Thank you for getting back to me, Johannes. My hypothesis was a wild guess based on almost no evidence, so I'm not surprised that it was totally wrong :) Despite remaining unexplained, the behavior is perfectly consistent. Plus, my system is very minimalistic (e.g., there is no network manager, all network scans are explicitly initiated by me, I only use iw for scans). Because of this, I wrote a wrapper script around iw. If action is anything other than scan, the script bails out and passes all arguments to the iw executable. If action is scan, script does a disposable scan then passes all arguments to the iw executable. It's ugly as heck but I can live with it. Happy hacking, Bruno