<<Corrected grammar>> If not with RF, how do you suppose that an AP would interfere with another AP? That is what the poster is asking about..... I am curious on how you would crack a WEP key without using RF signal..... What you are talking about is criminal and you're right, breaking into secure APs are not under the rules of Part-15. -------Original Message------- From: Doug Clark Date: 9/23/2012 9:29:49 PM To: WISPA General List Subject: Re: [WISPA] Can they really do this? -------Original Message------- From: Jeromie Reeves Date: 9/23/2012 5:53:20 PM To: WISPA General List Subject: Re: [WISPA] Can they really do this? IANAL but, I am fairly sure P15 only applies to RF, not to the OSI layers. If the FCC does have control of the OSI layers from a P15 device then people doing WEP cracking and such are in violation of P15 and that really is a stretch.
On Sat, Sep 22, 2012 at 6:19 AM, Doug Clark <d...@txox.com> wrote: If there is an AP that does that and it is operating in Part15, it would be directly in violation of the very rules that gave the device its right to exist! The major substance of Part-15 reads: This device complies with Part 15 of the FCC Rules. Operation is subject to the following two conditions: (1) this device may not cause harmful interference, and (2) this device must accept any interference received, including interference that may cause undesired operation. If the poster has actually seen an AP that does what he says it does then it would be in violation of Part 15 itself and thus an entity could lodge a formal complaint against the person or entity that was operating said AP and possibly end up with a $25 000.00 ticket. YMMV -------Original Message------- From: Greg Ihnen Date: 9/22/2012 5:34:47 AM To: WISPA General List Subject: [WISPA] Can they really do this? There's a current debate raging right now on the NANOG list about the ins and outs of setting up large temporary networks for things like conventions. This one post caught my attention. Has anyone heard of a WiFi AP that will spoof neighboring networks to intentionally interfere with them, not by occupying/jamming the spectrum in a brute force way, but rather by impersonating the other network and rejecting new associations? The quote: > One of which I forgot to mention. Many of the hotels (I believe all > Hilton properties at this time) have sold the facilities space for their > wifi network to another company. They CAN'T negotiate it with you, > because they don't own it any more. And most of these wifi networks have > stealth killers enabled, so that they spoof any other wifi zone they see > and send back reject messages to the clients. So you can't run them side > by side. Greg _______________________________________________ Wireless mailing list Wireless@wispa.org http://lists.wispa.org/mailman/listinfo/wireless _______________________________________________ Wireless mailing list Wireless@wispa.org http://lists.wispa.org/mailman/listinfo/wireless _______________________________________________ Wireless mailing list Wireless@wispa.org http://lists.wispa.org/mailman/listinfo/wireless
_______________________________________________ Wireless mailing list Wireless@wispa.org http://lists.wispa.org/mailman/listinfo/wireless