[WISPA] Re: wall mount racks

2006-11-27 Thread Justin Wilson
	I have a small (6U or so) wall mount rack I would let go for a 
song. I have had it on the floor for the past year or so. I can send pics 
if interested.


Justin

--
Justin S. Wilson [EMAIL PROTECTED]
Access - WISP Consulting - Tower Climbing
Web: http://www.mtin.net
Web: http://www.jwilson.ws


--
WISPA Wireless List: wireless@wispa.org

Subscribe/Unsubscribe:
http://lists.wispa.org/mailman/listinfo/wireless

Archives: http://lists.wispa.org/pipermail/wireless/


[WISPA] Handheld Spectrum analyzer mentioned on list last summer

2006-11-27 Thread rabbtux rabbtux

All,
I recall there was some interest in a German manufactured handheld
spectrum analyzer last summer(cost about 1K).  Some on the list were
going to pool their resources to make a overseas order.

Did that ever happen?  Does anyone have one of those units??  How does it work?
--
WISPA Wireless List: wireless@wispa.org

Subscribe/Unsubscribe:
http://lists.wispa.org/mailman/listinfo/wireless

Archives: http://lists.wispa.org/pipermail/wireless/


Re: [WISPA] Handheld Spectrum analyzer mentioned on list last summer

2006-11-27 Thread David E. Smith
On Mon, November 27, 2006 11:43 am, rabbtux rabbtux wrote:

 I recall there was some interest in a German manufactured handheld
 spectrum analyzer last summer(cost about 1K).  Some on the list were
 going to pool their resources to make a overseas order.

You're thinking of the Spectran analyzers, from www.elektrosmog.de.

I love that domain name. Elektro-Smog. Sounds like someone you'd see as a
guest villain in Spider-Man or something. I wonder what his superpowers
would be...

Anyway. Yeah, the special-order did happen a few months back. We've got
one of these units in the office, but sadly nobody's had much time to
really play with it and try to use it to its full potential.

Hopefully someone that bought one, and has been using it, will have more
helpful feedback.

David Smith
MVN.net


-- 
WISPA Wireless List: wireless@wispa.org

Subscribe/Unsubscribe:
http://lists.wispa.org/mailman/listinfo/wireless

Archives: http://lists.wispa.org/pipermail/wireless/


Re: [WISPA] Handheld Spectrum analyzer mentioned on list last summer

2006-11-27 Thread Mike Ireton


If you're speaking of the Spectran, I have one and it doesn't seem to 
work too well for me. The issue for me is that there seems to be not 
enough resolution to be working with the reletively low power 
unliscensed systems as we do. I'm sure for paging and gsm it's great but 
after trying repeatedly to use it for even simple tasks like direction 
finding and channel sweeping (seeing what's clear), I had to give up and 
stop wasting time with it.


rabbtux rabbtux wrote:

All,
I recall there was some interest in a German manufactured handheld
spectrum analyzer last summer(cost about 1K).  Some on the list were
going to pool their resources to make a overseas order.

Did that ever happen?  Does anyone have one of those units??  How does 
it work?


--
WISPA Wireless List: wireless@wispa.org

Subscribe/Unsubscribe:
http://lists.wispa.org/mailman/listinfo/wireless

Archives: http://lists.wispa.org/pipermail/wireless/


[WISPA] Wi-Fi Faces New Patent Woes

2006-11-27 Thread Peter R.

http://www.sda-asia.com/sda/features/psecom,id,764,srn,2,nodeid,4,_language,Singapore.html

Wi-Fi Faces New Patent Woes


A federal judge in Tyler, Texas, ruled last week that an Australian government 
agency holds the rights to patents on  the underlying technology used in two 
Wi-Fi standards and a  third proposed standard. The decision could have a  
wide-ranging impact on wireless equipment makers and consumer  electronics 
manufacturers.

Australias Commonwealth Scientific and Industrial Research Organisation filed a 
patent in 1996 that it says is employed  in some IEEE standards, potentially 
including 802.11. The  group said that Microsoft, Dell, HP, Intel, Apple, and 
Netgear  have initiated legal action in an attempt to overturn the  patent. The 
organisation says it intends to fight the action.

This isn't the first time a company or organisation has tried  to pursue 
companies in the 802.11 space for patent  infringement.
Last year a patent buying firm called Acacia  began sending letters to access 
point makers that use redirect  technologies, saying those firms owed royalties 
for a patent  Acacia owns on redirect technologies. Its unclear how  vigorously 
Acacia followed up on its pursuits, but the move  caused an uproar in the 
industry.

The question remains why the Australian organisation is  deciding to pursue 
this patent at this stage in the market.  While companies must be able to reap 
the rewards of their own  research and development, there also must be 
consideration for  the positive effects that low cost products can have on a  
market.

One reason that Wi-Fi has proliferated as it has is because it's reached a point where it's incredibly cheap, so it's easy to just stick a Wi-Fi chip in a consumer electronics device, 
said Stan Schatt, a vice president at ABI Research. But if  the cost of the technology goes up to pay for the license,  even a little bit, it could throw off the economics.


Indeed, Wi-Fi products generate billions of dollars in revenue for equipment makers. Just the access points that provide the actual Wi-Fi signals in local area networks are expected to generate USD 1.9 billion in 2006, according to ABI Research. 
That figure is expected to jump to USD 3.7 billion in 2010.



--
WISPA Wireless List: wireless@wispa.org

Subscribe/Unsubscribe:
http://lists.wispa.org/mailman/listinfo/wireless

Archives: http://lists.wispa.org/pipermail/wireless/


Re: [WISPA] Wi-Fi Faces New Patent Woes

2006-11-27 Thread Matt Liotta

Peter R. wrote:
The question remains why the Australian organisation is  deciding to 
pursue this patent at this stage in the market.  While companies must 
be able to reap the rewards of their own  research and development, 
there also must be consideration for  the positive effects that low 
cost products can have on a  market.


It is important to understand that this ruling while recent is the 
result of a process that started years earlier.


-Matt

--
WISPA Wireless List: wireless@wispa.org

Subscribe/Unsubscribe:
http://lists.wispa.org/mailman/listinfo/wireless

Archives: http://lists.wispa.org/pipermail/wireless/


[WISPA] Wireless Security biting you in the ass?

2006-11-27 Thread John Scrivner
Wireless broadband security issues have now officially led to my 
business being put into a bad light due to perceived lack of security. I 
am a member of a regional broadband planning group that is working with 
health care and other industry sectors to help deliver broadband options 
to all areas that need it. Rural Health centers and hospitals are all 
over the region and most need access to broadband which is highly 
secure. I need to know what others have done to bring HIPAA compliance 
assurance to network administrators and hospital personnel so that your 
solutions are chosen and used for health care connectivity. Currently my 
services are not being considered do to the perception of a lack of 
HIPAA security compliance. I need to get on top of this right now and 
welcome your thoughts and ideas. I would prefer to hear from those of 
you who have some actual knowledge of delivering HIPAA compliant 
connections or those who provide equipment which has been documented to 
meet HIPAA compliance.

Thank you,
John Scrivner

--
WISPA Wireless List: wireless@wispa.org

Subscribe/Unsubscribe:
http://lists.wispa.org/mailman/listinfo/wireless

Archives: http://lists.wispa.org/pipermail/wireless/


RE: [WISPA] Wireless Security biting you in the ass?

2006-11-27 Thread Rick Smith
I've been wonderin about this same thing.  I've always blown it off
and won the argument but

Where's the HIPAA cert stuff to be found ?
Like, exact checklists ?

R 

-Original Message-
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On
Behalf Of John Scrivner
Sent: Monday, November 27, 2006 5:17 PM
To: wireless@wispa.org
Subject: [WISPA] Wireless Security biting you in the ass?

Wireless broadband security issues have now officially led to my business
being put into a bad light due to perceived lack of security. I am a member
of a regional broadband planning group that is working with health care and
other industry sectors to help deliver broadband options to all areas that
need it. Rural Health centers and hospitals are all over the region and most
need access to broadband which is highly secure. I need to know what others
have done to bring HIPAA compliance assurance to network administrators and
hospital personnel so that your solutions are chosen and used for health
care connectivity. Currently my services are not being considered do to the
perception of a lack of HIPAA security compliance. I need to get on top of
this right now and welcome your thoughts and ideas. I would prefer to hear
from those of you who have some actual knowledge of delivering HIPAA
compliant connections or those who provide equipment which has been
documented to meet HIPAA compliance.
Thank you,
John Scrivner

--
WISPA Wireless List: wireless@wispa.org

Subscribe/Unsubscribe:
http://lists.wispa.org/mailman/listinfo/wireless

Archives: http://lists.wispa.org/pipermail/wireless/

-- 
WISPA Wireless List: wireless@wispa.org

Subscribe/Unsubscribe:
http://lists.wispa.org/mailman/listinfo/wireless

Archives: http://lists.wispa.org/pipermail/wireless/


[WISPA] WAR board distributors

2006-11-27 Thread Tom DeReggi

US Distributors,

Are any of you planning on stepping up to stock/carry WAR533 boards 
w/embedded StarOS V3, for better US availabilty?


Tom DeReggi
RapidDSL  Wireless, Inc
IntAirNet- Fixed Wireless Broadband

--
WISPA Wireless List: wireless@wispa.org

Subscribe/Unsubscribe:
http://lists.wispa.org/mailman/listinfo/wireless

Archives: http://lists.wispa.org/pipermail/wireless/


RE: [WISPA] Wireless Security biting you in the ass?

2006-11-27 Thread Charles Wu
I can expand on this, but would that be considered a vendor pitch ?
(discussion will include product capabilities, etc)

-Charles


---
WiNOG Wireless Roadshows
Coming to a City Near You
http://www.winog.com 



-Original Message-
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On
Behalf Of John Scrivner
Sent: Monday, November 27, 2006 4:17 PM
To: wireless@wispa.org
Subject: [WISPA] Wireless Security biting you in the ass?


Wireless broadband security issues have now officially led to my 
business being put into a bad light due to perceived lack of security. I 
am a member of a regional broadband planning group that is working with 
health care and other industry sectors to help deliver broadband options 
to all areas that need it. Rural Health centers and hospitals are all 
over the region and most need access to broadband which is highly 
secure. I need to know what others have done to bring HIPAA compliance 
assurance to network administrators and hospital personnel so that your 
solutions are chosen and used for health care connectivity. Currently my 
services are not being considered do to the perception of a lack of 
HIPAA security compliance. I need to get on top of this right now and 
welcome your thoughts and ideas. I would prefer to hear from those of 
you who have some actual knowledge of delivering HIPAA compliant 
connections or those who provide equipment which has been documented to 
meet HIPAA compliance.
Thank you,
John Scrivner

-- 
WISPA Wireless List: wireless@wispa.org

Subscribe/Unsubscribe: http://lists.wispa.org/mailman/listinfo/wireless

Archives: http://lists.wispa.org/pipermail/wireless/


-- 
WISPA Wireless List: wireless@wispa.org

Subscribe/Unsubscribe:
http://lists.wispa.org/mailman/listinfo/wireless

Archives: http://lists.wispa.org/pipermail/wireless/


RE: [WISPA] Wireless Security biting you in the ass?

2006-11-27 Thread Dennis Burgess - 2K Wireless
Well said!

Dennis Burgess, MCP, CCNA, A+, N+, Mikrotik Certified
[EMAIL PROTECTED]
www.2kwireless.com
 
2K Wireless provides high-speed internet access, along with network
consulting for WISPs, and business's with a focus on TCP/IP networking,
security, and Mikrotik routers.

-Original Message-
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On
Behalf Of Marlon K. Schafer (509) 982-2181
Sent: Monday, November 27, 2006 4:25 PM
To: WISPA General List
Subject: Re: [WISPA] Wireless Security biting you in the ass?

Officially, hippa compliance is a CLIENT issue.  As long as the data is 
properly encrypted there's no need for the transport to be.

Some will argue this (mainly the telco but sometimes the customer).  It's 
still a fact.

Questions to ask them.
What do the Doctors use for connectivity to their handheld devices?  Right, 
wireless.
What is the encryption mechanism on a t-1 or dsl link?  Right, none.
What is the security on the cable network?  Right, none.
Does the facility have a wireless network?  Care to have me break into it 
for you?  (I'm told that WPA has now been cracked too.)

