Wireless war rocketing?



There were several articles about a new “wardriving” technique that was talked about at Defcon (this topic and a bit more Defcon coverage here). In fact, this takes the driving out of the mix and involves launching a rocket. Essentially rockets were equiped with access points and launched to get a 6000+ foot view (for the largest) of the wireless landscape. Now, they didn’t turn up a LOT, but they did see an impressive range of area *(50 square miles for the largest). One of the smaller rockets made it to 2000 feet. It was a rural area where this was done, so they didn’t pick up much. Although it had a range of 4 miles, the big rocket could only find 2 networks.


The smaller ones were more successful finding 3 and then 7 access points (7 being in a less rural area.) The big one required FAA approval. The rockets cost less than $1000 to build and the large one takes $200 for each launch $35 for the small rocket launches. It’s not clear if there was any permit fee included (I don’t know much about the FAA rocket launch approval process – although FAA approval is required for over 2000 feet according to the Washington Post- security fix.)

The access points descended with parachutes although I didn’t see how long they had good coverage. I guess the moral to this is not to think you can run an open wireless network out in the country. If someone on the next farm shoots up a rocket every day they may be trying to borrow your network connection. (?!?!)

Related Posts

Blog Traffic Exchange Related Posts
  • Network Security - Arp spoofing series I think I've wrapped up the series on arp spoofing and it's implications for network security. I know there's nothing earth shattering here, most network security types are well aware of the problems (and perhaps aware of more sophisticated solutions?). For some though, this series is likely an eye opener......
  • The D-Link DWL-800AP+ as a wireless repeater to extend wireless range - Part 4 Ok, so now I had to add the new D-Link's MAC address to the list of authorized MAC's in the Linksys WAP11 (v. 1.1) For this, I call on wap11gui. Used to (since I use linux), I would have to suffer through a Windows boot on the laptop and balance......
  • More on Wireless networking security Sunbeltblog has a flurry of posts today. This one muses on wireless networking (in)security. One of the points that they make is that there are "acceptable" levels of security depending on your circumstance. In other words, if you're miles from nowhere and feel comfortable with WEP (which is breakable) fine.......
Blog Traffic Exchange Related Websites
  • Types of Wireless Attacks Standard wireless communication occurs when the end user and the wireless access point are able to communication on a point-to-point basis without interruptions. There are many attack variations in existence against wireless networks that breaks the standard communication format. These attacks includes the denial of service attacks, the man in......
  • How To Protect your Wi-Fi network from unauthorized access Wireless security is of major concern at this time. Terrorists might use your unprotected Wireless network for sending e-mails and/or Cyber Terrorists can use it for hacking into Government websites/networks. Your IP address will be traced by the Cyber Police and you'll be in unnecessary trouble. Very less people actually......
  • Seminar Invite: NSA's View of Wireless Security Risks – Nov. 9th DATE: Nov. 9, 2011   |   LOCATION: Tysons Corner, VA Wireless technology is exploding in popularity. Businesses are not only migrating to wireless networking, they are steadily integrating wireless technology into their wired infrastructure. This explosion has given momentum to a new generation of hackers who specialize in inventing and......
www.pdf24.org    Send article as PDF   

Similar Posts


See what happened this day in history from either BBC Wikipedia
Search:
Keywords:
Amazon Logo

Comments are closed.


Switch to our mobile site