Finesse of
Conscious
Containment:
Staying on Top of Security and
Spectrum Rules in
WIPS Deployments
#WLPC
Hemant Chaskar @CHemantC
Marriott agreed to pay a $600,000 fine
after the Federal Communications
Commission found the company blocked
consumer Wi-Fi networks last year
during an event at a hotel and conference
center in Nashville.
http://transition.fcc.gov/Daily_Releases/Dai
ly_Business/2014/db1003/DA-14-
1444A1.pdf
RF Shock
@CHemantC
Marriott has agreed to pay a $600,000 fine
after the Federal Communications
Commission found the company blocked
consumer Wi-Fi networks last year during
an event at a hotel and conference center
in Nashville.
Marriott fined $600,000 by FCC
for blocking guests' Wi-Fi
VS
http://apps.fcc.gov/ecfs/document/view?id=
60000986872
AHLA Petitions the FCC
@CHemantC
“Wi-Fi Operators Should Have The Ability to Manage Their
Networks In Order To Offer Secure And Reliable Wi-Fi
Service”
“Wi-Fi networks are more susceptible to a variety of attacks
that can threaten the security and reliability of a hotel's
network or pose a risk to guests, including: (i) signal
interception; (ii) unauthorized network access; (iii)
unauthorized access points; and (iv) access point spoofing.”
FCC Warning on Wi-Fi Blocking
“No hotel, convention center, or other
commercial establishment or the network
operator providing services at such
establishments may intentionally block or
disrupt personal Wi-Fi hot spots”
Predicament:
Caveats and Partial Coverage of Use
Cases = Confusion.
@CHemantC
For the Rest of the Presentation …
 Wear your engineering hat
 Stay focused on security (WIPS)
 Recognize concreate versus haze
 Disclaimer: I am NOT a regulatory authority.
 My arguments are based on technology knowledge
and civic sense.
@CHemantC
http://www.fcc.gov/document/warning-wi-fi-
blocking-prohibited
Any Wi-Fi device that is not mine is security threat,
must be crushed (contained)!
“Marriott International, Inc. deployed a Wi-Fi
deauthentication protocol to deliberately block
consumers who sought to connect to the Internet using
their own personal Wi-Fi hot spots. Marriott admitted
that the customers it blocked did not pose a security
threat.”
“No hotel, convention center, or other commercial
establishment or the network operator providing services
at such establishments may intentionally block or disrupt
personal Wi-Fi hot spots on such premises providing
services at such establishments may intentionally block or
disrupt personal Wi-Fi hot spots on such premises,
including as part of an effort to force consumers to
purchase access to the property owner’s Wi-Fi
network.”
“In addition, we reiterate that Federal law prohibits the
operation, marketing, or sale of any type of jamming
equipment, including devices that interfere with Wi-Fi,
cellular, or public safety communications.”
Brute Force =/= Security
Any Wi-Fi device
in the airspace
that is not mine
is a security
threat and must
be crushed
(contained)!
#WLPC@CHemantC
Finesse of Conscious Containment
Is there a way to use containment for
Wi-Fi security (WIPS), without:
 Harming legit users sharing the airwaves
 Causing airtime wastage
 Human intervention
@CHemantC
Fin. Con. Con. Rules
1) Only contain devices that you
control
2) Confirm violation before
containment
3) Do containment surgically
@CHemantC
Client Containment
Definition:
 Blocking specific client from connecting to AP
Clients that you control:
 Enterprise assigned clients
 For on-boarded clients (BYOD, Guest), take
opt-in permission if you plan to contain them
@CHemantC
Client Containment
Confirmed violation:
 Block controlled client’s association to
Honeypot/Hotspot/Ad hoc network when it
happens
Surgical deauth:
 Don’t disrupt other clients connecting to
Honeypot/Hotspot/Ad hoc network
 Well timed, feedback based deauth for minimal
airtime consumption
@CHemantC
Containment Airtime Consumption
@CHemantC
0.1
0.6
1.1
1.6
2.1
2.6
3.1
0 2 4 6 8 10 12
Percent(%)
Concurrent Associations Under Sustained Containment
Deauth + Connection Traffic
AP Containment
Definition:
 Blocking any client from connecting to AP
APs that you control:
 Managed enterprise APs
 Rogue APs: Unmanaged APs physically
connected to enterprise wired network
@CHemantC
Confirmed violation:
 Confirm rogue AP is physically connected to
your network (automatic or manual methods)
Surgical wireless containment:
 Do not disrupt neighborhood APs without
knowing if they are connected to your network
 Well timed, feedback based deauth for minimal
airtime consumption
AP Containment
@CHemantC
Wire-side containment is also an option
 Can bypass the FCC issue altogether
 Techniques: ARP tarpitting, switch port
blocking
AP Containment
@CHemantC
Closing Remarks
FCC vs Marriott spat opened a can of worms.
Regulatory guidance is missing for many use
cases.
Brute vs Fin. Con. Con. as technical matter.
Hope FCC will be clarify its stand on Fin. Con.
Con. and other use cases in future.
@CHemantC
Additional Information
FCC order and decree in the matter of Marriott International
Understanding FCC decision regarding Wi-Fi containment at Marriott by
Hemant Chaskar via @AirTight blog
Marriott Fined 600K by FCC for Blocking Guests Wi-Fi via SlideShare
FCC-Marriott WiFi Blocking Fine Opens Pandora’s Box by Lee Badman via
InformationWeek Network Computing
Wire-Side Containment – Hidden Gem of Rogue Access Point Protection
by Hemant Chaskar via @AirTight blog
AHLA Petition: Petition For Declaratory Ruling, Or In The Alternative, For
Rulemaking
FCC WARNING: Wi-Fi Blocking is Prohibited, January 27 2015
http://www.airtightnetworks.com/home/products/AirTight-WIPS.html
Thank you!
#WLPC

