Yep, I do. Maybe Miltary or other DoD contractors, but you may own the leased of the corp space, but still do not own the frequencies within.
Dennis Burgess, CTO, Link Technologies, Inc. den...@linktechs.net <mailto:den...@linktechs.net> – 314-735-0270 – www.linktechs.net <http://www.linktechs.net> From: wireless-boun...@wispa.org [mailto:wireless-boun...@wispa.org] On Behalf Of Mike Hammett Sent: Tuesday, January 06, 2015 4:27 PM To: WISPA General List Subject: Re: [WISPA] Rogue Accesspoint Detection A WISP doesn't own (or lease) everywhere. A company owns or leases their corporate space. If a Russian or Chinese spy snuck a MiFi into Lockheed Skunkworks and somehow passed their other forms of security, you'd be okay with them chugging away uploading whatever they found? ----- Mike Hammett Intelligent Computing Solutions http://www.ics-il.com ________________________________ From: "Dennis Burgess" <dmburg...@linktechs.net> To: "WISPA General List" <wireless@wispa.org> Sent: Tuesday, January 6, 2015 3:09:47 PM Subject: Re: [WISPA] Rogue Accesspoint Detection While I understand your reasoning, I would disagree. If you could do this, for the security of a WISP, we will shut down all Access Points via Deauth attack that my Access Points can see. Also note, I am not talking for the FCC, but for what I believe is right, in this case, you can’t own a location or area of the wifi bands, therefore, you can’t cause harmful interference, and a deauth attack would be harmful, and interference. I can agree that you can detect it and shut it off on a port on your network, but you should not be able to interfere with other operations, regardless if it is your property or not. Maybe that’s not the intent from those actions, but it’s clear that if it’s not on your network then you can’t do much about it. Now, if they are on your property, sure you can tell them to turn it off or leave, but that’s another issue. lol Dennis Burgess, CTO, Link Technologies, Inc. den...@linktechs.net – 314-735-0270 – www.linktechs.net From: wireless-boun...@wispa.org [mailto:wireless-boun...@wispa.org] On Behalf Of Mike Hammett Sent: Tuesday, January 06, 2015 2:02 PM To: WISPA General List Subject: Re: [WISPA] Rogue Accesspoint Detection There is no mention of a blanket refusal. In the FCC citation, the fact that they're charging for Internet access is brought up every time the deauthing activity is. https://apps.fcc.gov/edocs_public/attachmatch/DOC-329743A1.pdf https://apps.fcc.gov/edocs_public/attachmatch/DA-14-1444A1.pdf In reading that second one, they also keep bringing up that Marriott charged for Internet (and a lot at that). "Specifically, such employees had used this capability to prevent users from connecting to the Internet via their own personal Wi-Fi networks when these users did not pose a threat to the security of the Gaylord Opryland network or its guests." Sounds like security is a viable defense. ----- Mike Hammett Intelligent Computing Solutions http://www.ics-il.com <https://www.facebook.com/ICSIL> <https://plus.google.com/+IntelligentComputingSolutionsDeKalb> <https://www.linkedin.com/company/intelligent-computing-solutions> <https://twitter.com/ICSIL> ________________________________ From: "Dennis Burgess" <dmburg...@linktechs.net> To: "WISPA General List" <wireless@wispa.org> Sent: Tuesday, January 6, 2015 11:43:53 AM Subject: Re: [WISPA] Rogue Accesspoint Detection You cannot do it at all…. Dennis Burgess, CTO, Link Technologies, Inc. den...@linktechs.net – 314-735-0270 – www.linktechs.net From: wireless-boun...@wispa.org [mailto:wireless-boun...@wispa.org] On Behalf Of Mike Hammett Sent: Tuesday, January 06, 2015 11:06 AM To: WISPA General List Subject: Re: [WISPA] Rogue Accesspoint Detection You can do it all day long within your own company. Marriott was doing it to force people to give them money. A company doing it has plenty of other reasons. ----- Mike Hammett Intelligent Computing Solutions http://www.ics-il.com <https://www.facebook.com/ICSIL> <https://plus.google.com/+IntelligentComputingSolutionsDeKalb> <https://www.linkedin.com/company/intelligent-computing-solutions> <https://twitter.com/ICSIL> ________________________________ From: "Dennis Burgess" <dmburg...@linktechs.net> To: "WISPA General List" <wireless@wispa.org> Sent: Tuesday, January 6, 2015 10:05:02 AM Subject: Re: [WISPA] Rogue Accesspoint Detection Note that many of these systems (rather rogue AP prevention) have been deemed illegal by the FCC, a hotel chain was fined 600k I think due to it. Dennis Burgess, CTO, Link Technologies, Inc. den...@linktechs.net – 314-735-0270 – www.linktechs.net From: wireless-boun...@wispa.org [mailto:wireless-boun...@wispa.org] On Behalf Of Scott Piehn Sent: Tuesday, January 06, 2015 9:49 AM To: WISPA General List Subject: [WISPA] Rogue Accesspoint Detection I have a customer that is being required to get rogue access point detection. not a one time thing but ongoing detection. What products have people used. --------------------------------------------------------- Scott M Piehn _______________________________________________ Wireless mailing list Wireless@wispa.org http://lists.wispa.org/mailman/listinfo/wireless _______________________________________________ Wireless mailing list Wireless@wispa.org http://lists.wispa.org/mailman/listinfo/wireless _______________________________________________ Wireless mailing list Wireless@wispa.org http://lists.wispa.org/mailman/listinfo/wireless
_______________________________________________ Wireless mailing list Wireless@wispa.org http://lists.wispa.org/mailman/listinfo/wireless