recommended reading

FEC move on wireless campaign contributions could aid Democrats

Yuri Arcurs/

In a move that will likely open text-message-based campaign contributions to AT&T customers, the Federal Election Commission has issued an advisory opinion allowing for wireless carriers to process political donations at a low rate.

The decision is politically significant because AT&T is the only nationally unionized wireless carrier, and it offers discounts to union members. While both presidential campaigns are accepting text-message donations via custom shortcodes, the donation channel has not received that much publicity. This could change, at least where Democratic candidates are concerned: On Wednesday, the left-leaning campaign-technology firm NGP VAN announced a partnership with Revolution Messaging to process text-message-based contributions for campaigns.

The FEC first allowed text-message donations to be made via wireless carrier billing in June. Initially they were intended to be anonymous and capped at $50 per month per phone number and $200 per election cycle. Since then, the FEC has allowed wireless customers to donate the maximum allowable by law under existing rules of compliance.

When the FEC first took a crack at establishing rules for text-message-based donations, it followed the lead of the wireless trade association CTIA, which indicated that carriers who processed donations in the same way that charitable donations are handled could be on the hook for making "in-kind contributions" to political candidates, parties, or committees. This guidance suggested carriers treat political donations much like the sale of ring tones, from which carriers get a 40 percent cut or more.

AT&T broke ranks with CTIA and sought to process text-message-based political donations at low cost, arguing in its FEC filing that its customers "reasonably will expect that most of their contribution is going to the political candidate or committee of their choice" and "do not want a significant portion of their [contributions] siphoned off to the aggregators and wireless [service] providers."

The FEC will take up this opinion in their Sept. 20 meeting. If it is approved, AT&T will likely join Verizon, T-Mobile, Sprint, and U.S. Cellular in processing text-message-based political donations.

(Image via Yuri Arcursl/

Threatwatch Alert

Thousands of cyber attacks occur each day

See the latest threats


Close [ x ] More from Nextgov

Thank you for subscribing to newsletters from
We think these reports might interest you:

  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security

  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.


When you download a report, your information may be shared with the underwriters of that document.