More Related Content

PPTX
Marriott Fined 600K by FCC for Blocking Guests Wi-Fi
PDF
Public wifi
PPTX
Powerpoint Team Invincibles Verizon
PDF
Oku Solutions Battle for 5 GHz
PDF
Verizon Media's Mason Ng and Francis Fung's Presentation at Mumbrella360 Asia
PPTX
A Guide to Securing Networks for Wi-Fi (IEEE 802.11 Family).pptx
PDF
Sprite guard on line brochure
PDF
Ensuring Business Continuity with Last-Mile Diversity and Redundancy
Marriott Fined 600K by FCC for Blocking Guests Wi-Fi
Public wifi
Powerpoint Team Invincibles Verizon
Oku Solutions Battle for 5 GHz
Verizon Media's Mason Ng and Francis Fung's Presentation at Mumbrella360 Asia
A Guide to Securing Networks for Wi-Fi (IEEE 802.11 Family).pptx
Sprite guard on line brochure
Ensuring Business Continuity with Last-Mile Diversity and Redundancy

Similar to WLPC: Staying on Top of Security and Spectrum Rules in WIPS Deployments by Hemant Chaskar (20)

PDF
FINAL PROJECT Dean Kay
PPTX
Ethical hacking
PPT
hotspot(wi-fi)
PPT
Santa Clara Law Presentation
PPT
Hold The Phone: Assessing the Rights of Wireless Handset Owners and the Netwo...
PDF
Security Assessment Report and Business Continuity Plan
DOCX
Background Information for World-Wide Trading CompanyWorld-Wide .docx
PPTX
Wi fi Technilogy
PDF
Public wifi
DOCX
Authentic Assessment Project (AAP) Jan 2017Background Informat.docx
DOCX
C10-1 CASE STUDY 10 CHOICE HOTELS INTERNATIONAL .docx
DOCX
C10-1 CASE STUDY 10 CHOICE HOTELS INTERNATIONAL .docx
DOCX
1. Part 1) Choose your own topic related to web technologiesappl.docx
PDF
e-Commerce: Chapter 6
PPTX
Trusted Wireless Environment (TWE)
DOCX
Case Study 3 Choice Hotels International By CIS505 C.docx
PDF
DS_Kloudyy_v2015
PPTX
PACE-IT, Security+1.5: Wireless Security Considerations
PDF
Cellular Data Offloading Through WIFI Mesh Network Utilizing White Space Freq...
PDF
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
FINAL PROJECT Dean Kay
Ethical hacking
hotspot(wi-fi)
Santa Clara Law Presentation
Hold The Phone: Assessing the Rights of Wireless Handset Owners and the Netwo...
Security Assessment Report and Business Continuity Plan
Background Information for World-Wide Trading CompanyWorld-Wide .docx
Wi fi Technilogy
Public wifi
Authentic Assessment Project (AAP) Jan 2017Background Informat.docx
C10-1 CASE STUDY 10 CHOICE HOTELS INTERNATIONAL .docx
C10-1 CASE STUDY 10 CHOICE HOTELS INTERNATIONAL .docx
1. Part 1) Choose your own topic related to web technologiesappl.docx
e-Commerce: Chapter 6
Trusted Wireless Environment (TWE)
Case Study 3 Choice Hotels International By CIS505 C.docx
DS_Kloudyy_v2015
PACE-IT, Security+1.5: Wireless Security Considerations
Cellular Data Offloading Through WIFI Mesh Network Utilizing White Space Freq...
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
Ad

More from AirTight Networks (8)

