Wireless war rocketing?



There were several articles about a new “wardriving” technique that was talked about at Defcon (this topic and a bit more Defcon coverage here). In fact, this takes the driving out of the mix and involves launching a rocket. Essentially rockets were equiped with access points and launched to get a 6000+ foot view (for the largest) of the wireless landscape. Now, they didn’t turn up a LOT, but they did see an impressive range of area *(50 square miles for the largest). One of the smaller rockets made it to 2000 feet. It was a rural area where this was done, so they didn’t pick up much. Although it had a range of 4 miles, the big rocket could only find 2 networks.


The smaller ones were more successful finding 3 and then 7 access points (7 being in a less rural area.) The big one required FAA approval. The rockets cost less than $1000 to build and the large one takes $200 for each launch $35 for the small rocket launches. It’s not clear if there was any permit fee included (I don’t know much about the FAA rocket launch approval process – although FAA approval is required for over 2000 feet according to the Washington Post- security fix.)

The access points descended with parachutes although I didn’t see how long they had good coverage. I guess the moral to this is not to think you can run an open wireless network out in the country. If someone on the next farm shoots up a rocket every day they may be trying to borrow your network connection. (?!?!)

Related Posts

Blog Traffic Exchange Related Posts
  • The D-Link DWL-800AP+ as a wireless repeater to extend wireless range - Part 1 I've got a single access point for my wireless network layer at the house and unfortunately have at least one real "dead spot" in the house. As luck would have it that dead spot is at the couch... so for some time I've looked at ways to extend the wireless......
  • Firewall musings... Yesterday I had a bit of a realization. I had just been looking at a wireless router/firewall setup and was thinking about the firewalling rules (which seemed to be geared at the WIRELESS lan... i.e. blocking that activity on the Wireless segment.) You know, traditionally firewalls have had the attitude......
  • Using ssh to protect web browsing over wireless or other hostile networks This really could be used to encyrpt web traffic over any "hostile" network. Here's what I'm talking about. Laptop using wireless. Within our internal network we would LIKE all our web traffic to be encrypted at least from the laptop to a wired host. (From there to the outside world......
Blog Traffic Exchange Related Websites
  • How To Protect your Wi-Fi network from unauthorized access Wireless security is of major concern at this time. Terrorists might use your unprotected Wireless network for sending e-mails and/or Cyber Terrorists can use it for hacking into Government websites/networks. Your IP address will be traced by the Cyber Police and you'll be in unnecessary trouble. Very less people actually......
  • 12 Hands-on tips to protect yourself online As we move away from brick and mortar to online operators, protecting yourself from online fraud becomes vital. More and more people access their banks online. Yet the only thing standing between you and your money is a 4 to 6 digit number or a word or combination of words.......
  • Internet Monitoring Software: A happy employee means better productivity Whether it’s the telephone line, photocopying, stationary, or any other company resources that can be abused, there have always been – and there always will be – employees who take advantage of such things. Internet use is no exception to this. SMEs have often considered the adoption of internet monitoring......
PDF24    Send article as PDF   

Similar Posts


See what happened this day in history from either BBC Wikipedia
Search:
Keywords:
Amazon Logo

Comments are closed.


Switch to our mobile site