Home » CMA Communications »Consumer News »HissyFitWatch »Internet Overcharging » Currently Reading:

ISP Crams Its Own Ads All Over Your Capped Internet Connection; Banners Block Your View

Phillip Dampier April 3, 2013 CMA Communications, Consumer News, HissyFitWatch, Internet Overcharging 13 Comments
Bad clutter.

Bad clutter.

How would you like it if a banner ad was inserted on the bottom of every web page, on top of content you are trying to read and eating away at your usage allowance?

Customers of CMA Communications can tell you, because their web browsing experience now includes advertising messages injected by the cable company to earn more revenue.

CMA, which operates rural cable systems in Texas, Louisiana, Mississippi and Nevada, provides up to 7/1Mbps service with a usage cap of 250GB they borrowed from Comcast.

Zachary Henkel discovered the rude intrusion last month when he navigated to Apple’s website and discovered an intrusive banner ad for H&R Block.

Tired from the day’s events and travel, I had planned to quickly look up the specifications of a Mac Mini, respond to a few emails and then get some sleep. But as Apple.com rendered in my browser, I realized I was in for a long night. What I saw was something that would make both designers and computer programmers wince with great displeasure. At the bottom of the carefully designed white and grey webpage, appeared a bright neon green banner advertisement proclaiming: “File For Free Online, H&R Block”. I quickly deduced that either Apple had entered in to the worst cross-promotional deal ever, or my computer was infected with some type of malware. Unfortunately, I would soon discover there was a third possibility, something much worse.

[…] It was apparent at this point, that my parent’s ISP, CMA Communications, had started injecting advertisements into websites requested by their customers. I felt dissatisfied to say the least. […] You might not be surprised to know that CMA Communications won’t confirm or deny that they are injecting advertisements into their customer’s web traffic.

Customers of CMA Communications see this when they visit apple.com

Customers of CMA Communications see this when they visit apple.com.

CMA Communications is using JavaScript code injection that overlays third-party advertisements on top of various websites, opening the door to subscriber irritation and some obvious conflicts. In fact, visitors to CMA’s own website could find themselves staring at advertising for CenturyLink, AT&T, or a satellite competitor, unless CMA specifically opts its own website out of the third-party ads.

Amazon.com features an ad with Flo from Progressive Insurance, LinkedIn links to a Verizon 4G phone ad, and Bing’s home page pitches AT&T phones. Henkel wants customers to complain, but the affected websites may be in the best place to stop the ad injections by threatening lawsuits against the cable company.

Currently there are 13 comments on this Article:

  1. Or the websites could switch to using SSL for all connections, preventing content injection and rendering the provider’s money-grabbing tactics (as well as any deep packet inspection!) moot.

    (I’m in the process of doing so for my paltry little domain, too.)

  2. elfonblog says:

    I’d be semi-fine with this as long as it was opt-in, and I received a big discount for participating. This kind of crap really doesn’t fly unless it’s packaged with “free” wifi at merchant locations. Also, I’d demand either unlimited bandwidth (who knows how big the embedded applets in these ads are?) or some confirmed method to keep the ads from being counted toward any limit I suffered.

    • baelstrieri says:

      Yeah, you may be ok with it but websites like Google, Amazon, and Apple will not. CMA is not only injecting ads where there normally would not be any, but they are also overlapping ads that were originally in place.

      This is not ok..

      • elfonblog says:

        I’m pretty sure the courts will rule against this ad injection, as there is relative precedent, unless the payola is big enough.

        I recall a few years back that there was an absolutely voluntary, opt-in community, using a browser plug-in, which shared tags/comments which they placed on various websites. Other members of the community would see these tags when they visited the same websites. It was like a commenting system which was out of the hands of the website where the comments were being left. And commercial websites hated it with a burning vengeance. The websites weren’t actually being modified in any way, the community simply saw an overlay when their browser plug-in recognized the web address. The court was still persuaded that the websites were somehow being “defaced”, ruled generously for damage$, and put the plug-in company out of business. I think the court was absolutely wrong, btw. The plug-in co must have had a terrible lawyer. This was clearly free speech, and the judge set a shockingly dangerous precedent by outlawing it even when it took place in an entirely different web-space.

