1. 6

Hotel Operator Admits Employees Improperly Used Wi-Fi Monitoring System to Block Mobile Hotspots; Agrees to Three-Year Compliance Plan.

  1.  

  2. 6

    Via DSLR.

    Also, Marriott’s response at http://www.prnewswire.com/news-releases/marriott-internationals-statement-on-fcc-ruling-278050441.html and http://news.marriott.com/2014/10/marriott-internationals-statement-on-fcc-ruling.html.

    In summary, this was specific to one single property in Nashville, Tennessee; however, the ruling appears to be specifically against Marriott (it’s unclear whether it applies to all the franchise locations, though).

    They were basically sending de-auth packets for any foreign hotspots; something that’s very easy to do; you can send these via OpenBSD’s hostapd / hostapd.conf(5) / IEEE80211_FC0_SUBTYPE_DEAUTH; IIRC, there’s even a way to cycle through all the channels from 1 to 14 (hopper keyword), sending these deauth packets to everyone; I’ve tried it as a test years ago — it works (I think Reyk had a talk about it years back, which was what spiked my interest back then).

    Allegedly, as per DSLR, some such deauth feature was available as an option in some Cisco equipment (which, allegedly, has since been removed from newer versions of said equipment).

    1. 1

      There are apps that are made to specifically exploit this: wificurse and aircrack-ng (one of the modes)

    2. 3

      I never felt like pursuing it but they would also spoof the mail server of any outbound SMTP traffic and then send it on. Which I think would run afoul with wiretapping laws.