Blog: AirWise |



Fly safe this summer

As the availability of in-flight Wi-Fi grows, so does the potential for mid-air wireless attacks.

According to RouteHappy, flyers now have at least some chance of getting in-flight Wi-Fi on 24 percent of flights worldwide. Within the US, that likelihood spikes to 66 percent – including all of Virgin America and over half of Delta, JetBlue, and Southwest flights. Want to increase your odds of getting online aloft? Choose a flight served by Boeing equipment.


Wireless picks for BlackHat USA 2015 and DEF CON 23

Automotive hacking over wireless seems to be creating quite a stir. Check out this Wired video demo by Charlie Miller and Chris Valasek, who gave a briefing about this at BlackHat 2015: ... p-highway/


Wireless picks for BlackHat USA 2015 and DEF CON 23

Each summer, white hats, grey hats, and black hats rendezvous in Las Vegas for that well-known pair of industry events: Black Hat and DEF CON. In keeping with tradition, this month’s AirWise blog provides a short-list of briefings and presentation of particular interest to those responsible for securing wireless networks.

For Wi-Fi hacking demos, go to DEF CON


Avoiding Honeypot APs: Who do you trust?

While rigorously validating server certificates is key to avoiding Honeypot APs and other man-in-the-middle attacks that may follow, this advice begs the question: How do you know which servers to trust?


Can WPA2-Enterprise stop Honeypot AP attacks?

Numerous demonstrations have proven that users easily fall prey to open Honeypot (aka Evil Twin) APs. For example, an experiment conducted recently in London tricked 250 unsuspecting Wi-Fi clients into connecting to a fake public hotspot AP in just 30 minutes, with 33 of those victims actively using the honeypot to carry out web searches and send email, often exposing POP3 passwords (see


“Good Enough” Isn’t Good Enough Anymore: AirMagnet Enterprise v10.9 and the Need for Comprehensive Wireless Security Solutions

2014 was a busy year for wireless security, and not in a good way. The total number of cyber security incidents increased by 48% between 2013 and 2014 for a total of 42.8 million, according to PwC’s Global State of Security Survey. Back in 2010, the number was only 9.4 million. These attacks cost the global economy up to $575 billion annually as estimated by the Center for Strategic and International Studies research.


WLPC Attendees: AirMagnet Trials are Being Extended!

Those of you who recently attended the wirelessLAN Professionals conference know you received a free trial of AirMagnet Survey Pro and AirMagent WiFi Analyzer Pro included in your attendee bags. We usually keep our trials to a 30 days or less, but what we heard from you is that simply wasn’t enough time for you to really dive into the software. That matters to us. And we listened.


Will 2015 be the year of the drones?

After a year of increasingly frequent and potentially dangerous encounters between drones and airplanes, fire fighters, and even the White House, the FAA yesterday finally proposed a new set of rules governing non-recreational use of small unmanned aircraft systems (UAS).
According the FAA’s Proposed Part 107, drones must weigh less than 55 pounds, flown in the daylight, controlled by visual line of sight, and remain close enough at all times to be seen by the operator.

Improving Site Surveys

Two people head out to the same site to perform a site survey, they’re both using the same software, and yet they get significantly different results. We’d all like to think that data from a site survey is by definition reliable, but it’s not. So what happened? Choice of adapter, choice of survey (active vs. passive), even the paths the individuals walked can have large impact on the results. If you’re not following accepted best practices and collecting the right information during a survey, your results will be unreliable.


Using WPA2 to avoid data breach headlines

When most people hear “data breach” they think about lost laptops, server break-ins, or malware-based attacks. But according to a new survey by Spiceworks, commissioned by Certes Networks, lax network security and traffic segmentation played a crucial role in data breaches reported in 2013-2014. A few of this survey’s top findings included:

* Encryption for data in motion is highly fragmented, with 3 out of 4 companies using at least two methods – most often SSL-protected web traffic, followed by SSL-based VPNs.


Perfecting Passpoint secure roaming

In 2012, the Wi-Fi Alliance launched as secure seamless wireless roaming certification program dubbed Passpoint. This program was designed to overcome public hotspot challenges – notably, the security threats posed by open hotspots and the configuration barriers that impede mobile device hotspot roaming. The latter is of special importance to cellular and fixed broadband network operators that are anxious to offload mobile voice and data traffic onto less expensive Wi-Fi access networks.


