Parts of this article (those related to Mentions) need to be updated. The reason given is: Has it been mentioned in any newer media and papers?. Please help update this article to reflect recent events or newly available information.(August 2024)
WiGLE (Wireless Geographic Logging Engine) is a website for collecting information about the different wireless hotspots around the world. Users can register on the website and upload hotspot data like GPS coordinates, SSID, MAC address and the encryption type used on the hotspots discovered. In addition, cell tower data is uploaded and displayed.[1]
By obtaining information about the encryption of the different hotspots, WiGLE tries to create an awareness of the need for security by running a wireless network.[2]
The first recorded hotspot on WiGLE was uploaded in September 2001. By June 2017, WiGLE counted over 349 million recorded WiFi networks in its database, whereof 345 million was recorded with GPS coordinates and over 4.8 billion unique recorded observations. In addition, the database now contains 7.80 million unique cell towers including 7.75 million with GPS coordinates.[3] By May 2019, WiGLE had a total of 551 million networks recorded.[4]
Mentions in books
From Hacking for Dummies[5] to Introduction to Neography,[6] WiGLE is a well known resource and tool. As early as 2004, its database of 228,000 wireless networks was being used to advocate better security of Wifi.[7] Several books mentioned the WiGLE database in 2005,[8][9] including internationally,[10] and the association with vehicles was also becoming widely known.[11] Some associations of WiGLE have been positive, and some have been darker.[12][13][14] By 2004, the site was sufficiently well known that the announcement of a new book quoted the co-founder, saying “This is the ‘Kama Sutra’ of wardriving literature. If you can't wardrive after reading this, nature has selected you not to. This is the first complete guide on the subject we’ve ever seen (it mentions us). Don't quote me on that.”
–Bob “bobzilla” Hagemann, WiGLE.net CoFounder" and a shortened quote appeared on the book's cover.[15][16]
Mentions in academic papers
In early days, circa 2003 the lack of mapping was criticized, and was said to force WiFi seekers to use more primitive methods. "The most primitive method disseminated is warchalking, where mappers inscribe a symbolic markup on the physical premises to indicate the presence of a wireless network in the area." Regarding WiGLE in particular, it was said, "The Netstumbler map site and the Wireless Geographic Logging Engine store more detailed wardrive trace data, yet do not offer any visualization format that is particularly useful or informative."[17] By 2004 others felt differently, however, and a WiFi news site said about "the fine folks at wigle.net who have 900,000 access points in their wardriving database," "While the maps aren't as pretty, they're quite good, and the URLs correspond to specific locations where WiFiMaps hides the URL-to-location mapping."[18] In late 2004, other authors stated, "that war driving is now ubiquitous: a good illustration of this is provided by the WiGLE.net online database of WAPS." They also said, "The motherload of WAP maps is available on the Wireless Geographic Logging Engine Web site (wigle.net). Circa late September 2004, WiGLE’s database and mapping technology included over 1.6 million WAPS. If you can’t find the WAP of interest there, you can probably live without it."[19] In 2005, using WiFi databases for geolocation was being discussed, and WiGLE, with approximately 2.4 million located access points in the database, was often mentioned.[20][21][22] In 2017, data from WiGLE was used as a source for WiFi router locations and encryption frequencies.[23] In 2018, data from the WiGLE database was compared against the data collected by the authors.[24] The WiGLE Android app was compared against other wardriving tools in a conference in 2021.[25] In 2024, data from the WiGLE database was compared against Apple's location services and Erik Rye and Dave Levin found that the vast majority of networks in their sample from the WiGLE database were within 1km of the Apple database.[26]
Licensing
Although the apps used to collect information are open sourced,[27] the database itself is accessed and distributed under a freeware proprietary license.[28] Commercial use of parts of the data may be bought.[29]
The Android app to collect Wi-Fi hotspots and their geographic correspondent information is available under a 3-clause BSD license.[30]
^Beaver, Kevin (December 16, 2015). Hacking for Dummies (5th ed.). John Wiley & Sons. pp. 372, 389. ISBN9781119154693. Archived from the original on August 7, 2024. Retrieved June 28, 2017.
^McClure, Stuart; Scambray, Joel; Kurtz, George (May 10, 2005). Hacking Exposed (5th ed.). McGraw Hill Professional. pp. 664, 690. ISBN9780071493666. Archived from the original on 7 August 2024. Retrieved 30 June 2017.