[WISPA] Re: wall mount racks
I have a small (6U or so) wall mount rack I would let go for a song. I have had it on the floor for the past year or so. I can send pics if interested. Justin -- Justin S. Wilson [EMAIL PROTECTED] Access - WISP Consulting - Tower Climbing Web: http://www.mtin.net Web: http://www.jwilson.ws -- WISPA Wireless List: wireless@wispa.org Subscribe/Unsubscribe: http://lists.wispa.org/mailman/listinfo/wireless Archives: http://lists.wispa.org/pipermail/wireless/
[WISPA] Handheld Spectrum analyzer mentioned on list last summer
All, I recall there was some interest in a German manufactured handheld spectrum analyzer last summer(cost about 1K). Some on the list were going to pool their resources to make a overseas order. Did that ever happen? Does anyone have one of those units?? How does it work? -- WISPA Wireless List: wireless@wispa.org Subscribe/Unsubscribe: http://lists.wispa.org/mailman/listinfo/wireless Archives: http://lists.wispa.org/pipermail/wireless/
Re: [WISPA] Handheld Spectrum analyzer mentioned on list last summer
On Mon, November 27, 2006 11:43 am, rabbtux rabbtux wrote: I recall there was some interest in a German manufactured handheld spectrum analyzer last summer(cost about 1K). Some on the list were going to pool their resources to make a overseas order. You're thinking of the Spectran analyzers, from www.elektrosmog.de. I love that domain name. Elektro-Smog. Sounds like someone you'd see as a guest villain in Spider-Man or something. I wonder what his superpowers would be... Anyway. Yeah, the special-order did happen a few months back. We've got one of these units in the office, but sadly nobody's had much time to really play with it and try to use it to its full potential. Hopefully someone that bought one, and has been using it, will have more helpful feedback. David Smith MVN.net -- WISPA Wireless List: wireless@wispa.org Subscribe/Unsubscribe: http://lists.wispa.org/mailman/listinfo/wireless Archives: http://lists.wispa.org/pipermail/wireless/
Re: [WISPA] Handheld Spectrum analyzer mentioned on list last summer
If you're speaking of the Spectran, I have one and it doesn't seem to work too well for me. The issue for me is that there seems to be not enough resolution to be working with the reletively low power unliscensed systems as we do. I'm sure for paging and gsm it's great but after trying repeatedly to use it for even simple tasks like direction finding and channel sweeping (seeing what's clear), I had to give up and stop wasting time with it. rabbtux rabbtux wrote: All, I recall there was some interest in a German manufactured handheld spectrum analyzer last summer(cost about 1K). Some on the list were going to pool their resources to make a overseas order. Did that ever happen? Does anyone have one of those units?? How does it work? -- WISPA Wireless List: wireless@wispa.org Subscribe/Unsubscribe: http://lists.wispa.org/mailman/listinfo/wireless Archives: http://lists.wispa.org/pipermail/wireless/
[WISPA] Wi-Fi Faces New Patent Woes
http://www.sda-asia.com/sda/features/psecom,id,764,srn,2,nodeid,4,_language,Singapore.html Wi-Fi Faces New Patent Woes A federal judge in Tyler, Texas, ruled last week that an Australian government agency holds the rights to patents on the underlying technology used in two Wi-Fi standards and a third proposed standard. The decision could have a wide-ranging impact on wireless equipment makers and consumer electronics manufacturers. Australias Commonwealth Scientific and Industrial Research Organisation filed a patent in 1996 that it says is employed in some IEEE standards, potentially including 802.11. The group said that Microsoft, Dell, HP, Intel, Apple, and Netgear have initiated legal action in an attempt to overturn the patent. The organisation says it intends to fight the action. This isn't the first time a company or organisation has tried to pursue companies in the 802.11 space for patent infringement. Last year a patent buying firm called Acacia began sending letters to access point makers that use redirect technologies, saying those firms owed royalties for a patent Acacia owns on redirect technologies. Its unclear how vigorously Acacia followed up on its pursuits, but the move caused an uproar in the industry. The question remains why the Australian organisation is deciding to pursue this patent at this stage in the market. While companies must be able to reap the rewards of their own research and development, there also must be consideration for the positive effects that low cost products can have on a market. One reason that Wi-Fi has proliferated as it has is because it's reached a point where it's incredibly cheap, so it's easy to just stick a Wi-Fi chip in a consumer electronics device, said Stan Schatt, a vice president at ABI Research. But if the cost of the technology goes up to pay for the license, even a little bit, it could throw off the economics. Indeed, Wi-Fi products generate billions of dollars in revenue for equipment makers. Just the access points that provide the actual Wi-Fi signals in local area networks are expected to generate USD 1.9 billion in 2006, according to ABI Research. That figure is expected to jump to USD 3.7 billion in 2010. -- WISPA Wireless List: wireless@wispa.org Subscribe/Unsubscribe: http://lists.wispa.org/mailman/listinfo/wireless Archives: http://lists.wispa.org/pipermail/wireless/
Re: [WISPA] Wi-Fi Faces New Patent Woes
Peter R. wrote: The question remains why the Australian organisation is deciding to pursue this patent at this stage in the market. While companies must be able to reap the rewards of their own research and development, there also must be consideration for the positive effects that low cost products can have on a market. It is important to understand that this ruling while recent is the result of a process that started years earlier. -Matt -- WISPA Wireless List: wireless@wispa.org Subscribe/Unsubscribe: http://lists.wispa.org/mailman/listinfo/wireless Archives: http://lists.wispa.org/pipermail/wireless/
[WISPA] Wireless Security biting you in the ass?
Wireless broadband security issues have now officially led to my business being put into a bad light due to perceived lack of security. I am a member of a regional broadband planning group that is working with health care and other industry sectors to help deliver broadband options to all areas that need it. Rural Health centers and hospitals are all over the region and most need access to broadband which is highly secure. I need to know what others have done to bring HIPAA compliance assurance to network administrators and hospital personnel so that your solutions are chosen and used for health care connectivity. Currently my services are not being considered do to the perception of a lack of HIPAA security compliance. I need to get on top of this right now and welcome your thoughts and ideas. I would prefer to hear from those of you who have some actual knowledge of delivering HIPAA compliant connections or those who provide equipment which has been documented to meet HIPAA compliance. Thank you, John Scrivner -- WISPA Wireless List: wireless@wispa.org Subscribe/Unsubscribe: http://lists.wispa.org/mailman/listinfo/wireless Archives: http://lists.wispa.org/pipermail/wireless/
RE: [WISPA] Wireless Security biting you in the ass?
I've been wonderin about this same thing. I've always blown it off and won the argument but Where's the HIPAA cert stuff to be found ? Like, exact checklists ? R -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of John Scrivner Sent: Monday, November 27, 2006 5:17 PM To: wireless@wispa.org Subject: [WISPA] Wireless Security biting you in the ass? Wireless broadband security issues have now officially led to my business being put into a bad light due to perceived lack of security. I am a member of a regional broadband planning group that is working with health care and other industry sectors to help deliver broadband options to all areas that need it. Rural Health centers and hospitals are all over the region and most need access to broadband which is highly secure. I need to know what others have done to bring HIPAA compliance assurance to network administrators and hospital personnel so that your solutions are chosen and used for health care connectivity. Currently my services are not being considered do to the perception of a lack of HIPAA security compliance. I need to get on top of this right now and welcome your thoughts and ideas. I would prefer to hear from those of you who have some actual knowledge of delivering HIPAA compliant connections or those who provide equipment which has been documented to meet HIPAA compliance. Thank you, John Scrivner -- WISPA Wireless List: wireless@wispa.org Subscribe/Unsubscribe: http://lists.wispa.org/mailman/listinfo/wireless Archives: http://lists.wispa.org/pipermail/wireless/ -- WISPA Wireless List: wireless@wispa.org Subscribe/Unsubscribe: http://lists.wispa.org/mailman/listinfo/wireless Archives: http://lists.wispa.org/pipermail/wireless/
[WISPA] WAR board distributors
US Distributors, Are any of you planning on stepping up to stock/carry WAR533 boards w/embedded StarOS V3, for better US availabilty? Tom DeReggi RapidDSL Wireless, Inc IntAirNet- Fixed Wireless Broadband -- WISPA Wireless List: wireless@wispa.org Subscribe/Unsubscribe: http://lists.wispa.org/mailman/listinfo/wireless Archives: http://lists.wispa.org/pipermail/wireless/
RE: [WISPA] Wireless Security biting you in the ass?
I can expand on this, but would that be considered a vendor pitch ? (discussion will include product capabilities, etc) -Charles --- WiNOG Wireless Roadshows Coming to a City Near You http://www.winog.com -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of John Scrivner Sent: Monday, November 27, 2006 4:17 PM To: wireless@wispa.org Subject: [WISPA] Wireless Security biting you in the ass? Wireless broadband security issues have now officially led to my business being put into a bad light due to perceived lack of security. I am a member of a regional broadband planning group that is working with health care and other industry sectors to help deliver broadband options to all areas that need it. Rural Health centers and hospitals are all over the region and most need access to broadband which is highly secure. I need to know what others have done to bring HIPAA compliance assurance to network administrators and hospital personnel so that your solutions are chosen and used for health care connectivity. Currently my services are not being considered do to the perception of a lack of HIPAA security compliance. I need to get on top of this right now and welcome your thoughts and ideas. I would prefer to hear from those of you who have some actual knowledge of delivering HIPAA compliant connections or those who provide equipment which has been documented to meet HIPAA compliance. Thank you, John Scrivner -- WISPA Wireless List: wireless@wispa.org Subscribe/Unsubscribe: http://lists.wispa.org/mailman/listinfo/wireless Archives: http://lists.wispa.org/pipermail/wireless/ -- WISPA Wireless List: wireless@wispa.org Subscribe/Unsubscribe: http://lists.wispa.org/mailman/listinfo/wireless Archives: http://lists.wispa.org/pipermail/wireless/
RE: [WISPA] Wireless Security biting you in the ass?