DarkHotel: What Hospitality WLAN Operators Should Know

Operators responsible for securing hospitality networks have long worked to reduce fundamental guest Wi-Fi vulnerabilities and raise awareness about more sophisticated threats.  From blocking client-to-client traffic to adding Hotspot 2.0, hospitality network operators can play a big part in helping to protect guests. This week, new research published by Kaspersky demonstrates how these valiant efforts can still fall short – specifically, by failing to stop an Advanced Persistent Threat (APT) dubbed DarkHotel.


Poodle preys on open WiFi hotspot users

Google researchers recently posted a security advisory about an SSL downgrade attack dubbed POODLE:


Five Myths about Wireless Security

In our connected world, wireless security threats – which can lead to identity theft or the loss of proprietary information – have become all too common. As National Cyber Security Awareness Month winds down, here are five common myths about wireless security that deserve our attention and action:


WiFi Pineapple Detected: How to Combat this Sly Hacking Tool

Picture this. You’re monitoring a wireless network at a busy trade show. People are everywhere, browsing between booths. Everything is going smoothly until your wireless intrusion prevention system alerts you to an unauthorized access point spoofing your network’s SSID.

But with a large area to cover and limited information on the threat, you’re looking for the proverbial needle in the haystack.


Keep your mitts off my MiFi – why rogue policies matter

Last Friday, the FCC announced that it had fined Marriott $600,000 for “intentionally interfering with and disabling Wi-Fi networks” at the Gaylord Opryland Hotel in Nashville, Tennessee. The FCC’s ruling stems from a guest’s complaint in March 2013 that his mobile hotspot could not maintain a connection in the convention center’s ballroom. Specifically:


Hey, what’s that new MAC address? It’s just iOS 8

As iOS 8 starts appearing in WLANs just about everywhere today, one change that many WLAN admins will notice is a flurry of new probing Wi-Fi clients. In fact, those aren’t new Wi-Fi clients at all – they’re just iOS 8 devices now randomizing the MAC addresses carried in Probe Requests and Probe Responses.


Is your WLAN ready for the bigger, faster iPhone 6?

Apple this week announced the next generation of its flagship smartphone. The iPhone 6 and iPhone 6 Plus offer larger screens, thinner bodies, faster processors, better cameras, and embedded support for Apple’s new NFC-enabled ApplyPay system. While these features may grab headlines, many users will be just as thankful – if not more so – for the core wireless improvements found in these new iPhones.

Specifically, the iPhone 6 and iPhone 6 Plus include:


Don’t let this Wi-Fi exploit bug your BlackBerry

In the ever-changing smartphone landscape, BlackBerry phones have long been security darlings – built for enterprise administration and chocked full of lock-down capabilities, including a natively-secure transport protocol that’s impervious to common public Wi-Fi risks. But this relatively robust foundation doesn’t render the BlackBerry OS or BlackBerry Enterprise Server immune to Wi-Fi borne attack.


Planning for 11ac Wave Two and Beyond

As the Wi-Fi Alliance celebrates the one-year anniversary of 802.11ac certification, one naturally starts thinking about what the future will bring. Today, more than 670 entries appear on the Alliance’s list of Wi-Fi CERTIFIED ac products, including over 250 smartphones and 170 enterprise APs. ABI predicts that by 2015, 45% of all consumer Wi-Fi APs will support 11ac.


If a Drone Is Lurking in Your Airspace, DTU Has You Covered

Over the last couple years, drones have been capturing news headlines. From wars overseas, to airborne Amazon deliveries, to the most recent trend of drones flying through 4th of July firework celebrations (which was very cool), drones are simultaneously capturing our imagination and infringing on our personal space at alarming rates.


Drone attack!

Last week, tourists atop the Seattle Space Needle were buzzed by a drone hovering over the observation deck, 520 feet above street level. The drone then flew home to its operator, perched inside a nearby hotel room window. When police officers arrived, the drone’s operator – a visiting employee – played back footage shot by the drone, showing tourists waving from the observation deck.


Say Hello to AirCheck™ Wi-Fi Tester for Android™ and AirCheck™ Handheld 3.0

Today’s wireless networks support far more than just the basic applications of a few years ago. High speeds, reliability, and “anywhere – everywhere” service are now table stakes. They are to business-critical applications, transactions, and employee productivity.  And as wireless networks have evolved, so have the engineers and technicians that plan, deploy and troubleshoot the networks.


