The Detect Hidden Node action requires mutual signal range, so why would locating the physical location of a wireless node require anything less?
Thoughts on "Detect Hidden" and Mutual Signal Range.
It helped me to understand why the Detect Hidden Node action requires mutual signal range when I broke Detect Hidden into multiple steps.
1)
Detect Broadcasting. This requires an antenna, nothing more. Detecting the physical location could possibly require two antennas that can communicate with each other so that they can triangulate. Or it may simply be that one antenna can calculate direction, current signal strength, and original signal strength through some combination of hardware, software, and protocols. I don't know how, but we've 60+ years to figure it out. Worse comes to worse, have your hacker own a nearby router or three and use that plus your commlink to triangulate.
2) Either way,
Detect Broadcasting within Signal Range requires some capability to detect location, or at least range. It's the subset of devices that you should be able to talk to based on their location, their signal strength, the signal strength you're getting from them (to adjust for interference, etc.), etc.. Yay for computing power...
3)
Detect Public within Signal Range (Detect Public). This requires mutual signal range. You send standard protocols out and gather up the responses. For Detect Public, you need to be within mutual signal range and you need to "out" yourself. Basically, this is a list of all the devices that play well with others. Note that playing well with others may be advantageous at times*.
4) Detect Hidden. Subtract
Detect Public from
Detect Broadcasting within Signal Range. This leaves you with all "Verified Non-Public Broadcasting", ie. "Hidden".
Edit: Note on "playing well with others". A Telematics Infrastructure (Unwired, pg 62) that's operating hidden is going to alert every hacker that runs a Detect Hidden scan. A TI has way too many devices broadcasting and serving as wireless bridges. On the other hand, a Telematics Infrastructure that's opering as a public series of routers simply appears to be a very large collection of bridges and routers. By being "out in the open", the hacker is less able to tell the purpose of the system.
On the flip side, running hidden and having the signal from your 'ware picked up by a Telematics Infrastructure is not good news. Hacking and conning your way in and acting like you're supposed to be there (complete with public) is a much better way to get past a T.I.
Being undetected while being visible in the astral and wireless worlds has it's challenges.