We went around in circles with a local Sheriff's office on this issue.  In 
the end it was decided that the only real way to be hippa compliant was to 
encrypt the data AT THE PC level.  ANYTHING done after that point was all 
but useless.  They confirmed this with the DOJ.  All that's needed is data 
security, not transport security.  If transport security is what's wanted 
then EVERY vlan switch, router etc. in the loop is a possible security hole.

This risk runs end to end, regardless of the transport medium.

Good luck.
Marlon
(509) 982-2181   Equipment sales
(408) 907-6910 (Vonage)Consulting services
42846865 (icq)And I run my own wisp!
64.146.146.12 (net meeting)
www.odessaoffice.com/wireless
www.odessaoffice.com/marlon/cam



- Original Message - 
From: John Scrivner [EMAIL PROTECTED]
To: wireless@wispa.org
Sent: Monday, November 27, 2006 2:16 PM
Subject: [WISPA] Wireless Security biting you in the ass?


 Wireless broadband security issues have now officially led to my business 
 being put into a bad light due to perceived lack of security. I am a 
 member of a regional broadband planning group that is working with health 
 care and other industry sectors to help deliver broadband options to all 
 areas that need it. Rural Health centers and hospitals are all over the 
 region and most need access to broadband which is highly secure. I need to

 know what others have done to bring HIPAA compliance assurance to network 
 administrators and hospital personnel so that your solutions are chosen 
 and used for health care connectivity. Currently my services are not being

 considered do to the perception of a lack of HIPAA security compliance. I 
 need to get on top of this right now and welcome your thoughts and ideas. 
 I would prefer to hear from those of you who have some actual knowledge of

 delivering HIPAA compliant connections or those who provide equipment 
 which has been documented to meet HIPAA compliance.
 Thank you,
 John Scrivner

 -- 
 WISPA Wireless List: wireless@wispa.org

 Subscribe/Unsubscribe:
 http://lists.wispa.org/mailman/listinfo/wireless

 Archives: http://lists.wispa.org/pipermail/wireless/ 

-- 
WISPA Wireless List: wireless@wispa.org

Subscribe/Unsubscribe:
http://lists.wispa.org/mailman/listinfo/wireless

Archives: http://lists.wispa.org/pipermail/wireless/



-- 
WISPA Wireless List: wireless@wispa.org

Subscribe/Unsubscribe:
http://lists.wispa.org/mailman/listinfo/wireless

Archives: http://lists.wispa.org/pipermail/wireless/


Re: [WISPA] Wireless Security biting you in the ass?

2006-11-27 Thread Matt Larsen - Lists
HIPAA is NOT your responsibility.  It is the responsibility of the 
hospital/health care entity to make sure that they are HIPAA compliant 
at the point where they connect to the Internet.  If they are unable to 
make that distinction, then doing business with them is asking for 
trouble because they are just playing the cover your ass game. 

They probably won't like hearing that, and it may not get you the 
business, but HIPAA has absolutely nothing to do with your network.


Matt Larsen
[EMAIL PROTECTED]


John Scrivner wrote:
Wireless broadband security issues have now officially led to my 
business being put into a bad light due to perceived lack of security. 
I am a member of a regional broadband planning group that is working 
with health care and other industry sectors to help deliver broadband 
options to all areas that need it. Rural Health centers and hospitals 
are all over the region and most need access to broadband which is 
highly secure. I need to know what others have done to bring HIPAA 
compliance assurance to network administrators and hospital personnel 
so that your solutions are chosen and used for health care 
connectivity. Currently my services are not being considered do to the 
perception of a lack of HIPAA security compliance. I need to get on 
top of this right now and welcome your thoughts and ideas. I would 
prefer to hear from those of you who have some actual knowledge of 
delivering HIPAA compliant connections or those who provide equipment 
which has been documented to meet HIPAA compliance.

Thank you,
John Scrivner



--
WISPA Wireless List: wireless@wispa.org

Subscribe/Unsubscribe:
http://lists.wispa.org/mailman/listinfo/wireless

Archives: http://lists.wispa.org/pipermail/wireless/


[WISPA] Anyone need a trailer mounted generator?

2006-11-27 Thread Marlon K. Schafer (509) 982-2181

Looks like there are some in Ca.

http://cgi.govliquidation.com/auction/view?auctionId=1051228convertTo=USD

laters,
Marlon
(509) 982-2181   Equipment sales
(408) 907-6910 (Vonage)Consulting services
42846865 (icq)And I run my own wisp!
64.146.146.12 (net meeting)
www.odessaoffice.com/wireless
www.odessaoffice.com/marlon/cam



--
WISPA Wireless List: wireless@wispa.org

Subscribe/Unsubscribe:
http://lists.wispa.org/mailman/listinfo/wireless

Archives: http://lists.wispa.org/pipermail/wireless/


RE: [WISPA] Wireless Security biting you in the ass?

2006-11-27 Thread Patrick Leary
John, this is a common question of a vastly misunderstood issue. And
while I do not purport to be an expert on HIPAA, I have encountered the
question many times. 

There is no such thing as being HIPAA compliant from a hardware
standpoint. Rather, HIPAA addresses how information is handled as it
passes along the information chain which included all types of network
media and hardware as well as physical handling (e.g. paper patient
records being physically transported). In other words, I am not familiar
with the existence of any mechanism that certifies or otherwise
documents hardware as being HIPAA compliant. It is the organizational
process itself which must be certified as being compliant. Here is more
info:

http://www.hipaadvisory.com/action/Compliance/compliant.htm


Patrick Leary
AVP WISP Markets
Alvarion, Inc.
o: 650.314.2628
c: 760.580.0080
Vonage: 650.641.1243
[EMAIL PROTECTED]

-Original Message-
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On
Behalf Of John Scrivner
Sent: Monday, November 27, 2006 2:17 PM
To: wireless@wispa.org
Subject: [WISPA] Wireless Security biting you in the ass?

Wireless broadband security issues have now officially led to my 
business being put into a bad light due to perceived lack of security. I

am a member of a regional broadband planning group that is working with 
health care and other industry sectors to help deliver broadband options

to all areas that need it. Rural Health centers and hospitals are all 
over the region and most need access to broadband which is highly 
secure. I need to know what others have done to bring HIPAA compliance 
assurance to network administrators and hospital personnel so that your 
solutions are chosen and used for health care connectivity. Currently my

services are not being considered do to the perception of a lack of 
HIPAA security compliance. I need to get on top of this right now and 
welcome your thoughts and ideas. I would prefer to hear from those of 
you who have some actual knowledge of delivering HIPAA compliant 
connections or those who provide equipment which has been documented to 
meet HIPAA compliance.
Thank you,
John Scrivner

-- 
WISPA Wireless List: wireless@wispa.org

Subscribe/Unsubscribe:
http://lists.wispa.org/mailman/listinfo/wireless

Archives: http://lists.wispa.org/pipermail/wireless/





This footnote confirms that this email message has been scanned by
PineApp Mail-SeCure for the presence of malicious code, vandals 
computer viruses(190).







 
 


This footnote confirms that this email message has been scanned by
PineApp Mail-SeCure for the presence of malicious code, vandals 
computer viruses(42).











This footnote confirms that this email message has been scanned by
PineApp Mail-SeCure for the presence of malicious code, vandals  computer 
viruses.




--
WISPA Wireless List: wireless@wispa.org

Subscribe/Unsubscribe:
http://lists.wispa.org/mailman/listinfo/wireless

Archives: http://lists.wispa.org/pipermail/wireless/


Re: [WISPA] Wireless Security biting you in the ass?

2006-11-27 Thread Peter R.

Great questions, Marlon!
You are correct that it is application/data encryption needed, not 
transport security.


Every hospital has a HIPAA Officer. Talk to that person. By 2009, they 
all have to have EMR and HIPPA compliance, along with some EDI with 
health insurance payers.


- Peter Radizeski
Consultant to the Internet Stars :)

Marlon K. Schafer (509) 982-2181 wrote:

Officially, hippa compliance is a CLIENT issue.  As long as the data 
is properly encrypted there's no need for the transport to be.


Some will argue this (mainly the telco but sometimes the customer).  
It's still a fact.


Questions to ask them.
What do the Doctors use for connectivity to their handheld devices?  
Right, wireless.

What is the encryption mechanism on a t-1 or dsl link?  Right, none.
What is the security on the cable network?  Right, none.
Does the facility have a wireless network?  Care to have me break into 
it for you?  (I'm told that WPA has now been cracked too.)


We went around in circles with a local Sheriff's office on this 
issue.  In the end it was decided that the only real way to be hippa 
compliant was to encrypt the data AT THE PC level.  ANYTHING done 
after that point was all but useless.  They confirmed this with the 
DOJ.  All that's needed is data security, not transport security.  If 
transport security is what's wanted then EVERY vlan switch, router 
etc. in the loop is a possible security hole. This risk runs end to 
end, regardless of the transport medium.


Good luck.
Marlon


--
WISPA Wireless List: wireless@wispa.org

Subscribe/Unsubscribe:
http://lists.wispa.org/mailman/listinfo/wireless

Archives: http://lists.wispa.org/pipermail/wireless/


Re: [WISPA] Wireless Security biting you in the ass?

2006-11-27 Thread lakeland
Good luck Rick.  Last I looked there was no clear outline 

Bob
Sent from my Verizon Wireless BlackBerry  

-Original Message-
From: Rick Smith [EMAIL PROTECTED]
Date: Mon, 27 Nov 2006 17:23:15 
To:'WISPA General List' wireless@wispa.org
Subject: RE: [WISPA] Wireless Security biting you in the ass?

I've been wonderin about this same thing.  I've always blown it off
and won the argument but

Where's the HIPAA cert stuff to be found ?
Like, exact checklists ?

R 

-Original Message-
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On
Behalf Of John Scrivner
Sent: Monday, November 27, 2006 5:17 PM
To: wireless@wispa.org
Subject: [WISPA] Wireless Security biting you in the ass?

Wireless broadband security issues have now officially led to my business
being put into a bad light due to perceived lack of security. I am a member
of a regional broadband planning group that is working with health care and
other industry sectors to help deliver broadband options to all areas that
need it. Rural Health centers and hospitals are all over the region and most
need access to broadband which is highly secure. I need to know what others
have done to bring HIPAA compliance assurance to network administrators and
hospital personnel so that your solutions are chosen and used for health
care connectivity. Currently my services are not being considered do to the
perception of a lack of HIPAA security compliance. I need to get on top of
this right now and welcome your thoughts and ideas. I would prefer to hear
from those of you who have some actual knowledge of delivering HIPAA
compliant connections or those who provide equipment which has been
documented to meet HIPAA compliance.
Thank you,
John Scrivner

--
WISPA Wireless List: wireless@wispa.org

Subscribe/Unsubscribe:
http://lists.wispa.org/mailman/listinfo/wireless

Archives: http://lists.wispa.org/pipermail/wireless/

-- 
WISPA Wireless List: wireless@wispa.org

Subscribe/Unsubscribe:
http://lists.wispa.org/mailman/listinfo/wireless

Archives: http://lists.wispa.org/pipermail/wireless/

-- 
WISPA Wireless List: wireless@wispa.org

Subscribe/Unsubscribe:
http://lists.wispa.org/mailman/listinfo/wireless

Archives: http://lists.wispa.org/pipermail/wireless/


Re: [WISPA] Wireless Security biting you in the ass?

2006-11-27 Thread lakeland
John

To the best of my knowledge there are no HIPPA compliant solutions that are 
actually approved 

We have installed a ton of links for hospitals and other medical facilities an 
this issur comes up from time to time. We pretty much tell the customer that we 
are just a carrier and we encrypt oir data just like verizon does on a T1. And 
we all know how good that is.   

HIPPA compliance should beUp to the network administrator.  Not the carrier 
IMHO.  

Ask someone how your network is not compliant.  Its like Y2K all over again 

Good luck 

Bob
Sent from my Verizon Wireless BlackBerry  

-Original Message-
From: John Scrivner [EMAIL PROTECTED]
Date: Mon, 27 Nov 2006 16:16:51 
To:wireless@wispa.org
Subject: [WISPA] Wireless Security biting you in the ass?

