EDUCAUSE Southwest Regional Conference 2005 FCC, Rogue Access Points, and Security: Can We Get There From Here? Doug Jackson Director, Technology Customer.

Slides:



Advertisements
Similar presentations
Wi-Fi Technology.
Advertisements

© 2006 Open Grid Forum Network Services Interface Introduction to NSI Guy Roberts.
Cyber Security Haunted House: Creating a New Approach to Reach Students Kenneth Janz Director, Center for Instruction, Research, and Technology Indiana.
Student Laptop Program Victories and Defeats Dr. Timothy M. Chester, CIO Texas A&M University at Qatar
CHECK 2012 Bridging the Gap for Mobile Devices: Eager Adoption v. Practical Support Emporia State University The Faculty & Staff Support Perspective Cory.
Tools for Help Desk Management: Assessment & Guidance Karen Pothering Elinor Pennsylvania State University "Copyright.
What Does the Net Generation Expect From Us? SAC August 8, 2005 SAC August 8, 2005 Copyright © 2005, Joel L. Hartman. This work is the intellectual property.
Data, Policy, Stakeholders, and Governance Amy Brooks, University of Michigan – Ann Arbor Bret Ingerman, Vassar College Copyright Bret Ingerman This.
Defining the Security Domain Marilu Goodyear John H. Louis University of Kansas.
Student, Faculty, and Staff Data Availability and Protection What’s the Back-Up Plan? (for academic computing) Sponsored by.
Crisis Communications for Security Issues: A Nightmare You Can Manage Marilu Goodyear Donna Liss Allison Rose Lopez Jenny Mehmedovic The University of.
FCC Actions To Support Development of WISPS Julius P. Knapp Deputy Chief Office of Engineering and Technology Federal Communications Commission.
© Copyright Computer Lab Solutions All rights reserved. Do you need usage information about your computer labs? Copyright Computer Lab Solutions.
Cut Costs and Increase Productivity in your IT Organization with Effective Computer and Network Monitoring. Copyright © T3 Software Builders, Inc 2004.
A Web-based Bibliography Management Initiative: Collaborating for Classroom and Library Technology Integration Brian Nielsen, Academic Technologies Denise.
Tender Offer Revival - Evolution of the Best Price Rule June 21, 2007.
Copyright John F (Barry) Walsh This work is the intellectual property of the author. Permission is granted for this material to be shared for non-
1 Extending Authenticated Online Services with "Friend Accounts" at Washington State University Brian Foley Technology Architect/Application Developer.
Research and Educational Networking Information Analysis and Sharing Center (REN-ISAC) Mark S. Bruhn, Interim Director University Copyright.
Air Force Materiel Command I n t e g r i t y - S e r v i c e - E x c e l l e n c e Developing, Fielding, and Sustaining America’s Aerospace Force INTELLECTUAL.
Educause Security 2007ISC Information Security Copyright Joshua Beeman, This work is the intellectual property of the author. Permission is granted.
Exemption for Classroom Teaching: Section 110 of the Copyright Law (including The TEACH Act) Insert Date Insert Instructors’ Names / Titles The following.
By Abdullah Al-Dossary Ahmad Al-Suhaibani
Wireless LANs A Case Study of Baylor University’s Wireless Network Copyright Bob Hartland 2002 This work is the intellectual property of the author. Permission.
Wireless LANs A New Computing Experience Doug Jackson Director, Technology Customer Services University of Texas at Dallas EDUTEX 2002: Austin Copyright.
Mobile Computing and Security Authenticated Network Access (ANA) Jon Peters Associate Director Dave Packham Manager of Network Engineering NetCom University.
Risk Assessment 101 Kelley Bradder VP and CIO Simpson College.
National Science Foundation Symposium Ed Thomas Chief, Office of Engineering and Technology Federal Communications Commission.
Unified Messaging at Williams College A Cost Model Analysis By Mark Berman Copyright Mark Berman, This work is the intellectual property of the author.
Classroom Technologies Re-organization Copyright Kathy Bohnstedt, This work is the intellectual property of the author. Permission is granted for.
Page 1 Copyright Jill M. Forrester This work is the intellectual property of the author. Permission is granted for this material to be shared for.
