Hi Matt-

Back in my old Net-Stumbler days (back when you could drive across Atlanta
and see less than 20 Access Points, and 2 were my own), the "experimenters"
of the day became perplexed by this SSID that kept popping up at random
times.  It was an Access Point named "SST-PR-1"  The first time I saw it, I
was in my basement and I knew full well what I could normally receive down

There were all kinds of theories:  an AP on a low earth orbit satellite,
something on a passing vehicle, some sort of temporary SSID on a piece of
gear that just showed up right at bootup, etc.   Googling for SST-PR-1 might
actually turn up some of the old discussions about it.

Anyway- I started seeing it a lot in the evenings after they built some
apartments behind me.  I sent my son over there on his bike with a camera to
do some investigating.  He soon found a Sears Service truck (the ones with
the small Globalstar dish on top like you see on many semis) parked in front
of an apartment.  He went back with a laptop and traced the signal to this
van.  So we had it figured out- Sears truck.

A few days later, my son saw the driver coming home for the evening and the
driver gave him the dog and pony show of the truck computer.  It is linked
to Sears parts database via satellite. The SST-PR-1 is the SSID of an
integral access point that allows the driver to use a laptop from inside the
customer's home to check on parts, see service manuals, etc. The SST stands
for "Sears Smart Toolbox". 

I once told a friend about it and he set up a laptop to warn him when the
Sears guy entered the neighborhood on his way to fix their refrigerator.  An
"early warning" system of sorts.

So, the big SST-PR-1 mystery was finally solved by a 12 year old kid!



-----Original Message-----
Behalf Of Matt Larsen - Lists
Sent: Saturday, December 30, 2006 1:16 AM
To: WISPA General List
Subject: Re: [WISPA] TRUCKPC


I've been wondering where the hell that TruckPC request has been coming

Occasionally, I have techs who have left the radius authentication disabled
on an access point and the dhcp logs will start to fill up with requests
from "TruckPC".  They were coming from access points all over 
the place and I was a little perplexed.   It is interesting to watch our 
radius logs too.  I have one AP overlooking a little town of 200 people, but
it is right next to an interstate and the radius log from that AP is always
showing logins.  Must be all the trucker laptops whizzing by looking for an
open AP.

I've been toying with the idea of turning on hotspot functionality so that
we can provide transient access, and this is probably a good reason to do

Matt Larsen

Ralph wrote:
> Well, JohnnyO- you might want to also educate these people, then:
> http://www.drivertech.com/
> Their product, a "Truckpc" is being installed in many fleet vehicles. 
> One fleet that comes to mind is US Express, a long haul package hauling
> http://www.usxpress.com/   The device communicates back to the office via
> Satellite, Cellular, or WiFi- whichever is available and cheaper.  
> According to the manufacturer, it can hunt down open and unsecured 
> access points and do your "HIGHLY illegal" act of connecting and 
> sending its data whenever it can.
> I'm not endorsing this behavior, of course, but I wanted to bring it 
> to the attention of the list.
> How do I know?   My WISP operates hotspot portals that allow casual users
> make use of our mountain and tower-top sectors of WiFi.  These cover 
> major portions of several towns.  These towns have a major Interstate 
> route passing through them.  I began noticing numerous TRUCKPC leases 
> being granted by the DHCP servers in these towns.  I became concerned 
> about what they were, so I did a little internet research and ended up 
> on the phone with technical support at Drivertech. This is who 
> confirmed how these devices operate and who the probable fleet culprit
> If anyone has portals near major truck routes, check your DHCP logs 
> and see if you see the TRUCKPC SSID grabbing leases. You may want to 
> either block it or contact these folks and work out a "roaming agreement".
> Serious part over, joke follows:
> This message brought to you by the World's largest free wireless 
> internet provider. Look for our SSID wherever you go: Linksys.
> Ralph
> -----Original Message-----
> On Behalf Of JohnnyO
> Sent: Friday, December 29, 2006 5:35 PM
> To: [EMAIL PROTECTED]; 'WISPA General List'
> Subject: RE: [WISPA] recommendation for Client POE integrated radio 
> for802.11b/g
> Brian - Ham Operator or not - do you realize that what you're planning 
> on doing is HIGHLY illegal and has several people over the past 2 yrs 
> in Federal Prison as we speak ?

WISPA Wireless List: wireless@wispa.org


Archives: http://lists.wispa.org/pipermail/wireless/

WISPA Wireless List: wireless@wispa.org


Archives: http://lists.wispa.org/pipermail/wireless/

Reply via email to