Wireless broadband security issues have now officially led to my 
business being put into a bad light due to perceived lack of security. I 
am a member of a regional broadband planning group that is working with 
health care and other industry sectors to help deliver broadband options 
to all areas that need it. Rural Health centers and hospitals are all 
over the region and most need access to broadband which is highly 
secure. I need to know what others have done to bring HIPAA compliance 
assurance to network administrators and hospital personnel so that your 
solutions are chosen and used for health care connectivity. Currently my 
services are not being considered do to the perception of a lack of 
HIPAA security compliance. I need to get on top of this right now and 
welcome your thoughts and ideas. I would prefer to hear from those of 
you who have some actual knowledge of delivering HIPAA compliant 
connections or those who provide equipment which has been documented to 
meet HIPAA compliance.
Thank you,
John Scrivner

-- 
WISPA Wireless List: wireless@wispa.org

Subscribe/Unsubscribe:
http://lists.wispa.org/mailman/listinfo/wireless

Archives: http://lists.wispa.org/pipermail/wireless/

-- 
WISPA Wireless List: wireless@wispa.org

Subscribe/Unsubscribe:
http://lists.wispa.org/mailman/listinfo/wireless

Archives: http://lists.wispa.org/pipermail/wireless/


Re: [WISPA] Wireless Security biting you in the ass?

2006-11-27 Thread Tom DeReggi
I think its important to understand where the client's fear comes from.  Its 
thinking that they are opening their network wide up.
HIPPA is making a client process compliant not the hardware itself, as just 
mentioned by someone. But one of the processes is what network policies does 
the hospitol allow that could compromise securty if it was not managed 
properly. They don't want something in palce that could be improperly 
managed.  The intent may not jsut be HIPPA compliance, but their own good 
judgement on how to keep data secure.  Its been written about on every 
corner how consumer wifi devices are hackable and not secure, and they 
remember that regardless if it has anything to do with your network. The key 
is to not have the customer AP/WiFiCPE be the mechanism of implimenting 
security. When it is shown that a third party device or other internal 
processes are responsible for doing the security, it takes away the WIFI as 
even being a variable to consider for breaching security.  They can't 
critisize wifi for security if the securing method is not the wifi device. 
The last thing you want is to have your service be slow to be bought because 
some technical bouard is debating for months and months that security risks 
of your network. Just take it out of the equation, so there is no delay in 
buying your service, and they can figure out how to secure their network as 
a seperate transaction.


Tom DeReggi
RapidDSL  Wireless, Inc
IntAirNet- Fixed Wireless Broadband


- Original Message - 
From: Dennis Burgess - 2K Wireless [EMAIL PROTECTED]

To: 'WISPA General List' wireless@wispa.org
Sent: Monday, November 27, 2006 5:32 PM
Subject: RE: [WISPA] Wireless Security biting you in the ass?



John,

Do you have a listing of HIPPA security needs?


One thing you can do is provide a secure tunnel, IPSEC is best, or a
security on top of security approach.  This tunnel will run from your
customer equipment, his hospital, etc, to your boarder router etc that is
connected via fiber or land line.  At that point it is as secure as you 
can

get it.

So, if you use WEP, Ya security sux, but then put IPSEC inside that WEP
packet, now you are talking.  T1s can be tapped, seen it done.  So with 
the

WEP and IPSEC you are always talking secure.  Add on top of that, the
application, and whatever it uses for security, HTTPS, etc.

It's a custom solution to a simple problem.  The only thing now that they
could complain about is what about someone sitting in the parking lot
listening to packets sent and received.  Can they do that with a T1 etc,
well, ya you can TAP a T1, usually done on the switch side of things?  All
you can do then is maybe offer a dedicated backhaul to them, with a
proportery protocol, something like Nstream would work, so now you have
Nstream, running WEP encrypted packets that has IPSEC packets inside that.
If the break it, they should get the data for the work they had to do. 
Or

put up something like a optical service if you are close!  That would
eliminate that.

Another question I would have to ask is, how secure is cable or DSL? 
Figure

this, DSL lets every customer off of their DSLAM to coomuncate  to each
other, so does cable.  If someone had the right cable modem and off the 
same
segment, sure, they can capture every package that is going across the 
cable

line!

Thoughts.

Dennis Burgess, MCP, CCNA, A+, N+, Mikrotik Certified
[EMAIL PROTECTED]
www.2kwireless.com

2K Wireless provides high-speed internet access, along with network
consulting for WISPs, and business's with a focus on TCP/IP networking,
security, and Mikrotik routers.

-Original Message-
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On
Behalf Of John Scrivner
Sent: Monday, November 27, 2006 4:17 PM
To: wireless@wispa.org
Subject: [WISPA] Wireless Security biting you in the ass?

Wireless broadband security issues have now officially led to my
business being put into a bad light due to perceived lack of security. I
am a member of a regional broadband planning group that is working with
health care and other industry sectors to help deliver broadband options
to all areas that need it. Rural Health centers and hospitals are all
over the region and most need access to broadband which is highly
secure. I need to know what others have done to bring HIPAA compliance
assurance to network administrators and hospital personnel so that your
solutions are chosen and used for health care connectivity. Currently my
services are not being considered do to the perception of a lack of
HIPAA security compliance. I need to get on top of this right now and
welcome your thoughts and ideas. I would prefer to hear from those of
you who have some actual knowledge of delivering HIPAA compliant
connections or those who provide equipment which has been documented to
meet HIPAA compliance.
Thank you,
John Scrivner

--
WISPA Wireless List: wireless@wispa.org

Subscribe/Unsubscribe:

Re: [WISPA] Wireless Security biting you in the ass?

2006-11-27 Thread Butch Evans

On Mon, 27 Nov 2006 [EMAIL PROTECTED] wrote:

HIPPA compliance should beUp to the network administrator.  Not the 
carrier IMHO.


This is not a matter of opinion.  It is factual.

--
Butch Evans
Network Engineering and Security Consulting
573-276-2879
http://www.butchevans.com/
Mikrotik Certified Consultant
(http://www.mikrotik.com/consultants.html)
--
WISPA Wireless List: wireless@wispa.org

Subscribe/Unsubscribe:
http://lists.wispa.org/mailman/listinfo/wireless

Archives: http://lists.wispa.org/pipermail/wireless/


Re: [WISPA] Wireless Security biting you in the ass?

2006-11-27 Thread Mark Nash - Lists
I have a customer who works from home transcribing mammogram notes from
doctors into their system.  Their IT department put a Cisco VPN router at
the client side to connect to their VPN at the imaging center.  We discussed
HIPPA, and they were not worried about my side at all as they were
encrypting the data.  If it is a large enough organization, they will have
IT support that understand HIPPA vs. Telecommuting.

However, IT guys in large organizations tend to be skeptical of WISP service
as they have not seen it much so don't want to vouch for its reliability or
support it.

So you can get the IT guys into the conversation but beware of the
reluctance factor.

Mark Nash
Network Engineer
UnwiredOnline.Net
350 Holly Street
Junction City, OR 97448
http://www.uwol.net
541-998-
541-998-5599 fax

- Original Message - 
From: Tom DeReggi [EMAIL PROTECTED]
To: WISPA General List wireless@wispa.org
Sent: Monday, November 27, 2006 3:23 PM
Subject: Re: [WISPA] Wireless Security biting you in the ass?


 I think its important to understand where the client's fear comes from.
Its
 thinking that they are opening their network wide up.
 HIPPA is making a client process compliant not the hardware itself, as
just
 mentioned by someone. But one of the processes is what network policies
does
 the hospitol allow that could compromise securty if it was not managed
 properly. They don't want something in palce that could be improperly
 managed.  The intent may not jsut be HIPPA compliance, but their own good
 judgement on how to keep data secure.  Its been written about on every
 corner how consumer wifi devices are hackable and not secure, and they
 remember that regardless if it has anything to do with your network. The
key
 is to not have the customer AP/WiFiCPE be the mechanism of implimenting
 security. When it is shown that a third party device or other internal
 processes are responsible for doing the security, it takes away the WIFI
as
 even being a variable to consider for breaching security.  They can't
 critisize wifi for security if the securing method is not the wifi device.
 The last thing you want is to have your service be slow to be bought
because
 some technical bouard is debating for months and months that security
risks
 of your network. Just take it out of the equation, so there is no delay in
 buying your service, and they can figure out how to secure their network
as
 a seperate transaction.

 Tom DeReggi
 RapidDSL  Wireless, Inc
 IntAirNet- Fixed Wireless Broadband


 - Original Message - 
 From: Dennis Burgess - 2K Wireless [EMAIL PROTECTED]
 To: 'WISPA General List' wireless@wispa.org
 Sent: Monday, November 27, 2006 5:32 PM
 Subject: RE: [WISPA] Wireless Security biting you in the ass?


  John,
 
  Do you have a listing of HIPPA security needs?
 
 
  One thing you can do is provide a secure tunnel, IPSEC is best, or a
  security on top of security approach.  This tunnel will run from your
  customer equipment, his hospital, etc, to your boarder router etc that
is
  connected via fiber or land line.  At that point it is as secure as you
  can
  get it.
 
  So, if you use WEP, Ya security sux, but then put IPSEC inside that WEP
  packet, now you are talking.  T1s can be tapped, seen it done.  So with
  the
  WEP and IPSEC you are always talking secure.  Add on top of that, the
  application, and whatever it uses for security, HTTPS, etc.
 
  It's a custom solution to a simple problem.  The only thing now that
they
  could complain about is what about someone sitting in the parking lot
  listening to packets sent and received.  Can they do that with a T1 etc,
  well, ya you can TAP a T1, usually done on the switch side of things?
All
  you can do then is maybe offer a dedicated backhaul to them, with a
  proportery protocol, something like Nstream would work, so now you have
  Nstream, running WEP encrypted packets that has IPSEC packets inside
that.
  If the break it, they should get the data for the work they had to do.
  Or
  put up something like a optical service if you are close!  That would
  eliminate that.
 
  Another question I would have to ask is, how secure is cable or DSL?
  Figure
  this, DSL lets every customer off of their DSLAM to coomuncate  to each
  other, so does cable.  If someone had the right cable modem and off the
  same
  segment, sure, they can capture every package that is going across the
  cable
  line!
 
  Thoughts.
 
  Dennis Burgess, MCP, CCNA, A+, N+, Mikrotik Certified
  [EMAIL PROTECTED]
  www.2kwireless.com
 
  2K Wireless provides high-speed internet access, along with network
  consulting for WISPs, and business's with a focus on TCP/IP networking,
  security, and Mikrotik routers.
 
  -Original Message-
  From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On
  Behalf Of John Scrivner
  Sent: Monday, November 27, 2006 4:17 PM
  To: wireless@wispa.org
  Subject: [WISPA] Wireless Security biting you in the ass?
 
  Wireless broadband 

Re: [WISPA] Wireless Security biting you in the ass?

2006-11-27 Thread George Rogato

I have a few hospital employees working at home across my wireless system.
They vpn into the hospital and we don't do anything special for them.

One reason that they tell the employees to use us is because we service 
them quickly when they have an issue.


I will agree that we've lost work becaue the competition and others tell 
the tale that wireless is not secure and it's hard to defend against 
that when the other guy has already won their trust by trashing us.


Only thing I can counter that with is to tell them that the hospita and 
a few other serious high profile customers use us and the security issue 
is a hype.


One of my subs a few years ago was being told by the network company 
that serviced his network to switch away from us and install a pix 
router because of the lack of security.


So when the sub called, and I tried my best to explain to him it was not 
insecure, I got to the point that I realized I was not getting anywhere 
a thought popped in my mind and I said:
 If your  professional security network people say it's so insecure, 
have them break into your network and prove to you that what they are 
saying is true otherwise they are hyping you into a sale at my expense. 
They are after all network security experts and they ought to know how 
to break in


I still have the sub, but those network security experts don't.

