Fluke wifi sniffer

New Fluke device fights child p*rn, identity theft, phishing scheme, but will not cure baldness or relieve that painful burning sensation.

++++++++++++++++++++++++++++++++++++++++

formatting link
Everett-based Fluke Networks adapted a troubleshooting product to help law enforcement officials fight crime.

A feature on iPhones and laptops allows users to detect WiFi networks in the area. Fluke Networks made a device, called the Aircheck WiFi Tester, that can focus in on any networks being used to handle child pornography.

Detectives who have a lead on a child predator can use Aircheck to quickly locate the WiFi network used to handle child pornography.

The directional antennae on the device scans a building or home for WiFi connections. Aircheck can tell if a network is open or password- protected, then pinpoint the person who handled the illegal content. That way, police can confidently identify their suspects and make a quick arrest.

Officers with the Martinez Police Department in California say Aircheck makes all the difference.

"It provides us and additional layer of certainty that the person we are targeting is, in fact, the suspect that we are looking for," said Sgt. Dave Mathers. "We don't have to go in blindly anymore."

Prior to Aircheck, police struggled when child predators piggy-backed on someone else's WiFi signal, making it hard to trace the crime. The device now gives investigators a way to sort through the variables, and hunt down the criminals.

"Police have found that they are able to pick this tool up, and within minutes, they know how to use it, and they know how to use it effectively," said Mark Bauman of Fluke Networks.

This device can also be used against identity theft, Internet stalking and even online phishing scams.

Reply to
miso
Loading thread data ...

(...)

Adapted how? Nothing on sniffing content on the Fluke web site:

$2000. Basically, it's a neat portable sniffer similar to InSSIDer, Kismet, or other wireless sniffer software. What the clueless author of the KVAL article lacked was the understanding that the wireless access point or client needs to be previously identified as a source or consumer of child pornography, and that the Fluke instrument will simply nail down some details required to identify the perpetrator. That can also be done with any wireless sniffer.

Reply to
Jeff Liebermann

It doesn't appear to have enough volume to contain much of a directional antenna.

My guess is they have to know the mac, then try to DF it mostly on signal strength. If you have a little bit of directionality, you probably could use signal strength to aid in DFing.

Basically this is the kind of device we would dream up, ponder upon, then declare kind of useless. But we're not in the business of fleecing the government. As you know, with a directional antenna, the client could be some distance away from the WAP itself, and further could be cloaked by WAPs near the client. That is, the cop would have to get on the beam of the client rather than any WAP near the client.

It's really a shame a good company like Fluke would peddle such nonsense.

Reply to
miso

Fluke is not peddling such nonsense. Read the data sheets and web page and notice that it's not being sold as some kind of search and destroy device. It's meant for wireless troubleshooting, mostly in a corporate, municipal, or government environment. It's the author of the article you quoted that has an excessively creative imagination.

Reply to
Jeff Liebermann

I checked out the Fluke website. I noticed the directional antenna is external.

Well let's hope the PD isn't going to bust down doors based on their interpretation of this box. We're dealing with people that barely understand their HTs let alone something like the innards of wifi.

Reply to
miso

Cabling-Design.com Forums website is not affiliated with any of the manufacturers or service providers discussed here. All logos and trade names are the property of their respective owners.