PPTX
iBeacon Reality Check _ Essential Considerations for an iBeacon Deployment
PPTX
The Impact of IoT on Enterprise Wi-Fi by AirTight Networks via Slideshare
PPTX
The New Economics of Wi-Fi _ Disruptive Forces Driving Innovation for Carrier...
PPTX
WizShark : Wi-Fi Troubleshooting Made Easy - CWNP Conference 2014
PDF
PDF
SMAC - Presentation from RetailWeek Technology Summit, Sept 23
PPTX
SMAC _ Can It Maximise Staff and Customer Engagement? RWTS
PPT
Cafe Latte
iBeacon Reality Check _ Essential Considerations for an iBeacon Deployment
The Impact of IoT on Enterprise Wi-Fi by AirTight Networks via Slideshare
The New Economics of Wi-Fi _ Disruptive Forces Driving Innovation for Carrier...
WizShark : Wi-Fi Troubleshooting Made Easy - CWNP Conference 2014
SMAC - Presentation from RetailWeek Technology Summit, Sept 23
SMAC _ Can It Maximise Staff and Customer Engagement? RWTS
Cafe Latte
Ad

Recently uploaded (20)

PDF
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
PPTX
MicrosoftCybserSecurityReferenceArchitecture-April-2025.pptx
PDF
Five Habits of High-Impact Board Members
PDF
UiPath Agentic Automation session 1: RPA to Agents
PDF
CloudStack 4.21: First Look Webinar slides
PDF
Enhancing plagiarism detection using data pre-processing and machine learning...
PPTX
Build Your First AI Agent with UiPath.pptx
PDF
Developing a website for English-speaking practice to English as a foreign la...
PPTX
Custom Battery Pack Design Considerations for Performance and Safety
PPTX
The various Industrial Revolutions .pptx
PPTX
AI IN MARKETING- PRESENTED BY ANWAR KABIR 1st June 2025.pptx
PDF
The influence of sentiment analysis in enhancing early warning system model f...
PDF
STKI Israel Market Study 2025 version august
PPTX
Chapter 5: Probability Theory and Statistics
PPTX
TEXTILE technology diploma scope and career opportunities
PDF
Zenith AI: Advanced Artificial Intelligence
PDF
“A New Era of 3D Sensing: Transforming Industries and Creating Opportunities,...
PDF
Architecture types and enterprise applications.pdf
PDF
1 - Historical Antecedents, Social Consideration.pdf
PDF
How ambidextrous entrepreneurial leaders react to the artificial intelligence...
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
MicrosoftCybserSecurityReferenceArchitecture-April-2025.pptx
Five Habits of High-Impact Board Members
UiPath Agentic Automation session 1: RPA to Agents
CloudStack 4.21: First Look Webinar slides
Enhancing plagiarism detection using data pre-processing and machine learning...
Build Your First AI Agent with UiPath.pptx
Developing a website for English-speaking practice to English as a foreign la...
Custom Battery Pack Design Considerations for Performance and Safety
The various Industrial Revolutions .pptx
AI IN MARKETING- PRESENTED BY ANWAR KABIR 1st June 2025.pptx
The influence of sentiment analysis in enhancing early warning system model f...
STKI Israel Market Study 2025 version august
Chapter 5: Probability Theory and Statistics
TEXTILE technology diploma scope and career opportunities
Zenith AI: Advanced Artificial Intelligence
“A New Era of 3D Sensing: Transforming Industries and Creating Opportunities,...
Architecture types and enterprise applications.pdf
1 - Historical Antecedents, Social Consideration.pdf
How ambidextrous entrepreneurial leaders react to the artificial intelligence...

WLPC: Staying on Top of Security and Spectrum Rules in WIPS Deployments by Hemant Chaskar

