

Post a comment to this story

COMMENTS POLICY
We reserve the right to remove any post that we feel is obscene, profane, vulgar, racist, sexually explicit, abusive, or hateful.
 
You are legally responsible for what you post and your anonymity is not guaranteed.
 
Posts that insult, defame, threaten, harass or abuse other readers or people mentioned in Indiana Lawyer editorial content are also subject to removal. Please respect the privacy of individuals and refrain from posting personal information.
 
No solicitations, spamming or advertisements are allowed. Readers may post links to other informational websites that are relevant to the topic at hand, but please do not link to objectionable material.
 
We may remove messages that are unrelated to the topic, encourage illegal activity, use all capital letters or are unreadable.
 

Messages that are flagged by readers as objectionable will be reviewed and may or may not be removed. Please do not flag a post simply because you disagree with it.

Sponsored by

facebook - twitter on Facebook & Twitter

Indiana State Bar Association

Indianapolis Bar Association

Evansville Bar Association

Allen County Bar Association

Indiana Lawyer on Facebook

facebook
ADVERTISEMENT
Subscribe to Indiana Lawyer
  1. I wonder if the USSR had electronic voting machines that changed the ballot after it was cast? Oh well, at least we have a free media serving as vicious watchdog and exposing all of the rot in the system! (Insert rimshot)

  2. Jose, you are assuming those in power do not wish to be totalitarian. My experience has convinced me otherwise. Constitutionalists are nearly as rare as hens teeth among the powerbrokers "managing" us for The Glorious State. Oh, and your point is dead on, el correcta mundo. Keep the Founders’ (1791 & 1851) vision alive, my friend, even if most all others, and especially the ruling junta, chase only power and money (i.e. mammon)

  3. Hypocrisy in high places, absolute immunity handed out like Halloween treats (it is the stuff of which tyranny is made) and the belief that government agents are above the constitutions and cannot be held responsible for mere citizen is killing, perhaps has killed, The Republic. And yet those same power drunk statists just reel on down the hallway toward bureaucratic fascism.

  4. Well, I agree with you that the people need to wake up and see what our judges and politicians have done to our rights and freedoms. This DNA loophole in the statute of limitations is clearly unconstitutional. Why should dna evidence be treated different than video tape evidence for example. So if you commit a crime and they catch you on tape or if you confess or leave prints behind: they only have five years to bring their case. However, if dna identifies someone they can still bring a case even fifty-years later. where is the common sense and reason. Members of congress are corrupt fools. They should all be kicked out of office and replaced by people who respect the constitution.

  5. If the AG could pick and choose which state statutes he defended from Constitutional challenge, wouldn't that make him more powerful than the Guv and General Assembly? In other words, the AG should have no choice in defending laws. He should defend all of them. If its a bad law, blame the General Assembly who presumably passed it with a majority (not the government lawyer). Also, why has there been no write up on the actual legislators who passed the law defining marriage? For all the fuss Democrats have made, it would be interesting to know if some Democrats voted in favor of it (or if some Republican's voted against it). Have a nice day.

ADVERTISEMENT