back to article Marriott fined $600k for deliberate JAMMING of guests' Wi-Fi hotspots

The Marriott has been fined $600,000 by the FCC for paralyzing guests' personal Wi-Fi hotspots, forcing them to use the hotel giant's expensive network instead. The US watchdog today said the Marriott Gaylord Opryland in Nashville, Tennessee, used monitoring equipment to illegally boot hotel and convention center guests off …

Page:

  1. Greg 24
    Pint

    Oh dear

    Friday evening - couldn't really get past the Hotel name, fokkers!

    1. Kingston Black

      Re: Oh dear

      Were the owners watching re-runs of the Dick Emery Show?

  2. NoneSuch Silver badge
    Devil

    Excuse me while I de-auth Marriott from my list of acceptable travel hotels.

    (Make note for P.A.)

    Thank you. Please carry on.

    1. larokus

      Yeah unfortunately this news comes a month after I've prebooked for next week, though not in Nashville. Needless to say I'll be watching out for NetEnforcer, though I'm not exactly sure what the CRTC does if anything so my complaints will likely work as well as my hotspot.

      1. Dan 55 Silver badge

        Now would be the time to investigate Bluetooth/USB tethering...?

        1. Number6

          That was my thought too, I've used the phone on a USB cable before now.

          1. Anonymous Coward
            Anonymous Coward

            Prebooked

            Don't you just mean booked?

            Interestingly enough I found a lot of hotels were giving free WiFi access of a reasonable quality when I traveled through France a few weeks ago. Especially the smaller more independent ones, surprisingly nice rooms and good service too.

    2. Persiflage

      Excellent call...

      ...now excuse me while I instruct our travel partners to de-auth Marriott from the entire company's list of acceptable travel hotels. Someone just made the "only permitted if no other option available" list.

      But hey, we only use booking software supplied by well-known, reputable vendors and I believe my actions to be lawful, so there's no reason for them to be upset, right?

  3. Robert E A Harvey

    Harvey's law

    I travel all over the world for work, and stop in accomodation ranging from a guesthouse to a 5 star business hotel.

    Harvey's law says that the higher the price of the room the more likely you are to have to pay for internet access. And the slower it will be.

    I've spent €30 a night in a gasthof in Germany, and got free super-fast internet, and paid $250 a night at an airport in the USA and been unable to connect to an nntp server despite paying an extra $50 for the right to try.

    1. garetht t

      Re: Harvey's law

      I'm not sure a hotel should be expected to allow nntp access, considering it's unsavoury usages far outweigh it's legally safe usages.

      1. Number6

        Re: Harvey's law

        This is why the first thing you do when connecting to hotel wifi (or even a wired connection) is to establish a VPN to a trusted machine elsewhere that you know can access all the services you want.

        1. John Tserkezis

          Re: Harvey's law

          "This is why the first thing you do when connecting to hotel wifi (or even a wired connection) is to establish a VPN to a trusted machine elsewhere that you know can access all the services you want."

          I tried this at one hotel, and found they had a machine in the middle that passed on url requests to the outside world for you. In other words, you could not directly connect to another server via their systems (VPNs will never work).

          This is where Harvey's Law (Part II) comes in. For every hotel that has tighter restrictions, directly opposite the hotel will be a Cafe that offers free WiFi with any purchase. There you can do all your VPNing and NNTPing you like.

          1. Daniel B.

            Re: Harvey's law

            I tried this at one hotel, and found they had a machine in the middle that passed on url requests to the outside world for you. In other words, you could not directly connect to another server via their systems (VPNs will never work).

            This is where you set up OpenVPN on its "port-sharing" mode, where it listens on port tcp/443 so you can deal with this exact scenario.

            1. Anonymous Coward
              Anonymous Coward

              Re: Harvey's law

              Quote: This is where you set up OpenVPN on its "port-sharing" mode

              If the hotel is crap enough and expensive enough that will not help either. Example the Etoille convention centre (nowdays Grand Hayatt) in Paris. Last time I was there (IETF 2011) it was killing any persistent sessions _INCLUDING_ port 443 and disallowing IM (so you use the hotel phone you know).

              1. Anonymous Coward
                Anonymous Coward

                Re: Harvey's law

                If the hotel is crap enough and expensive enough that will not help either. Example the Etoille convention centre (nowdays Grand Hayatt) in Paris. Last time I was there (IETF 2011) it was killing any persistent sessions _INCLUDING_ port 443

                I could sort of try to understand that if it were a company network (but not really). However, for a business where you are the customer to try that, it borders on the psychopathically suicidal.