  • 1. Finesse of Conscious Containment: Staying on Top of Security and Spectrum Rules in WIPS Deployments #WLPC Hemant Chaskar @CHemantC
  • 2. Marriott agreed to pay a $600,000 fine after the Federal Communications Commission found the company blocked consumer Wi-Fi networks last year during an event at a hotel and conference center in Nashville. http://transition.fcc.gov/Daily_Releases/Dai ly_Business/2014/db1003/DA-14- 1444A1.pdf RF Shock @CHemantC Marriott has agreed to pay a $600,000 fine after the Federal Communications Commission found the company blocked consumer Wi-Fi networks last year during an event at a hotel and conference center in Nashville. Marriott fined $600,000 by FCC for blocking guests' Wi-Fi VS
  • 3. http://apps.fcc.gov/ecfs/document/view?id= 60000986872 AHLA Petitions the FCC @CHemantC “Wi-Fi Operators Should Have The Ability to Manage Their Networks In Order To Offer Secure And Reliable Wi-Fi Service” “Wi-Fi networks are more susceptible to a variety of attacks that can threaten the security and reliability of a hotel's network or pose a risk to guests, including: (i) signal interception; (ii) unauthorized network access; (iii) unauthorized access points; and (iv) access point spoofing.”
  • 4. FCC Warning on Wi-Fi Blocking “No hotel, convention center, or other commercial establishment or the network operator providing services at such establishments may intentionally block or disrupt personal Wi-Fi hot spots” Predicament: Caveats and Partial Coverage of Use Cases = Confusion. @CHemantC
  • 5. For the Rest of the Presentation …  Wear your engineering hat  Stay focused on security (WIPS)  Recognize concreate versus haze  Disclaimer: I am NOT a regulatory authority.  My arguments are based on technology knowledge and civic sense. @CHemantC
  • 6. http://www.fcc.gov/document/warning-wi-fi- blocking-prohibited Any Wi-Fi device that is not mine is security threat, must be crushed (contained)! “Marriott International, Inc. deployed a Wi-Fi deauthentication protocol to deliberately block consumers who sought to connect to the Internet using their own personal Wi-Fi hot spots. Marriott admitted that the customers it blocked did not pose a security threat.” “No hotel, convention center, or other commercial establishment or the network operator providing services at such establishments may intentionally block or disrupt personal Wi-Fi hot spots on such premises providing services at such establishments may intentionally block or disrupt personal Wi-Fi hot spots on such premises, including as part of an effort to force consumers to purchase access to the property owner’s Wi-Fi network.” “In addition, we reiterate that Federal law prohibits the operation, marketing, or sale of any type of jamming equipment, including devices that interfere with Wi-Fi, cellular, or public safety communications.” Brute Force =/= Security Any Wi-Fi device in the airspace that is not mine is a security threat and must be crushed (contained)! #WLPC@CHemantC
  • 7. Finesse of Conscious Containment Is there a way to use containment for Wi-Fi security (WIPS), without:  Harming legit users sharing the airwaves  Causing airtime wastage  Human intervention @CHemantC
  • 8. Fin. Con. Con. Rules 1) Only contain devices that you control 2) Confirm violation before containment 3) Do containment surgically @CHemantC
  • 9. Client Containment Definition:  Blocking specific client from connecting to AP Clients that you control:  Enterprise assigned clients  For on-boarded clients (BYOD, Guest), take opt-in permission if you plan to contain them @CHemantC
  • 10. Client Containment Confirmed violation:  Block controlled client’s association to Honeypot/Hotspot/Ad hoc network when it happens Surgical deauth:  Don’t disrupt other clients connecting to Honeypot/Hotspot/Ad hoc network  Well timed, feedback based deauth for minimal airtime consumption @CHemantC
  • 11. Containment Airtime Consumption @CHemantC 0.1 0.6 1.1 1.6 2.1 2.6 3.1 0 2 4 6 8 10 12 Percent(%) Concurrent Associations Under Sustained Containment Deauth + Connection Traffic
  • 12. AP Containment Definition:  Blocking any client from connecting to AP APs that you control:  Managed enterprise APs  Rogue APs: Unmanaged APs physically connected to enterprise wired network @CHemantC
  • 13. Confirmed violation:  Confirm rogue AP is physically connected to your network (automatic or manual methods) Surgical wireless containment:  Do not disrupt neighborhood APs without knowing if they are connected to your network  Well timed, feedback based deauth for minimal airtime consumption AP Containment @CHemantC
  • 14. Wire-side containment is also an option  Can bypass the FCC issue altogether  Techniques: ARP tarpitting, switch port blocking AP Containment @CHemantC
  • 15. Closing Remarks FCC vs Marriott spat opened a can of worms. Regulatory guidance is missing for many use cases. Brute vs Fin. Con. Con. as technical matter. Hope FCC will be clarify its stand on Fin. Con. Con. and other use cases in future. @CHemantC
  • 16. Additional Information FCC order and decree in the matter of Marriott International Understanding FCC decision regarding Wi-Fi containment at Marriott by Hemant Chaskar via @AirTight blog Marriott Fined 600K by FCC for Blocking Guests Wi-Fi via SlideShare FCC-Marriott WiFi Blocking Fine Opens Pandora’s Box by Lee Badman via InformationWeek Network Computing Wire-Side Containment – Hidden Gem of Rogue Access Point Protection by Hemant Chaskar via @AirTight blog AHLA Petition: Petition For Declaratory Ruling, Or In The Alternative, For Rulemaking FCC WARNING: Wi-Fi Blocking is Prohibited, January 27 2015 http://www.airtightnetworks.com/home/products/AirTight-WIPS.html