IANAL but, I am fairly sure P15 only applies to RF, not to the OSI layers.
If the FCC does have control of the OSI layers from a P15 device then
people doing WEP cracking and such are in violation of P15 and that really
is a stretch.

On Sat, Sep 22, 2012 at 6:19 AM, Doug Clark <d...@txox.com> wrote:

>     If there is an AP that does that and it is operating in Part15, it
> would be directly in violation of the very rules that gave the device its
> right to exist!
> The major substance of Part-15 reads: This device complies with Part 15 of
> the FCC Rules. Operation is subject to the following two conditions: (1)
> this device may not cause harmful interference, and (2) this device must
> accept any interference received, including interference that may cause
> undesired operation.
>
> If the poster has actually seen an AP that does what he says it does then
> it would be in violation of Part 15 itself and thus an entity could lodge a
> formal complaint against the
> person or entity that was operating said AP and possibly end up with a
> $25,000.00 ticket.  YMMV
>
>
>
>
>  *-------Original Message-------*
>
>  *From:* Greg Ihnen <os10ru...@gmail.com>
> *Date:* 9/22/2012 5:34:47 AM
> *To:* WISPA General List <wireless@wispa.org>
> *Subject:* [WISPA] Can they really do this?
>
> There's a current debate raging right now on the NANOG list about the ins
> and outs of setting up large temporary networks for things like
> conventions.
>
> This one post caught my attention. Has anyone heard of a WiFi AP that will
> spoof neighboring networks to intentionally interfere with them, not by
> occupying/jamming the spectrum in a brute force way, but rather by
> impersonating the other network and rejecting new associations?
>
> The quote:
>
> > One of which I forgot to mention. Many of the hotels (I believe all
> > Hilton properties at this time) have sold the facilities space for their
> > wifi network to another company. They CAN'T negotiate it with you,
> > because they don't own it any more. And most of these wifi networks have
> > stealth killers enabled, so that they spoof any other wifi zone they see
> > and send back reject messages to the clients. So you can't run them side
> > by side.
>
> Greg
>
> ------------------------------
>
> _______________________________________________
> Wireless mailing list
> Wireless@wispa.org
> http://lists.wispa.org/mailman/listinfo/wireless
>
>
> _______________________________________________
> Wireless mailing list
> Wireless@wispa.org
> http://lists.wispa.org/mailman/listinfo/wireless
>
>
_______________________________________________
Wireless mailing list
Wireless@wispa.org
http://lists.wispa.org/mailman/listinfo/wireless

Reply via email to