        The ad injection doesn’t just change the look and feel of particular websites, it seems capable of changing ANY website. And it’s not a community of people exercising free speech, but rather a centralized network of advertisement propaganda. And it’s for profit. And there’s no opting out for the web user. If the august courts ruled against free speech in this form, they sure as hell better rule against for-profit malarkey of an even more intrusive sort.

  3. Anonymous says:

    I just use Ad Block Plus to prevent this sort of thing.

    • baelstrieri says:

      It has been stated that Ad Block is not able to prevent this.

      According to other users on reddit who are subjected to this, the only way to block it is to harvest and block the IP that the injected content is served from at the router level.

      • elfonblog says:

        Ad Block could be updated to block this easily. Ad Block works by examining the web page source which is received, recognizing components, and modifying it to eliminate unwanted elements. Basically the reverse of the ad-injection. Ad code is going to be conspicuous. Obfuscated ad code will still be conspicuous. The bottom line is that the ad code cannot hide from Ad Block. You’ll still download the code script, though not the graphics and embedded applets it calls in turn. These scripts will be removed before your browser takes over and displays what is left. The ad injection would have to get seriously ballsy, like transparently proxying a website’s banner graphic, and pasting the illicit ads into the image file itself so that Ad Block thinks it’s source is legitimate.

  4. txpatriot says:

    Does the ad content (esp. videos) count against the user’s data cap?

  5. James R Curry says:

    More than the cap issue, it’s the gall, the sheer impertinence and the sense of entitlement required to routinely interfere with and, indeed, alter the nature of a communication between your customers, and a third party.

    If I were to call Apple on the telephone, it wouldn’t be acceptable for my call to be interrupted by a robotic voice telling me that my discussion was being sponsored by H&R Block. So why do these companies feel that it’s in any way acceptable to alter the content of a web session in the same manner?

    On top of all of that, there are enormous privacy and security implications to what they’re doing. Charging the ads against the customer’s usage cap is just salt in the wound.

Search This Site:

Contributions:

Recent Comments:

  • Angela Ehlers (Former Employee): Wow, talk about pointing the finger! Employees are the backbone of your business, without them, you don't have a successful company. How about looking...
  • Frontier Employee: As a frontier employee in Florida, I can honestly say our problems began way before Frontier came along. In my opinion, it started with Verizon, and...
  • Brandon: I am a current employee in Residential Sales in Deland Fl and it is getting harder and harder to meet the sales goals... any former employees , can y...
  • Former Employee: I was let go back in 2013 after working for Frontier for a little over 7 years. The only reason why I stayed for so long is because I needed to suppo...
  • Jennifer: Don't like Frontier? Share my letter I wrote last Fall to the CFO. They never responded or acknowledged. Nor did they ever send the promised $300 g...
  • Cindy: How has class action lawsuits never been filed against them? I dumped them 2 weeks ago, it's so nice to actually have internet again! Frontier would s...
  • Arlene Hughes: the plans are the amts for new signed up customers, the loyal customers get nothing and they pay for all the perks for the new customers. i for one i...
  • David Bystrack: What about all the problems in Ct ??? They still can't get my bill fixed and billed me $476.00 for there mistake.They just took the money from my cred...
  • Disagree with McCarthy: I was an employee of a real Telco corporation and my state was sold to Frontier. There is no training for employees. We have to teach ourselves and ...
  • Smith6612: Compared to Time Warner Cable, some people may actually be saving $10 here if they use the Rental Gateway. In my market, TWC would charge $10 for the ...
  • phychic99: Surely you jest on the Secure Connection Fee :) If not I just spit out my coffee......
  • Lee: I have Frontier and my lines going back to the dslam are all underground. I doubt they would go back to hanging new lines on the electric poles, and t...

Your Account: