Wireless war rocketing?



There were several articles about a new “wardriving” technique that was talked about at Defcon (this topic and a bit more Defcon coverage here). In fact, this takes the driving out of the mix and involves launching a rocket. Essentially rockets were equiped with access points and launched to get a 6000+ foot view (for the largest) of the wireless landscape. Now, they didn’t turn up a LOT, but they did see an impressive range of area *(50 square miles for the largest). One of the smaller rockets made it to 2000 feet. It was a rural area where this was done, so they didn’t pick up much. Although it had a range of 4 miles, the big rocket could only find 2 networks.


The smaller ones were more successful finding 3 and then 7 access points (7 being in a less rural area.) The big one required FAA approval. The rockets cost less than $1000 to build and the large one takes $200 for each launch $35 for the small rocket launches. It’s not clear if there was any permit fee included (I don’t know much about the FAA rocket launch approval process – although FAA approval is required for over 2000 feet according to the Washington Post- security fix.)

The access points descended with parachutes although I didn’t see how long they had good coverage. I guess the moral to this is not to think you can run an open wireless network out in the country. If someone on the next farm shoots up a rocket every day they may be trying to borrow your network connection. (?!?!)

Related Posts

Blog Traffic Exchange Related Posts
  • Network Security - Arp spoofing series I think I've wrapped up the series on arp spoofing and it's implications for network security. I know there's nothing earth shattering here, most network security types are well aware of the problems (and perhaps aware of more sophisticated solutions?). For some though, this series is likely an eye opener......
  • Firewall musings... Yesterday I had a bit of a realization. I had just been looking at a wireless router/firewall setup and was thinking about the firewalling rules (which seemed to be geared at the WIRELESS lan... i.e. blocking that activity on the Wireless segment.) You know, traditionally firewalls have had the attitude......
  • Using ssh to protect web browsing over wireless or other hostile networks This really could be used to encyrpt web traffic over any "hostile" network. Here's what I'm talking about. Laptop using wireless. Within our internal network we would LIKE all our web traffic to be encrypted at least from the laptop to a wired host. (From there to the outside world......
Blog Traffic Exchange Related Websites
  • Seminar Invite: NSA's View of Wireless Security Risks – Nov. 9th DATE: Nov. 9, 2011   |   LOCATION: Tysons Corner, VA Wireless technology is exploding in popularity. Businesses are not only migrating to wireless networking, they are steadily integrating wireless technology into their wired infrastructure. This explosion has given momentum to a new generation of hackers who specialize in inventing and......
  • Types of Wireless Attacks Standard wireless communication occurs when the end user and the wireless access point are able to communication on a point-to-point basis without interruptions. There are many attack variations in existence against wireless networks that breaks the standard communication format. These attacks includes the denial of service attacks, the man in......
  • Bay Water Trail Boosted by New Shoreline Camp A two-hour long kayak paddling trip was taken to Richmond from San Rafael, but this short trip ended up being a really big step in the right direction for what is known as the San Francisco Bay Water Trail. This is a network of camping and launching spots serving paddlers......
www.pdf24.org    Send article as PDF   

Similar Posts


See what happened this day in history from either BBC Wikipedia
Search:
Keywords:
Amazon Logo

Comments are closed.


Switch to our mobile site