Well said! Dennis Burgess, MCP, CCNA, A+, N+, Mikrotik Certified [EMAIL PROTECTED] www.2kwireless.com 2K Wireless provides high-speed internet access, along with network consulting for WISPs, and business's with a focus on TCP/IP networking, security, and Mikrotik routers. -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Marlon K. Schafer (509) 982-2181 Sent: Monday, November 27, 2006 4:25 PM To: WISPA General List Subject: Re: [WISPA] Wireless Security biting you in the ass? Officially, hippa compliance is a CLIENT issue. As long as the data is properly encrypted there's no need for the transport to be. Some will argue this (mainly the telco but sometimes the customer). It's still a fact. Questions to ask them. What do the Doctors use for connectivity to their handheld devices? Right, wireless. What is the encryption mechanism on a t-1 or dsl link? Right, none. What is the security on the cable network? Right, none. Does the facility have a wireless network? Care to have me break into it for you? (I'm told that WPA has now been cracked too.) We went around in circles with a local Sheriff's office on this issue. In the end it was decided that the only real way to be hippa compliant was to encrypt the data AT THE PC level. ANYTHING done after that point was all but useless. They confirmed this with the DOJ. All that's needed is data security, not transport security. If transport security is what's wanted then EVERY vlan switch, router etc. in the loop is a possible security hole. This risk runs end to end, regardless of the transport medium. Good luck. Marlon (509) 982-2181 Equipment sales (408) 907-6910 (Vonage)Consulting services 42846865 (icq)And I run my own wisp! 64.146.146.12 (net meeting) www.odessaoffice.com/wireless www.odessaoffice.com/marlon/cam - Original Message - From: John Scrivner [EMAIL PROTECTED] To: wireless@wispa.org Sent: Monday, November 27, 2006 2:16 PM Subject: [WISPA] Wireless Security biting you in the ass? Wireless broadband security issues have now officially led to my business being put into a bad light due to perceived lack of security. I am a member of a regional broadband planning group that is working with health care and other industry sectors to help deliver broadband options to all areas that need it. Rural Health centers and hospitals are all over the region and most need access to broadband which is highly secure. I need to know what others have done to bring HIPAA compliance assurance to network administrators and hospital personnel so that your solutions are chosen and used for health care connectivity. Currently my services are not being considered do to the perception of a lack of HIPAA security compliance. I need to get on top of this right now and welcome your thoughts and ideas. I would prefer to hear from those of you who have some actual knowledge of delivering HIPAA compliant connections or those who provide equipment which has been documented to meet HIPAA compliance. Thank you, John Scrivner -- WISPA Wireless List: wireless@wispa.org Subscribe/Unsubscribe: http://lists.wispa.org/mailman/listinfo/wireless Archives: http://lists.wispa.org/pipermail/wireless/ -- WISPA Wireless List: wireless@wispa.org Subscribe/Unsubscribe: http://lists.wispa.org/mailman/listinfo/wireless Archives: http://lists.wispa.org/pipermail/wireless/ -- WISPA Wireless List: wireless@wispa.org Subscribe/Unsubscribe: http://lists.wispa.org/mailman/listinfo/wireless Archives: http://lists.wispa.org/pipermail/wireless/
Re: [WISPA] Wireless Security biting you in the ass?
HIPAA is NOT your responsibility. It is the responsibility of the hospital/health care entity to make sure that they are HIPAA compliant at the point where they connect to the Internet. If they are unable to make that distinction, then doing business with them is asking for trouble because they are just playing the cover your ass game. They probably won't like hearing that, and it may not get you the business, but HIPAA has absolutely nothing to do with your network. Matt Larsen [EMAIL PROTECTED] John Scrivner wrote: Wireless broadband security issues have now officially led to my business being put into a bad light due to perceived lack of security. I am a member of a regional broadband planning group that is working with health care and other industry sectors to help deliver broadband options to all areas that need it. Rural Health centers and hospitals are all over the region and most need access to broadband which is highly secure. I need to know what others have done to bring HIPAA compliance assurance to network administrators and hospital personnel so that your solutions are chosen and used for health care connectivity. Currently my services are not being considered do to the perception of a lack of HIPAA security compliance. I need to get on top of this right now and welcome your thoughts and ideas. I would prefer to hear from those of you who have some actual knowledge of delivering HIPAA compliant connections or those who provide equipment which has been documented to meet HIPAA compliance. Thank you, John Scrivner -- WISPA Wireless List: wireless@wispa.org Subscribe/Unsubscribe: http://lists.wispa.org/mailman/listinfo/wireless Archives: http://lists.wispa.org/pipermail/wireless/
[WISPA] Anyone need a trailer mounted generator?
Looks like there are some in Ca. http://cgi.govliquidation.com/auction/view?auctionId=1051228convertTo=USD laters, Marlon (509) 982-2181 Equipment sales (408) 907-6910 (Vonage)Consulting services 42846865 (icq)And I run my own wisp! 64.146.146.12 (net meeting) www.odessaoffice.com/wireless www.odessaoffice.com/marlon/cam -- WISPA Wireless List: wireless@wispa.org Subscribe/Unsubscribe: http://lists.wispa.org/mailman/listinfo/wireless Archives: http://lists.wispa.org/pipermail/wireless/
RE: [WISPA] Wireless Security biting you in the ass?
John, this is a common question of a vastly misunderstood issue. And while I do not purport to be an expert on HIPAA, I have encountered the question many times. There is no such thing as being HIPAA compliant from a hardware standpoint. Rather, HIPAA addresses how information is handled as it passes along the information chain which included all types of network media and hardware as well as physical handling (e.g. paper patient records being physically transported). In other words, I am not familiar with the existence of any mechanism that certifies or otherwise documents hardware as being HIPAA compliant. It is the organizational process itself which must be certified as being compliant. Here is more info: http://www.hipaadvisory.com/action/Compliance/compliant.htm Patrick Leary AVP WISP Markets Alvarion, Inc. o: 650.314.2628 c: 760.580.0080 Vonage: 650.641.1243 [EMAIL PROTECTED] -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of John Scrivner Sent: Monday, November 27, 2006 2:17 PM To: wireless@wispa.org Subject: [WISPA] Wireless Security biting you in the ass? Wireless broadband security issues have now officially led to my business being put into a bad light due to perceived lack of security. I am a member of a regional broadband planning group that is working with health care and other industry sectors to help deliver broadband options to all areas that need it. Rural Health centers and hospitals are all over the region and most need access to broadband which is highly secure. I need to know what others have done to bring HIPAA compliance assurance to network administrators and hospital personnel so that your solutions are chosen and used for health care connectivity. Currently my services are not being considered do to the perception of a lack of HIPAA security compliance. I need to get on top of this right now and welcome your thoughts and ideas. I would prefer to hear from those of you who have some actual knowledge of delivering HIPAA compliant connections or those who provide equipment which has been documented to meet HIPAA compliance. Thank you, John Scrivner -- WISPA Wireless List: wireless@wispa.org Subscribe/Unsubscribe: http://lists.wispa.org/mailman/listinfo/wireless Archives: http://lists.wispa.org/pipermail/wireless/ This footnote confirms that this email message has been scanned by PineApp Mail-SeCure for the presence of malicious code, vandals computer viruses(190). This footnote confirms that this email message has been scanned by PineApp Mail-SeCure for the presence of malicious code, vandals computer viruses(42). This footnote confirms that this email message has been scanned by PineApp Mail-SeCure for the presence of malicious code, vandals computer viruses. -- WISPA Wireless List: wireless@wispa.org Subscribe/Unsubscribe: http://lists.wispa.org/mailman/listinfo/wireless Archives: http://lists.wispa.org/pipermail/wireless/
Re: [WISPA] Wireless Security biting you in the ass?
Great questions, Marlon! You are correct that it is application/data encryption needed, not transport security. Every hospital has a HIPAA Officer. Talk to that person. By 2009, they all have to have EMR and HIPPA compliance, along with some EDI with health insurance payers. - Peter Radizeski Consultant to the Internet Stars :) Marlon K. Schafer (509) 982-2181 wrote: Officially, hippa compliance is a CLIENT issue. As long as the data is properly encrypted there's no need for the transport to be. Some will argue this (mainly the telco but sometimes the customer). It's still a fact. Questions to ask them. What do the Doctors use for connectivity to their handheld devices? Right, wireless. What is the encryption mechanism on a t-1 or dsl link? Right, none. What is the security on the cable network? Right, none. Does the facility have a wireless network? Care to have me break into it for you? (I'm told that WPA has now been cracked too.) We went around in circles with a local Sheriff's office on this issue. In the end it was decided that the only real way to be hippa compliant was to encrypt the data AT THE PC level. ANYTHING done after that point was all but useless. They confirmed this with the DOJ. All that's needed is data security, not transport security. If transport security is what's wanted then EVERY vlan switch, router etc. in the loop is a possible security hole. This risk runs end to end, regardless of the transport medium. Good luck. Marlon -- WISPA Wireless List: wireless@wispa.org Subscribe/Unsubscribe: http://lists.wispa.org/mailman/listinfo/wireless Archives: http://lists.wispa.org/pipermail/wireless/
Re: [WISPA] Wireless Security biting you in the ass?
Good luck Rick. Last I looked there was no clear outline Bob Sent from my Verizon Wireless BlackBerry -Original Message- From: Rick Smith [EMAIL PROTECTED] Date: Mon, 27 Nov 2006 17:23:15 To:'WISPA General List' wireless@wispa.org Subject: RE: [WISPA] Wireless Security biting you in the ass? I've been wonderin about this same thing. I've always blown it off and won the argument but Where's the HIPAA cert stuff to be found ? Like, exact checklists ? R -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of John Scrivner Sent: Monday, November 27, 2006 5:17 PM To: wireless@wispa.org Subject: [WISPA] Wireless Security biting you in the ass? Wireless broadband security issues have now officially led to my business being put into a bad light due to perceived lack of security. I am a member of a regional broadband planning group that is working with health care and other industry sectors to help deliver broadband options to all areas that need it. Rural Health centers and hospitals are all over the region and most need access to broadband which is highly secure. I need to know what others have done to bring HIPAA compliance assurance to network administrators and hospital personnel so that your solutions are chosen and used for health care connectivity. Currently my services are not being considered do to the perception of a lack of HIPAA security compliance. I need to get on top of this right now and welcome your thoughts and ideas. I would prefer to hear from those of you who have some actual knowledge of delivering HIPAA compliant connections or those who provide equipment which has been documented to meet HIPAA compliance. Thank you, John Scrivner -- WISPA Wireless List: wireless@wispa.org Subscribe/Unsubscribe: http://lists.wispa.org/mailman/listinfo/wireless Archives: http://lists.wispa.org/pipermail/wireless/ -- WISPA Wireless List: wireless@wispa.org Subscribe/Unsubscribe: http://lists.wispa.org/mailman/listinfo/wireless Archives: http://lists.wispa.org/pipermail/wireless/ -- WISPA Wireless List: wireless@wispa.org Subscribe/Unsubscribe: http://lists.wispa.org/mailman/listinfo/wireless Archives: http://lists.wispa.org/pipermail/wireless/
Re: [WISPA] Wireless Security biting you in the ass?
