I dunno. If Marriott was using it to force people to buy access to their own wifi, then that's a bit shifty.

If Lockheed Martin wants to deauth rogue AP's so nobody plugs in a wifi AP in the engineering department and the file server containing plans for the Joint Strike Fighter is suddenly exposed via wifi to somebody sitting in the parking lot, then I think they're justified. I would say the same about any company trying to protect trade secrets or other IP.

In the law firm example where they are hurting other tenants in the building, that's probably not ok. The hypothetical law firm should have to take steps to ensure that their wifi can't leave their own area, or move their practice to a fenced in compound like Lockheed.

This is not me telling you what's legal....just me saying what I think is fair and reasonable. On the other hand, I guess if I was Lockhead Martin, I'd probably just write the FCC the $600,000 check and then send a bill for it to the DOD.


So then those Enterprise security types are going to have to stick to disabling Ethernet ports, I guess.



-----
Mike Hammett
Intelligent Computing Solutions
http://www.ics-il.com

------------------------------------------------------------------------
*From: *"Chuck McCown via Af" <af@afmug.com>
*To: *af@afmug.com
*Sent: *Friday, October 3, 2014 1:13:45 PM
*Subject: *Re: [AFMUG] MARRIOTT TO PAY $600, 000 TO RESOLVE WIFI-BLOCKING INVESTIGATION

“No person shall willfully or maliciously interfere with or cause interference to any radio communications of any station licensed or authorized by or under this Act or operated by the United States Government” Wifi is authorized. You don’t have the legal right to deauth any AP sessions but your own. I would think the manufacturer of equipment that makes this possible would be just as liable as manufacturers of RF jammers.
*From:* Eric Kuhnke via Af <mailto:af@afmug.com>
*Sent:* Friday, October 03, 2014 12:03 PM
*To:* af@afmug.com <mailto:af@afmug.com>
*Subject:* Re: [AFMUG] MARRIOTT TO PAY $600,000 TO RESOLVE WIFI-BLOCKING INVESTIGATION Sounds like they're setting a precedent that a landlord can't operate rogue AP detection/automatic deauth against tenants or customers. Should still be fine in an enterprise environment.

Where it gets possibly weird is, let's say you're a major law firm that is a tenant in a large office building. You occupy half a floor. You operate your own enterprise wifi system and use cisco's rogue AP deauth feature. The tenants in the other suite (a totally separate business) on the other half of the same floor notice that wifi tethering doesn't work on any of their phones, and their pocket wifi hotspots don't work. On Fri, Oct 3, 2014 at 10:52 AM, Hardy, Tim via Af <af@afmug.com <mailto:af@afmug.com>> wrote:

    And the actual order has more detail

    
http://transition.fcc.gov/Daily_Releases/Daily_Business/2014/db1003/DA-14-1444A1.pdf

    *From:*Af [mailto:af-boun...@afmug.com
    <mailto:af-boun...@afmug.com>] *On Behalf Of *Hardy, Tim via Af
    *Sent:* Friday, October 03, 2014 1:46 PM
    *To:* af@afmug.com <mailto:af@afmug.com>
    *Subject:* Re: [AFMUG] MARRIOTT TO PAY $600, 000 TO RESOLVE
    WIFI-BLOCKING INVESTIGATION

    More information about impermissible Wi-Fi blocking or jamming
    practices is available at

    www.fcc.gov/jammers <http://www.fcc.gov/jammers>. If you would
    like additional information about Wi-Fi blocking, you may email us at

    jammeri...@fcc.gov <mailto:jammeri...@fcc.gov>.

    *From:*Af [mailto:af-boun...@afmug.com] *On Behalf Of *Adam
    Moffett via Af
    *Sent:* Friday, October 03, 2014 1:42 PM
    *To:* af@afmug.com <mailto:af@afmug.com>
    *Subject:* Re: [AFMUG] MARRIOTT TO PAY $600, 000 TO RESOLVE
    WIFI-BLOCKING INVESTIGATION

    being a hotel might be the thing that made it a problem.  If an
    enterprise or hospital does it as a security measure, I have
    trouble believing that's illegal.

        Marriott are dicks, but here's an interesting question...

        broad spectrum 2.4 or 5 GHz jammers are illegal, yeah.

        But is an 802.11-compliant device issuing deauth requests
        illegal, if part-15 devices are supposed to accept any
        unwanted interference and there's no recourse?

        Provided that the device issuing deauth requests is operating
        within spec for EIRP, channel plan, etc.

        On Fri, Oct 3, 2014 at 10:27 AM, Hardy, Tim via Af
        <af@afmug.com <mailto:af@afmug.com>> wrote:

        https://apps.fcc.gov/edocs_public/attachmatch/DOC-329743A1.docx



Reply via email to