Wireless Hacks at DEFCON 22

Wireless security professionals know that safeguarding a network requires thinking like an attacker. One great place to gain this perspective is DEF CON, slated for August 7-10, 2014.


New Wireless Attacks at BlackHat 2014

WiFi professionals looking for the latest in wireless vulnerabilities and attacks may want to check out BlackHat USA 2014 on August 2-7 in Las Vegas. This annual hack-fest brings together researchers from around the world anxious to share new attack targets, vectors, and exploits. This year’s briefings take aim at cars, point of sale devices, cloud services, mobile devices, and the increasingly wireless fabric that makes all of this communication possible.


Stay “Healthy” with AirMagnet Mobile Tools

When it comes to healthcare, keeping patients healthy is no longer in the hands of just doctors and nurses. Network technicians also have a critical job. In fact, healthcare is one industry where Wi-Fi plays a mission-critical role for applications that patients and their doctors rely on—fusion pumps, glucose monitors, wireless scanners and the list goes on.


Cupid takes a shot at WiFi devices

Heartbleed’s fallout continues, as researchers continue to find and exploit OpenSSL vulnerabilities. At the end of May, Luis Grangeia announced Cupid, a pair of Heartbleed exploits that target WiFi devices.

Like Heartbleed, Cupid uses a malicious TLS Heartbeat packet to exploit an OpenSSL vulnerability, retrieving a 64 KB chunk of the victim’s memory. However, instead of sending the TLS Heartbeat over TCP, Cupid sends that malicious packet over EAP – the Extensible Authentication Protocol used by 802.1X for enterprise WLAN access control.


Don't let your WLAN fall prey to buggy SOHO routers

A new study by Tripwire found that many wireless LANs are still surprisingly vulnerable to attack. As reported by Tripwire’s Vulnerability and Exposure Research Team (VERT) in this paper:


Denial of Service: Virtual Carrier by Node

As enterprise wireless networks have matured, effective threat detection and prevention have grown indispensible. But WLANs constantly change in composition and location, requiring nimble defenses that can rapidly recognize and prevent emerging threats.


Defeating Data Breaches with WIPS

Verizon recently released its latest data breach investigations report, after reviewing more than 63,000 security incidents reported in 2013, resulting in 1,300 confirmed data breaches.

What you need to know about Heartbleed

Vendors and site administrators are scrambling to close the gaping hole opened by Heartbleed, a remotely-exploitable bug in the OpenSSL crypto library widely used to enable TLS sessions. But Heartbleed doesn’t just affect web servers.

New AirCheck™ Wi-Fi Tester for Windows® and AirCheck™ Wi-Fi Tester for Android™ Offers Greater Platform Choice for Technicians

Any good technician knows the value of having the right tool at the right time. They also know transporting a toolbox overflowing with testing equipment isn’t always practical. The good news is Fluke Networks can help. We just released new AirCheck Wi-Fi Tester solutions that run on Windows or Android devices, which means frontline technicians can now use the platform of their choice when troubleshooting basic Wi-Fi issues.


Stopping Rotten Apple Man-in-the-Middle Attacks

If you are an apple iOS user, take a few minutes right now to install last week’s patch to fix a glaring SSL certifiate handling error that left over 700 million iPhones, iPads, Apple TVs and Macs vulnerable to Man-in-the-Middle (MitM) attack.


Mobility Takes the Center Stage at Mobile World Congress 2014

This week is Mobile World Congress (MWC) in Barcelona, Spain and all eyes are on the latest mobile trends and emerging technologies and services. If you’re wondering what’s next for the mobile industry, just take a look at what’s on the agenda at MWC.

For starters, “mobile” is no longer synonymous with 3G/4G cellular. From Bring-Your-Own-Device (BYOD) to mobile video, Near Field Communication to Wi-Fi voice offload, mobile payments to M2M industrial wireless, the MWC conference explores the entire fast-growing ecosystem spawned by mobility.


Why Strong Passwords Are Not Enough

Perhaps you have read this recent GitHub post by Eloi Vanderbeken:


Hot Spot 2.0 Crawling Along

The Wi-Fi Alliance has been quietly growing its list of Passpoint certified Wi-Fi products for over a year, topping 200 certifications to date. In fact, many contemporary smartphones now implement the WFA's Hotspot 2.0 spec for seamless, secure hotspot roaming, including Apple's iPhone 5S and Samsung's Galaxy S4.