John To the best of my knowledge there are no HIPPA compliant solutions that are actually approved We have installed a ton of links for hospitals and other medical facilities an this issur comes up from time to time. We pretty much tell the customer that we are just a carrier and we encrypt oir data just like verizon does on a T1. And we all know how good that is. HIPPA compliance should beUp to the network administrator. Not the carrier IMHO. Ask someone how your network is not compliant. Its like Y2K all over again Good luck Bob Sent from my Verizon Wireless BlackBerry -Original Message- From: John Scrivner [EMAIL PROTECTED] Date: Mon, 27 Nov 2006 16:16:51 To:wireless@wispa.org Subject: [WISPA] Wireless Security biting you in the ass? Wireless broadband security issues have now officially led to my business being put into a bad light due to perceived lack of security. I am a member of a regional broadband planning group that is working with health care and other industry sectors to help deliver broadband options to all areas that need it. Rural Health centers and hospitals are all over the region and most need access to broadband which is highly secure. I need to know what others have done to bring HIPAA compliance assurance to network administrators and hospital personnel so that your solutions are chosen and used for health care connectivity. Currently my services are not being considered do to the perception of a lack of HIPAA security compliance. I need to get on top of this right now and welcome your thoughts and ideas. I would prefer to hear from those of you who have some actual knowledge of delivering HIPAA compliant connections or those who provide equipment which has been documented to meet HIPAA compliance. Thank you, John Scrivner -- WISPA Wireless List: wireless@wispa.org Subscribe/Unsubscribe: http://lists.wispa.org/mailman/listinfo/wireless Archives: http://lists.wispa.org/pipermail/wireless/ -- WISPA Wireless List: wireless@wispa.org Subscribe/Unsubscribe: http://lists.wispa.org/mailman/listinfo/wireless Archives: http://lists.wispa.org/pipermail/wireless/
Re: [WISPA] Wireless Security biting you in the ass?
I think its important to understand where the client's fear comes from. Its thinking that they are opening their network wide up. HIPPA is making a client process compliant not the hardware itself, as just mentioned by someone. But one of the processes is what network policies does the hospitol allow that could compromise securty if it was not managed properly. They don't want something in palce that could be improperly managed. The intent may not jsut be HIPPA compliance, but their own good judgement on how to keep data secure. Its been written about on every corner how consumer wifi devices are hackable and not secure, and they remember that regardless if it has anything to do with your network. The key is to not have the customer AP/WiFiCPE be the mechanism of implimenting security. When it is shown that a third party device or other internal processes are responsible for doing the security, it takes away the WIFI as even being a variable to consider for breaching security. They can't critisize wifi for security if the securing method is not the wifi device. The last thing you want is to have your service be slow to be bought because some technical bouard is debating for months and months that security risks of your network. Just take it out of the equation, so there is no delay in buying your service, and they can figure out how to secure their network as a seperate transaction. Tom DeReggi RapidDSL Wireless, Inc IntAirNet- Fixed Wireless Broadband - Original Message - From: Dennis Burgess - 2K Wireless [EMAIL PROTECTED] To: 'WISPA General List' wireless@wispa.org Sent: Monday, November 27, 2006 5:32 PM Subject: RE: [WISPA] Wireless Security biting you in the ass? John, Do you have a listing of HIPPA security needs? One thing you can do is provide a secure tunnel, IPSEC is best, or a security on top of security approach. This tunnel will run from your customer equipment, his hospital, etc, to your boarder router etc that is connected via fiber or land line. At that point it is as secure as you can get it. So, if you use WEP, Ya security sux, but then put IPSEC inside that WEP packet, now you are talking. T1s can be tapped, seen it done. So with the WEP and IPSEC you are always talking secure. Add on top of that, the application, and whatever it uses for security, HTTPS, etc. It's a custom solution to a simple problem. The only thing now that they could complain about is what about someone sitting in the parking lot listening to packets sent and received. Can they do that with a T1 etc, well, ya you can TAP a T1, usually done on the switch side of things? All you can do then is maybe offer a dedicated backhaul to them, with a proportery protocol, something like Nstream would work, so now you have Nstream, running WEP encrypted packets that has IPSEC packets inside that. If the break it, they should get the data for the work they had to do. Or put up something like a optical service if you are close! That would eliminate that. Another question I would have to ask is, how secure is cable or DSL? Figure this, DSL lets every customer off of their DSLAM to coomuncate to each other, so does cable. If someone had the right cable modem and off the same segment, sure, they can capture every package that is going across the cable line! Thoughts. Dennis Burgess, MCP, CCNA, A+, N+, Mikrotik Certified [EMAIL PROTECTED] www.2kwireless.com 2K Wireless provides high-speed internet access, along with network consulting for WISPs, and business's with a focus on TCP/IP networking, security, and Mikrotik routers. -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of John Scrivner Sent: Monday, November 27, 2006 4:17 PM To: wireless@wispa.org Subject: [WISPA] Wireless Security biting you in the ass? Wireless broadband security issues have now officially led to my business being put into a bad light due to perceived lack of security. I am a member of a regional broadband planning group that is working with health care and other industry sectors to help deliver broadband options to all areas that need it. Rural Health centers and hospitals are all over the region and most need access to broadband which is highly secure. I need to know what others have done to bring HIPAA compliance assurance to network administrators and hospital personnel so that your solutions are chosen and used for health care connectivity. Currently my services are not being considered do to the perception of a lack of HIPAA security compliance. I need to get on top of this right now and welcome your thoughts and ideas. I would prefer to hear from those of you who have some actual knowledge of delivering HIPAA compliant connections or those who provide equipment which has been documented to meet HIPAA compliance. Thank you, John Scrivner -- WISPA Wireless List: wireless@wispa.org Subscribe/Unsubscribe:
Re: [WISPA] Wireless Security biting you in the ass?
On Mon, 27 Nov 2006 [EMAIL PROTECTED] wrote: HIPPA compliance should beUp to the network administrator. Not the carrier IMHO. This is not a matter of opinion. It is factual. -- Butch Evans Network Engineering and Security Consulting 573-276-2879 http://www.butchevans.com/ Mikrotik Certified Consultant (http://www.mikrotik.com/consultants.html) -- WISPA Wireless List: wireless@wispa.org Subscribe/Unsubscribe: http://lists.wispa.org/mailman/listinfo/wireless Archives: http://lists.wispa.org/pipermail/wireless/
Re: [WISPA] Wireless Security biting you in the ass?
I have a customer who works from home transcribing mammogram notes from doctors into their system. Their IT department put a Cisco VPN router at the client side to connect to their VPN at the imaging center. We discussed HIPPA, and they were not worried about my side at all as they were encrypting the data. If it is a large enough organization, they will have IT support that understand HIPPA vs. Telecommuting. However, IT guys in large organizations tend to be skeptical of WISP service as they have not seen it much so don't want to vouch for its reliability or support it. So you can get the IT guys into the conversation but beware of the reluctance factor. Mark Nash Network Engineer UnwiredOnline.Net 350 Holly Street Junction City, OR 97448 http://www.uwol.net 541-998- 541-998-5599 fax - Original Message - From: Tom DeReggi [EMAIL PROTECTED] To: WISPA General List wireless@wispa.org Sent: Monday, November 27, 2006 3:23 PM Subject: Re: [WISPA] Wireless Security biting you in the ass? I think its important to understand where the client's fear comes from. Its thinking that they are opening their network wide up. HIPPA is making a client process compliant not the hardware itself, as just mentioned by someone. But one of the processes is what network policies does the hospitol allow that could compromise securty if it was not managed properly. They don't want something in palce that could be improperly managed. The intent may not jsut be HIPPA compliance, but their own good judgement on how to keep data secure. Its been written about on every corner how consumer wifi devices are hackable and not secure, and they remember that regardless if it has anything to do with your network. The key is to not have the customer AP/WiFiCPE be the mechanism of implimenting security. When it is shown that a third party device or other internal processes are responsible for doing the security, it takes away the WIFI as even being a variable to consider for breaching security. They can't critisize wifi for security if the securing method is not the wifi device. The last thing you want is to have your service be slow to be bought because some technical bouard is debating for months and months that security risks of your network. Just take it out of the equation, so there is no delay in buying your service, and they can figure out how to secure their network as a seperate transaction. Tom DeReggi RapidDSL Wireless, Inc IntAirNet- Fixed Wireless Broadband - Original Message - From: Dennis Burgess - 2K Wireless [EMAIL PROTECTED] To: 'WISPA General List' wireless@wispa.org Sent: Monday, November 27, 2006 5:32 PM Subject: RE: [WISPA] Wireless Security biting you in the ass? John, Do you have a listing of HIPPA security needs? One thing you can do is provide a secure tunnel, IPSEC is best, or a security on top of security approach. This tunnel will run from your customer equipment, his hospital, etc, to your boarder router etc that is connected via fiber or land line. At that point it is as secure as you can get it. So, if you use WEP, Ya security sux, but then put IPSEC inside that WEP packet, now you are talking. T1s can be tapped, seen it done. So with the WEP and IPSEC you are always talking secure. Add on top of that, the application, and whatever it uses for security, HTTPS, etc. It's a custom solution to a simple problem. The only thing now that they could complain about is what about someone sitting in the parking lot listening to packets sent and received. Can they do that with a T1 etc, well, ya you can TAP a T1, usually done on the switch side of things? All you can do then is maybe offer a dedicated backhaul to them, with a proportery protocol, something like Nstream would work, so now you have Nstream, running WEP encrypted packets that has IPSEC packets inside that. If the break it, they should get the data for the work they had to do. Or put up something like a optical service if you are close! That would eliminate that. Another question I would have to ask is, how secure is cable or DSL? Figure this, DSL lets every customer off of their DSLAM to coomuncate to each other, so does cable. If someone had the right cable modem and off the same segment, sure, they can capture every package that is going across the cable line! Thoughts. Dennis Burgess, MCP, CCNA, A+, N+, Mikrotik Certified [EMAIL PROTECTED] www.2kwireless.com 2K Wireless provides high-speed internet access, along with network consulting for WISPs, and business's with a focus on TCP/IP networking, security, and Mikrotik routers. -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of John Scrivner Sent: Monday, November 27, 2006 4:17 PM To: wireless@wispa.org Subject: [WISPA] Wireless Security biting you in the ass? Wireless broadband
Re: [WISPA] Wireless Security biting you in the ass?
I have a few hospital employees working at home across my wireless system. They vpn into the hospital and we don't do anything special for them. One reason that they tell the employees to use us is because we service them quickly when they have an issue. I will agree that we've lost work becaue the competition and others tell the tale that wireless is not secure and it's hard to defend against that when the other guy has already won their trust by trashing us. Only thing I can counter that with is to tell them that the hospita and a few other serious high profile customers use us and the security issue is a hype. One of my subs a few years ago was being told by the network company that serviced his network to switch away from us and install a pix router because of the lack of security. So when the sub called, and I tried my best to explain to him it was not insecure, I got to the point that I realized I was not getting anywhere a thought popped in my mind and I said: If your professional security network people say it's so insecure, have them break into your network and prove to you that what they are saying is true otherwise they are hyping you into a sale at my expense. They are after all network security experts and they ought to know how to break in I still have the sub, but those network security experts don't. George John Scrivner wrote: Wireless broadband security issues have now officially led to my business being put into a bad light due to perceived lack of security. I am a member of a regional broadband planning group that is working with health care and other industry sectors to help deliver broadband options to all areas that need it. Rural Health centers and hospitals are all over the region and most need access to broadband which is highly secure. I need to know what others have done to bring HIPAA compliance assurance to network administrators and hospital personnel so that your solutions are chosen and used for health care connectivity. Currently my services are not being considered do to the perception of a lack of HIPAA security compliance. I need to get on top of this right now and welcome your thoughts and ideas. I would prefer to hear from those of you who have some actual knowledge of delivering HIPAA compliant connections or those who provide equipment which has been documented to meet HIPAA compliance. Thank you, John Scrivner -- WISPA Wireless List: wireless@wispa.org Subscribe/Unsubscribe: http://lists.wispa.org/mailman/listinfo/wireless Archives: http://lists.wispa.org/pipermail/wireless/
RE: [WISPA] Wireless Security biting you in the ass?
