How Dare You Want To Use That Internet Connection!
from the send-him-away! dept
While everyone was focused on the guy in Florida getting arrested for using an open WiFi connection, it turns out a similar case was already under way in the UK. Broadband Reports points out that someone has been found guilty of connecting to an open WiFi network and fined. From the sound of things, he could have been jailed for a year, but was let free under certain conditions. The actual crime appears to be: "dishonestly obtaining an electronic communications service and possessing equipment for fraudulent use of a communications service." Hmm. It would seem that an awful lot of people are probably guilty of the exact same thing. Since when has a WiFi enabled laptop become "equipment for fraudulent use?" This guy was just standing outside of a building with a laptop. Again, it doesn't look like he was doing anything nefarious with it at all. At least he wasn't charged with it. The article unfairly compares the guy to the Lowe's WiFi hackers who were stealing credit card info. So, again, it's worth asking where were the "losses" here? The guy was using radio waves that were sent out into the public. From the description in the article, it sounds like he didn't do anything wrong. He didn't "break into" anything. He didn't do any damage. He didn't cost anyone anything. With many computers (not clear in this case) they connect automatically to open WiFi, so he may not have even chosen to connect to these networks. There may be more to this case (not too many details are given), but from the details reported, it's hard to see why this is a crime at all. If he did cause damage or break into things, then it's a different story -- but those are the details that should have been reported.Thank you for reading this Techdirt post. With so many things competing for everyone’s attention these days, we really appreciate you giving us your time. We work hard every day to put quality content out there for our community.
Techdirt is one of the few remaining truly independent media outlets. We do not have a giant corporation behind us, and we rely heavily on our community to support us, in an age when advertisers are increasingly uninterested in sponsoring small, independent sites — especially a site like ours that is unwilling to pull punches in its reporting and analysis.
While other websites have resorted to paywalls, registration requirements, and increasingly annoying/intrusive advertising, we have always kept Techdirt open and available to anyone. But in order to continue doing so, we need your support. We offer a variety of ways for our readers to support us, from direct donations to special subscriptions and cool merchandise — and every little bit helps. Thank you.
–The Techdirt Team
Reader Comments
Subscribe: RSS
View by: Time | Thread
well
I have water spigots on the side of my house - I don't expect that just because they are not locked shut that people should be able to come up and use whatever they want.
I'm tired of the new trend that seems to make the victum be at fault because they didn't take certain measures to lock something down.
[ link to this | view in chronology ]
Re: well
One analogy that makes sense is if you have a spotlight on the front of your house. If the light extends out into the street, and someone sits there reading a book, have they "stolen" light from you? Have they "dishonestly obtained light"? Of course not. In this case, just like with the light, the radio waves have expanded out into the street, and someone sitting there can use them at no expense to you.
It's not the "fault" of someone not locking them up, but it IS quite questionable as to why this should be illegal. If something is broadcast in the air, openly, then it's open for use. That's always been the way our communications infrastructure has been set up, so it's hard to see why it's different now.
[ link to this | view in chronology ]
Re: well
Your analogy is no better. You state "the radio waves have expanded out into the street, and someone sitting there can use them at no expense to you". Really? Most ISPs have a cap on the amount of GB that can transfered each month. If you go over that cap, you may get charged additional fees.
Say, I'm a newbie to this and don't secure my router. Someone comes along and connects to my router, but also decided to change all the settings on my router. Has that person committed a crime? Just some food for thought.
[ link to this | view in chronology ]
Re: well
All this really means is that laws are outdated and have no hope of ever keeping pace with technology, let alone what is right and what "wrong"; consequently, anyone who uses any "advanced" technology can be considered a criminal at some fundamental level or another. Technology and science are *ALWAYS* neutral players; the state will *ALWAYS* reserve the right to exercise their credability whenever possible (and judges/juries may not be able to inject common sense into the system for fear of weakening the state's tools of enforcement). This is why I *never* do anything beyond casual surfing through untrusted access points. Never check your mail, blog, post comments via a registered account and be sure to clear your cookies before proceeding.
[ link to this | view in chronology ]
Re: Re: well
[ link to this | view in chronology ]
Re: well
I pay for my net account, and while I DO have a huge amount of UL/DL bytes available, they ARE finite. So someone logging into my network, connecting to IRC and downloading a few movies is a problem.
Let's continue on that note, what if the MPAA comes after me after tracing this to my connection? Or what if this person is using MY connection to surf the net without it being traced back to him (kiddie porn comes to mind, or releasing viruses or a hack attempt).
I do agree with some posters that it shouldn't be ALL on the victim's fault(I take precautions to make sure no one can log on without my say so...and I do feel that network owners SHOULD shoulder SOME, but not all, responsibility)...however, lets stop saying "Its OK" for anyone to just use ANY wifi connection. If its open, make enquiries to see if its public, if its not, let the owner know he needs to secure it...and if you can't do any of that, DON'T USE IT.
Just because my front door's unlocked, doesn't mean you can come in and raid my fridge, use my stereo and cool off with the AC right? (also a bad analogy I agree)
[ link to this | view in chronology ]
Re: well
Well, if you're that concerned about it, then maybe you should have that particular technology in your home. The threat is real and you are trading security for convience... plain and simple.