George



John Scrivner wrote:
Wireless broadband security issues have now officially led to my 
business being put into a bad light due to perceived lack of security. I 
am a member of a regional broadband planning group that is working with 
health care and other industry sectors to help deliver broadband options 
to all areas that need it. Rural Health centers and hospitals are all 
over the region and most need access to broadband which is highly 
secure. I need to know what others have done to bring HIPAA compliance 
assurance to network administrators and hospital personnel so that your 
solutions are chosen and used for health care connectivity. Currently my 
services are not being considered do to the perception of a lack of 
HIPAA security compliance. I need to get on top of this right now and 
welcome your thoughts and ideas. I would prefer to hear from those of 
you who have some actual knowledge of delivering HIPAA compliant 
connections or those who provide equipment which has been documented to 
meet HIPAA compliance.

Thank you,
John Scrivner




--
WISPA Wireless List: wireless@wispa.org

Subscribe/Unsubscribe:
http://lists.wispa.org/mailman/listinfo/wireless

Archives: http://lists.wispa.org/pipermail/wireless/


RE: [WISPA] Wireless Security biting you in the ass?

2006-11-27 Thread Jeff Broadwick
Are you suggesting single DES?  I wouldn't recommend that.  Go with 3DES or
AES. 

-Original Message-
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On
Behalf Of Dennis Burgess - 2K Wireless
Sent: Monday, November 27, 2006 5:33 PM
To: 'WISPA General List'
Subject: RE: [WISPA] Wireless Security biting you in the ass?

John,

Do you have a listing of HIPPA security needs?  


One thing you can do is provide a secure tunnel, IPSEC is best, or a
security on top of security approach.  This tunnel will run from your
customer equipment, his hospital, etc, to your boarder router etc that is
connected via fiber or land line.  At that point it is as secure as you can
get it.  

So, if you use WEP, Ya security sux, but then put IPSEC inside that WEP
packet, now you are talking.  T1s can be tapped, seen it done.  So with the
WEP and IPSEC you are always talking secure.  Add on top of that, the
application, and whatever it uses for security, HTTPS, etc.

It's a custom solution to a simple problem.  The only thing now that they
could complain about is what about someone sitting in the parking lot
listening to packets sent and received.  Can they do that with a T1 etc,
well, ya you can TAP a T1, usually done on the switch side of things?  All
you can do then is maybe offer a dedicated backhaul to them, with a
proportery protocol, something like Nstream would work, so now you have
Nstream, running WEP encrypted packets that has IPSEC packets inside that.
If the break it, they should get the data for the work they had to do.   Or
put up something like a optical service if you are close!  That would
eliminate that.  

Another question I would have to ask is, how secure is cable or DSL?  Figure
this, DSL lets every customer off of their DSLAM to coomuncate  to each
other, so does cable.  If someone had the right cable modem and off the same
segment, sure, they can capture every package that is going across the cable
line!

Thoughts.

Dennis Burgess, MCP, CCNA, A+, N+, Mikrotik Certified
[EMAIL PROTECTED] www.2kwireless.com
 
2K Wireless provides high-speed internet access, along with network
consulting for WISPs, and business's with a focus on TCP/IP networking,
security, and Mikrotik routers.

-Original Message-
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On
Behalf Of John Scrivner
Sent: Monday, November 27, 2006 4:17 PM
To: wireless@wispa.org
Subject: [WISPA] Wireless Security biting you in the ass?

Wireless broadband security issues have now officially led to my business
being put into a bad light due to perceived lack of security. I am a member
of a regional broadband planning group that is working with health care and
other industry sectors to help deliver broadband options to all areas that
need it. Rural Health centers and hospitals are all over the region and most
need access to broadband which is highly secure. I need to know what others
have done to bring HIPAA compliance assurance to network administrators and
hospital personnel so that your solutions are chosen and used for health
care connectivity. Currently my services are not being considered do to the
perception of a lack of HIPAA security compliance. I need to get on top of
this right now and welcome your thoughts and ideas. I would prefer to hear
from those of you who have some actual knowledge of delivering HIPAA
compliant connections or those who provide equipment which has been
documented to meet HIPAA compliance.
Thank you,
John Scrivner

--
WISPA Wireless List: wireless@wispa.org

Subscribe/Unsubscribe:
http://lists.wispa.org/mailman/listinfo/wireless

Archives: http://lists.wispa.org/pipermail/wireless/



--
WISPA Wireless List: wireless@wispa.org

Subscribe/Unsubscribe:
http://lists.wispa.org/mailman/listinfo/wireless

Archives: http://lists.wispa.org/pipermail/wireless/


-- 
WISPA Wireless List: wireless@wispa.org

Subscribe/Unsubscribe:
http://lists.wispa.org/mailman/listinfo/wireless

Archives: http://lists.wispa.org/pipermail/wireless/


Re: [WISPA] Wireless Security biting you in the ass?

2006-11-27 Thread Marlon K. Schafer (509) 982-2181
BTW, we're going to try to work out something with the local hospital for 
data storage.  We want to do off site backup for them.  Via a dedicated link 
to a server that never touches the internet!


I'll be working on physical security of the server as well as the transport 
needs.  Issues like noc access and such.


We'll also be working on the frequency of the backups.  ie: does the system 
need to backup the data every time a change is made?  Or only a few times 
per day?  Once per night?


I hope to meet with the hospital administrator here in a couple of weeks 
when we're not both so swamped.

Marlon
(509) 982-2181   Equipment sales
(408) 907-6910 (Vonage)Consulting services
42846865 (icq)And I run my own wisp!
64.146.146.12 (net meeting)
www.odessaoffice.com/wireless
www.odessaoffice.com/marlon/cam



- Original Message - 
From: Peter R. [EMAIL PROTECTED]

To: WISPA General List wireless@wispa.org
Sent: Monday, November 27, 2006 2:44 PM
Subject: Re: [WISPA] Wireless Security biting you in the ass?



Great questions, Marlon!
You are correct that it is application/data encryption needed, not 
transport security.


Every hospital has a HIPAA Officer. Talk to that person. By 2009, they all 
have to have EMR and HIPPA compliance, along with some EDI with health 
insurance payers.


- Peter Radizeski
Consultant to the Internet Stars :)

Marlon K. Schafer (509) 982-2181 wrote:

Officially, hippa compliance is a CLIENT issue.  As long as the data is 
properly encrypted there's no need for the transport to be.


Some will argue this (mainly the telco but sometimes the customer).  It's 
still a fact.


Questions to ask them.
What do the Doctors use for connectivity to their handheld devices? 
Right, wireless.

What is the encryption mechanism on a t-1 or dsl link?  Right, none.
What is the security on the cable network?  Right, none.
Does the facility have a wireless network?  Care to have me break into it 
for you?  (I'm told that WPA has now been cracked too.)


We went around in circles with a local Sheriff's office on this issue. 
In the end it was decided that the only real way to be hippa compliant 
was to encrypt the data AT THE PC level.  ANYTHING done after that point 
was all but useless.  They confirmed this with the DOJ.  All that's 
needed is data security, not transport security.  If transport security 
is what's wanted then EVERY vlan switch, router etc. in the loop is a 
possible security hole. This risk runs end to end, regardless of the 
transport medium.


Good luck.
Marlon


--
WISPA Wireless List: wireless@wispa.org

Subscribe/Unsubscribe:
http://lists.wispa.org/mailman/listinfo/wireless

Archives: http://lists.wispa.org/pipermail/wireless/



--
WISPA Wireless List: wireless@wispa.org

Subscribe/Unsubscribe:
http://lists.wispa.org/mailman/listinfo/wireless

Archives: http://lists.wispa.org/pipermail/wireless/


Re: [WISPA] illegal CPE installs

2006-11-27 Thread Jack Unger

Travis,

What's the illegality?

Are they using 5150 - 5250 (indoor use only)?

Are they exceeding + 30 dBm EIRP on either the AP or the SM?

jack


Travis Johnson wrote:


Hi,

Curious to everyone's thoughts about a regional WISP installing illegal 
CPE units? They are using Last Mile Gear 120degree Canopy 120 degree 
sectors (5.2GHz) and then putting the Canopy 5.2GHz SM in dishes at 
customer locations. I am talking about thousands of CPE installed this 
way and doing more every day. This company covers several western states 
(Idaho, Utah, Nevada, etc.) and also does Dish Network satellite TV 
installs.


Is this OK? What are everyone's thoughts?

Travis
Microserv


--
Jack Unger ([EMAIL PROTECTED]) - President, Ask-Wi.Com, Inc.
Serving the License-Free Wireless Industry Since 1993
Author of the WISP Handbook - Deploying License-Free Wireless WANs
True Vendor-Neutral WISP Consulting-Training-Troubleshooting
Newsletters Downloadable from http://ask-wi.com/newsletters.html
Phone (VoIP Over Broadband Wireless) 818-227-4220  www.ask-wi.com



--
WISPA Wireless List: wireless@wispa.org

Subscribe/Unsubscribe:
http://lists.wispa.org/mailman/listinfo/wireless

Archives: http://lists.wispa.org/pipermail/wireless/


Re: [WISPA] illegal CPE installs

2006-11-27 Thread Tom DeReggi

There are two very distinct issues in thos post...

One is using a third party antenna, with a radio, that it is not certified 
with, and installing an uncertified system.

Two is running a equipment above allowable EIRPs.

As for one, as you have mentioned to me before, installing a StarOS or 
Mikrotik system, equally is an uncertified system. But we often justify it 
by understanding that our systems are within limits, and could be made FCC 
compiant if the expense was taken to go through the process.  And 
technically most of us want that ability, to pick and chose the best 
antennas for our equipment.  And off record, the word is the FCC isn't going 
to go after WISPs using uncertiufied systems as long as they are operating 
within FCC EIRP levels.  So its hard to fight that one. The best that can be 
done is use certified systems yourself when you can and support the vendors 
that sell certified systems.


As for two thats where you must draw the line.  Installing a dish does not 
make the 5.2 gear uncertifiable or above FCC limits, if the 5.2 gear drops 
its power level accordingly.  A 28db 2ft dish can be used if they drop their 
TX to 0 dbm. Or even neg numbers.  Trango allows this, Does Canopy?  Are 
they actually running the CPEs or APs above EIRP limits, without turning 
their power down to the appropriate level? If you can prove that they are 
over powering, then you ahve a case and should report to the FCC. And there 
is one reason for that. If they over power in your area, they will most 
likely force you to over power to stay above them, and the vicious circle 
starts.  If they are in fact broadcasting over the legal limits, the FCC 
will inforce policy, from what I understand.  But you are going to have to 
deliver proof to them that it is happening.  If the FCC has strong reason to 
believe that they are running at legal limits, and the WISP does not comply 
on request, then the FCC can use the non-compliance to FCC certified systems 
to inforce compliance, if its to hard to prove when the customer turns the 
power down or back up again to be out or in compliance.


I'd argue that you almost have an obligation to the industry to report a 
company that is heavilly abusing the rules for 1000s of installed systems. 
It gives WISPs a bad name.  But I think we also need to use our own 
judgement on when a hand needs slapping.  For example, if someone is located 
in the middle of a forrest, and they bump up the EIRP with a high gain YAGI, 
is it really doing any harm, knowing that the trees absorb most of the extra 
power, and has no more impact on the environment than a legal system located 
on the edge of the forest.


So my opinion is, if they are doing harm to the RF environment in the 
communities, due to illegal limits, you should report them. But make sure 
you've done your home work, so you don't make false accusations.


These are all hard questions and the reason is because, no body wants to be 
the bad guy. The FCC isn't going to shut down an WISP that is providing the 
only option for Broadband to it's subscribers in an underserved rural area, 
without good cause.  And turning the power down and narrowing the beam width 
helps prevent interference, not cause it.


Just my 2 cents.

Tom DeReggi
RapidDSL  Wireless, Inc
IntAirNet- Fixed Wireless Broadband


- Original Message - 
From: Travis Johnson [EMAIL PROTECTED]
To: isp-wireless@isp-wireless.com; WISP [EMAIL PROTECTED]; WISPA 
General List wireless@wispa.org

Sent: Monday, November 27, 2006 5:58 PM
Subject: [WISPA] illegal CPE installs



Hi,

Curious to everyone's thoughts about a regional WISP installing illegal 
CPE units? They are using Last Mile Gear 120degree Canopy 120 degree 
sectors (5.2GHz) and then putting the Canopy 5.2GHz SM in dishes at 
customer locations. I am talking about thousands of CPE installed this way 
and doing more every day. This company covers several western states 
(Idaho, Utah, Nevada, etc.) and also does Dish Network satellite TV 
installs.


