A practical minimum standard for safer municipal and public-space Wi-Fi.
Publisher: SafePublicWiFi (QState Cyber Security)
Version: v1.0
Status: Public Draft (for consultation)
Public Wi-Fi enables digital inclusion and access to essential services, but it also significantly expands the attack surface of public institutions. This baseline defines what reasonable protection looks like for operators of public Wi-Fi networks.
The scope of this baseline is intentionally focused on network-layer safety and operational assurance, including detection, monitoring, and response. It does not address content filtering, user surveillance, or end-user device management.
Public Wi-Fi attacks often occur before application-layer protections (including VPNs) are effective. The following threats are prioritized because they are realistic in public venues and can lead to credential theft, session compromise, or malware delivery.
Attackers deploy fake access points that mimic legitimate SSIDs to lure users into connecting. These attacks may downgrade security or present malicious captive portals.
Primary impact: Credential capture, session theft, traffic interception.
Baseline expectation: Detect SSID/BSSID impersonation patterns, unexpected security modes, and abnormal beacon or probe behavior.
Attackers force clients off legitimate access points to trigger reconnections or herd
users toward rogue networks.
Primary impact: User disruption and increased likelihood of evil twin compromise.
Baseline expectation: Detect abnormal deauthentication and disassociation rates and correlate them with nearby SSID or BSSID changes.
Malicious hosts provide unauthorized DHCP leases or DNS responses to redirect traffic.
Primary impact: Traffic interception, phishing, malware delivery.
Baseline expectation: Detect multiple DHCP servers, unexpected gateway or DNS assignments, and sudden lease-pattern changes.
Captive portals are modified or replaced to mimic legitimate login pages or inject credential-harvesting prompts.
Primary impact: Credential theft and account compromise.
Baseline expectation: Monitor portal behavior changes and TLS anomalies without collecting credentials.
Because many public Wi-Fi threats are transient, continuous monitoring is required to
reduce exposure time and support timely response.
Public Wi-Fi safety monitoring must respect citizen privacy. This baseline explicitly
prohibits collection of user content.
Operators should prioritize high-risk public venues such as libraries, transit hubs, and dense public spaces. Pilot deployments are recommended to establish baseline metrics and validate detection and response workflows.
This baseline should be reviewed and updated annually as threats, technologies, and standards evolve.
Document Information
Version: v1.0
Status: Public Draft
Publisher: SafePublicWiFi (QState Cyber Security)