The L8NT could help law enforcement track and find Wi-Fi enabled gadgets.
On Tuesday, local media reported that David Schwindt, a 14-year veteran from Iowa City, has designed software which can be used to recover Wi-Fi enabled products.
The product, dubbed L8NT — short for “latent analysis of 802.11 network traffic” — will not necessarily be used for cases when a smartphone, tablet or laptop is negligently lost or stolen from the bar. However, Schwindt believes the L8NT could be useful in higher-level crimes.
“If your cellphone is stolen from a bar… that’s not necessarily what L8NT is intended for,” Schwindt told The Gazette. “But, if your home is burglarized and your cellphone is stolen, now, as a police chief, I’m interested in that technology.”
L8NT is software which runs after a flash drive-sized antenna is plugged into a squad car’s USB port. Once enabled, the software continually scans for media access control addresses (MACs).
MAC addresses are unique hardware identifiers that belong to devices with network interface cards (NICs). Not to be confused with Apple’s Mac systems, instead, MAC addresses are used to punt data to NICs, of which all manner of gadgets — including smartphones, tablets and PCs — contain.
If a database of stolen items is accessible by law enforcement and contains MAC addresses, L8NT may be able to detect the presence of these devices, which could lead to suspects involved in large-scale crimes. With a range of approximately 300 feet, agents will be able to trace a stolen device’s signal and obtain a warrant to search a property based on this information.
Naturally, such scanners may prompt privacy worries. Schwindt is quick to reassure on this scale, however, that while MAC packets can contain private information, this data is “ignored.”
In addition, for law enforcement to be able to track down a device, Wi-Fi must be enabled and the gadget must be in active use. If powered down, there will be no signal to trace.
Schwindt will introduce L8NT to other agencies at the International Association of Chiefs of Police Conference in Chicago in October before applying for a patent to protect his invention later this year.
He is a well-known expert in mobile security and malware analysis. He studied Computer Science at NYU and started working as a cyber security analyst in 2003. He is actively working as an anti-malware expert. He also worked for security companies like Kaspersky Lab. His everyday job includes researching about new malware and cyber security incidents. Also he has deep level of knowledge in mobile security and mobile vulnerabilities.