Is this OK? What are everyone's thoughts?

Travis
Microserv
--
WISPA Wireless List: wireless@wispa.org

Subscribe/Unsubscribe:
http://lists.wispa.org/mailman/listinfo/wireless

Archives: http://lists.wispa.org/pipermail/wireless/ 


--
WISPA Wireless List: wireless@wispa.org

Subscribe/Unsubscribe:
http://lists.wispa.org/mailman/listinfo/wireless

Archives: http://lists.wispa.org/pipermail/wireless/


Re: [WISPA] Wireless Security biting you in the ass?

2006-11-27 Thread John Scrivner
It does not matter if the responsibility is the network admin or not 
when it comes down to purchase time. It comes down to perception. Right 
now perception of the hospital corporate officers is that wireless = not 
secure. I have been told by people who order circuits that they are not 
allowed to buy from me or any wireless operator due to security issues. 
I believe it will require some type of HIPAA seal of approval from 
some source or another before we can start selling to these guys. This 
could be bad for us. ALL of the hospitals are going to buying new 
circuits soon and right now I am out of the running.

Scriv


[EMAIL PROTECTED] wrote:


John

To the best of my knowledge there are no HIPPA compliant solutions that are actually approved 

We have installed a ton of links for hospitals and other medical facilities an this issur comes up from time to time. We pretty much tell the customer that we are just a carrier and we encrypt oir data just like verizon does on a T1. And we all know how good that is.   

HIPPA compliance should beUp to the network administrator.  Not the carrier IMHO.  

Ask someone how your network is not compliant.  Its like Y2K all over again 

Good luck 


Bob
Sent from my Verizon Wireless BlackBerry  


-Original Message-
From: John Scrivner [EMAIL PROTECTED]
Date: Mon, 27 Nov 2006 16:16:51 
To:wireless@wispa.org

Subject: [WISPA] Wireless Security biting you in the ass?

Wireless broadband security issues have now officially led to my 
business being put into a bad light due to perceived lack of security. I 
am a member of a regional broadband planning group that is working with 
health care and other industry sectors to help deliver broadband options 
to all areas that need it. Rural Health centers and hospitals are all 
over the region and most need access to broadband which is highly 
secure. I need to know what others have done to bring HIPAA compliance 
assurance to network administrators and hospital personnel so that your 
solutions are chosen and used for health care connectivity. Currently my 
services are not being considered do to the perception of a lack of 
HIPAA security compliance. I need to get on top of this right now and 
welcome your thoughts and ideas. I would prefer to hear from those of 
you who have some actual knowledge of delivering HIPAA compliant 
connections or those who provide equipment which has been documented to 
meet HIPAA compliance.

Thank you,
John Scrivner

 




No virus found in this incoming message.
Checked by AVG Free Edition.
Version: 7.1.409 / Virus Database: 268.14.17/553 - Release Date: 11/27/2006

 


--
WISPA Wireless List: wireless@wispa.org

Subscribe/Unsubscribe:
http://lists.wispa.org/mailman/listinfo/wireless

Archives: http://lists.wispa.org/pipermail/wireless/


Re: [WISPA] Wireless Security biting you in the ass?

2006-11-27 Thread John Scrivner



On Mon, 27 Nov 2006 [EMAIL PROTECTED] wrote:

HIPPA compliance should beUp to the network administrator.  Not the 
carrier IMHO.



This is not a matter of opinion.  It is factual.


I never doubted this. I just need to find someway to make the corporate 
people believe they can use my wireless transport to deliver an end to 
end solution that will be HIPAA compliant with my service located in the 
center. Passing the buck is not the problem. The buck will never get in 
my pocket if I cannot sell my service as a way to connect without 
breaking HIPAA compliance perception issues. This is a perception 
problem that I do not have enough information or expertise to fix.

Scriv



--
WISPA Wireless List: wireless@wispa.org

Subscribe/Unsubscribe:
http://lists.wispa.org/mailman/listinfo/wireless

Archives: http://lists.wispa.org/pipermail/wireless/


Re: [WISPA] Wireless Security biting you in the ass?

2006-11-27 Thread Butch Evans

On Mon, 27 Nov 2006, John Scrivner wrote:

I never doubted this. I just need to find someway to make the 
corporate people believe they can use my wireless transport to 
deliver an end to end solution that will be HIPAA compliant with my 
service located in the center. Passing the buck is not the problem.


Which is the reason I mentioned in my other post about speaking to 
an attorney about drafting a paper in plain English to help them 
understand (and lend credibility to what you tell them).  Someone 
else mentioned partnering with a HIPAA compliance consultant, which 
is another (perhaps better) idea.


--
Butch Evans
Network Engineering and Security Consulting
573-276-2879
http://www.butchevans.com/
Mikrotik Certified Consultant
(http://www.mikrotik.com/consultants.html)
--
WISPA Wireless List: wireless@wispa.org

Subscribe/Unsubscribe:
http://lists.wispa.org/mailman/listinfo/wireless

Archives: http://lists.wispa.org/pipermail/wireless/


Re: [WISPA] Wireless Security biting you in the ass?

2006-11-27 Thread Butch Evans

On Mon, 27 Nov 2006, John Scrivner wrote:

Wireless broadband security issues have now officially led to my 
business being put into a bad light due to perceived lack of 
security. I am a member of a regional broadband planning group that 
is working with health care and other industry sectors to help 
deliver broadband options to all areas that need it. Rural Health 
centers and hospitals are all over the region and most need access 
to broadband which is highly secure. I need to know what others 
have done to bring HIPAA compliance assurance to network 
administrators and hospital personnel so that your solutions are 
chosen and used for health care connectivity. Currently my services 
are not being considered do to the perception of a lack of HIPAA 
security compliance. I need to get on top of this right now and 
welcome your thoughts and ideas. I would prefer to hear from those 
of you who have some actual knowledge of delivering HIPAA compliant 
connections or those who provide equipment which has been 
documented to meet HIPAA compliance.


Like many others, I've had this argument with various people.  In 
the end, the reality is that HIPAA has nothing do to with the 
transport medium.  Data along a T1, wireless, cable network or DSL 
network is unencrypted.  It's as simple as that.  If it makes your 
customer feel better, then you can easily create a VPN tunnel (with 
whatever strength encryption they want) between their client device 
all to way to your border (where it will hit a T1, fiber or 
whatever), at which point it will (again) be unencrypted.


HIPAA compliance is NOT (according to the attorney I spoke to) the 
responsibility of the transport provider.  The perception (which you 
correctly identified) is that wireless is insecure.  This is easily 
fixed by creating end to end encryption (at least as far as you have 
control over the network).  Marlon pointed out the fact that MOST 
end users (hospitals and such) have networks INSIDE that have flawed 
security models.


The biggest hurdle with this perception is that these places ASSUME 
it is your responsibility.  This is a tough issue to overcome 
because most of them do not understand what they want or need.  You 
will have to become an expert in the rules in order to show them the 
truth.


SO...what I would recommend (and have done) is offer them some 
options.


1. I would offer an encrypted (IPSEC) tunnel service for a premium 
price.  Be certain to point out the weaknesses that Marlon mentioned 
regarding wired services.  I'd google up some information on hacking 
these wired services, as there is a TON of information out there.


2. Get familiar with a good security company and offer good firewall 
options (this would be at the client end) that includes IDS with 
notifications.  I'd steer WAY clear of SonicWall and those types of 
devices, as these are NOT very flexible.


3. Have an attorney write you up some information on YOUR 
responsibility as well as THEIR responsibility as it relates to an 
internet connection.  Make sure that he includes language that makes 
it clear that these responsibilities are the same whether the 
connection is wired or wireless (or notes any differences).


--
Butch Evans
Network Engineering and Security Consulting
573-276-2879
http://www.butchevans.com/
Mikrotik Certified Consultant
(http://www.mikrotik.com/consultants.html)
--
WISPA Wireless List: wireless@wispa.org

Subscribe/Unsubscribe:
http://lists.wispa.org/mailman/listinfo/wireless

Archives: http://lists.wispa.org/pipermail/wireless/


[WISPA] Bet they didn't plan this.. LOL

2006-11-27 Thread Butch Evans

Do a google search for wwwlook at the first link...
;-)

--
Butch Evans
Network Engineering and Security Consulting
573-276-2879
http://www.butchevans.com/
Mikrotik Certified Consultant
(http://www.mikrotik.com/consultants.html)
--
WISPA Wireless List: wireless@wispa.org

Subscribe/Unsubscribe:
http://lists.wispa.org/mailman/listinfo/wireless

Archives: http://lists.wispa.org/pipermail/wireless/


Re: [WISPA] Bet they didn't plan this.. LOL

2006-11-27 Thread George Rogato

Yahoo?

Butch Evans wrote:

Do a google search for wwwlook at the first link...
;-)



--
George Rogato

Welcome to WISPA

www.wispa.org

http://signup.wispa.org/
--
WISPA Wireless List: wireless@wispa.org

Subscribe/Unsubscribe:
http://lists.wispa.org/mailman/listinfo/wireless

Archives: http://lists.wispa.org/pipermail/wireless/


Re: [WISPA] Bet they didn't plan this.. LOL

2006-11-27 Thread George Rogato

You'd think google would be first

Butch Evans wrote:

Do a google search for wwwlook at the first link...
;-)



--
George Rogato

Welcome to WISPA

www.wispa.org

http://signup.wispa.org/
--
WISPA Wireless List: wireless@wispa.org

Subscribe/Unsubscribe:
http://lists.wispa.org/mailman/listinfo/wireless

Archives: http://lists.wispa.org/pipermail/wireless/


RE: [WISPA] Bet they didn't plan this.. LOL

2006-11-27 Thread Gino A. Villarini
W3c ? 2nd came yahoo ...

Gino A. Villarini
[EMAIL PROTECTED]
Aeronet Wireless Broadband Corp.
tel  787.273.4143   fax   787.273.4145

-Original Message-
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On
Behalf Of Butch Evans
Sent: Monday, November 27, 2006 10:06 PM
To: Wispa List
Subject: [WISPA] Bet they didn't plan this.. LOL

Do a google search for wwwlook at the first link...
;-)

-- 
Butch Evans
Network Engineering and Security Consulting
573-276-2879
http://www.butchevans.com/
Mikrotik Certified Consultant
(http://www.mikrotik.com/consultants.html)
-- 
WISPA Wireless List: wireless@wispa.org

Subscribe/Unsubscribe:
http://lists.wispa.org/mailman/listinfo/wireless

Archives: http://lists.wispa.org/pipermail/wireless/

-- 
WISPA Wireless List: wireless@wispa.org

Subscribe/Unsubscribe:
http://lists.wispa.org/mailman/listinfo/wireless

Archives: http://lists.wispa.org/pipermail/wireless/


Re: [WISPA] Wireless Security biting you in the ass?

2006-11-27 Thread Peter R.
It is HIPAA - The Health Insurance Portability and Accountability Act. 
It covers way more than just encrypting data. Like Pat said, it is a 
process. Even paper records have to have a chain of command and 
security. So when you see the files in the reception area at your 
doctor's office, unless they are tagged with signatures of who has them, 
they are not in compliance. The fine for violation is up to $250,000 and 
jail time for the doctor.


And, btw, the line in the sand constantly shifts. It was supposed to be 
completed by 1999, then 2001, then 2003, now it looks like 2009. (It's 
the Insurance companies that are pushing for EMD and EDI transactions).  
Even dentists have to comply.


One of the purposes of the Health Insurance Portability and 
Accountability Act (HIPAA), which was passed in 1996, is to encourage 
the efficient use of electronic data interchange in the health care 
system. The HIPAA subtitle standardizes specific electronic transactions 
used in the health care arena by requiring that certain formats and 
specified code sets be used. 

There are specialists that you can partner with. (I partner with 
Threadfin Consulting).


