Discover how to locate wireless signal sources using spectrum geolocation techniques. Learn about the concepts of wardriving and geolocation, explore some available geolocation-enabled products, and more.
- [Instructor] Hi, this is Jordan Scott, computer engineering expert. This course provides a look into the world of geolocation of wireless signals and some existing applications of the methods and future uses for it. We'll begin with an introduction. Then we'll look at what wardriving is. After that, I'll go over what geolocation is, how it works, and demo some examples. Then we'll explore some available geolocation enabled products and future complications that geolocation may help solve.
And then, of course, we'll end with a conclusion Now let's get started. Welcome. I've been a warfighter, or supported warfighters for over decade. As one of the first operational Army Electronic Warfare Officers since the Cold War, I gained some very unique experience with respect to information warfare. I am a Master of Science in Computer Engineering, open source/collaboration proponent, technology integrator, and proven innovator.
I've worked in additional environments, such as, Global Positioning System, Missile Defense, Software Development, System of Systems Integration, and Cybersecurity. I've earned a Security+, my CISSP, and I'm an active member of the Association of Old Crows and IEEE. Ready? Here we go. This course will help you understand how to locate wireless signal sources using something called spectrum geolocation techniques.
This will allow users to trust and verify wireless signals, allow access by location, take wireless snapshots, et cetera. Security is a lot stronger utilizing electrons as they are extremely hard to spoof. As oppose to other aspects, such as, cyber addresses, but it is definitely a complicated math problem ripe with errors. There are not many solutions today that make this an easy thing to accomplish.
You will have to use many tools and understand many aspects of the technology to add this concept to your own environment. Different environments will use this concept differently. For example, cybersecurity professionals could use geolocation to help secure an entire enterprise. A home network could use geolocation to prevent neighbors or past guests from using the network outside of the home. A coffee shop user could know where the free Wi-Fi source actually is.
A vehicle driver could ensure the Bluetooth enabled stereo he wants to connect to is in the same vehicle. This course's target audience is geared towards those working with wireless signals, which could be from any Wi-Fi user, Wi-Fi hobbyist or cybersecurity personnel. This course is intended for an intermediate level audience. But all levels could gain from it. If there are any topics that seem a bit confusing or new, it is recommend to continue researching.
Some of this will only scratch the surface. Those intimidated by, or uninterested in formulas could still learn from this course. As products and standards change, it will still be good to have a basic understanding of the concept, especially as products automate these functions.
Note: This course was recorded and produced by Mentor Source, Inc. We're pleased to host this training in our library.
- Access points
- Reviewing the concept of geolocation
- Reviewing available products for geolocation
- Use cases