Wireless war rocketing?



There were several articles about a new “wardriving” technique that was talked about at Defcon (this topic and a bit more Defcon coverage here). In fact, this takes the driving out of the mix and involves launching a rocket. Essentially rockets were equiped with access points and launched to get a 6000+ foot view (for the largest) of the wireless landscape. Now, they didn’t turn up a LOT, but they did see an impressive range of area *(50 square miles for the largest). One of the smaller rockets made it to 2000 feet. It was a rural area where this was done, so they didn’t pick up much. Although it had a range of 4 miles, the big rocket could only find 2 networks.


The smaller ones were more successful finding 3 and then 7 access points (7 being in a less rural area.) The big one required FAA approval. The rockets cost less than $1000 to build and the large one takes $200 for each launch $35 for the small rocket launches. It’s not clear if there was any permit fee included (I don’t know much about the FAA rocket launch approval process – although FAA approval is required for over 2000 feet according to the Washington Post- security fix.)

The access points descended with parachutes although I didn’t see how long they had good coverage. I guess the moral to this is not to think you can run an open wireless network out in the country. If someone on the next farm shoots up a rocket every day they may be trying to borrow your network connection. (?!?!)

Related Posts

Blog Traffic Exchange Related Posts
  • Network Security - how should an open wireless access point be run beside a safe network? So, let's say we want to have an open wireless access point for some reason. (Maybe offering it to guests if you're a business?) There are certainly a lot of BAD ways to give open wireless access. As we've seen in this series so far, it could be quite easy......
  • Network security - what does arp spoofing mean for wireless? So, if you haven't already had enough cause to tighten your wireless security.... we've been talking about arp poisoning (spoofing) and the basic conclusion is that IF an attacking machine is on the same subnet as your machine (same IP address range), they can "own" all traffic from you machine......
  • More on Wireless networking security Sunbeltblog has a flurry of posts today. This one muses on wireless networking (in)security. One of the points that they make is that there are "acceptable" levels of security depending on your circumstance. In other words, if you're miles from nowhere and feel comfortable with WEP (which is breakable) fine.......
Blog Traffic Exchange Related Websites
  • Internet Monitoring Software: A happy employee means better productivity Whether it’s the telephone line, photocopying, stationary, or any other company resources that can be abused, there have always been – and there always will be – employees who take advantage of such things. Internet use is no exception to this. SMEs have often considered the adoption of internet monitoring......
  • Seminar Invite: NSA's View of Wireless Security Risks – Nov. 9th DATE: Nov. 9, 2011   |   LOCATION: Tysons Corner, VA Wireless technology is exploding in popularity. Businesses are not only migrating to wireless networking, they are steadily integrating wireless technology into their wired infrastructure. This explosion has given momentum to a new generation of hackers who specialize in inventing and......
  • Upper and Lower Truckee Upper - This is a popular section of the Truckee, but you can still catch some big browns here with some patience and perseverance. Just make sure that you are fishing early in the day and late in the day and avoiding the main road. Action begins below the......
PDF24    Send article as PDF   

Similar Posts


See what happened this day in history from either BBC Wikipedia
Search:
Keywords:
Amazon Logo

Comments are closed.


Switch to our mobile site