Are you suggesting single DES? I wouldn't recommend that. Go with 3DES or AES. -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Dennis Burgess - 2K Wireless Sent: Monday, November 27, 2006 5:33 PM To: 'WISPA General List' Subject: RE: [WISPA] Wireless Security biting you in the ass? John, Do you have a listing of HIPPA security needs? One thing you can do is provide a secure tunnel, IPSEC is best, or a security on top of security approach. This tunnel will run from your customer equipment, his hospital, etc, to your boarder router etc that is connected via fiber or land line. At that point it is as secure as you can get it. So, if you use WEP, Ya security sux, but then put IPSEC inside that WEP packet, now you are talking. T1s can be tapped, seen it done. So with the WEP and IPSEC you are always talking secure. Add on top of that, the application, and whatever it uses for security, HTTPS, etc. It's a custom solution to a simple problem. The only thing now that they could complain about is what about someone sitting in the parking lot listening to packets sent and received. Can they do that with a T1 etc, well, ya you can TAP a T1, usually done on the switch side of things? All you can do then is maybe offer a dedicated backhaul to them, with a proportery protocol, something like Nstream would work, so now you have Nstream, running WEP encrypted packets that has IPSEC packets inside that. If the break it, they should get the data for the work they had to do. Or put up something like a optical service if you are close! That would eliminate that. Another question I would have to ask is, how secure is cable or DSL? Figure this, DSL lets every customer off of their DSLAM to coomuncate to each other, so does cable. If someone had the right cable modem and off the same segment, sure, they can capture every package that is going across the cable line! Thoughts. Dennis Burgess, MCP, CCNA, A+, N+, Mikrotik Certified [EMAIL PROTECTED] www.2kwireless.com 2K Wireless provides high-speed internet access, along with network consulting for WISPs, and business's with a focus on TCP/IP networking, security, and Mikrotik routers. -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of John Scrivner Sent: Monday, November 27, 2006 4:17 PM To: wireless@wispa.org Subject: [WISPA] Wireless Security biting you in the ass? Wireless broadband security issues have now officially led to my business being put into a bad light due to perceived lack of security. I am a member of a regional broadband planning group that is working with health care and other industry sectors to help deliver broadband options to all areas that need it. Rural Health centers and hospitals are all over the region and most need access to broadband which is highly secure. I need to know what others have done to bring HIPAA compliance assurance to network administrators and hospital personnel so that your solutions are chosen and used for health care connectivity. Currently my services are not being considered do to the perception of a lack of HIPAA security compliance. I need to get on top of this right now and welcome your thoughts and ideas. I would prefer to hear from those of you who have some actual knowledge of delivering HIPAA compliant connections or those who provide equipment which has been documented to meet HIPAA compliance. Thank you, John Scrivner -- WISPA Wireless List: wireless@wispa.org Subscribe/Unsubscribe: http://lists.wispa.org/mailman/listinfo/wireless Archives: http://lists.wispa.org/pipermail/wireless/ -- WISPA Wireless List: wireless@wispa.org Subscribe/Unsubscribe: http://lists.wispa.org/mailman/listinfo/wireless Archives: http://lists.wispa.org/pipermail/wireless/ -- WISPA Wireless List: wireless@wispa.org Subscribe/Unsubscribe: http://lists.wispa.org/mailman/listinfo/wireless Archives: http://lists.wispa.org/pipermail/wireless/
Re: [WISPA] Wireless Security biting you in the ass?
BTW, we're going to try to work out something with the local hospital for data storage. We want to do off site backup for them. Via a dedicated link to a server that never touches the internet! I'll be working on physical security of the server as well as the transport needs. Issues like noc access and such. We'll also be working on the frequency of the backups. ie: does the system need to backup the data every time a change is made? Or only a few times per day? Once per night? I hope to meet with the hospital administrator here in a couple of weeks when we're not both so swamped. Marlon (509) 982-2181 Equipment sales (408) 907-6910 (Vonage)Consulting services 42846865 (icq)And I run my own wisp! 64.146.146.12 (net meeting) www.odessaoffice.com/wireless www.odessaoffice.com/marlon/cam - Original Message - From: Peter R. [EMAIL PROTECTED] To: WISPA General List wireless@wispa.org Sent: Monday, November 27, 2006 2:44 PM Subject: Re: [WISPA] Wireless Security biting you in the ass? Great questions, Marlon! You are correct that it is application/data encryption needed, not transport security. Every hospital has a HIPAA Officer. Talk to that person. By 2009, they all have to have EMR and HIPPA compliance, along with some EDI with health insurance payers. - Peter Radizeski Consultant to the Internet Stars :) Marlon K. Schafer (509) 982-2181 wrote: Officially, hippa compliance is a CLIENT issue. As long as the data is properly encrypted there's no need for the transport to be. Some will argue this (mainly the telco but sometimes the customer). It's still a fact. Questions to ask them. What do the Doctors use for connectivity to their handheld devices? Right, wireless. What is the encryption mechanism on a t-1 or dsl link? Right, none. What is the security on the cable network? Right, none. Does the facility have a wireless network? Care to have me break into it for you? (I'm told that WPA has now been cracked too.) We went around in circles with a local Sheriff's office on this issue. In the end it was decided that the only real way to be hippa compliant was to encrypt the data AT THE PC level. ANYTHING done after that point was all but useless. They confirmed this with the DOJ. All that's needed is data security, not transport security. If transport security is what's wanted then EVERY vlan switch, router etc. in the loop is a possible security hole. This risk runs end to end, regardless of the transport medium. Good luck. Marlon -- WISPA Wireless List: wireless@wispa.org Subscribe/Unsubscribe: http://lists.wispa.org/mailman/listinfo/wireless Archives: http://lists.wispa.org/pipermail/wireless/ -- WISPA Wireless List: wireless@wispa.org Subscribe/Unsubscribe: http://lists.wispa.org/mailman/listinfo/wireless Archives: http://lists.wispa.org/pipermail/wireless/
Re: [WISPA] illegal CPE installs
Travis, What's the illegality? Are they using 5150 - 5250 (indoor use only)? Are they exceeding + 30 dBm EIRP on either the AP or the SM? jack Travis Johnson wrote: Hi, Curious to everyone's thoughts about a regional WISP installing illegal CPE units? They are using Last Mile Gear 120degree Canopy 120 degree sectors (5.2GHz) and then putting the Canopy 5.2GHz SM in dishes at customer locations. I am talking about thousands of CPE installed this way and doing more every day. This company covers several western states (Idaho, Utah, Nevada, etc.) and also does Dish Network satellite TV installs. Is this OK? What are everyone's thoughts? Travis Microserv -- Jack Unger ([EMAIL PROTECTED]) - President, Ask-Wi.Com, Inc. Serving the License-Free Wireless Industry Since 1993 Author of the WISP Handbook - Deploying License-Free Wireless WANs True Vendor-Neutral WISP Consulting-Training-Troubleshooting Newsletters Downloadable from http://ask-wi.com/newsletters.html Phone (VoIP Over Broadband Wireless) 818-227-4220 www.ask-wi.com -- WISPA Wireless List: wireless@wispa.org Subscribe/Unsubscribe: http://lists.wispa.org/mailman/listinfo/wireless Archives: http://lists.wispa.org/pipermail/wireless/
Re: [WISPA] illegal CPE installs
There are two very distinct issues in thos post... One is using a third party antenna, with a radio, that it is not certified with, and installing an uncertified system. Two is running a equipment above allowable EIRPs. As for one, as you have mentioned to me before, installing a StarOS or Mikrotik system, equally is an uncertified system. But we often justify it by understanding that our systems are within limits, and could be made FCC compiant if the expense was taken to go through the process. And technically most of us want that ability, to pick and chose the best antennas for our equipment. And off record, the word is the FCC isn't going to go after WISPs using uncertiufied systems as long as they are operating within FCC EIRP levels. So its hard to fight that one. The best that can be done is use certified systems yourself when you can and support the vendors that sell certified systems. As for two thats where you must draw the line. Installing a dish does not make the 5.2 gear uncertifiable or above FCC limits, if the 5.2 gear drops its power level accordingly. A 28db 2ft dish can be used if they drop their TX to 0 dbm. Or even neg numbers. Trango allows this, Does Canopy? Are they actually running the CPEs or APs above EIRP limits, without turning their power down to the appropriate level? If you can prove that they are over powering, then you ahve a case and should report to the FCC. And there is one reason for that. If they over power in your area, they will most likely force you to over power to stay above them, and the vicious circle starts. If they are in fact broadcasting over the legal limits, the FCC will inforce policy, from what I understand. But you are going to have to deliver proof to them that it is happening. If the FCC has strong reason to believe that they are running at legal limits, and the WISP does not comply on request, then the FCC can use the non-compliance to FCC certified systems to inforce compliance, if its to hard to prove when the customer turns the power down or back up again to be out or in compliance. I'd argue that you almost have an obligation to the industry to report a company that is heavilly abusing the rules for 1000s of installed systems. It gives WISPs a bad name. But I think we also need to use our own judgement on when a hand needs slapping. For example, if someone is located in the middle of a forrest, and they bump up the EIRP with a high gain YAGI, is it really doing any harm, knowing that the trees absorb most of the extra power, and has no more impact on the environment than a legal system located on the edge of the forest. So my opinion is, if they are doing harm to the RF environment in the communities, due to illegal limits, you should report them. But make sure you've done your home work, so you don't make false accusations. These are all hard questions and the reason is because, no body wants to be the bad guy. The FCC isn't going to shut down an WISP that is providing the only option for Broadband to it's subscribers in an underserved rural area, without good cause. And turning the power down and narrowing the beam width helps prevent interference, not cause it. Just my 2 cents. Tom DeReggi RapidDSL Wireless, Inc IntAirNet- Fixed Wireless Broadband - Original Message - From: Travis Johnson [EMAIL PROTECTED] To: isp-wireless@isp-wireless.com; WISP [EMAIL PROTECTED]; WISPA General List wireless@wispa.org Sent: Monday, November 27, 2006 5:58 PM Subject: [WISPA] illegal CPE installs Hi, Curious to everyone's thoughts about a regional WISP installing illegal CPE units? They are using Last Mile Gear 120degree Canopy 120 degree sectors (5.2GHz) and then putting the Canopy 5.2GHz SM in dishes at customer locations. I am talking about thousands of CPE installed this way and doing more every day. This company covers several western states (Idaho, Utah, Nevada, etc.) and also does Dish Network satellite TV installs. Is this OK? What are everyone's thoughts? Travis Microserv -- WISPA Wireless List: wireless@wispa.org Subscribe/Unsubscribe: http://lists.wispa.org/mailman/listinfo/wireless Archives: http://lists.wispa.org/pipermail/wireless/ -- WISPA Wireless List: wireless@wispa.org Subscribe/Unsubscribe: http://lists.wispa.org/mailman/listinfo/wireless Archives: http://lists.wispa.org/pipermail/wireless/
Re: [WISPA] Wireless Security biting you in the ass?
