IANAL but, I am fairly sure P15 only applies to RF, not to the OSI layers. If the FCC does have control of the OSI layers from a P15 device then people doing WEP cracking and such are in violation of P15 and that really is a stretch.
On Sat, Sep 22, 2012 at 6:19 AM, Doug Clark <d...@txox.com> wrote: > If there is an AP that does that and it is operating in Part15, it > would be directly in violation of the very rules that gave the device its > right to exist! > The major substance of Part-15 reads: This device complies with Part 15 of > the FCC Rules. Operation is subject to the following two conditions: (1) > this device may not cause harmful interference, and (2) this device must > accept any interference received, including interference that may cause > undesired operation. > > If the poster has actually seen an AP that does what he says it does then > it would be in violation of Part 15 itself and thus an entity could lodge a > formal complaint against the > person or entity that was operating said AP and possibly end up with a > $25,000.00 ticket. YMMV > > > > > *-------Original Message-------* > > *From:* Greg Ihnen <os10ru...@gmail.com> > *Date:* 9/22/2012 5:34:47 AM > *To:* WISPA General List <wireless@wispa.org> > *Subject:* [WISPA] Can they really do this? > > There's a current debate raging right now on the NANOG list about the ins > and outs of setting up large temporary networks for things like > conventions. > > This one post caught my attention. Has anyone heard of a WiFi AP that will > spoof neighboring networks to intentionally interfere with them, not by > occupying/jamming the spectrum in a brute force way, but rather by > impersonating the other network and rejecting new associations? > > The quote: > > > One of which I forgot to mention. Many of the hotels (I believe all > > Hilton properties at this time) have sold the facilities space for their > > wifi network to another company. They CAN'T negotiate it with you, > > because they don't own it any more. And most of these wifi networks have > > stealth killers enabled, so that they spoof any other wifi zone they see > > and send back reject messages to the clients. So you can't run them side > > by side. > > Greg > > ------------------------------ > > _______________________________________________ > Wireless mailing list > Wireless@wispa.org > http://lists.wispa.org/mailman/listinfo/wireless > > > _______________________________________________ > Wireless mailing list > Wireless@wispa.org > http://lists.wispa.org/mailman/listinfo/wireless > >
_______________________________________________ Wireless mailing list Wireless@wispa.org http://lists.wispa.org/mailman/listinfo/wireless