Most doctors work with a hospital. The Hosp Admin has to understand 
HIPAA for federal dollars. Also, they have to assign a HIPAA Compliance 
Officer - under the CYA policy so you have someone to blame, hire and 
put in jail, like CFO's under the SOX. The Hospital is your best bet. 
Plus check with the local AMA and ADA for meetings. They will be talking 
HIPAA all next year. It is really about getting rid of FUD and putting a 
process in place.


You can make them warm and fuzzy selling IPSec wrapped in WEP wrapped in 
Nstream with Firewalls on both ends, but the Act is ultimately about 
safe, secure use of medical information. So data security, data storage, 
back-up and retrieval. Physical storage as well as electronic.


That's my 2 cents.

Peter @ RAD-INFO, Inc.



Tom DeReggi wrote:


John,

There is no HIPPA certification for a broadband connection.  HIPPA is 
an overall concept to have a medical intity secure it's customer 
records. 


As mentioned at this year's ISPCON CEO Session, the HIPPA compliance 
manual is about 3 inches thick, and thats hard to sum up in a few 
words. And most of it won't apply to making your service HIPPA compliant.


My advice is to partner with a consulting company that offers HIPPA 
compliant consulting services to hospitols and doctors, and make sure 
they know who you are, and recommend your service.



--
WISPA Wireless List: wireless@wispa.org

Subscribe/Unsubscribe:
http://lists.wispa.org/mailman/listinfo/wireless

Archives: http://lists.wispa.org/pipermail/wireless/


Re: [WISPA] Bet they didn't plan this.. LOL

2006-11-27 Thread George Rogato

Hmm, my page came with yahoo 1st and w3c 2nd. here's what I got:

Web 	Results 1 - 100 of about 4,030,000,000 English pages for www 
[definition]. (0.24 seconds)


Yahoo!
Welcome to Yahoo!, the world's most visited home page. Quickly find what 
you're searching for, get in touch with friends and stay in-the-know 
with the ...

www.yahoo.com/ - 71k - Nov 26, 2006 - Cached - Similar pages
Mail - The best web-based email! - mail.yahoo.com/
Finance - finance.yahoo.com/
Radio - music.yahoo.com/
Movies - movies.yahoo.com/
More results from yahoo.com ยป

World Wide Web Consortium
The World Wide Web Consortium was created to lead the World Wide Web to 
its full potential by developing common protocols that promote its 
evolution and ...

www.w3.org/ - 37k - Nov 26, 2006 - Cached - Similar pages

CNN.com - Breaking News, U.S., World, Weather, Entertainment ...
Includes US and international stories and analysis, weather, video 
clips, and program schedule.

www.cnn.com/ - 101k - Nov 26, 2006 - Cached - Similar pages

AltaVista
AltaVista provides the most comprehensive search experience on the Web!
www.altavista.com/ - 10k - Cached - Similar pages

Sign In
Free web-based e-mail. 2MB e-mail storage, signatures, stationery, HTML 
compatible.

www.hotmail.com/ - 11k - Nov 26, 2006 - Cached - Similar pages

Microsoft Corporation
The entry page to Microsoft's Web site. Find software, solutions, 
answers, support, and Microsoft news.

www.microsoft.com/ - 32k - Nov 26, 2006 - Cached - Similar pages

Internet Explorer 7: Home
Download Internet Explorer 7, the latest version of Microsoft's new, 
improved, and free web browser.

www.microsoft.com/windows/ie/ - 11k - Cached - Similar pages

AOL.com - Welcome to AOL
America On Line's portal, offering search, shopping, channels, chat and 
mail.

www.aol.com/ - 41k - Nov 26, 2006 - Cached - Similar pages
MySpace
Meet people from your area in the country and keep in touch. Includes 
blog, forums, email, groups, games and events.

www.myspace.com/ - 32k - Nov 26, 2006 - Cached - Similar pages

MSN.com
MSN's all-in-one Internet portal, the home of Hotmail, MSN Messenger, 
MSNBC News, Fox Sports, Slate Magazine and more information you care about.

www.msn.com/ - 38k - Nov 26, 2006 - Cached - Similar pages

SecurityFocus
SecurityFocus is the most comprehensive and trusted source of security 
information on the Internet. SecurityFocus is a vendor-neutral site that 
provides ...

www.securityfocus.com/ - 20k - Nov 26, 2006 - Cached - Similar pages

Hotel, resort and vacation information from Marriott.com
Hotel and resort information, make reservations and book events, or find 
special offers at Marriott.com.

marriott.com/ - 46k - Cached - Similar pages

My Excite
Excite is the leading personalization Web portal, featuring world-class 
search, content and functionality. From financial portfolios to sports 
scores, ...

www.excite.com/ - 60k - Cached - Similar pages

UPS Global Home
Company news, tracking, software, employment information, and FAQ.
www.ups.com/ - 19k - Cached - Similar pages

SAMSUNG's Digital World
Manufactures TVs, digital cameras, DVDs, VCRs and audio systems.
www.samsung.com/ - 23k - Cached - Similar pages

National Geographic - photos, videos, daily news stories, maps ...
Explore National Geographic Online. A world leader in geography, 
cartography and exploration.

www.nationalgeographic.com/ - 52k - Nov 26, 2006 - Cached - Similar pages

The New York Times - Breaking News, World News  Multimedia
Online edition of the newspaper's recent content with searchable 
archives for a fee. [Registration required]

www.nytimes.com/ - Similar pages

Lycos
North American portal with email, YellowPages, heavily integrated search 
engine, personal settings and weather.

www.lycos.com/ - 50k - Cached - Similar pages

Gino A. Villarini wrote:

W3c ? 2nd came yahoo ...

Gino A. Villarini
[EMAIL PROTECTED]
Aeronet Wireless Broadband Corp.
tel  787.273.4143   fax   787.273.4145

-Original Message-
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On
Behalf Of Butch Evans
Sent: Monday, November 27, 2006 10:06 PM
To: Wispa List
Subject: [WISPA] Bet they didn't plan this.. LOL

Do a google search for wwwlook at the first link...
;-)



--
George Rogato

Welcome to WISPA

www.wispa.org

http://signup.wispa.org/
--
WISPA Wireless List: wireless@wispa.org

Subscribe/Unsubscribe:
http://lists.wispa.org/mailman/listinfo/wireless

Archives: http://lists.wispa.org/pipermail/wireless/


Re: [WISPA] Wireless Security biting you in the ass?

2006-11-27 Thread cw
You're right. Perception is everything. So I picked up two things from this 
thread. One, why is the onus on me to prove my network is secure? Break into 
it or you're just passing on hot air from uninformed or biased sources. Two, 
I can offer transport on a private network that doesn't touch the net. How 
many layers of security are the other vendors offering? I've got two; 
encryption and private network. - cw


John Scrivner wrote:
It does not matter if the responsibility is the network admin or not 
when it comes down to purchase time. It comes down to perception. Right 
now perception of the hospital corporate officers is that wireless = not 
secure. I have been told by people who order circuits that they are not 
allowed to buy from me or any wireless operator due to security issues. 
I believe it will require some type of HIPAA seal of approval from 
some source or another before we can start selling to these guys. This 
could be bad for us. ALL of the hospitals are going to buying new 
circuits soon and right now I am out of the running.

Scriv

--
WISPA Wireless List: wireless@wispa.org

Subscribe/Unsubscribe:
http://lists.wispa.org/mailman/listinfo/wireless

Archives: http://lists.wispa.org/pipermail/wireless/


RE: [WISPA] Bet they didn't plan this.. LOL

2006-11-27 Thread Butch Evans

On Mon, 27 Nov 2006, Gino A. Villarini wrote:


W3c ? 2nd came yahoo ...


When I accidentally did that search, Yahoo was the first.

--
Butch Evans
Network Engineering and Security Consulting
573-276-2879
http://www.butchevans.com/
Mikrotik Certified Consultant
(http://www.mikrotik.com/consultants.html)
--
WISPA Wireless List: wireless@wispa.org

Subscribe/Unsubscribe:
http://lists.wispa.org/mailman/listinfo/wireless

Archives: http://lists.wispa.org/pipermail/wireless/


Re: [WISPA] illegal CPE installs

2006-11-27 Thread Jon Langeler
IMO it comes down to if/how they are affecting you and what you want 
them to do about it? You could persuade or force them to move everything 
to another freq. which may/may not end up being in your favor. If your 
trying to get them to give-up and shut the doors...I can't forsee that 
pursuit being successfull or leading to anything 'good'.


Jon Langeler
Michwave Tech.

Travis Johnson wrote:


Hi,

Curious to everyone's thoughts about a regional WISP installing 
illegal CPE units? They are using Last Mile Gear 120degree Canopy 120 
degree sectors (5.2GHz) and then putting the Canopy 5.2GHz SM in 
dishes at customer locations. I am talking about thousands of CPE 
installed this way and doing more every day. This company covers 
several western states (Idaho, Utah, Nevada, etc.) and also does Dish 
Network satellite TV installs.


Is this OK? What are everyone's thoughts?

Travis
Microserv


--
WISPA Wireless List: wireless@wispa.org

Subscribe/Unsubscribe:
http://lists.wispa.org/mailman/listinfo/wireless

Archives: http://lists.wispa.org/pipermail/wireless/


Re: [WISPA] Bet they didn't plan this.. LOL

2006-11-27 Thread Tom DeReggi
Funny. But then again maybe the perception was, if they were already using 
google, why would they need to find it?


Whats interesting is that if you do a Yahoo search for www Google still 
doesn;t come up :-)


Tom DeReggi
RapidDSL  Wireless, Inc
IntAirNet- Fixed Wireless Broadband


- Original Message - 
From: George Rogato [EMAIL PROTECTED]

To: WISPA General List wireless@wispa.org
Sent: Monday, November 27, 2006 9:14 PM
Subject: Re: [WISPA] Bet they didn't plan this.. LOL



You'd think google would be first

Butch Evans wrote:

Do a google search for wwwlook at the first link...
;-)



--
George Rogato

Welcome to WISPA

www.wispa.org

http://signup.wispa.org/
--
WISPA Wireless List: wireless@wispa.org

Subscribe/Unsubscribe:
http://lists.wispa.org/mailman/listinfo/wireless

Archives: http://lists.wispa.org/pipermail/wireless/ 


--
WISPA Wireless List: wireless@wispa.org

Subscribe/Unsubscribe:
http://lists.wispa.org/mailman/listinfo/wireless

Archives: http://lists.wispa.org/pipermail/wireless/


Re: [WISPA] illegal CPE installs

2006-11-27 Thread Tom DeReggi
Of course they aren't going to vounteer to shut down. But the FCC will 
inforce the rules, and shut them down, if they are illegally operating, and 
causing harm.
They just have better things to do than go on wild goose chases, so you have 
to deliver proof.  I don;t know about you, but if the FCC enforcement 
burough called me and I was illegal, I'd get legal quick.  NOt that I'm a 
tattle tail, or try and be the police. But ifthey are effecting the quality 
of my network because they are illegal, they need to be set straight.


Tom DeReggi
RapidDSL  Wireless, Inc
IntAirNet- Fixed Wireless Broadband


- Original Message - 
From: Jon Langeler [EMAIL PROTECTED]

To: WISPA General List wireless@wispa.org
Sent: Monday, November 27, 2006 9:39 PM
Subject: Re: [WISPA] illegal CPE installs


IMO it comes down to if/how they are affecting you and what you want them 
to do about it? You could persuade or force them to move everything to 
another freq. which may/may not end up being in your favor. If your trying 
to get them to give-up and shut the doors...I can't forsee that pursuit 
being successfull or leading to anything 'good'.


Jon Langeler
Michwave Tech.

Travis Johnson wrote:


Hi,

Curious to everyone's thoughts about a regional WISP installing illegal 
CPE units? They are using Last Mile Gear 120degree Canopy 120 degree 
sectors (5.2GHz) and then putting the Canopy 5.2GHz SM in dishes at 
customer locations. I am talking about thousands of CPE installed this 
way and doing more every day. This company covers several western states 
(Idaho, Utah, Nevada, etc.) and also does Dish Network satellite TV 
installs.


Is this OK? What are everyone's thoughts?