It does not matter if the responsibility is the network admin or not when it comes down to purchase time. It comes down to perception. Right now perception of the hospital corporate officers is that wireless = not secure. I have been told by people who order circuits that they are not allowed to buy from me or any wireless operator due to security issues. I believe it will require some type of HIPAA seal of approval from some source or another before we can start selling to these guys. This could be bad for us. ALL of the hospitals are going to buying new circuits soon and right now I am out of the running. Scriv [EMAIL PROTECTED] wrote: John To the best of my knowledge there are no HIPPA compliant solutions that are actually approved We have installed a ton of links for hospitals and other medical facilities an this issur comes up from time to time. We pretty much tell the customer that we are just a carrier and we encrypt oir data just like verizon does on a T1. And we all know how good that is. HIPPA compliance should beUp to the network administrator. Not the carrier IMHO. Ask someone how your network is not compliant. Its like Y2K all over again Good luck Bob Sent from my Verizon Wireless BlackBerry -Original Message- From: John Scrivner [EMAIL PROTECTED] Date: Mon, 27 Nov 2006 16:16:51 To:wireless@wispa.org Subject: [WISPA] Wireless Security biting you in the ass? Wireless broadband security issues have now officially led to my business being put into a bad light due to perceived lack of security. I am a member of a regional broadband planning group that is working with health care and other industry sectors to help deliver broadband options to all areas that need it. Rural Health centers and hospitals are all over the region and most need access to broadband which is highly secure. I need to know what others have done to bring HIPAA compliance assurance to network administrators and hospital personnel so that your solutions are chosen and used for health care connectivity. Currently my services are not being considered do to the perception of a lack of HIPAA security compliance. I need to get on top of this right now and welcome your thoughts and ideas. I would prefer to hear from those of you who have some actual knowledge of delivering HIPAA compliant connections or those who provide equipment which has been documented to meet HIPAA compliance. Thank you, John Scrivner No virus found in this incoming message. Checked by AVG Free Edition. Version: 7.1.409 / Virus Database: 268.14.17/553 - Release Date: 11/27/2006 -- WISPA Wireless List: wireless@wispa.org Subscribe/Unsubscribe: http://lists.wispa.org/mailman/listinfo/wireless Archives: http://lists.wispa.org/pipermail/wireless/
Re: [WISPA] Wireless Security biting you in the ass?
On Mon, 27 Nov 2006 [EMAIL PROTECTED] wrote: HIPPA compliance should beUp to the network administrator. Not the carrier IMHO. This is not a matter of opinion. It is factual. I never doubted this. I just need to find someway to make the corporate people believe they can use my wireless transport to deliver an end to end solution that will be HIPAA compliant with my service located in the center. Passing the buck is not the problem. The buck will never get in my pocket if I cannot sell my service as a way to connect without breaking HIPAA compliance perception issues. This is a perception problem that I do not have enough information or expertise to fix. Scriv -- WISPA Wireless List: wireless@wispa.org Subscribe/Unsubscribe: http://lists.wispa.org/mailman/listinfo/wireless Archives: http://lists.wispa.org/pipermail/wireless/
Re: [WISPA] Wireless Security biting you in the ass?
On Mon, 27 Nov 2006, John Scrivner wrote: I never doubted this. I just need to find someway to make the corporate people believe they can use my wireless transport to deliver an end to end solution that will be HIPAA compliant with my service located in the center. Passing the buck is not the problem. Which is the reason I mentioned in my other post about speaking to an attorney about drafting a paper in plain English to help them understand (and lend credibility to what you tell them). Someone else mentioned partnering with a HIPAA compliance consultant, which is another (perhaps better) idea. -- Butch Evans Network Engineering and Security Consulting 573-276-2879 http://www.butchevans.com/ Mikrotik Certified Consultant (http://www.mikrotik.com/consultants.html) -- WISPA Wireless List: wireless@wispa.org Subscribe/Unsubscribe: http://lists.wispa.org/mailman/listinfo/wireless Archives: http://lists.wispa.org/pipermail/wireless/
Re: [WISPA] Wireless Security biting you in the ass?
On Mon, 27 Nov 2006, John Scrivner wrote: Wireless broadband security issues have now officially led to my business being put into a bad light due to perceived lack of security. I am a member of a regional broadband planning group that is working with health care and other industry sectors to help deliver broadband options to all areas that need it. Rural Health centers and hospitals are all over the region and most need access to broadband which is highly secure. I need to know what others have done to bring HIPAA compliance assurance to network administrators and hospital personnel so that your solutions are chosen and used for health care connectivity. Currently my services are not being considered do to the perception of a lack of HIPAA security compliance. I need to get on top of this right now and welcome your thoughts and ideas. I would prefer to hear from those of you who have some actual knowledge of delivering HIPAA compliant connections or those who provide equipment which has been documented to meet HIPAA compliance. Like many others, I've had this argument with various people. In the end, the reality is that HIPAA has nothing do to with the transport medium. Data along a T1, wireless, cable network or DSL network is unencrypted. It's as simple as that. If it makes your customer feel better, then you can easily create a VPN tunnel (with whatever strength encryption they want) between their client device all to way to your border (where it will hit a T1, fiber or whatever), at which point it will (again) be unencrypted. HIPAA compliance is NOT (according to the attorney I spoke to) the responsibility of the transport provider. The perception (which you correctly identified) is that wireless is insecure. This is easily fixed by creating end to end encryption (at least as far as you have control over the network). Marlon pointed out the fact that MOST end users (hospitals and such) have networks INSIDE that have flawed security models. The biggest hurdle with this perception is that these places ASSUME it is your responsibility. This is a tough issue to overcome because most of them do not understand what they want or need. You will have to become an expert in the rules in order to show them the truth. SO...what I would recommend (and have done) is offer them some options. 1. I would offer an encrypted (IPSEC) tunnel service for a premium price. Be certain to point out the weaknesses that Marlon mentioned regarding wired services. I'd google up some information on hacking these wired services, as there is a TON of information out there. 2. Get familiar with a good security company and offer good firewall options (this would be at the client end) that includes IDS with notifications. I'd steer WAY clear of SonicWall and those types of devices, as these are NOT very flexible. 3. Have an attorney write you up some information on YOUR responsibility as well as THEIR responsibility as it relates to an internet connection. Make sure that he includes language that makes it clear that these responsibilities are the same whether the connection is wired or wireless (or notes any differences). -- Butch Evans Network Engineering and Security Consulting 573-276-2879 http://www.butchevans.com/ Mikrotik Certified Consultant (http://www.mikrotik.com/consultants.html) -- WISPA Wireless List: wireless@wispa.org Subscribe/Unsubscribe: http://lists.wispa.org/mailman/listinfo/wireless Archives: http://lists.wispa.org/pipermail/wireless/
[WISPA] Bet they didn't plan this.. LOL
Do a google search for wwwlook at the first link... ;-) -- Butch Evans Network Engineering and Security Consulting 573-276-2879 http://www.butchevans.com/ Mikrotik Certified Consultant (http://www.mikrotik.com/consultants.html) -- WISPA Wireless List: wireless@wispa.org Subscribe/Unsubscribe: http://lists.wispa.org/mailman/listinfo/wireless Archives: http://lists.wispa.org/pipermail/wireless/
Re: [WISPA] Bet they didn't plan this.. LOL
Yahoo? Butch Evans wrote: Do a google search for wwwlook at the first link... ;-) -- George Rogato Welcome to WISPA www.wispa.org http://signup.wispa.org/ -- WISPA Wireless List: wireless@wispa.org Subscribe/Unsubscribe: http://lists.wispa.org/mailman/listinfo/wireless Archives: http://lists.wispa.org/pipermail/wireless/
Re: [WISPA] Bet they didn't plan this.. LOL
You'd think google would be first Butch Evans wrote: Do a google search for wwwlook at the first link... ;-) -- George Rogato Welcome to WISPA www.wispa.org http://signup.wispa.org/ -- WISPA Wireless List: wireless@wispa.org Subscribe/Unsubscribe: http://lists.wispa.org/mailman/listinfo/wireless Archives: http://lists.wispa.org/pipermail/wireless/
RE: [WISPA] Bet they didn't plan this.. LOL
W3c ? 2nd came yahoo ... Gino A. Villarini [EMAIL PROTECTED] Aeronet Wireless Broadband Corp. tel 787.273.4143 fax 787.273.4145 -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Butch Evans Sent: Monday, November 27, 2006 10:06 PM To: Wispa List Subject: [WISPA] Bet they didn't plan this.. LOL Do a google search for wwwlook at the first link... ;-) -- Butch Evans Network Engineering and Security Consulting 573-276-2879 http://www.butchevans.com/ Mikrotik Certified Consultant (http://www.mikrotik.com/consultants.html) -- WISPA Wireless List: wireless@wispa.org Subscribe/Unsubscribe: http://lists.wispa.org/mailman/listinfo/wireless Archives: http://lists.wispa.org/pipermail/wireless/ -- WISPA Wireless List: wireless@wispa.org Subscribe/Unsubscribe: http://lists.wispa.org/mailman/listinfo/wireless Archives: http://lists.wispa.org/pipermail/wireless/
Re: [WISPA] Wireless Security biting you in the ass?