                1. Yet Another Anonymous coward Silver badge

                  Re: Harvey's law

                  " it borders on the psychopathically suicidal."

                  It did say "in paris"!

                2. Terry 6 Silver badge

                  Re: Harvey's law

                  Not psychopathically suicidal, just normal bean counter thinking. They only see ways to syphon cash, (sorry maximise revenue) not the effect this has on the overall business.

                  1. MachDiamond Silver badge

                    Re: Harvey's law

                    "Not psychopathically suicidal, just normal bean counter thinking. They only see ways to syphon cash, (sorry maximise revenue) not the effect this has on the overall business."

                    The larger hotels have driven my business to small chains and independents that offer free internet and a nice cooked breakfast to attract customers. Nearly all of the time I only need a nice clean room with peace and quiet to get my head down and enough hot water to sluice off the day's dirt. Posh hotels just don't offer anything I find useful.

              2. Daniel B.
                Boffin

                Re: Harvey's law

                If the hotel is crap enough and expensive enough that will not help either. Example the Etoille convention centre (nowdays Grand Hayatt) in Paris. Last time I was there (IETF 2011) it was killing any persistent sessions _INCLUDING_ port 443 and disallowing IM (so you use the hotel phone you know).

                There are ways to getting around this as well, let's just say that I've encountered most of these scenarios. Yes, I'm including the persistent session killing on port 443.

                Hotels should wise up on the fact that they aren't going to stop a skillful hacker from getting his/her unrestricted internet access. We're willing to pay for internet access (even if it is far more expensive in some hotels than what it should be), but we expect unfiltered access to the 'net when doing so.

          2. Tom Chiverton 1

            Re: Harvey's law

            You know you can run SSH over HTTP right ? So straight through proxies ?

      2. goldcd

        I was always dubious

        of the copious amounts of boxed tissues hotels seem to leave around - but you're not charged by usage type.

      3. This post has been deleted by its author

      4. rav

        Re: Harvey's law

        The Hotel does not have the authority to JAM or otherwise interferre with a licensed radio service in the United States. WiFi, Bluetooth, Mobile phone service, GPS, commercial radio and broadcast radio and even your garage door opener are all LICENSED radio services in the United States. This includes schools, restaurants, movie theatres and your private residence.

        WiFi is a licensed service. It is also illegal to interfere with Cell phone emissions and your mobile WiFi.

        It is illegal to manufacture, import, sell and possess this equipment.

        There are NO EXCEPTIONS for ANY reason at all. The FCC will fine you and confiscate your equipment.

        1. DaLo

          Re: Harvey's law

          They weren't interferring with the radio signal, they were doing it on the data layer.

          1. AndyS

            Re: Harvey's law

            They weren't interferring with the radio signal, they were doing it on the data layer.

            Interesting response. To a layman the difference is irrelevant, and the result is the same. I wonder if the law is so tightly written that this counts as a loophole?

            Obviously the FCC wasn't particularly happy about the situation, so I'd assume they don't believe it matters how you mess with the signal (whether by flooding the radio spectrum with noise, or injecting malicious data packets). They seem to have concluded the hotel's actions were illegal, and slapped down a pretty big fine.

            1. DaLo

              Re: Harvey's law

              Just to clarify - I wasn't stating that it was therefore legal or okay to do, it was specifically in response to interfering/jamming a radio signal, which may be the same to a lay person but might not be the same to an expert. Could a WiFi user who uses their hotspot the same channel and maximum permitted power as their neighbour be accused of signal interference - not while the device is operating as intended I would presume?

              Whether it was legal or not, or more specifically under which law it would be prosecuted is still unknown as the hotel chain in question decided to pay to not find out and the FCC decided to accept the payment and not pursue it (If someone settles with a patent troll out of court doesn't mean they are guilty or the patent is valid, just that it is the most commercially attractive option).

              However I would suggest that they could be prosecuted under laws relating to computer misuse/DoS/hacking/data interception etc rather than radio signal interference.

          2. SImon Hobson Bronze badge

            Re: Harvey's law

            > They weren't interferring with the radio signal, they were doing it on the data layer.

            It's making a transmission with the sole function to disrupt legal use of a facility. So while you might not technically be interfering with the user's transmitted radio signal, you are deliberately interfering with another user's use of the band. In the UK this would be illegal :

            Wireless Telegraphy Act 2006, Section 68 http://www.legislation.gov.uk/ukpga/2006/36/section/68

            "A person commits an offence if he uses apparatus for the purpose of interfering with wireless telegraphy."

            Good to see it slapped down. Now if only our UK bodies could stop spending all their effort on coming up with excuses not to deal with interference caused by Powerline adapters.