Up the Speed: 5 Tips for Deploying 802.11ac

The bring-your-own-device (BYOD) phenomenon is growing rapidly and creating capacity issues for enterprises that must now support more devices than ever. In addition, networks are already under strain from bandwidth-hungry applications like video and audio streaming. Given all the performance demands, anything that improves the capacity and end-user experience of wireless networks is likely to be embraced by network planners.


Detect and Protect from Cellular and Wi-Fi Security Threats with AirMagnet Enterprise

With the networking world increasingly moving into the wireless realm, security becomes an utmost concern for protected entities including government agencies and enterprises. New methods meant to breach security and jam cellular airways pose a real risk for organizations that rely on a closed network to maintain business processes. In and around sensitive locations, there is a growing need to monitor and detect cellular usage and many entities require continuous visibility into the presence of cellular devices.


How Does PCI DSS Version 3 Impact Wireless Networks?

The PCI Security Standards Council, a forum to develop payment card security standards, published version 3.0of the PCI Data Security Standard (PCI DSS) and Payment Application Data Security Standard (PA-DSS). The new version will become effective on Jan. 1, 2014. Version 2 will remain in effect until Dec. 31, 2014, to give organizations adequate time to comply with the new standards.


The Industry’s First 802.11ac Wireless Deployment Tool – Fluke Networks’ AirMagnet Survey PRO 8.6

Faster is better. It’s a truth that’s been fully embraced by the networking industry since the beginning. After all, we can’t even stomach a web page that takes more than five seconds to load, or 10 second file share access. As our network connectivity expectations continue to rise, and as wireless plays an ever increasing role with ubiquitous access to key business applications, the ability to quickly deploy new wireless technologies is key.


Wireless Integrity in the Hospital

In a recent AirWISE blog post, we talked about the complex wireless environment that often exists in a busy modern hospital.


In Texas, even the COWs are wireless

Memorial Hermann health system is an example of the old adage that everything is bigger in Texas.


New iPhones and iOS 7: What’s it all mean for WLAN Administrators?

Apple recently announced that it sold more than 9 million new iPhone 5s and 5c models in just the first 3 days of their availability while nearly 200 million existing users upgraded to iOS 7 (which runs on iPads and iPod touch devices as well as iPhones) in just 72 hours.


New Threat Signature to Combat SSID Fuzzing Attack

Recently an issue was announced from a third party website that identified an issue with the Core Text rendering engine used by Apple in their iOS and OSX platforms. A malicious string of Unicode characters can cause the application that used Core Text to crash. This included Safari, Chrome browser, and the message application.


Say goodbye to bulky, expensive carrier offload tools and hello to AirMagnet Spectrum ES™

Did you know that more than a third of global mobile data traffic was offloaded to small cells in the last year? And that the volume is expected to grow to nearly 50% over the next few years?


Intrusion Detection for Wireless Compliance

Government regulations and industry standards often require businesses to take measures to track, prevent and report network intrusion. A wireless intrusion detection system (IDS) monitors and records WLAN events and analyzes them for possible security incidents. An intrusion prevention system (IPS) has all the features of an IDS, but with additional functions designed to stop an identified attack. The tool you choose will depend on your business needs and security infrastructure.


Karma is a …Errr, What We Learned at BlackHat 2013

BlackHat is always a fantastic and enlightening event, and this year was no different.  Your faithful Fluke Networks team was in the Sponsor Hall showing off AirMagnet Enterprise, our comprehensive wireless intrusion and prevention and detection (WIPS/WIDS) solution. 


Top Briefings for Wireless Security Professionals at BlackHat 2013

Every summer, hackers flock to Las Vegas, NV, to learn about new vulnerabilities and exploits, and this year’s show is right around the corner, starting July 27 and going through August 1. As in years past, BlackHat speakers are expected to introduce a few new wireless hacks. Here’s a quick preview of briefings that may be of interest to wireless network admins and users:


Wi-Fi Certified 802.11ac is Here (And If You’re Not Ready, You’re Playing Catch-Up)

After one of the biggest tech build-ups since IPv6, the Wi-Fi Alliance finally launched its Wi-Fi CERTIFIED ac program in mid-June. Wi-Fi CERTIFIED ac products interoperate with each other and older Wi-Fi products in the 5 GHz band, delivering higher data rates (up to 1.3 Gbps), higher capacity, lower latency and better battery life due to reduced power consumption.