Travis
Microserv


--
WISPA Wireless List: wireless@wispa.org

Subscribe/Unsubscribe:
http://lists.wispa.org/mailman/listinfo/wireless

Archives: http://lists.wispa.org/pipermail/wireless/ 


--
WISPA Wireless List: wireless@wispa.org

Subscribe/Unsubscribe:
http://lists.wispa.org/mailman/listinfo/wireless

Archives: http://lists.wispa.org/pipermail/wireless/


Re: [WISPA] Wireless Security biting you in the ass?

2006-11-27 Thread Tom DeReggi

Private network


Great point. Its one of our biggest selling points for multi-location 
businesses. It like having their own private network engineered for them.



Tom DeReggi
RapidDSL  Wireless, Inc
IntAirNet- Fixed Wireless Broadband


- Original Message - 
From: cw [EMAIL PROTECTED]

To: WISPA General List wireless@wispa.org
Sent: Monday, November 27, 2006 8:34 PM
Subject: Re: [WISPA] Wireless Security biting you in the ass?


You're right. Perception is everything. So I picked up two things from 
this thread. One, why is the onus on me to prove my network is secure? 
Break into it or you're just passing on hot air from uninformed or biased 
sources. Two, I can offer transport on a private network that doesn't 
touch the net. How many layers of security are the other vendors offering? 
I've got two; encryption and private network. - cw


John Scrivner wrote:
It does not matter if the responsibility is the network admin or not when 
it comes down to purchase time. It comes down to perception. Right now 
perception of the hospital corporate officers is that wireless = not 
secure. I have been told by people who order circuits that they are not 
allowed to buy from me or any wireless operator due to security issues. I 
believe it will require some type of HIPAA seal of approval from some 
source or another before we can start selling to these guys. This could 
be bad for us. ALL of the hospitals are going to buying new circuits soon 
and right now I am out of the running.

Scriv

--
WISPA Wireless List: wireless@wispa.org

Subscribe/Unsubscribe:
http://lists.wispa.org/mailman/listinfo/wireless

Archives: http://lists.wispa.org/pipermail/wireless/ 


--
WISPA Wireless List: wireless@wispa.org

Subscribe/Unsubscribe:
http://lists.wispa.org/mailman/listinfo/wireless

Archives: http://lists.wispa.org/pipermail/wireless/


Re: [WISPA] Bet they didn't plan this.. LOL

2006-11-27 Thread David E. Smith

George Rogato wrote:

Hmm, my page came with yahoo 1st and w3c 2nd. here's what I got:


(yahoo being first)

Google tries to provide results that will be relevant to their users, 
and Yahoo! is one of the biggest and most popular sites on the Web. 
Honestly, it just looks like Google is doing its job well. :)


David Smith
MVN.net
--
WISPA Wireless List: wireless@wispa.org

Subscribe/Unsubscribe:
http://lists.wispa.org/mailman/listinfo/wireless

Archives: http://lists.wispa.org/pipermail/wireless/


Re: [WISPA] ATT launches WiMAX at NV Brothels

2006-11-27 Thread Rick Kunze
I drove through Pahrump the day before yesterday on my way from Lake 
Havasu to Death Valley for the last night of my vacation.  Don't 
worry, we're safe.


LOL

;)

At 07:27 PM 11/20/2006, you wrote:

http://andyabramson.blogs.com/voipwatch/2006/11/att_hooking_wim.html

http://telephonyonline.com/home/news/att_mobile_wimax_111606/



Regards,

Peter Radizeski
RAD-INFO, Inc. - NSP Strategist
We Help ISPs Connect  Communicate
813.963.5884 http://www.marketingIDEAguy.com


--
WISPA Wireless List: wireless@wispa.org

Subscribe/Unsubscribe:
http://lists.wispa.org/mailman/listinfo/wireless

Archives: http://lists.wispa.org/pipermail/wireless/



--
WISPA Wireless List: wireless@wispa.org

Subscribe/Unsubscribe:
http://lists.wispa.org/mailman/listinfo/wireless

Archives: http://lists.wispa.org/pipermail/wireless/


Re: [WISPA] External battery on UPS

2006-11-27 Thread Mario Pommier

We've done it two ways:
1.  Electric  - Power converter/charger -12V Batteries - DC regulator 
- DC radios: no AC power adapters
2.  Electric - Power converter/charger -12V Batteries - DC regulator 
- DC-to-AC converter - AC power adapters


   so we use the DC setup to isolate AC lightning danger.

Mario


Rick Smith wrote:


stupid question.

Normally, power supplies convert from AC to DC.

If you wire DC into an outlet, and plug an AC power supply into it, will it
just cut down the DC to whatever that P/S is supposed to provide to the POE
unit, and pass the rest ?

i.e. Solar 48V - 24V Batteries - 24VDC - Outlets w/normal AC P/Ss
plugged into them outputting 5vdc to an AP or the like - will it work ?  I
imagine it will, albeit terribly inefficient...

-Original Message-
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On
Behalf Of Paul Hendry
Sent: Saturday, November 25, 2006 7:32 AM
To: 'WISPA General List'
Subject: RE: [WISPA] External battery on UPS

Looking for the most efficient use of the battery power and the kit to
achieve it. Old APC's are easy enough to track down on ebay but normally
only have standard AC outputs so I'm guessing you would connect both an APC
and Ethernet direct to the batteries?

-Original Message-
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On
Behalf Of Mario Pommier
Sent: 24 November 2006 19:04
To: WISPA General List
Subject: Re: [WISPA] External battery on UPS

Yes, Paul.
What are you looking for?

Mario

Paul Hendry wrote:

 

Just out of interest, does anyone run batteries (via fuses) directly 
into
cat5 instead of converting back to AC just to run standard 48v PoE up 
the tower?


-Original Message-
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On 
Behalf Of Ron Wallace

Sent: 17 November 2006 21:19
To: WISPA General List
Subject: Re: [WISPA] External battery on UPS

Thanks Brian



   


-Original Message-
From: Brian Rohrbacher [mailto:[EMAIL PROTECTED]
Sent: Wednesday, November 15, 2006 09:41 PM
To: 'WISPA General List'
Subject: Re: [WISPA] External battery on UPS

I'm pasting Gino's link to the right thread.
Then I can search me email in a year and find the correct thread

Connectors:

http://www.partsexpress.com/pe/showdetl.cfm?Partnumber=263-110

Batteries:

http://www.donrowe.com/batteries/8a31dt.html



Brian Rohrbacher wrote:

  

 


Can we get some links to these batteries that work well?
Gino,
Got a link to the DC block connectors you were talking about?

Brian


Travis Johnson wrote:



   


Hi,

We run two 4 gauge power wires out the front of the case, connect 
the positive to a 60A fuse, and then to the batteries.


We are using AGM type (same thing used in UPS systems) big batteries 
(a little bigger than a car battery, but each battery is 110 pounds).

We wire them in series (to get 24VDC).

This setup has only been installed for 12-18 months at various 
locations, so I don't have an estimate on battery life.


Travis
Microserv

Brian Rohrbacher wrote:

  

 


You got any pics of this or similar Travisanyone?

Travis,
What APC do you use and what batteries are added? What do you draw 
and what is th run time? Do you know how many times the one with 
the most cycles has been drawn down? How long do the batteries last?


Brian

Travis Johnson wrote:



   

You can't use just 1 battery. The APC units want to see 24vdc, so 
you need two batteries running in series.


It works perfectly, as I have 20+ remote locations running off two 
gel type batteries. Make sure you install some type of a fuse on 
the positive side of the connection.


Travis
Microserv

Mark Nash - Lists wrote:

  

 

I believe I remember some discussion on this list on connecting 
an external battery to an APC UPS. I'm in the middle of doing it 
right now and am having problems. The UPS just beep continuously 
with the 'bad battery' light on. I'm using a Lifeline deep cycle 
battery. Any ideas?


Mark Nash
Network Engineer
UnwiredOnline.Net
350 Holly Street
Junction City, OR 97448
http://www.uwol.net
541-998-
541-998-5599 fax




   


--
WISPA Wireless List: wireless@wispa.org

Subscribe/Unsubscribe:
http://lists.wispa.org/mailman/listinfo/wireless

Archives: http://lists.wispa.org/pipermail/wireless/

  

 




   


--
WISPA Wireless List: wireless@wispa.org

Subscribe/Unsubscribe:
http://lists.wispa.org/mailman/listinfo/wireless

Archives: http://lists.wispa.org/pipermail/wireless/

--
No virus found in this incoming message.
Checked by AVG Free Edition.
Version: 7.1.409 / Virus Database: 268.14.14/548 - Release Date: 23/11/2006


 


--
WISPA Wireless List: wireless@wispa.org

Subscribe/Unsubscribe:
http://lists.wispa.org/mailman/listinfo/wireless

Archives: http://lists.wispa.org/pipermail/wireless/


Re: [WISPA] Bet they didn't plan this.. LOL

2006-11-27 Thread Pete Davis
What I have seen is that if you ping google.com, your results will vary 
based on your DNS server. The results (especially the order) seem to 
vary slightly between


72.14.203.104 (www.google.com) [returns yahoo.com]
64.233.167.99 (www.google.com) [www returns w3.org] and
72.14.203.99 (www.google.com) and whatever YOUR DNS server returns.
Also the indexing synronization between the multiple googleservers would 
make sense that different results at any given time.


pd


Butch Evans wrote:

On Mon, 27 Nov 2006, Gino A. Villarini wrote:


W3c ? 2nd came yahoo ...


When I accidentally did that search, Yahoo was the first.



--
WISPA Wireless List: wireless@wispa.org

Subscribe/Unsubscribe:
http://lists.wispa.org/mailman/listinfo/wireless

Archives: http://lists.wispa.org/pipermail/wireless/


Re: [WISPA] Wireless Security biting you in the ass?

2006-11-27 Thread Peter R.

Back to your problem:  Wireless = Unsecure.

You have a Marketing problem.
The onus is on you to get him to tell you why your network is unsecure.
Objections are made to be hurdled, after all.

Explaining that cable and DSL are LAN based topologies is not going to 
help you.


You need describe how your Alvarian Fixed Wireless network is capable of 
providing fiber like capabilities in the private transport arena. (Maybe 
get some help from your Alvarian Support Engineer).


I need to think about it some more before I can give you a better answer.

Regards,

Peter
RAD-INFO, Inc.


--
WISPA Wireless List: wireless@wispa.org

Subscribe/Unsubscribe:
http://lists.wispa.org/mailman/listinfo/wireless

Archives: http://lists.wispa.org/pipermail/wireless/


Re: [WISPA] illegal CPE installs

2006-11-27 Thread Marlon K. Schafer

Me?  I'd make a few calls about it.

First to them.  It's amazing how often management doesn't know the rules.

If that won't fix it, I'd call Motorola.

If that doesn't work, I'd call the FCC.

The last thing this industry needs is people screwing with the one thing 
that the FCC has been a stickler on.  EIRP is a sacred stone.  Mess with it 
and someone at the commission will be getting pissed.


Make DAMN sure you know what they are doing and with what frequencies first 
though.  Nothing worse than making that kind of false accusation.


And sometimes having someone else call the company and ask around is a good 
idea.  If you can get me a name and number I'd be happy to make a call for 
you.  As would, I'm sure, anyone on the wispa board.


Good luck.
marlon

- Original Message - 
From: Jack Unger [EMAIL PROTECTED]

To: WISPA General List wireless@wispa.org
Sent: Monday, November 27, 2006 4:48 PM
Subject: Re: [WISPA] illegal CPE installs



Travis,

What's the illegality?

Are they using 5150 - 5250 (indoor use only)?

Are they exceeding + 30 dBm EIRP on either the AP or the SM?

jack


Travis Johnson wrote:


Hi,

Curious to everyone's thoughts about a regional WISP installing illegal 
CPE units? They are using Last Mile Gear 120degree Canopy 120 degree 
sectors (5.2GHz) and then putting the Canopy 5.2GHz SM in dishes at 
customer locations. I am talking about thousands of CPE installed this 
way and doing more every day. This company covers several western states 
(Idaho, Utah, Nevada, etc.) and also does Dish Network satellite TV 
installs.


Is this OK? What are everyone's thoughts?