It is HIPAA - The Health Insurance Portability and Accountability Act. It covers way more than just encrypting data. Like Pat said, it is a process. Even paper records have to have a chain of command and security. So when you see the files in the reception area at your doctor's office, unless they are tagged with signatures of who has them, they are not in compliance. The fine for violation is up to $250,000 and jail time for the doctor. And, btw, the line in the sand constantly shifts. It was supposed to be completed by 1999, then 2001, then 2003, now it looks like 2009. (It's the Insurance companies that are pushing for EMD and EDI transactions). Even dentists have to comply. One of the purposes of the Health Insurance Portability and Accountability Act (HIPAA), which was passed in 1996, is to encourage the efficient use of electronic data interchange in the health care system. The HIPAA subtitle standardizes specific electronic transactions used in the health care arena by requiring that certain formats and specified code sets be used. There are specialists that you can partner with. (I partner with Threadfin Consulting). Most doctors work with a hospital. The Hosp Admin has to understand HIPAA for federal dollars. Also, they have to assign a HIPAA Compliance Officer - under the CYA policy so you have someone to blame, hire and put in jail, like CFO's under the SOX. The Hospital is your best bet. Plus check with the local AMA and ADA for meetings. They will be talking HIPAA all next year. It is really about getting rid of FUD and putting a process in place. You can make them warm and fuzzy selling IPSec wrapped in WEP wrapped in Nstream with Firewalls on both ends, but the Act is ultimately about safe, secure use of medical information. So data security, data storage, back-up and retrieval. Physical storage as well as electronic. That's my 2 cents. Peter @ RAD-INFO, Inc. Tom DeReggi wrote: John, There is no HIPPA certification for a broadband connection. HIPPA is an overall concept to have a medical intity secure it's customer records. As mentioned at this year's ISPCON CEO Session, the HIPPA compliance manual is about 3 inches thick, and thats hard to sum up in a few words. And most of it won't apply to making your service HIPPA compliant. My advice is to partner with a consulting company that offers HIPPA compliant consulting services to hospitols and doctors, and make sure they know who you are, and recommend your service. -- WISPA Wireless List: wireless@wispa.org Subscribe/Unsubscribe: http://lists.wispa.org/mailman/listinfo/wireless Archives: http://lists.wispa.org/pipermail/wireless/
Re: [WISPA] Bet they didn't plan this.. LOL
Hmm, my page came with yahoo 1st and w3c 2nd. here's what I got: Web Results 1 - 100 of about 4,030,000,000 English pages for www [definition]. (0.24 seconds) Yahoo! Welcome to Yahoo!, the world's most visited home page. Quickly find what you're searching for, get in touch with friends and stay in-the-know with the ... www.yahoo.com/ - 71k - Nov 26, 2006 - Cached - Similar pages Mail - The best web-based email! - mail.yahoo.com/ Finance - finance.yahoo.com/ Radio - music.yahoo.com/ Movies - movies.yahoo.com/ More results from yahoo.com ยป World Wide Web Consortium The World Wide Web Consortium was created to lead the World Wide Web to its full potential by developing common protocols that promote its evolution and ... www.w3.org/ - 37k - Nov 26, 2006 - Cached - Similar pages CNN.com - Breaking News, U.S., World, Weather, Entertainment ... Includes US and international stories and analysis, weather, video clips, and program schedule. www.cnn.com/ - 101k - Nov 26, 2006 - Cached - Similar pages AltaVista AltaVista provides the most comprehensive search experience on the Web! www.altavista.com/ - 10k - Cached - Similar pages Sign In Free web-based e-mail. 2MB e-mail storage, signatures, stationery, HTML compatible. www.hotmail.com/ - 11k - Nov 26, 2006 - Cached - Similar pages Microsoft Corporation The entry page to Microsoft's Web site. Find software, solutions, answers, support, and Microsoft news. www.microsoft.com/ - 32k - Nov 26, 2006 - Cached - Similar pages Internet Explorer 7: Home Download Internet Explorer 7, the latest version of Microsoft's new, improved, and free web browser. www.microsoft.com/windows/ie/ - 11k - Cached - Similar pages AOL.com - Welcome to AOL America On Line's portal, offering search, shopping, channels, chat and mail. www.aol.com/ - 41k - Nov 26, 2006 - Cached - Similar pages MySpace Meet people from your area in the country and keep in touch. Includes blog, forums, email, groups, games and events. www.myspace.com/ - 32k - Nov 26, 2006 - Cached - Similar pages MSN.com MSN's all-in-one Internet portal, the home of Hotmail, MSN Messenger, MSNBC News, Fox Sports, Slate Magazine and more information you care about. www.msn.com/ - 38k - Nov 26, 2006 - Cached - Similar pages SecurityFocus SecurityFocus is the most comprehensive and trusted source of security information on the Internet. SecurityFocus is a vendor-neutral site that provides ... www.securityfocus.com/ - 20k - Nov 26, 2006 - Cached - Similar pages Hotel, resort and vacation information from Marriott.com Hotel and resort information, make reservations and book events, or find special offers at Marriott.com. marriott.com/ - 46k - Cached - Similar pages My Excite Excite is the leading personalization Web portal, featuring world-class search, content and functionality. From financial portfolios to sports scores, ... www.excite.com/ - 60k - Cached - Similar pages UPS Global Home Company news, tracking, software, employment information, and FAQ. www.ups.com/ - 19k - Cached - Similar pages SAMSUNG's Digital World Manufactures TVs, digital cameras, DVDs, VCRs and audio systems. www.samsung.com/ - 23k - Cached - Similar pages National Geographic - photos, videos, daily news stories, maps ... Explore National Geographic Online. A world leader in geography, cartography and exploration. www.nationalgeographic.com/ - 52k - Nov 26, 2006 - Cached - Similar pages The New York Times - Breaking News, World News Multimedia Online edition of the newspaper's recent content with searchable archives for a fee. [Registration required] www.nytimes.com/ - Similar pages Lycos North American portal with email, YellowPages, heavily integrated search engine, personal settings and weather. www.lycos.com/ - 50k - Cached - Similar pages Gino A. Villarini wrote: W3c ? 2nd came yahoo ... Gino A. Villarini [EMAIL PROTECTED] Aeronet Wireless Broadband Corp. tel 787.273.4143 fax 787.273.4145 -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Butch Evans Sent: Monday, November 27, 2006 10:06 PM To: Wispa List Subject: [WISPA] Bet they didn't plan this.. LOL Do a google search for wwwlook at the first link... ;-) -- George Rogato Welcome to WISPA www.wispa.org http://signup.wispa.org/ -- WISPA Wireless List: wireless@wispa.org Subscribe/Unsubscribe: http://lists.wispa.org/mailman/listinfo/wireless Archives: http://lists.wispa.org/pipermail/wireless/
Re: [WISPA] Wireless Security biting you in the ass?
You're right. Perception is everything. So I picked up two things from this thread. One, why is the onus on me to prove my network is secure? Break into it or you're just passing on hot air from uninformed or biased sources. Two, I can offer transport on a private network that doesn't touch the net. How many layers of security are the other vendors offering? I've got two; encryption and private network. - cw John Scrivner wrote: It does not matter if the responsibility is the network admin or not when it comes down to purchase time. It comes down to perception. Right now perception of the hospital corporate officers is that wireless = not secure. I have been told by people who order circuits that they are not allowed to buy from me or any wireless operator due to security issues. I believe it will require some type of HIPAA seal of approval from some source or another before we can start selling to these guys. This could be bad for us. ALL of the hospitals are going to buying new circuits soon and right now I am out of the running. Scriv -- WISPA Wireless List: wireless@wispa.org Subscribe/Unsubscribe: http://lists.wispa.org/mailman/listinfo/wireless Archives: http://lists.wispa.org/pipermail/wireless/
RE: [WISPA] Bet they didn't plan this.. LOL
On Mon, 27 Nov 2006, Gino A. Villarini wrote: W3c ? 2nd came yahoo ... When I accidentally did that search, Yahoo was the first. -- Butch Evans Network Engineering and Security Consulting 573-276-2879 http://www.butchevans.com/ Mikrotik Certified Consultant (http://www.mikrotik.com/consultants.html) -- WISPA Wireless List: wireless@wispa.org Subscribe/Unsubscribe: http://lists.wispa.org/mailman/listinfo/wireless Archives: http://lists.wispa.org/pipermail/wireless/
Re: [WISPA] illegal CPE installs
IMO it comes down to if/how they are affecting you and what you want them to do about it? You could persuade or force them to move everything to another freq. which may/may not end up being in your favor. If your trying to get them to give-up and shut the doors...I can't forsee that pursuit being successfull or leading to anything 'good'. Jon Langeler Michwave Tech. Travis Johnson wrote: Hi, Curious to everyone's thoughts about a regional WISP installing illegal CPE units? They are using Last Mile Gear 120degree Canopy 120 degree sectors (5.2GHz) and then putting the Canopy 5.2GHz SM in dishes at customer locations. I am talking about thousands of CPE installed this way and doing more every day. This company covers several western states (Idaho, Utah, Nevada, etc.) and also does Dish Network satellite TV installs. Is this OK? What are everyone's thoughts? Travis Microserv -- WISPA Wireless List: wireless@wispa.org Subscribe/Unsubscribe: http://lists.wispa.org/mailman/listinfo/wireless Archives: http://lists.wispa.org/pipermail/wireless/
Re: [WISPA] Bet they didn't plan this.. LOL
Funny. But then again maybe the perception was, if they were already using google, why would they need to find it? Whats interesting is that if you do a Yahoo search for www Google still doesn;t come up :-) Tom DeReggi RapidDSL Wireless, Inc IntAirNet- Fixed Wireless Broadband - Original Message - From: George Rogato [EMAIL PROTECTED] To: WISPA General List wireless@wispa.org Sent: Monday, November 27, 2006 9:14 PM Subject: Re: [WISPA] Bet they didn't plan this.. LOL You'd think google would be first Butch Evans wrote: Do a google search for wwwlook at the first link... ;-) -- George Rogato Welcome to WISPA www.wispa.org http://signup.wispa.org/ -- WISPA Wireless List: wireless@wispa.org Subscribe/Unsubscribe: http://lists.wispa.org/mailman/listinfo/wireless Archives: http://lists.wispa.org/pipermail/wireless/ -- WISPA Wireless List: wireless@wispa.org Subscribe/Unsubscribe: http://lists.wispa.org/mailman/listinfo/wireless Archives: http://lists.wispa.org/pipermail/wireless/
Re: [WISPA] illegal CPE installs
Of course they aren't going to vounteer to shut down. But the FCC will inforce the rules, and shut them down, if they are illegally operating, and causing harm. They just have better things to do than go on wild goose chases, so you have to deliver proof. I don;t know about you, but if the FCC enforcement burough called me and I was illegal, I'd get legal quick. NOt that I'm a tattle tail, or try and be the police. But ifthey are effecting the quality of my network because they are illegal, they need to be set straight. Tom DeReggi RapidDSL Wireless, Inc IntAirNet- Fixed Wireless Broadband - Original Message - From: Jon Langeler [EMAIL PROTECTED] To: WISPA General List wireless@wispa.org Sent: Monday, November 27, 2006 9:39 PM Subject: Re: [WISPA] illegal CPE installs IMO it comes down to if/how they are affecting you and what you want them to do about it? You could persuade or force them to move everything to another freq. which may/may not end up being in your favor. If your trying to get them to give-up and shut the doors...I can't forsee that pursuit being successfull or leading to anything 'good'. Jon Langeler Michwave Tech. Travis Johnson wrote: Hi, Curious to everyone's thoughts about a regional WISP installing illegal CPE units? They are using Last Mile Gear 120degree Canopy 120 degree sectors (5.2GHz) and then putting the Canopy 5.2GHz SM in dishes at customer locations. I am talking about thousands of CPE installed this way and doing more every day. This company covers several western states (Idaho, Utah, Nevada, etc.) and also does Dish Network satellite TV installs. Is this OK? What are everyone's thoughts? Travis Microserv -- WISPA Wireless List: wireless@wispa.org Subscribe/Unsubscribe: http://lists.wispa.org/mailman/listinfo/wireless Archives: http://lists.wispa.org/pipermail/wireless/ -- WISPA Wireless List: wireless@wispa.org Subscribe/Unsubscribe: http://lists.wispa.org/mailman/listinfo/wireless Archives: http://lists.wispa.org/pipermail/wireless/
Re: [WISPA] Wireless Security biting you in the ass?
