Students Short-Circuit School Chromebooks in Viral Challenge

Schools across the US are grappling with a disturbing trend in which students intentionally tamper with school-issued Chromebooks to create sparks, smoke, or even fires, all for viral fame on TikTok. Educators in Colorado, New Jersey, North Carolina, Washington, and beyond have issued alerts to parents after incidents forced evacuations, early dismissals, and medical attention for smoke inhalation.
Background: The Rise of the Chromebook Challenge
The so-called Chromebook Challenge encourages participants to insert metallic objects into USB-C, USB-A, headphone, or charging ports to short the internal circuitry. Common items include:
- Paper clips or pushpins bent to fit into USB ports
- Pencil leads or mechanical pencil tips
- Gum wrappers or foil fragments
- Tweezers or metal scissors
Shorting the 5V and ground pins can lead to arcing, component failure, and potentially a thermal runaway in the lithium battery pack, which typically runs at 7.6V for a 2-cell configuration or 11.4V for a 3-cell pack in many Chrome OS models.
Technical Mechanisms of Port Tampering
Chromebooks used in schools often rely on Intel Celeron or MediaTek MT8183 chipsets, with a power delivery subsystem that can supply up to 30W via USB-C. When a student introduces a conductive bridge between the VBUS and GND pins, the internal power management IC (PMIC) attempts to draw excessive current, triggering rapid heating of MOSFETs and capacitors.
If the overcurrent protection fails or is bypassed by rapid short intervals, the cell chemistry in polymer lithium-ion batteries can enter thermal runaway at around 80°C. This can generate flammable gases and smoke, and in extreme cases, result in cell rupture or fire.
Updated Security Measures and Manufacturer Response
In May 2025, Google published a firmware update for Chrome OS that improves detection of port tampering by monitoring sudden current spikes before shutdown. Schools using Chrome Enterprise Management can now remotely disable unused USB ports using Device Management Policies and deploy firmware that locks port Controller Area Networks at boot.
Third-party mobile device management tools from vendors like Cisco Meraki and Jamf also support port lockdown profiles, allowing IT administrators to whitelist only specific peripherals such as keyboards and mice.
Impact on School IT Operations
- Device replacements costing up to $250 per unit
- IT staff hours spike by 40% handling damage reports and remediation
- Evacuations and first responder calls add safety liability concerns
Research by the Consortium for School Networking estimates that a mid-sized district could face replacement costs exceeding $50,000 within a single semester if the trend escalates.
Expert Insights and Recommendations
Dr Laura Chen, a hardware security expert at the IEEE Center for Secure Electronics, advises: “Enforcing physical port covers and deploying tamper-evident seals can deter most attempts. Coupling this with continuous monitoring of power draw on endpoints provides an early warning system.”
Cybersecurity consultant Alex Reynhardt of TechSafe Solutions recommends an educational approach: “Incorporate modules about component safety and the physics of electricity into digital citizenship curricula. Understanding the risk of lithium fires may dissuade thrill-seekers.”
Legal and Disciplinary Actions
Some districts now treat tampering as criminal mischief. In Plainville, Connecticut, a middle schooler has been referred to juvenile court after reportedly using scissors to induce smoke from a Chromebook, resulting in one student suffering smoke inhalation and requiring hospital monitoring.
Under state laws in New Jersey and Washington, willful property damage can lead to juvenile detention or restitution orders, and schools are exploring mandatory safety workshops as part of disciplinary measures.
Broader Context: History of Dangerous Internet Challenges
This trend follows other high-risk viral stunts such as the 2022 Kia Challenge, which exploited remote keyless entry vulnerabilities, leading to a $200 million class action settlement. The Blackout Challenge and Fire Challenge similarly highlighted the role of social media amplification in risk-taking behavior among adolescents.
Conclusion
The Chromebook Challenge is a stark reminder of how digital fame impulses can intersect with hardware vulnerabilities and real-world safety hazards. Combining technical mitigations, policy enforcement, and education may be the most effective strategy to curb this dangerous phenomenon.