Wireless war rocketing?



There were several articles about a new “wardriving” technique that was talked about at Defcon (this topic and a bit more Defcon coverage here). In fact, this takes the driving out of the mix and involves launching a rocket. Essentially rockets were equiped with access points and launched to get a 6000+ foot view (for the largest) of the wireless landscape. Now, they didn’t turn up a LOT, but they did see an impressive range of area *(50 square miles for the largest). One of the smaller rockets made it to 2000 feet. It was a rural area where this was done, so they didn’t pick up much. Although it had a range of 4 miles, the big rocket could only find 2 networks.


The smaller ones were more successful finding 3 and then 7 access points (7 being in a less rural area.) The big one required FAA approval. The rockets cost less than $1000 to build and the large one takes $200 for each launch $35 for the small rocket launches. It’s not clear if there was any permit fee included (I don’t know much about the FAA rocket launch approval process – although FAA approval is required for over 2000 feet according to the Washington Post- security fix.)

The access points descended with parachutes although I didn’t see how long they had good coverage. I guess the moral to this is not to think you can run an open wireless network out in the country. If someone on the next farm shoots up a rocket every day they may be trying to borrow your network connection. (?!?!)

Related Posts

Blog Traffic Exchange Related Posts
  • Network security - what does arp spoofing mean for wireless? So, if you haven't already had enough cause to tighten your wireless security.... we've been talking about arp poisoning (spoofing) and the basic conclusion is that IF an attacking machine is on the same subnet as your machine (same IP address range), they can "own" all traffic from you machine......
  • The D-Link DWL-800AP+ as a wireless repeater to extend wireless range - Part 1 I've got a single access point for my wireless network layer at the house and unfortunately have at least one real "dead spot" in the house. As luck would have it that dead spot is at the couch... so for some time I've looked at ways to extend the wireless......
  • Using ssh to protect web browsing over wireless or other hostile networks This really could be used to encyrpt web traffic over any "hostile" network. Here's what I'm talking about. Laptop using wireless. Within our internal network we would LIKE all our web traffic to be encrypted at least from the laptop to a wired host. (From there to the outside world......
Blog Traffic Exchange Related Websites
  • Internet Monitoring Software: A happy employee means better productivity Whether it’s the telephone line, photocopying, stationary, or any other company resources that can be abused, there have always been – and there always will be – employees who take advantage of such things. Internet use is no exception to this. SMEs have often considered the adoption of internet monitoring......
  • 12 Hands-on tips to protect yourself online As we move away from brick and mortar to online operators, protecting yourself from online fraud becomes vital. More and more people access their banks online. Yet the only thing standing between you and your money is a 4 to 6 digit number or a word or combination of words.......
  • Seminar Invite: NSA's View of Wireless Security Risks – Nov. 9th DATE: Nov. 9, 2011   |   LOCATION: Tysons Corner, VA Wireless technology is exploding in popularity. Businesses are not only migrating to wireless networking, they are steadily integrating wireless technology into their wired infrastructure. This explosion has given momentum to a new generation of hackers who specialize in inventing and......
PDF24    Send article as PDF   

Similar Posts


See what happened this day in history from either BBC Wikipedia
Search:
Keywords:
Amazon Logo

Comments are closed.


Switch to our mobile site