Private network Great point. Its one of our biggest selling points for multi-location businesses. It like having their own private network engineered for them. Tom DeReggi RapidDSL Wireless, Inc IntAirNet- Fixed Wireless Broadband - Original Message - From: cw [EMAIL PROTECTED] To: WISPA General List wireless@wispa.org Sent: Monday, November 27, 2006 8:34 PM Subject: Re: [WISPA] Wireless Security biting you in the ass? You're right. Perception is everything. So I picked up two things from this thread. One, why is the onus on me to prove my network is secure? Break into it or you're just passing on hot air from uninformed or biased sources. Two, I can offer transport on a private network that doesn't touch the net. How many layers of security are the other vendors offering? I've got two; encryption and private network. - cw John Scrivner wrote: It does not matter if the responsibility is the network admin or not when it comes down to purchase time. It comes down to perception. Right now perception of the hospital corporate officers is that wireless = not secure. I have been told by people who order circuits that they are not allowed to buy from me or any wireless operator due to security issues. I believe it will require some type of HIPAA seal of approval from some source or another before we can start selling to these guys. This could be bad for us. ALL of the hospitals are going to buying new circuits soon and right now I am out of the running. Scriv -- WISPA Wireless List: wireless@wispa.org Subscribe/Unsubscribe: http://lists.wispa.org/mailman/listinfo/wireless Archives: http://lists.wispa.org/pipermail/wireless/ -- WISPA Wireless List: wireless@wispa.org Subscribe/Unsubscribe: http://lists.wispa.org/mailman/listinfo/wireless Archives: http://lists.wispa.org/pipermail/wireless/
Re: [WISPA] Bet they didn't plan this.. LOL
George Rogato wrote: Hmm, my page came with yahoo 1st and w3c 2nd. here's what I got: (yahoo being first) Google tries to provide results that will be relevant to their users, and Yahoo! is one of the biggest and most popular sites on the Web. Honestly, it just looks like Google is doing its job well. :) David Smith MVN.net -- WISPA Wireless List: wireless@wispa.org Subscribe/Unsubscribe: http://lists.wispa.org/mailman/listinfo/wireless Archives: http://lists.wispa.org/pipermail/wireless/
Re: [WISPA] ATT launches WiMAX at NV Brothels
I drove through Pahrump the day before yesterday on my way from Lake Havasu to Death Valley for the last night of my vacation. Don't worry, we're safe. LOL ;) At 07:27 PM 11/20/2006, you wrote: http://andyabramson.blogs.com/voipwatch/2006/11/att_hooking_wim.html http://telephonyonline.com/home/news/att_mobile_wimax_111606/ Regards, Peter Radizeski RAD-INFO, Inc. - NSP Strategist We Help ISPs Connect Communicate 813.963.5884 http://www.marketingIDEAguy.com -- WISPA Wireless List: wireless@wispa.org Subscribe/Unsubscribe: http://lists.wispa.org/mailman/listinfo/wireless Archives: http://lists.wispa.org/pipermail/wireless/ -- WISPA Wireless List: wireless@wispa.org Subscribe/Unsubscribe: http://lists.wispa.org/mailman/listinfo/wireless Archives: http://lists.wispa.org/pipermail/wireless/
Re: [WISPA] External battery on UPS
We've done it two ways: 1. Electric - Power converter/charger -12V Batteries - DC regulator - DC radios: no AC power adapters 2. Electric - Power converter/charger -12V Batteries - DC regulator - DC-to-AC converter - AC power adapters so we use the DC setup to isolate AC lightning danger. Mario Rick Smith wrote: stupid question. Normally, power supplies convert from AC to DC. If you wire DC into an outlet, and plug an AC power supply into it, will it just cut down the DC to whatever that P/S is supposed to provide to the POE unit, and pass the rest ? i.e. Solar 48V - 24V Batteries - 24VDC - Outlets w/normal AC P/Ss plugged into them outputting 5vdc to an AP or the like - will it work ? I imagine it will, albeit terribly inefficient... -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Paul Hendry Sent: Saturday, November 25, 2006 7:32 AM To: 'WISPA General List' Subject: RE: [WISPA] External battery on UPS Looking for the most efficient use of the battery power and the kit to achieve it. Old APC's are easy enough to track down on ebay but normally only have standard AC outputs so I'm guessing you would connect both an APC and Ethernet direct to the batteries? -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Mario Pommier Sent: 24 November 2006 19:04 To: WISPA General List Subject: Re: [WISPA] External battery on UPS Yes, Paul. What are you looking for? Mario Paul Hendry wrote: Just out of interest, does anyone run batteries (via fuses) directly into cat5 instead of converting back to AC just to run standard 48v PoE up the tower? -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Ron Wallace Sent: 17 November 2006 21:19 To: WISPA General List Subject: Re: [WISPA] External battery on UPS Thanks Brian -Original Message- From: Brian Rohrbacher [mailto:[EMAIL PROTECTED] Sent: Wednesday, November 15, 2006 09:41 PM To: 'WISPA General List' Subject: Re: [WISPA] External battery on UPS I'm pasting Gino's link to the right thread. Then I can search me email in a year and find the correct thread Connectors: http://www.partsexpress.com/pe/showdetl.cfm?Partnumber=263-110 Batteries: http://www.donrowe.com/batteries/8a31dt.html Brian Rohrbacher wrote: Can we get some links to these batteries that work well? Gino, Got a link to the DC block connectors you were talking about? Brian Travis Johnson wrote: Hi, We run two 4 gauge power wires out the front of the case, connect the positive to a 60A fuse, and then to the batteries. We are using AGM type (same thing used in UPS systems) big batteries (a little bigger than a car battery, but each battery is 110 pounds). We wire them in series (to get 24VDC). This setup has only been installed for 12-18 months at various locations, so I don't have an estimate on battery life. Travis Microserv Brian Rohrbacher wrote: You got any pics of this or similar Travisanyone? Travis, What APC do you use and what batteries are added? What do you draw and what is th run time? Do you know how many times the one with the most cycles has been drawn down? How long do the batteries last? Brian Travis Johnson wrote: You can't use just 1 battery. The APC units want to see 24vdc, so you need two batteries running in series. It works perfectly, as I have 20+ remote locations running off two gel type batteries. Make sure you install some type of a fuse on the positive side of the connection. Travis Microserv Mark Nash - Lists wrote: I believe I remember some discussion on this list on connecting an external battery to an APC UPS. I'm in the middle of doing it right now and am having problems. The UPS just beep continuously with the 'bad battery' light on. I'm using a Lifeline deep cycle battery. Any ideas? Mark Nash Network Engineer UnwiredOnline.Net 350 Holly Street Junction City, OR 97448 http://www.uwol.net 541-998- 541-998-5599 fax -- WISPA Wireless List: wireless@wispa.org Subscribe/Unsubscribe: http://lists.wispa.org/mailman/listinfo/wireless Archives: http://lists.wispa.org/pipermail/wireless/ -- WISPA Wireless List: wireless@wispa.org Subscribe/Unsubscribe: http://lists.wispa.org/mailman/listinfo/wireless Archives: http://lists.wispa.org/pipermail/wireless/ -- No virus found in this incoming message. Checked by AVG Free Edition. Version: 7.1.409 / Virus Database: 268.14.14/548 - Release Date: 23/11/2006 -- WISPA Wireless List: wireless@wispa.org Subscribe/Unsubscribe: http://lists.wispa.org/mailman/listinfo/wireless Archives: http://lists.wispa.org/pipermail/wireless/
Re: [WISPA] Bet they didn't plan this.. LOL
What I have seen is that if you ping google.com, your results will vary based on your DNS server. The results (especially the order) seem to vary slightly between 72.14.203.104 (www.google.com) [returns yahoo.com] 64.233.167.99 (www.google.com) [www returns w3.org] and 72.14.203.99 (www.google.com) and whatever YOUR DNS server returns. Also the indexing synronization between the multiple googleservers would make sense that different results at any given time. pd Butch Evans wrote: On Mon, 27 Nov 2006, Gino A. Villarini wrote: W3c ? 2nd came yahoo ... When I accidentally did that search, Yahoo was the first. -- WISPA Wireless List: wireless@wispa.org Subscribe/Unsubscribe: http://lists.wispa.org/mailman/listinfo/wireless Archives: http://lists.wispa.org/pipermail/wireless/
Re: [WISPA] Wireless Security biting you in the ass?
Back to your problem: Wireless = Unsecure. You have a Marketing problem. The onus is on you to get him to tell you why your network is unsecure. Objections are made to be hurdled, after all. Explaining that cable and DSL are LAN based topologies is not going to help you. You need describe how your Alvarian Fixed Wireless network is capable of providing fiber like capabilities in the private transport arena. (Maybe get some help from your Alvarian Support Engineer). I need to think about it some more before I can give you a better answer. Regards, Peter RAD-INFO, Inc. -- WISPA Wireless List: wireless@wispa.org Subscribe/Unsubscribe: http://lists.wispa.org/mailman/listinfo/wireless Archives: http://lists.wispa.org/pipermail/wireless/
Re: [WISPA] illegal CPE installs
Me? I'd make a few calls about it. First to them. It's amazing how often management doesn't know the rules. If that won't fix it, I'd call Motorola. If that doesn't work, I'd call the FCC. The last thing this industry needs is people screwing with the one thing that the FCC has been a stickler on. EIRP is a sacred stone. Mess with it and someone at the commission will be getting pissed. Make DAMN sure you know what they are doing and with what frequencies first though. Nothing worse than making that kind of false accusation. And sometimes having someone else call the company and ask around is a good idea. If you can get me a name and number I'd be happy to make a call for you. As would, I'm sure, anyone on the wispa board. Good luck. marlon - Original Message - From: Jack Unger [EMAIL PROTECTED] To: WISPA General List wireless@wispa.org Sent: Monday, November 27, 2006 4:48 PM Subject: Re: [WISPA] illegal CPE installs Travis, What's the illegality? Are they using 5150 - 5250 (indoor use only)? Are they exceeding + 30 dBm EIRP on either the AP or the SM? jack Travis Johnson wrote: Hi, Curious to everyone's thoughts about a regional WISP installing illegal CPE units? They are using Last Mile Gear 120degree Canopy 120 degree sectors (5.2GHz) and then putting the Canopy 5.2GHz SM in dishes at customer locations. I am talking about thousands of CPE installed this way and doing more every day. This company covers several western states (Idaho, Utah, Nevada, etc.) and also does Dish Network satellite TV installs. Is this OK? What are everyone's thoughts? Travis Microserv -- Jack Unger ([EMAIL PROTECTED]) - President, Ask-Wi.Com, Inc. Serving the License-Free Wireless Industry Since 1993 Author of the WISP Handbook - Deploying License-Free Wireless WANs True Vendor-Neutral WISP Consulting-Training-Troubleshooting Newsletters Downloadable from http://ask-wi.com/newsletters.html Phone (VoIP Over Broadband Wireless) 818-227-4220 www.ask-wi.com -- WISPA Wireless List: wireless@wispa.org Subscribe/Unsubscribe: http://lists.wispa.org/mailman/listinfo/wireless Archives: http://lists.wispa.org/pipermail/wireless/ -- WISPA Wireless List: wireless@wispa.org Subscribe/Unsubscribe: http://lists.wispa.org/mailman/listinfo/wireless Archives: http://lists.wispa.org/pipermail/wireless/
RE: [WISPA] Wireless Security biting you in the ass?