        2. streaky

          Re: Harvey's law

          "The FCC will fine you and confiscate your equipment."

          Strictly speaking you can do jail time for this in the US. Also in the UK.

          I'd want to know who's smart idea it was and prosecute them accordingly.

          Oddly enough I'm absolutely convinced (but have no proof) that something similar is done with 3G data around underground stations that aren't under ground around London, one day I'll take some kit with me.. Phone calls no problem, pushing data - good luck!

      5. streaky

        Re: Harvey's law

        "considering it's unsavoury usages far outweigh it's legally safe usages"

        Yeah alright. Are you going to argue reasons not to go near black people next? It's a protocol, you'll allow it. Traffic volumes I can understand, because it's <x> protocol without knowing up front why is extremely obnoxious.

  4. James 100

    A small step in the right direction

    Now, can we please see the de-auth loophole closed so any old idiot can't disable wifi networks, and shut down all the firms selling these DoS tools?

    My old university (in the UK) pulled the same stunt on anything within range; perhaps a few more six figure fines in the news will stop this being mistaken for acceptable.

    1. BryceP

      Re: A small step in the right direction

      This has already been closed with 802.11w. The revision still needs widespread implementation and it does also introduce new issues, but it does prevent deauth as long as the AP requires protected management frames. Finding a combination of AP and device that both support it might be the difficult part, but all AC devices (and I'd bet most N devices manufactured in the last couple of years) should.

      1. Phil W

        Re: A small step in the right direction

        De-authing networks does have it's legitimate uses though. For instance in a business environment where people shouldn't be using their own Wi-Fi or plugging in unauthorised equipment in your buildings but do so anyway.

        1. Daniel B.

          Re: A small step in the right direction

          De-authing networks does have it's legitimate uses though. For instance in a business environment where people shouldn't be using their own Wi-Fi or plugging in unauthorised equipment in your buildings but do so anyway.

          If you're concerned with people plugging in unauthorised equipment, you should have actual MAC filters in your level 2&3 switches, not doing illegal DoS on the airwaves. I remember from my college years that the Cisco Catalyst 2950 has a "protected" mode for switchports where you could lock a port to a single MAC address. I would expect beefier stuff to have these kinds of security.

          1. petur

            Re: A small step in the right direction

            I remember once plugging my laptop in a switch on a customers' desk, and having IT stand next to me within 15 minutes. Good times...

            1. Keven E.

              Re: A small step in the right direction

              "I remember once plugging my laptop in a switch on a customers' desk, and having IT stand next to me within 15 minutes. Good times..."

              A reason to not run a DHCP server? <wink>

          2. theModge

            Re: A small step in the right direction

            Universities in the UK tend to be picky about what connects to them over wired networks at least - authorized mac addresses only. Over the WIFI however that's been dropped some time between when I was an under-grad and going back to do a phd - the wireless is set up so as to be very separate to the wired, but anyone with a valid (active directory) credentials on the university network can use it. Via gift of eduorome this applies to other universities as well.

          3. Tom 13

            Re: you should have actual MAC filters in your level 2&3 switches

            That's not the case the quashing is meant to stop. It's meant to stop setting up the wifi device, removing the network cable and plugging up the wifi. If the data is on the PC is still gets exfiltrated.

        2. Roland6 Silver badge

          Re: A small step in the right direction @Phil W

          "De-authing networks does have it's legitimate uses though."

          Yes it does, however those uses are within your own private business premises and you use kit like the AirDefense Security & Compliance solution to enforce published company policy.

          In a public space - which includes hotel bedrooms, it's use is highly questionable, particularly if it is done without being publicly declared (I bet the Marriott's signing in slip didn't include the guest accepting a clause forbidding the use of private WiFi...).

          1. Anonymous Coward
            Anonymous Coward

            Re: A small step in the right direction @Phil W

            Actually while 2.4Ghz and 5Ghz are ISM bands, Wifi isn't usually "licensed" due to there being limited non overlapping channels in said bands, disabling wifi other than theirs *could* be considered protecting their service (crap as it may be), also, I don't recall them needing to prohibit private wifi in words, same as businesses operating on their own turf don't need to post signs about unauthorized access.

            As to hotel bedrooms being public space, I call bullshit. If you want proof, try staying in a hotel room without paying and claiming (once you end up in court) that you have the right because It's "public", seriously, Hotel rooms are not public by any definition, that's why you have to pay for the use of one.

            I'll add that I am actually against wifi blocking just to be able to gouge to sell your own, but I believe that was the point of the article: Profiting by creating adverse conditions to sell theirs.

