Hacking Neighbor Pleads Guilty On Death Threats and Porn 284
wiredmikey writes "Another good reason to make sure your wireless is secured! 'Barry Vincent Ardolf of Blaine, Minnesota pleaded guilty to hacking into his neighbor's wireless Internet system and posing as the neighbor to make threats to kill the Vice President of the United States. Just two days into his federal trial in St. Paul, Ardolf stopped the trial to plead guilty. According to the US Department of Justice, in his plea agreement, Ardolf, 45 years-old, was indicted on June 23, 2010, admitted that in February of 2009, he hacked into his neighbor's wireless Internet connection and created multiple Yahoo.com email accounts in his neighbor's name." Ardolf's guilty plea included child porn possession, as well as the death threats.
Re:What's not to like? (Score:5, Informative)
when you read TFA, it actually just sounds like he was screwing around and the child porn was more like "this'll get the dude in trouble" rather than "I have a private collection because i'm a pedo".
Either way, the dude was really stupid and deserves to get jail time for it.
edit: changed the word "article" to TFA cause that's the way it's done here ;)
MAC Address Spoofing (Score:4, Informative)
Connecting to a wireless router usually means obtaining IP settings via DHCP. In the process, the MAC address of your network adapter (which is supposed to unique) will be recorded on the router, at least for some period of time. Therefore, if you want to connect without leaving an obvious fingerprint pointing back to your computer, first modify the MAC address that your network card is putting out. On Windows machines, drivers often provide a way to specify your MAC address under the "advanced properties" of the adapter. On my Intel network adapter, for example, the setting is listed as "Locally Administered Address", and is undefined by default.
You might even spoof a specific make of network adapter by choosing an "Organizationally Unique Identifier" from the OUI Public Listing [ieee.org].
This article has a lot of details... (Score:5, Informative)
The neighbors suspected the guy right away. Fortunately, the investigators listened to the [innocent] neighbors and started looking at the real bad guy.
http://www.startribune.com/local/north/112080854.html?elr=KArks:DCiUHc3E7_V_nDaycUiD3aPc:_Yyc:aUoD3aPc:_2yc:a_ncyD_MDCiU [startribune.com]
Re:What's not to like? (Score:2, Informative)
what can a normal user do against these smart asses?
Here's an idea. Get a Linux based router (I have a Linksys with DD-WRT) and use it to muck with any connections coming from his MAC address. You could block all his Bittorrent connections and redirect his HTTP connections somewhere else (such as a rickroll or goatse). Do this long enough to annoy the heck out of him and then block him completely using a higher grade encryption (such as WPA2) and/or MAC filtering.
Re:What's not to like? (Score:3, Informative)
what can a normal user do against these smart asses?
Here's an idea. Get a Linux based router (I have a Linksys with DD-WRT) and use it to muck with any connections coming from his MAC address. You could block all his Bittorrent connections and redirect his HTTP connections somewhere else (such as a rickroll or goatse). Do this long enough to annoy the heck out of him and then block him completely using a higher grade encryption (such as WPA2) and/or MAC filtering.
MAC filtering? SERIOUSLY?
That is just so wrong.
Re:What's not to like? (Score:5, Informative)
This guy has a history of problems with neighbors. This isnt his first run in with the law
See: http://www.startribune.com/local/99435264.html
and
http://www.startribune.com/local/north/96012389.html
Re:What's not to like? (Score:5, Informative)
Minneapolis Star Tribune http://www.startribune.com/ [startribune.com] had several stories, which you can find by searching for "Ardolf". Good stories, although not too technical.
The victim, Matt Kostolnik, worked in a law firm, and Ardolf sent messages to the firm. The law firm hired an investigator to figure out what was going on. The investigator tracked Kostolnik's wireless traffic, and fingered Ardolf. Then they sent the cops with a search warrant to Ardolf's house, which produced even more incriminating evidence.
Ardolf turned down a plea bargain on the identity theft charges alone, so they added the child porn charges and went to trial. When he saw the evidence against him, he gave up and pled guilty.
I can remember a handful of cases like this where the victim got out of it because they managed to catch the real criminal. (Wasn't there one recently in England?) I wonder how many cases there were where the innocent victim got convicted.
Re:My neighbor's IP (Score:5, Informative)
He sent threats and child porn (etc) to his neighbours co-workers. His neighbours hired an "investigator" who then discovered buddy was jacking their wireless.
Basically someone looked at their router logs.
Re:What's not to like? (Score:2, Informative)
MAC filtering is a waste of time. MAC addresses can easily be changed to match one of your exciting addresses. And you're already broadcasting your existing devices. Guess what one of the first things attack tools do when they're having trouble getting a response from the AP?
I know; I was there... (Score:3, Informative)