Scriv, I carry 2 hospitals and 4 clinics in N. Louisiana and are their primary internet connections. We had this discussion last year and a simple VPN from their router to my core router was more than sufficient to meet HIPPA guidelines. HIPPA compliance is a very vague area! Mac Dearman -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of John Scrivner Sent: Monday, November 27, 2006 4:17 PM To: wireless@wispa.org Subject: [WISPA] Wireless Security biting you in the ass? Wireless broadband security issues have now officially led to my business being put into a bad light due to perceived lack of security. I am a member of a regional broadband planning group that is working with health care and other industry sectors to help deliver broadband options to all areas that need it. Rural Health centers and hospitals are all over the region and most need access to broadband which is highly secure. I need to know what others have done to bring HIPAA compliance assurance to network administrators and hospital personnel so that your solutions are chosen and used for health care connectivity. Currently my services are not being considered do to the perception of a lack of HIPAA security compliance. I need to get on top of this right now and welcome your thoughts and ideas. I would prefer to hear from those of you who have some actual knowledge of delivering HIPAA compliant connections or those who provide equipment which has been documented to meet HIPAA compliance. Thank you, John Scrivner -- WISPA Wireless List: wireless@wispa.org Subscribe/Unsubscribe: http://lists.wispa.org/mailman/listinfo/wireless Archives: http://lists.wispa.org/pipermail/wireless/ -- WISPA Wireless List: wireless@wispa.org Subscribe/Unsubscribe: http://lists.wispa.org/mailman/listinfo/wireless Archives: http://lists.wispa.org/pipermail/wireless/
RE: [WISPA] Bet they didn't plan this.. LOL
funnier thing is, the view source' pages of those top 10 returns hardly have ANY www solo keywords in them... -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Tom DeReggi Sent: Monday, November 27, 2006 9:51 PM To: WISPA General List Subject: Re: [WISPA] Bet they didn't plan this.. LOL Funny. But then again maybe the perception was, if they were already using google, why would they need to find it? Whats interesting is that if you do a Yahoo search for www Google still doesn;t come up :-) Tom DeReggi RapidDSL Wireless, Inc IntAirNet- Fixed Wireless Broadband - Original Message - From: George Rogato [EMAIL PROTECTED] To: WISPA General List wireless@wispa.org Sent: Monday, November 27, 2006 9:14 PM Subject: Re: [WISPA] Bet they didn't plan this.. LOL You'd think google would be first Butch Evans wrote: Do a google search for wwwlook at the first link... ;-) -- George Rogato Welcome to WISPA www.wispa.org http://signup.wispa.org/ -- WISPA Wireless List: wireless@wispa.org Subscribe/Unsubscribe: http://lists.wispa.org/mailman/listinfo/wireless Archives: http://lists.wispa.org/pipermail/wireless/ -- WISPA Wireless List: wireless@wispa.org Subscribe/Unsubscribe: http://lists.wispa.org/mailman/listinfo/wireless Archives: http://lists.wispa.org/pipermail/wireless/ -- WISPA Wireless List: wireless@wispa.org Subscribe/Unsubscribe: http://lists.wispa.org/mailman/listinfo/wireless Archives: http://lists.wispa.org/pipermail/wireless/
Re: [WISPA] illegal CPE installs
That's what I'm saying. They would likely end up moving to another frequency of which may pose more harm to Travis's current network. Not that he should be scared because Trango kicks Canopy's butt right?! :-) Jon Langeler Michwave Tech. Tom DeReggi wrote: Of course they aren't going to vounteer to shut down. But the FCC will inforce the rules, and shut them down, if they are illegally operating, and causing harm. They just have better things to do than go on wild goose chases, so you have to deliver proof. I don;t know about you, but if the FCC enforcement burough called me and I was illegal, I'd get legal quick. NOt that I'm a tattle tail, or try and be the police. But ifthey are effecting the quality of my network because they are illegal, they need to be set straight. Tom DeReggi RapidDSL Wireless, Inc IntAirNet- Fixed Wireless Broadband - Original Message - From: Jon Langeler [EMAIL PROTECTED] To: WISPA General List wireless@wispa.org Sent: Monday, November 27, 2006 9:39 PM Subject: Re: [WISPA] illegal CPE installs IMO it comes down to if/how they are affecting you and what you want them to do about it? You could persuade or force them to move everything to another freq. which may/may not end up being in your favor. If your trying to get them to give-up and shut the doors...I can't forsee that pursuit being successfull or leading to anything 'good'. Jon Langeler Michwave Tech. -- WISPA Wireless List: wireless@wispa.org Subscribe/Unsubscribe: http://lists.wispa.org/mailman/listinfo/wireless Archives: http://lists.wispa.org/pipermail/wireless/
RE: [WISPA] Wireless Security biting you in the ass?
I had another ISP borrow a trango radio to do a training session at the local college for their hosted medical application. They connected the trango to the network, and then ran a Cisco IPSEC connection over it using PIX firewalls. That was enough to satisfy the HIPAA requirements. R -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Mac Dearman Sent: Tuesday, November 28, 2006 12:29 AM To: 'WISPA General List' Subject: RE: [WISPA] Wireless Security biting you in the ass? Scriv, I carry 2 hospitals and 4 clinics in N. Louisiana and are their primary internet connections. We had this discussion last year and a simple VPN from their router to my core router was more than sufficient to meet HIPPA guidelines. HIPPA compliance is a very vague area! Mac Dearman -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of John Scrivner Sent: Monday, November 27, 2006 4:17 PM To: wireless@wispa.org Subject: [WISPA] Wireless Security biting you in the ass? Wireless broadband security issues have now officially led to my business being put into a bad light due to perceived lack of security. I am a member of a regional broadband planning group that is working with health care and other industry sectors to help deliver broadband options to all areas that need it. Rural Health centers and hospitals are all over the region and most need access to broadband which is highly secure. I need to know what others have done to bring HIPAA compliance assurance to network administrators and hospital personnel so that your solutions are chosen and used for health care connectivity. Currently my services are not being considered do to the perception of a lack of HIPAA security compliance. I need to get on top of this right now and welcome your thoughts and ideas. I would prefer to hear from those of you who have some actual knowledge of delivering HIPAA compliant connections or those who provide equipment which has been documented to meet HIPAA compliance. Thank you, John Scrivner -- WISPA Wireless List: wireless@wispa.org Subscribe/Unsubscribe: http://lists.wispa.org/mailman/listinfo/wireless Archives: http://lists.wispa.org/pipermail/wireless/ -- WISPA Wireless List: wireless@wispa.org Subscribe/Unsubscribe: http://lists.wispa.org/mailman/listinfo/wireless Archives: http://lists.wispa.org/pipermail/wireless/ -- WISPA Wireless List: wireless@wispa.org Subscribe/Unsubscribe: http://lists.wispa.org/mailman/listinfo/wireless Archives: http://lists.wispa.org/pipermail/wireless/
RE: [WISPA] illegal CPE installs
Only one warning in that advice. If the FCC takes any interest which they ususally don't (think CB) the first one they will require testing on is you. We had a person running 40 watts and a quick call around found that the FCC likes to make sure the complaintant is also above board. We've been beseiged with competitors who take the philosophy that causing us interference is their business model. I don't like them as much as any of you but we just had a person in Spokane, WA who praised the police, whom they called, for catching a burglar who was in their house. This was said as they were being hauled off to jail for a pot growing operation in the house that was being burglarized. They called Police then they went to jail. Just remember the law is looking for all abusers not just the one you want them to take out. Forbes -Original Message- From: [EMAIL PROTECTED] on behalf of Marlon K. Schafer Sent: Mon 11/27/2006 9:23 PM To: WISPA General List Cc: Subject: Re: [WISPA] illegal CPE installs Me? I'd make a few calls about it. First to them. It's amazing how often management doesn't know the rules. If that won't fix it, I'd call Motorola. If that doesn't work, I'd call the FCC. The last thing this industry needs is people screwing with the one thing that the FCC has been a stickler on. EIRP is a sacred stone. Mess with it and someone at the commission will be getting pissed. Make DAMN sure you know what they are doing and with what frequencies first though. Nothing worse than making that kind of false accusation. And sometimes having someone else call the company and ask around is a good idea. If you can get me a name and number I'd be happy to make a call for you. As would, I'm sure, anyone on the wispa board. Good luck. marlon - Original Message - From: Jack Unger [EMAIL PROTECTED] To: WISPA General List wireless@wispa.org Sent: Monday, November 27, 2006 4:48 PM Subject: Re: [WISPA] illegal CPE installs Travis, What's the illegality? Are they using 5150 - 5250 (indoor use only)? Are they exceeding + 30 dBm EIRP on either the AP or the SM? jack Travis Johnson wrote: Hi, Curious to everyone's thoughts about a regional WISP installing illegal CPE units? They are using Last Mile Gear 120degree Canopy 120 degree sectors (5.2GHz) and then putting the Canopy 5.2GHz SM in dishes at customer locations. I am talking about thousands of CPE installed this way and doing more every day. This company covers several western states (Idaho, Utah, Nevada, etc.) and also does Dish Network satellite TV installs. Is this OK? What are everyone's thoughts? Travis Microserv -- Jack Unger ([EMAIL PROTECTED]) - President, Ask-Wi.Com, Inc. Serving the License-Free Wireless Industry Since 1993 Author of the WISP Handbook - Deploying License-Free Wireless WANs True Vendor-Neutral WISP Consulting-Training-Troubleshooting Newsletters Downloadable from http://ask-wi.com/newsletters.html Phone (VoIP Over Broadband Wireless) 818-227-4220 www.ask-wi.com -- WISPA Wireless List: wireless@wispa.org Subscribe/Unsubscribe: http://lists.wispa.org/mailman/listinfo/wireless Archives: http://lists.wispa.org/pipermail/wireless/ -- WISPA Wireless List: wireless@wispa.org Subscribe/Unsubscribe: http://lists.wispa.org/mailman/listinfo/wireless Archives: http://lists.wispa.org/pipermail/wireless/ -- WISPA Wireless List: wireless@wispa.org Subscribe/Unsubscribe: http://lists.wispa.org/mailman/listinfo/wireless Archives: http://lists.wispa.org/pipermail/wireless/