New York attorney general blasts FCC for ignoring fake net neutrality comments

Flickr via USDA. Click for original.

Flickr via USDA. Click for original. (Image credit: Flickr via USDA)

In all likelihood, the FCC will soon strip away net neutrality rules that were introduced under the previous administration. To make matters worse, the commenting period that was to allow Americans to share their thoughts and feedback on the FCC's proposal to remove net neutrality rules may have been corrupted by what New York attorney general Eric Schneiderman called "fake comments."

The AG posted an open letter to FCC chairman Ajit Pai criticizing him and the FCC as a whole for refusing to cooperate with an investigation into "the fraudulent use of Americans' identities" to spam the comments. Schneiderman says his office has been investigation "a massive scheme to corrupt the FCC's notice and comment process" for the past six months, during which time it asked for crucial information on at least 9 times.

"In May 2017, researchers and reporters discovered that the FCC’s public comment process was being corrupted by the submission of enormous numbers of fake comments concerning the possible repeal of net neutrality rules. In doing so, the perpetrator or perpetrators attacked what is supposed to be an open public process by attempting to drown out and negate the views of the real people, businesses, and others who honestly commented on this important issue," Scheiderman wrote. "Worse, while some of these fake comments used made up names and addresses, many misused the real names and addresses of actual people as part of the effort to undermine the integrity of the comment process."

An investigation led by Scheiderman revealed that tens of thousands of residents in New York alone may have had their identities misused in such a manner. Scheiderman likened the situation to identify theft, but on a massive scale.

It's not clear if the fake comments were in support of repealing net neutrality, as the FCC has proposed, or were part of the "overwhelming majority" who oppose the plan, of which Scheiderman is a part of. Scheiderman said it doesn't matter either way, that it's not about the issues. The bigger issue, he says, is that the misuse of hundreds of thousands should be concerning to everyone, whether they are for or against net neutrality. That, and the FCC's unwillingness to aid the investigation.

"We reached out for assistance to multiple top FCC officials, including you, three successive acting FCC General Counsels, and the FCC’s Inspector General. We offered to keep the requested records confidential, as we had done when my office and the FCC shared information and documents as part of past investigative work," Scheiderman wrote. "Yet we have received no substantive response to our investigative requests. None."

The proposal in question received over 22 million comments over the summer. A final revision will be released today and voted on next month.

Paul Lilly

Paul has been playing PC games and raking his knuckles on computer hardware since the Commodore 64. He does not have any tattoos, but thinks it would be cool to get one that reads LOAD"*",8,1. In his off time, he rides motorcycles and wrestles alligators (only one of those is true).

Latest in Networking
Netgear Nighthawk XR1000
Netgear says certain router owners should 'download the latest firmware as soon as possible' to patch a critical vulnerability
TP-Link AXE75 Wi-Fi 6E router
US congressman calls again for the government to ban Chinese-made TP-Link routers: 'I would not have that in my home'
An illustration of a silhouetted thief in motion running while carrying a stolen fingerprint. This could represent individuality, identity, privacy concerns, or a concept of personal data being in motion or at risk. The combination of the human form with the unique identifier of a fingerprint offers a visual metaphor for themes such as identity theft, digital security, or the trace we leave behind in a digital age. The overall aesthetic is bold and dynamic, fitting for topics of cybersecurity, personal identity, or discussions about the intersection of humanity and technology.
Hackers hijack over 16,000 TP-Link network devices, creating a big ol' botnet that's absolutely slamming Microsoft Azure accounts
Netgear Nighthawk RS300 Wi-Fi 7 router
Netgear Nighthawk RS300 review
TP-Link Archer GE800 router
US lawmakers believe TP-Link networking products come with an 'unusual degree of vulnerabilities' leaving them vulnerable to hackers
A racing car in F1 2022 game with a cartoon explosion overlayed on top
Today I learned F1 cars can have their engines disabled wirelessly via IP connection
Latest in News
An Enshrouded player in a recreation of Erebor from The Lord of the Rings
Kings under the Mountain! 33 Enshrouded players spent 10,000 hours to recreate this iconic location from The Lord of the Rings
A mech awakens.
Mecha Break developer is considering unlocking all mechs following open beta feedback
Lara Croft Unified Art
Tomb Raider developer Crystal Dynamics lays off 17 employees 'to better align our current business needs and the studio's future success'
A long bendy arm stealing money from people in a subway car
'You're a very long arm. You steal things. It's a comedy game,' explains developer of comedy game where you steal things with a very long arm
The heroes are attacked by monsters
Pillars of Eternity is getting turn-based combat to mark its 10th anniversary, and that means PC Gamer editors will soon be arguing about combat mechanics again
Image of Ronaldo from Fatal Fury: City of the Wolves trailer
It doesn't really make sense that soccer star Ronaldo is now a Fatal Fury character, but if you follow the money you can see how it happened