Skip to main content

FCC commissioner wants an investigation into Wi-Fi at presidential debate

how to follow election results online 2016 presidential trump clinton debate watch
Image used with permission by copyright holder
The Federal Communications Commission was asked to investigate the banning of journalists’ Wi-Fi hot spots at Monday’s presidential debate at Hofstra University.

Jessica Rosenworcel, an FCC commissioner, has requested the agency investigate the restriction that banned journalists from using their own Wi-Fi hot spot inside the venue, which staged the first debate of the election. Members of the press were required to pay $200 to use the venue’s own Wi-Fi.

With the furor over the banning of personal hot spots, Hofstra University had been accused of detecting these other networks — there are no accusations of jamming however. A journalist from Politico tweeted an image of a device inside the venue that he claims officials were using to detect non-permitted Wi-Fi networks.

Technicians patrolling #debatenight press file using this device to detect & shut down hotspots, so they can sell $200 wifi accounts instead pic.twitter.com/JzbkzlZR1g

— Kenneth P. Vogel (@kenvogel) September 26, 2016

In a tweet of her own, Rosenwercel said the arrangement for Wi-Fi at the event was “not right” and there was a precedent. She linked to an FCC ruling from 2015 that ruled against a company called Smart City Holdings for carrying out Wi-Fi blocking. The company was fined $750,000 at the time. The FCC has also in the past handed down fines to hotels for jamming guests’ Wi-Fi hot spots.

In response to the reports, Hofstra University told Ars Technica in a statement that the criteria for Wi-Fi networks at debates came from the Commission on Presidential Debates.

“For Wi-Fi to perform optimally the system must be tuned with each access point and antenna. When other Wi-Fi access points are placed within the environment the result is poorer service for all. To avoid unauthorized access points that could interfere, anyone who has a device that emits RF frequency must register the device,” the university’s spokesperson Karla Schuster said. “Whenever a RF-emitting device was located, the technician notified the individual to visit the RF desk located in the Hall. The CPD RF engineer would determine if the device could broadcast without interference.”

Jonathan Keane
Former Digital Trends Contributor
Jonathan is a freelance technology journalist living in Dublin, Ireland. He's previously written for publications and sites…
A dangerous new jailbreak for AI chatbots was just discovered
the side of a Microsoft building

Microsoft has released more details about a troubling new generative AI jailbreak technique it has discovered, called "Skeleton Key." Using this prompt injection method, malicious users can effectively bypass a chatbot's safety guardrails, the security features that keeps ChatGPT from going full Taye.

Skeleton Key is an example of a prompt injection or prompt engineering attack. It's a multi-turn strategy designed to essentially convince an AI model to ignore its ingrained safety guardrails, "[causing] the system to violate its operators’ policies, make decisions unduly influenced by a user, or execute malicious instructions," Mark Russinovich, CTO of Microsoft Azure, wrote in the announcement.

Read more