Securing BYO Devices Extends Beyond the Enterprise – It Starts at Home

For employees who bring their own device to work (BYOD), compliance with company policy should start at home. If your employees use a home wireless network to access the corporate network, you need ensure their home network is secure for all their activity, whether they are at work or play.


Snooping is more than a public telephone threat: How to prevent Vo-Fi attacks

Public telephone snooping isn’t the only call vulnerability out there. Voice over IP calls can be snooped over wireless networks, leaving corporate and personal calls vulnerable without appropriate precautions and tools. Any unencrypted traffic sent over Wi-Fi can be easily captured for later replay.


Reflections on Interop Las Vegas 2013: The WLAN Life Cycle, AP Problems and IT Best Practices

Last month, I attended Interop Las Vegas to speak about Wireless LAN Testing, Benchmarking and Verification with a panel of wireless industry experts, including analyst Craig Mathias. Our discussion was well attended by a variety of eager, lively network professionals with active, dynamic debate and discussions.


Model Any Wireless Environment Across Multiple Floors with the New Release of AirMagnet Survey (8.5)

Wireless networks are becoming ubiquitous. We connect wirelessly at our homes, offices, hotels, cafes and airports – pretty much everywhere. Wireless environment are also very dynamic: the RF (radio frequency) environment can change, new users may need to be supported, more devices may need to be supported (Bring Your Own Device; BYOD) or access points (APs) may need to be upgraded to the latest 802.11 technology. Unfortunately when these challenges emerge, many struggle with proper planning to address these problems.


Step Aside BYOD, There’s a Bigger, Badder WLAN Challenge on the Horizon: Network Traffic Planning

While IT admins are losing sleep over smartphone and tablet (in)security, there’s a bigger, badder challenge on the horizon: wireless network traffic planning.


Seven Steps to Creating a Common Sense BYOD Compliance Policy

Today users not only bring themselves to work, but also their devices. Bring Your Own Device (BYOD) to work programs make for complex security policies and strategies for compliance. As with most things, a little common sense can go a long way in reducing the risk of threats and managing components where specific technologies can be applied.


Putting Customer Data at Risk is Never In Style: How a Major Department Store Chain Uses AirMagnet Enterprise for Full Wi-Fi Visibility

Often the problems that need solving the most are the ones right in front of you. This holds true for one major department store chain that found from deploying AirMagnet Enterprise, they had hazardous Wi-Fi threats hidden in plain site.


AirMagnet Enterprise Wins Network Products Guide Bronze Award for Mobility and Wireless Solution

Fluke Networks’ AirMagnet team works hard to deliver the industry’s premier overlay wireless intrusion detection and prevention system (WIPS/WIDS) – for companies that have the most stringent security requirements. And, we’re excited to say, the industry has recognized us for our efforts.


How to ensure Wi-Fi networks are ready for Cisco Location Services: Fluke Networks’ AirMagnet Survey PRO First to Use Real-World Data

Image this situation: Your IT department selects a new service to keep your organization better organized, more secure, and better equipped for emergencies. Your department invests ample time into deploying the new service, diligently working to meet specific requirements, and triple checking work completed. And then, to your surprise the service doesn't act quite as it should.

Unfortunately for some Cisco Location Services (CLS) customers, this can be a reality because of a lack of using real-world data when designing the network.


Does Wi-Fi Network Compliance Equal Corporate Data Security?

If a network is compliant with regulations, does that mean it’s secure? Unfortunately for both IT professionals and businesses, no it doesn’t. Why? Compliance is not security, but security can be compliant - with a set of requirements and guidelines that ensure data is confidential to authorized users, has integrity, has not been changed or modified, and is available on demand.


Three Steps for Making BYO Access Points a Company Benefit, Not an IT Risk

As I discussed in my last blog post, Bring Your Own Access Points (BYO APs) are quickly growing both in public use and in the workplace. In fact, according to a February 2013 survey conducted by Smith Micro, 62 percent of smartphone users use their handset’s personal hotspot feature. Market analyst firm TechNavio expects the Global Mobile Hotspot Router market to grow 34 percent annually between 2012 and 2016, driven partially by 4G bandwidth.