Travis
Microserv


--
Jack Unger ([EMAIL PROTECTED]) - President, Ask-Wi.Com, Inc.
Serving the License-Free Wireless Industry Since 1993
Author of the WISP Handbook - Deploying License-Free Wireless WANs
True Vendor-Neutral WISP Consulting-Training-Troubleshooting
Newsletters Downloadable from http://ask-wi.com/newsletters.html
Phone (VoIP Over Broadband Wireless) 818-227-4220  www.ask-wi.com



--
WISPA Wireless List: wireless@wispa.org

Subscribe/Unsubscribe:
http://lists.wispa.org/mailman/listinfo/wireless

Archives: http://lists.wispa.org/pipermail/wireless/ 


--
WISPA Wireless List: wireless@wispa.org

Subscribe/Unsubscribe:
http://lists.wispa.org/mailman/listinfo/wireless

Archives: http://lists.wispa.org/pipermail/wireless/


RE: [WISPA] Wireless Security biting you in the ass?

2006-11-27 Thread Mac Dearman
Scriv,

  I carry 2 hospitals and 4 clinics in N. Louisiana and are their primary
internet connections. We had this discussion last year and a simple VPN from
their router to my core router was more than sufficient to meet HIPPA
guidelines. HIPPA compliance is a very vague area!

Mac Dearman


-Original Message-
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On
Behalf Of John Scrivner
Sent: Monday, November 27, 2006 4:17 PM
To: wireless@wispa.org
Subject: [WISPA] Wireless Security biting you in the ass?

Wireless broadband security issues have now officially led to my 
business being put into a bad light due to perceived lack of security. I 
am a member of a regional broadband planning group that is working with 
health care and other industry sectors to help deliver broadband options 
to all areas that need it. Rural Health centers and hospitals are all 
over the region and most need access to broadband which is highly 
secure. I need to know what others have done to bring HIPAA compliance 
assurance to network administrators and hospital personnel so that your 
solutions are chosen and used for health care connectivity. Currently my 
services are not being considered do to the perception of a lack of 
HIPAA security compliance. I need to get on top of this right now and 
welcome your thoughts and ideas. I would prefer to hear from those of 
you who have some actual knowledge of delivering HIPAA compliant 
connections or those who provide equipment which has been documented to 
meet HIPAA compliance.
Thank you,
John Scrivner

-- 
WISPA Wireless List: wireless@wispa.org

Subscribe/Unsubscribe:
http://lists.wispa.org/mailman/listinfo/wireless

Archives: http://lists.wispa.org/pipermail/wireless/

-- 
WISPA Wireless List: wireless@wispa.org

Subscribe/Unsubscribe:
http://lists.wispa.org/mailman/listinfo/wireless

Archives: http://lists.wispa.org/pipermail/wireless/


RE: [WISPA] Bet they didn't plan this.. LOL

2006-11-27 Thread Rick Smith
funnier thing is, the view source' pages of those top 10 returns hardly
have ANY www solo keywords in them...

-Original Message-
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On
Behalf Of Tom DeReggi
Sent: Monday, November 27, 2006 9:51 PM
To: WISPA General List
Subject: Re: [WISPA] Bet they didn't plan this.. LOL

Funny. But then again maybe the perception was, if they were already using
google, why would they need to find it?

Whats interesting is that if you do a Yahoo search for www Google still
doesn;t come up :-)

Tom DeReggi
RapidDSL  Wireless, Inc
IntAirNet- Fixed Wireless Broadband


- Original Message -
From: George Rogato [EMAIL PROTECTED]
To: WISPA General List wireless@wispa.org
Sent: Monday, November 27, 2006 9:14 PM
Subject: Re: [WISPA] Bet they didn't plan this.. LOL


 You'd think google would be first

 Butch Evans wrote:
 Do a google search for wwwlook at the first link...
 ;-)


 -- 
 George Rogato

 Welcome to WISPA

 www.wispa.org

 http://signup.wispa.org/
 -- 
 WISPA Wireless List: wireless@wispa.org

 Subscribe/Unsubscribe:
 http://lists.wispa.org/mailman/listinfo/wireless

 Archives: http://lists.wispa.org/pipermail/wireless/ 

-- 
WISPA Wireless List: wireless@wispa.org

Subscribe/Unsubscribe:
http://lists.wispa.org/mailman/listinfo/wireless

Archives: http://lists.wispa.org/pipermail/wireless/

-- 
WISPA Wireless List: wireless@wispa.org

Subscribe/Unsubscribe:
http://lists.wispa.org/mailman/listinfo/wireless

Archives: http://lists.wispa.org/pipermail/wireless/


Re: [WISPA] illegal CPE installs

2006-11-27 Thread Jon Langeler
That's what I'm saying. They would likely end up moving to another 
frequency of which may pose more harm to Travis's current network. Not 
that he should be scared because Trango kicks Canopy's butt right?! :-)


Jon Langeler
Michwave Tech.

Tom DeReggi wrote:

Of course they aren't going to vounteer to shut down. But the FCC will 
inforce the rules, and shut them down, if they are illegally 
operating, and causing harm.
They just have better things to do than go on wild goose chases, so 
you have to deliver proof.  I don;t know about you, but if the FCC 
enforcement burough called me and I was illegal, I'd get legal quick.  
NOt that I'm a tattle tail, or try and be the police. But ifthey are 
effecting the quality of my network because they are illegal, they 
need to be set straight.


Tom DeReggi
RapidDSL  Wireless, Inc
IntAirNet- Fixed Wireless Broadband


- Original Message - From: Jon Langeler [EMAIL PROTECTED]
To: WISPA General List wireless@wispa.org
Sent: Monday, November 27, 2006 9:39 PM
Subject: Re: [WISPA] illegal CPE installs


IMO it comes down to if/how they are affecting you and what you want 
them to do about it? You could persuade or force them to move 
everything to another freq. which may/may not end up being in your 
favor. If your trying to get them to give-up and shut the doors...I 
can't forsee that pursuit being successfull or leading to anything 
'good'.


Jon Langeler
Michwave Tech.



--
WISPA Wireless List: wireless@wispa.org

Subscribe/Unsubscribe:
http://lists.wispa.org/mailman/listinfo/wireless

Archives: http://lists.wispa.org/pipermail/wireless/


RE: [WISPA] Wireless Security biting you in the ass?

2006-11-27 Thread Rick Smith
I had another ISP borrow a trango radio to do a training session at the
local college
for their hosted medical application.   They connected the trango to the
network, and then
ran a Cisco IPSEC connection over it using PIX firewalls.  That was enough
to satisfy
the HIPAA requirements.

R

-Original Message-
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On
Behalf Of Mac Dearman
Sent: Tuesday, November 28, 2006 12:29 AM
To: 'WISPA General List'
Subject: RE: [WISPA] Wireless Security biting you in the ass?

Scriv,

  I carry 2 hospitals and 4 clinics in N. Louisiana and are their primary
internet connections. We had this discussion last year and a simple VPN from
their router to my core router was more than sufficient to meet HIPPA
guidelines. HIPPA compliance is a very vague area!

Mac Dearman


-Original Message-
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On
Behalf Of John Scrivner
Sent: Monday, November 27, 2006 4:17 PM
To: wireless@wispa.org
Subject: [WISPA] Wireless Security biting you in the ass?

Wireless broadband security issues have now officially led to my business
being put into a bad light due to perceived lack of security. I am a member
of a regional broadband planning group that is working with health care and
other industry sectors to help deliver broadband options to all areas that
need it. Rural Health centers and hospitals are all over the region and most
need access to broadband which is highly secure. I need to know what others
have done to bring HIPAA compliance assurance to network administrators and
hospital personnel so that your solutions are chosen and used for health
care connectivity. Currently my services are not being considered do to the
perception of a lack of HIPAA security compliance. I need to get on top of
this right now and welcome your thoughts and ideas. I would prefer to hear
from those of you who have some actual knowledge of delivering HIPAA
compliant connections or those who provide equipment which has been
documented to meet HIPAA compliance.
Thank you,
John Scrivner

--
WISPA Wireless List: wireless@wispa.org

Subscribe/Unsubscribe:
http://lists.wispa.org/mailman/listinfo/wireless

Archives: http://lists.wispa.org/pipermail/wireless/

--
WISPA Wireless List: wireless@wispa.org

Subscribe/Unsubscribe:
http://lists.wispa.org/mailman/listinfo/wireless

Archives: http://lists.wispa.org/pipermail/wireless/

-- 
WISPA Wireless List: wireless@wispa.org

Subscribe/Unsubscribe:
http://lists.wispa.org/mailman/listinfo/wireless

Archives: http://lists.wispa.org/pipermail/wireless/


RE: [WISPA] illegal CPE installs

2006-11-27 Thread Forbes Mercy
Only one warning in that advice.  If the FCC takes any interest which they 
ususally don't (think CB) the first one they will require testing on is you.  
We had a person running 40 watts and a quick call around found that the FCC 
likes to make sure the complaintant is also above board.  We've been beseiged 
with competitors who take the philosophy that causing us interference is their 
business model.  I don't like them as much as any of you but we just had a 
person in Spokane, WA who praised the police, whom they called, for catching a 
burglar who was in their house.  This was said as they were being hauled off to 
jail for a pot growing operation in the house that was being burglarized.  They 
called Police then they went to jail.  Just remember the law is looking for all 
abusers not just the one you want them to take out.
 
Forbes

-Original Message- 
From: [EMAIL PROTECTED] on behalf of Marlon K. Schafer 
Sent: Mon 11/27/2006 9:23 PM 
To: WISPA General List 
Cc: 
Subject: Re: [WISPA] illegal CPE installs



Me?  I'd make a few calls about it.

First to them.  It's amazing how often management doesn't know the 
rules.

If that won't fix it, I'd call Motorola.

If that doesn't work, I'd call the FCC.

The last thing this industry needs is people screwing with the one thing
that the FCC has been a stickler on.  EIRP is a sacred stone.  Mess 
with it
and someone at the commission will be getting pissed.

Make DAMN sure you know what they are doing and with what frequencies 
first
though.  Nothing worse than making that kind of false accusation.

And sometimes having someone else call the company and ask around is a 
good
idea.  If you can get me a name and number I'd be happy to make a call 
for
you.  As would, I'm sure, anyone on the wispa board.

Good luck.
marlon

- Original Message -
From: Jack Unger [EMAIL PROTECTED]
To: WISPA General List wireless@wispa.org
Sent: Monday, November 27, 2006 4:48 PM
Subject: Re: [WISPA] illegal CPE installs


 Travis,

 What's the illegality?

 Are they using 5150 - 5250 (indoor use only)?

 Are they exceeding + 30 dBm EIRP on either the AP or the SM?

 jack


 Travis Johnson wrote:

 Hi,

 Curious to everyone's thoughts about a regional WISP installing 
illegal
 CPE units? They are using Last Mile Gear 120degree Canopy 120 degree
 sectors (5.2GHz) and then putting the Canopy 5.2GHz SM in dishes at
 customer locations. I am talking about thousands of CPE installed 
this
 way and doing more every day. This company covers several western 
states
 (Idaho, Utah, Nevada, etc.) and also does Dish Network satellite TV
 installs.

 Is this OK? What are everyone's thoughts?

 Travis
 Microserv

 --
 Jack Unger ([EMAIL PROTECTED]) - President, Ask-Wi.Com, Inc.
 Serving the License-Free Wireless Industry Since 1993
 Author of the WISP Handbook - Deploying License-Free Wireless WANs
 True Vendor-Neutral WISP Consulting-Training-Troubleshooting
 Newsletters Downloadable from http://ask-wi.com/newsletters.html
 Phone (VoIP Over Broadband Wireless) 818-227-4220  www.ask-wi.com



 --
 WISPA Wireless List: wireless@wispa.org

 Subscribe/Unsubscribe:
 http://lists.wispa.org/mailman/listinfo/wireless

 Archives: http://lists.wispa.org/pipermail/wireless/

--
WISPA Wireless List: wireless@wispa.org

Subscribe/Unsubscribe:
http://lists.wispa.org/mailman/listinfo/wireless

Archives: http://lists.wispa.org/pipermail/wireless/



-- 
WISPA Wireless List: wireless@wispa.org

Subscribe/Unsubscribe:
http://lists.wispa.org/mailman/listinfo/wireless

Archives: http://lists.wispa.org/pipermail/wireless/