FCC: Stop Blocking Personal WiFi

Great news for travelers: Hotels and other businesses cannot interfere with your personal WiFi hotspot.

Thomas Claburn, Editor at Large, Enterprise Mobility

January 28, 2015

3 Min Read
<p align="center">(Image: <a href="https://www.flickr.com/photos/wwworks/5349327692/in/photolist-99GGKN-6rfT96-6rfVVn-6rfUha-Ydwn-9CrRcp-9njwNs-YdxM-ch2VmL-9ngtgr-jT1vu-7eE1J2-ksDW4U-9koYEz-4ZmYGs-7Zrfz6-5rvU9L-6Pxt5a-9m3uyr-4FSjuv-fPTnW1-6AmAda-6dFqq9-4qeQDY-82isf-6z6aYm-niBJ4k-5rrymF-5rvQ2G-oRvkk3-b5TEPP-3g5rb-fHs5c-5LmSCD-7ZP8Wc-5rrvZv-5K8PRc-axQAfP-5VwWqR-6RWFtc-anLa5P-fkcPi-5D5Pe-6XWDY-ftby2-6C7m5q-8L5ZXs-efnT7-axdjzn-axg29j" target="blank">woodleywonderworks</a> -- CC BY 2.0)</p>

First Transcontinental Phone Call: A 100-Year Celebration

First Transcontinental Phone Call: A 100-Year Celebration


First Transcontinental Phone Call: A 100-Year Celebration (Click image for larger view and slideshow.)

If you're a business traveler looking to use your own WiFi hotspot on the road, the FCC has made your life a whole lot easier. If you're an IT or security executive at a commercial establishment looking to protect your guests, your life is now a lot more complicated.

The Federal Communications Commission made it clear that blocking people's WiFi hotspots will not be tolerated. "Willful or malicious interference with WiFi hotspots is illegal," the agency stated in an enforcement advisory on Tuesday, noting that doing so violated Section 333 of the Communications Act.

The agency characterized WiFi blocking as a "disturbing trend in which hotels and other commercial establishments block wireless consumers from using their own personal WiFi hotspots on the commercial establishment's premises."

[ Check out what Google has planned for its new wireless service. Read Google's Wireless Service Taps WiFi and Cellular. ]

To date, this trend consists of one recent public case involving Marriott International. In an email to InformationWeek, an FCC spokesperson declined to discuss the number of WiFi blocking complaints the agency has received or the number of such cases, if any, the agency is investigating.

In October 2014, Marriott International agreed to pay $600,000 to settle an FCC complaint that it jammed guests' mobile WiFi hotspots at its Gaylord Opryland hotel and conference facility in Nashville, Tenn.

Initially, Marriott argued that it did so to protect guests "from rogue wireless hotspots that can cause degraded service, insidious cyber-attacks and identity theft," noting that it employed common FCC-authorized equipment to do so.

After widespread outcry over the company's actions, Marriott stopped insisting that WiFi blocking is lawful. "Marriott International listens to its customers, and we will not block guests from using their personal WiFi devices at any of our managed hotels," the company said in a statement in mid-January. At the same time, the company added that it wants clarification from the FCC about allowable network security measures. (In its October 2014 consent decree with the FCC, Marriott conceded that personal WiFi usage didn't represent a security threat.)

The clarification that's required is whether deauthentication always represents unlawful jamming.

Wireless network management systems from vendors such as Cisco often include options like the ability to send deauthentication ("deauth") packets to boot unauthorized users from a network, including a rogue network operated by someone else.

An FCC spokesperson said in an email that Section 333 of the Communications Act applies "to willful or malicious interference with WiFi hotspots" and that the statutory term "interfere with" includes de-authentication as well as the electromagnetic interference emitted from a jamming device.

The term doesn't include unintentional interference, so deauthentication done for the purpose of load balancing appears to be acceptable. Nor does it include use of de-authentication on one's own network.

Attend Interop Las Vegas, the leading independent technology conference and expo series designed to inspire, inform, and connect the world's IT community. In 2015, look for all new programs, networking opportunities, and classes that will help you set your organization’s IT action plan. It happens April 27 to May 1. Register with Discount Code MPOIWK for $200 off Total Access & Conference Passes.

About the Author(s)

Thomas Claburn

Editor at Large, Enterprise Mobility

Thomas Claburn has been writing about business and technology since 1996, for publications such as New Architect, PC Computing, InformationWeek, Salon, Wired, and Ziff Davis Smart Business. Before that, he worked in film and television, having earned a not particularly useful master's degree in film production. He wrote the original treatment for 3DO's Killing Time, a short story that appeared in On Spec, and the screenplay for an independent film called The Hanged Man, which he would later direct. He's the author of a science fiction novel, Reflecting Fires, and a sadly neglected blog, Lot 49. His iPhone game, Blocfall, is available through the iTunes App Store. His wife is a talented jazz singer; he does not sing, which is for the best.

Never Miss a Beat: Get a snapshot of the issues affecting the IT industry straight to your inbox.

You May Also Like


More Insights