        3. streaky

          Re: A small step in the right direction

          "For instance in a business environment where people shouldn't be using their own Wi-Fi or plugging in unauthorised equipment in your buildings but do so anyway."

          Yeah, no, there's legal ways to prevent outside signals. If your security policy is based on "no wifi" but doesn't account for other signals you're already screwed. This is not the way to do this - and as I mentioned somewhere up there ^ it's a jailable offence in the US and the UK.

          "disabling wifi other than theirs *could* be considered protecting their service"

          At best this is anticompetitive. If your service isn't a rip off and doesn't suck you shouldn't need this. If it does and you're jamming people, seriously..

        4. StargateSg7

          Re: A small step in the right direction

          I just don't bother with cow dung like that! I use a custom BIOS which I wrote myself on my CUSTOM wifi router which I carry myself EVERYWHERE I go and it SPECIFICALLY STOPS attacks like this! It finds a free port and VPN's it to wherever I go disregardng ALL de-auth packets and ANYTHING else unless it's MY laptop Mac Address and personal encrypt/decrypt keys. I even have multiple DSP chips in it so I can bypass wireless completely and use my cell phone carrier's 22 megabits download, 10 megabits upload connections (Telus in Canada) for relatively DECENT internet connections. I even put custom hardware DSP chips and SDR (Software Defined Radio) software (self-built) the router with a wireless 4G line aggregator system so that I can use up to SIXTEEN 4G phone lines to get up to long-range wireless 200 megabits upload and 100 megabits download. Just make sure you pay your monthly bills for the 16 phone 4G numbers!

          Sometimes us eggheads REALLY ARE SMARTER than the rest of the plebes!

          We DON'T HAVE TO PUT UP WITH THE COW DUNG! We just bypass it!

    2. Adam 1

      Re: A small step in the right direction

      Fire with fire!

      Find the sales office for these de auth tools and return fire.

    3. Tom 13

      Re: shut down all the firms selling these DoS tools?

      Not sure where things stand on it legally at the moment, but about 10 years ago there were entirely reputable firms selling equipment that would perform these functions as part of securing a company's infrastructure. One of our network admins reviewed a wireless access solution that would both optimize the bandwidths for the installed access points as well as quash any unauthorized points within the operational area.

  5. Anonymous Coward
    Anonymous Coward

    'Posh Hostel'

    Thank you for that one El Reg.

  6. Nate Amsden

    curious how it works

    in case someone here knows -- flooding wifi with deauth - how does that not impact the hotel's own wifi? Unless the hotel wifi is on a single channel and the deauths are flooding all other channels (in which case you could work around it by using the same channel as the hotel?)

    I rarely use hotel wifi myself whether it is free or not, For some reason I feel safer for using the mifi on my phone, and I'm paying something like $50/mo for mifi anyway so might as well use it (unless cell coverage is bad).

    Hotel wifi is generally bad in my experience anyway.

    On that note I've never used other public wifi access spots like coffee shops(I don't drink coffee so am rarely in one anyway), airports(don't fly often anyway - also never used wifi on a plane) or whomever else seems to offer "free" wifi, generally don't trust them either (not that I feel the urge to need to use them in the first place so it's not like it's hard to resist).

    1. BryceP

      Re: curious how it works

      They probably whitelist their own MACs and flood everything else. Even if they can't see the MAC addresses of other wifi networks they'll know which networks are theirs and thus which ones not to flood.

      I'm not sure what that would mean for address cloning, but I doubt your average conference attendee is going to bother with that.

    2. BristolBachelor Gold badge
      Coat

      Re: curious how it works

      It probably sniffs WiFi packets, and for any not on their netwotk, sends a deauth.

      The solution is this: the radio hardware is pretty obvious. Simply imagine that you suffer from "electro-smog" phobia, rip the stuff from the ceiling/walls and claim it was self-defence, as it assaulted you.

      1. Anonymous Coward
        Anonymous Coward

        Re: curious how it works

        "...rip the stuff from the ceiling/walls and claim it was self-defence, as it assaulted you."

        Ah, I see why you are BristolBachelor.

        1. Martin-73 Silver badge

          Re: curious how it works

          While ripping it from the walls is a bit much, I'd CERTAINLY have turned it off if I found out what was going on

          1. Anonymous Coward
            Anonymous Coward

            Re: curious how it works

            I would rip it off, smash it to bits, and chuck if off the window. Or go BOFH and PFY style. And go "I don't know what you talking about" on them.

            Or dial 911.

Page:

POST COMMENT House rules

Not a member of The Register? Create a new account here.

  • Enter your comment

  • Add an icon

Anonymous cowards cannot choose their icon

Other stories you might like