Pipe 2T6A Marriott fined $600,000 by FCC for interfering with customer WiFi hotspots

Marriott fined $600,000 by FCC for interfering with customer WiFi hotspots

by
in legal on (#2T6A)
Marriott (since 2012) has been using wireless technology to prevent guests at the Gaylord Opryland hotel and convention center from using their own Wi-Fi mobile hotspots, forcing exhibitors or customers to use Marriott’s expensive Internet services, available at the whopping cost of $250 to $1,000 per wireless access point. Despite popular press reports, this did not involve "jamming" which is strictly illegal in the US, but instead something more like a WiFi DoS attack.

Marriott had deployed a Wi-Fi monitoring system with a “containment capability”. When activated, the system could identify Wi-Fi access points that were not part of Marriott’s own Wi-Fi system (or otherwise authorized by Marriott). Such non-Marriott access points were dubbed “rogues”. When rogues were detected, the system sent “de-authorization” packets to the unauthorized access points, booting those users off their free connections and, presumably, forcing them to pony up for Marriott’s paid Internet access.

http://www.commlawblog.com/2014/10/articles/enforcement-activities-fines-f/marriott-whacked-for-600000-for-war-on-rogue-wifi-hotspots/

History

2014-10-09 16:17
Marriott fined $600,000 by FCC for interfering with customer WiFi hotspots
zafiro17@pipedot.org
Marriott (since 2012) has been using wireless technology to prevent guests at the Gaylord Opryland hotel and convention center from using their own Wi-Fi mobile hotspots, forcing exhibitors or customers to use Marriott’'s expensive Internet services, available at the whopping cost of $250 to $1,000 per wireless access point. Despite popular press reports, this did not involve "jamming" which is strictly illegal in the US, but instead something more like a WiFi DoS attack.

Marriott had deployed a Wi-Fi monitoring system with a “"containment capability”". When activated, the system could identify Wi-Fi access points that were not part of Marriott’'s own Wi-Fi system (or otherwise authorized by Marriott). Such non-Marriott access points were dubbed “"rogues”". When rogues were detected, the system sent “"de-authorization”" packets to the unauthorized access points, booting those users off their free connections and, presumably, forcing them to pony up for Marriott’'s paid Internet access.

http://www.commlawblog.com/2014/10/articles/enforcement-activities-fines-f/marriott-whacked-for-600000-for-war-on-rogue-wifi-hotspots/
Reply 0 comments