Sharing Information and Controlling Content: Continuing Challenges for Higher Education Susanna Frederick Fischer Assistant Professor Columbus School of.
Standards and Guidelines for Web Page Publishing December 9, 2009.
Please Note: Copyright –David L. Snellman This work is the intellectual property of the author. Permission is granted for this material to be shared.
Ten Thing IT Staff Need to Know About Education Records Privacy Ten Things IT Staff Need to Know About Education Records Privacy Jeff von Munkwitz-Smith.
Canadian Copyright Act Became law in January 1924 and was amended in 1988 (Phase I) The second phase amendments were completed in 1997 when Bill C-32.
Copyright Michael White and Sandra Thompson, This work is the intellectual property of the author. Permission is granted for this material to be.
“Copyright and Terms of Service Copyright © Texas Education Agency. The materials found on this website are copyrighted © and trademarked ™ as the property.
Center for Planning and Information Technology T HE C ATHOLIC U NIVERSITY of A MERICA ERP Systems: Ongoing Support Challenges and Opportunities Copyright.
The "How" and "Why" of a Large-Scale Wireless Deployment  March 3, 2004  EDUCAUSE Western Regional Conference Sacramento, CA Copyright Philip Reese,
The University of Texas at Dallas 1 Palm Pilot 2003 at UT Dallas EDUCAUSE Southwest Regional Conference February 26, 2004 Doug Jackson Daniel Calhoun Copyright.
CALEA Discussion Internet2 Joint Techs July 19, 2006 Doug Carlson Executive Director, Communications & Computing Services New York University
B r a z o s R i v e r A u t h o r i t y FERC Encroachments.
PRESENTATION ON WI-FI TECHNOLOGY
Online banking security best practices Access via ‘transaction devices’
Rethinking Campus and Classroom Design William J. Mitchell NLII 2004 September 9, 2004 Copyright William Mitchell, This work is the intellectual.
CALEA Discussion Institute for Computer Policy and Law June 28, 2006 Doug Carlson Executive Director, Communications & Computing Services New York University.
The Basics of Intellectual Property Law Understanding IP by A. David Spevack, Office of Naval Research.
1 Effective Incident Response Presented by Greg Hedrick, Manager of Security Services Copyright Purdue University This work is the intellectual property.
Intellectual Property and Copyright What is it and why does it matter?
EDUCAUSE 2003 Copyright Toshiyuki Urata 2003 This work is the intellectual property of the author. Permission is granted for this material to be shared.
Quickly Establishing A Workable IT Security Program EDUCAUSE Mid-Atlantic Regional Conference January 10-12, 2006 Copyright Robert E. Neale This.
NMI-EDIT and Rice University Federated Identity Management: Managing Access to Resources in Texas Barry Ribbeck Director System Architecture and Infrastructure.
Copyright James Kulich This work is the intellectual property of the author. Permission is granted for this material to be shared for non-commercial,
Doc.: IEEE /0077r2 Submission January 2009 Peter Ecclesine, Cisco SystemsSlide 1 TV white space update 1 Date: Authors:
© Scottsdale Community College Leveraging the Power of E-Learning Taking your course to a higher level Presented by Sidne Tate Director, Instructional.
Copyright Joel Rosenblatt 2010
SupportU 24x7: Implementing and Maintaining a Co-Managed Help Desk
Julian Hooker Assistant Managing Director Educause Southwest
Networking 2002 USA-Patriot Act Tracy Mitrano Cornell University
EDUCAUSE 2011 Three Paths, One Goal: Three Institutions’ Journey with Providing and Supporting Mobile Technology Emporia State University The Faculty &
Redesigning College Teaching at Sacramento State University
The Broadband Pricing working Group
Institution Affiliated
Ed Barboni, Senior Advisor, Council of Independent Colleges
Project for OnLine Instructional Support (POLIS)
myIS.neu.edu – presentation screen shots accompany:
An App A Day Copyright Tina Oestreich and Brian Yuhnke This work is the intellectual property of the author. Permission is granted for this material.
Principal Deputy County Counsel
Export Controls – Export Provisions in Research Agreements
Presentation transcript:

EDUCAUSE Southwest Regional Conference 2005 FCC, Rogue Access Points, and Security: Can We Get There From Here? Doug Jackson Director, Technology Customer Services UT Dallas Copyright William Hargrove and Doug Jackson This work is the intellectual property of the authors. Permission is granted for this material to be shared for non-commercial, educational purposes, provided that this copyright statement appears on the reproduced materials and notice is given that the copying is by permission of the authors. To disseminate otherwise or to republish requires written permission from the authors. William Hargrove Executive Director, Information Resources UT Dallas

Background Wireless at UTD –Response to provisioning campus buildings/classrooms where wiring was too expensive or otherwise impractical. –Response to Student Pressure to Wire Apartments Apartment Complex Challenge –No Campus Connectivity –Estimates to Wire Prohibitive

The Problem: Apartment Network Instability –Frequent Equipment Resets –Unexplained Utilization Difficulties We Discovered –Malware Running Rampant –Private Access Point Proliferation/Interference Potential for Abuse –Common WEP Key –Authentication Spoofing

Initial Response Eliminate Private A/Ps Investigate Security Alternatives

Student Push-Back FCC Rules Citations Posts to Discussion Groups Student Government Involvement

FCC Rules FCC Act of 1934 (47 USC, Sec. 1 et. seq.) FCC 1996 OTARD Regulations ( CFR Title 47, Sec )

Over The Air Reception Devices - OTARD Restrictions on Antenna Placement Effective January 22, 1999, the Commission amended the rule so that it also applies to rental property where the renter has an exclusive use area, such as a balcony or patio. On October 25, 2000, the Commission further amended the rule so that it applies to customer- end antennas that receive and transmit fixed wireless signals. This amendment became effective on May 25,

More on OTARD The rule only applies to restrictions on property where the viewer has an ownership or leasehold interest and exclusive use or control. CFR Title - Section

Exception? 73 On the current record, we decline to extend the protections of our Section 207 rules to college dormitories. Purdue University argues that college housing is unique and, as such, should be exempt from our rules. Purdue Comments at 4. No one responded to Purdue's comments, and because no one has shown that a university has the same relationship to a dormitory resident as a landlord to a tenant, that a dormitory room is a leasehold, that landlord-tenant law applies equally to dormitories, or that the practical problems associated with extending our rules to leaseholds can be similarly resolved with respect to dormitories, we have no basis to cover college dormitories by our Section 207 rules at this time. Where, however, the relationship between a university and a viewer bears sufficient attributes of a commercial landlord-tenant relationship (e.g., where a university leases a single family home to a faculty member), our Section 207 rules will apply.

Airports Hit Brick Wall in Regulating Unlicensed Radio FEDERAL COMMUNICATIONS COMMISSION STAFF CLARIFIES FCCS ROLE REGARDING RADIO INTERFERENCE MATTERS AND ITS RULES GOVERNING CUSTOMER ANTENNAS AND OTHER UNLICENSED EQUIPMENT The FCCs Office of Engineering and Technology says that the function of regulating and coordinating frequency use is reserved to the FCC itself. The report says in part, the FCC has exclusive authority to resolve matters involving radio frequency interference [RFI] when unlicensed devices are being used, regardless of venue. We also affirm that the rights that consumers have under our rules to install and operate customer antennas one meter or less in size apply to the operation of unlicensed equipment, such as Wi-Fi access points - just as they do to the use of equipment in connection with fixed wireless services licensed by the FCC.

Meanwhile, back at the university…

Problem? What Problem? UTD leases apartments to students and provides basic network connectivity for residents via WiFi Some residents acquire & setup their own WiFi Access Points (which are protected by the FCC) Other residents berate IT to provide better signal (I.e.- no interference) Frustrated residents then get their own APs & service (leading to more interference)

Solution? What Solution? a) Alter future lease contracts to disallow certain devices? b) Ignore the FCC, force rogues to be shut down (& blame it on the boss!)? c) Leave the students to their own devices? d) Ask the Navy to use FCC for target practice? ANSWER: NONE of the above!?

What is UTD Doing Now? a) Problem reported to Help Desk, preliminary analysis performed b) Computer brought to Helpdesk, Basic configuration analyzed c) Hardware tested in known environment (HelpDesk) d) Computer then tested at apartment by user e) Test with university equipment outside apartment f) Browse for rogue APs/networks g) Tell student no solution available from university

What are the Alternatives? a) Proprietary solutions b) Unauthenticated Disassociation c) a d) Wired service e) Remove all services

What Does the Future Hold? a) Europe has WiFi and cellular jammers available for use in locations such as restaurants, theatres, churches, etc. (FCC does not allow this in USA) b) Potential impacts include social changes, metro vs. corporate networks co-existing, free vs. commercial services… c) This is an issue that will need to be addressed and has no clear precedent.

What Do YOU Think?