Not withstanding the recent judgment by the High Court of Australia in the case, Roadshow Films Pty Ltdand Others versus iiNet Ltd, pressure on users of fixed networks inthis regard might continue and could be extended to mobile and/orWi-Fi networks in future. According to the guide, if a public Wi-Fi user is identified asaccessing prohibited content via a Wi-Fi network then the partywith the legal responsibility for identifying the user has not beentested. Similarly, the nature of the interaction between Wi-Fi networkoperators and service providers with law enforcement agencies[LEAs] has not been tested. This is in contrast to standingarrangements that exist between LEAs and both licensed carriers andcontent service providers [CSPs], read the documents. According to the paper, legal responsibility has not been testedbecause while law enforcement interception can be done on a publicWiFi network, the associated processes are not standardised in theway they are for tracing phone numbers in a licensed carriernetwork. In addition, the Alliance sets out the challenges of enforcement ona public Wi-Fi network which include: Dynamic address allocation, such as a different IP addressallocated per session, which can make tracking usage by IP addressdifficult. The absence of user data on a public Wi-Fi network as, according tothe report, there is usually no user data retained on public Wi-Finetworks, unlike in licensed carrier networks. Permitting anonymous, temporary use, which can be difficult totrace after the event. There are examples of Wi-Fi network operators assisting LEAsresulting in the relevant LEA matching different informationsources to identify a suspect e.g. the use of an internet protocol[IP] address combined with closed circuit television [CCTV] footageat a related site, read the documents. Turning to security, the Alliance recommends that operators useWi-Fi Protected Access II (WPA2) protocol, which is used forencryption to secure wireless links. WPA2 is the de facto standard for securing Wi-Fi networks,however in order to allow easy connection, most public Wi-Finetworks operate unsecured, instead relying on the end user or anapplication to secure any sensitive data such as through the use ofa virtual private network [VPN] or SSL connection, read reportdocuments. The report recommends operators use methods to limit network accessabuse such as limiting session duration and monitoring media accesscontrol (MAC) address logging. Follow Hamish Barwick on Twitter: @HamishBarwick Follow Computerworld Australia on Twitter: @ComputerworldAU. We are high quality suppliers, our products such as CHINA Customers Projects Manufacturer , China Motion Theater Chair for oversee buyer. To know more, please visits 3D Theater System.
Related Articles -
CHINA Customers Projects Manufacturer, China Motion Theater Chair,
|