Wireless Devices Convenient, But Vulnerable

  • Published
  • By Tech. Sgt. Jason Bright
  • 5th Communications Squadron Information Manager
Most of you already know wireless keyboards are forbidden on Department of Defense computers. But did you know wireless mice were recently banned? 

Government cordless phones now require a waiver from the 5th Communications Squadron commander, and even Bluetooth devices are not authorized on military cell phones. 

Why all this concern over wireless devices? 

Any electronic equipment using a radio transmitter can be picked up far beyond the intended range of the device. Since you can't control who can receives the signal, the only way to prevent someone from listening in is to encrypt the signal. Unfortunately, many times only weak, easily broken encryption is available, if it's used at all. 

For example, a college student attending the University of Southern California recently designed a device that can intercept conversations on a Bluetooth headset from over a mile away. Numerous other wireless devices are easy to intercept, even when they are properly installed and configured. 

In fact, many cordless phones don't use any encryption, and devices capable of intercepting them are easily available on the internet. 

Some security experts are concerned that wireless devices can be used to hack into computers. Wireless receivers are commonly standardized to reduce manufacturing costs. This results in one device capable of controlling multiple types of keyboards or mice, making it easy for someone within wireless range to take control of your computer. 

Unfortunately, there are plenty of folks in the world eager to exploit vulnerable systems. Some hackers will crack a system merely to prove it can be done, while others do it for financial gain. For years foreign governments have gathered intelligence by exploiting radio frequency systems. 

Whether you use these devices for home or business, the threat is real and growing. 

The use of wireless electronics has redefined how we communicate, gather information and view the world. It has also introduced numerous unexpected challenges to our personal, corporate and governmental security. Until the privacy of our information can be assured, we must sometimes forsake convenience behalf of our security.
a poster depicting open house info