Running an unsecured access point is the equivalent of installing a balsa wood door in a house in the bad end of town and worrying about doorknob twiddling.
> [...] what if the MPAA comes after me after
> tracing this to my connection?
Well, then... you'll have an opportunity to explain to their lawyers, a judge and possibly a jury that, because you failed to secure your wireless access point, somebody was able to share their precious content with a friend (or several thousand of them).
Of course, because you live in America, your life can be ruined without criminal charges.
Enjoy your freedom.
[ link to this | view in chronology ]
Re: well
Then you might have a case in the situation that the person has totally used up your bandwidth. But, barring that, I'm still at a loss to figure out what you've "lost."
Let's continue on that note, what if the MPAA comes after me after tracing this to my connection? Or what if this person is using MY connection to surf the net without it being traced back to him (kiddie porn comes to mind, or releasing viruses or a hack attempt).
And, in those cases, you can show that you had an open WiFi connection and show a reasonable doubt that you were the one involved in that activity. Despite what the MPAA says, it's up to them to prove that you really downloaded this stuff.
Just because my front door's unlocked, doesn't mean you can come in and raid my fridge, use my stereo and cool off with the AC right? (also a bad analogy I agree)
Terrible analogies. All of those involve actually trespassing on property. The case we're talking about involves someone on public property where the radio waves reach them. As for raiding the fridge, that's a tangible loss to you, which is clearly stealing.
[ link to this | view in chronology ]
Re: well
Ok, enough of the water spigots, hoses, and such lame analogies.
Say you do have a finite amount in which you can dl/ul, if this case I would believe that you could begin forming a relative case. Yet, your router should be secured (and yes, I know router security can be found and broken in 3 seconds...that's malicious though) ...If you do have an open access router, and don't have a finite ul/dl limit, then I don't see how you can even begin to form a case that proves guilt. If you bake a hot fresh apple pie and place it on the window sill, then then you can compare the pie to the router. For instance, if I'm sitting in my house across the street, I can see the pie and decide to walk closer towards it to be able to smell it. Same goes with walking around and doing warchalking. You are able to smell the pie once you get closer to it (you are still on the sidewalk -- public domain), but no one in their right mind would consider that illegal. Your brain is able to process the scent, potentially making you hungry. ... Ok, with the router signal, your computer is processing the signal making tangible usage of it.
[ link to this | view in chronology ]
Re: well
[ link to this | view in chronology ]
Re: well
[ link to this | view in chronology ]
Taking my bandwidth IS the loss
[ link to this | view in chronology ]
Re: well
[ link to this | view in chronology ]
Re: well
In some cases, it may violate the terms of service... but there's a big difference between that and illegal (and, in fact, the violation of the ToS usually falls on the owner of the service, not the person who uses it).
However, the point still stands (calling me names doesn't change things, but it also doesn't make your argument look very intelligent).
Someone over at O'Reilly has made a decent argument as well. He compares it to someone who has a sprinkler system, that sprays off of his property and lands in the street. Is someone who then collects that water guilty of "theft of water?" It's the same thing. There was no trespassing. This is a case where the signal that the user has passes out onto public property. No one "loses" anything, which is a must in any definition of theft -- so it's clearly not theft.
[ link to this | view in chronology ]
Re: well
Which is?
The water spigots on the side of your house are presumably on your private property, not on public property. So people would have to trespass to use them wouldn't they?
But still, by your reasoning if you use those spigots to water your lawn and some of the water runs off onto your neighbors lawn, you suddenly become a "victim" even you didn't take measures to prevent runoff.
[ link to this | view in chronology ]
Re: well
[ link to this | view in chronology ]
Re: well
"I have water spigots on the side of my house - I don't expect that just because they are not locked shut that people should be able to come up and use whatever they want."
It's a little more like pausing along the sidewalk on a hot day and letting your lawn sprinkler douse me as the spray sweeps past. Should I be arrested?
[ link to this | view in chronology ]
Wi-Fi Liability
[ link to this | view in chronology ]
For all those running unsecured wireless seeking j
There is an underground WRT54G firmware load floating around out there in the wild. It looks *EXACTLY* like the standard firmware that linksys ships, but also contains functionality that allows outside connections no matter how much secuirty you configure via the "linksys" interface (though you do have to be able to configure you computer to use the access point's hidden connectivity features).
The people installing this have war driving rigs that they drive around with, automatically rooting and installing the firmware load (they do have to pull over for ~2 mins to make sure the load takes).
The next milestone for this underground firmware load is hidden mesh routing capabilities.
Fun stuff; good luck finding it on the the intrawebs.
[ link to this | view in chronology ]
Too worked up
[ link to this | view in chronology ]
Google
[ link to this | view in chronology ]
net
have the access point named ThankTom
Now again, know that im rolling the dice for what we were talking about as child porn or lawsuits... but dont honestly care if neighbors can share my net. done this for the last what 4 years with a wireless b router so that they can only max out at half of my connection.
and if net is bogging down, i just turn of wireless for a while.
now everyone tell me how evil i am for sharing with my neighbors. not perticularly religious, as it seems that most of the types that claim to be are the same ones that are sitting there arguing how much they would get mad if that neighbor was drinking from his water spicket or whatever.
but on that same note... wwjd?
[ link to this | view in chronology ]