Bring Your Own Access Point (BYO AP): IT Friend or Foe?

As the bring-your-own (BYO) explosion continues, a rising tide of smartphones and pocket-sized personal hotspot gadgets are bringing BYO access points (APs) into the workplace. Whether powered by smartphone software or mobile router hardware, BYO APs can turn any 3G/4G cellular data connection into a small footprint Wi-Fi hotspot, whenever and wherever Internet access is needed.


AirMagnet Enterprise Helps University IT from Getting "Schooled" by BYOD

The Bring-Your-Own-Device (BYOD) phenomenon is growing with fervor in enterprises worldwide. And with a population of busy, information-seeking people, it isn't surprising that the trend extends to university campuses. University IT faces unique wireless challenges: inconsistent bandwidth use that ebbs and flows with the academic calendar; differing IT needs from students and staff; and the constant threat of malicious attacks that threaten not only the classroom, but also critical student and staff data.


Clear the Air of Layer 1 Wireless Vulnerabilities

Wi-Fi isn't just for smartphones, tablets, and laptops anymore. Cheap and relatively easy to deploy, Wi-Fi has transformed over the last decade from a convenience to a strategic network parameter. Carriers are using wireless to offload 3G and 4G cellular traffic, verticals like healthcare and retail use it for crucial applications like processing credit cards, and end users expect wireless access everywhere from the local cafe to even in the latest models of cars.


Why Secure Your Wi-Fi Router?

Occasionally we like to go a bit off topic and cover emerging general market trends. Recently I’ve been getting a lot of questions about liability associated with an unsecure Wi-Fi router. This post should help demystify the topic.


What the Final Rule to HIPAA Means for Wireless Security

To protect individually identifiable information and realize the benefits and cost savings of new electronic medical record technology, The Health Insurance Portability and Accountability Act (HIPAA) directed the Secretary of the U.S. Department of Health and Human Services (HHS) to develop new privacy and security regulations to meet today’s healthcare security challenges.


How to Protect Yourself from the Top Wireless Hotspot Security Threats


Bring-Your-Own Mobile Malware

The tide of mobile malware continues to grow, from 2004’s tiny trickle of Bluetooth worms to a steady stream of malicious Android apps that topped 350,000 in 2012 [1]. While this tally pales in comparison to PC malware, there’s a key distinction: most business PCs are somewhat defended by IT-managed anti-malware. The same can’t be said for consumer smartphones and tablets. In fact, you’d be hard-pressed to find a bring-your-own Android running anti-malware.

Do I really need to worry about mobile malware?


How-To Guide for Managing and Securing BYOD

Bring Your Own Device (BYOD) is as much a sign of cultural change as it is an indicator of prevailing technology trends. Shifting work patterns and the need to be smarter and more flexible have neatly coincided with the proliferation of connected devices like smartphones, tablets and netbooks. For most it’s a marriage made in heaven. Users like the freedom, spontaneity and instant-on availability of mobile and portable devices. Employers like the creativity, productivity and extended working they encourage from staff.


Quantifying BYOD impact

For IT admins concerned about planning WLAN capacity or securing WLAN access, bring-your-own Wi-Fi enabled consumer electronic devices are posing significant concerns. But just how big is their impact on enterprise WLANs? Let’s put some metrics around these trends.

According to the just-published Neilsen US Consumer Usage Report 2012:


Top 5 WLAN Security Threats to Defend Against in 2013

For nearly a decade, Wi-Fi has been a "nice-to-have" technology for most corporations, and wired networks have been the backbone for transmitting sensitive information. That time is long gone. With the explosive growth of Wi-Fi and the dramatic increase in smart devices usage, more and more industry leaders, including top retailers, manufacturers and healthcare organizations, are using Wi-Fi as a critical medium for transmitting sensitive data. Is your organization ready for the increased threats caused by this growth?


Get ready to use – and safeguard – more spectrum

At CES 2013, FCC chairman Julius Genachowski announced that regulatory efforts are well underway to free up "substantial" additional spectrum for Wi-Fi to accommodate sky-rocketing demand with less congestion. In comments made at the industry’s largest annual consumer electronics event this week, Genachowski said that the FCC hopes to expand the 5 GHz band by about 35 percent. That’s the band soon to be occupied by next-generation 802.11ac Wi-FI products, along with other government uses.

Why that’s good news…