IANAL but that would appear to suggest that I am unable to give consent (implied or otherwise) to a third party, particularly an unknown third party, to use my connection.
Bricker: I was the first one to rasie the analogy between this situation and squatting (post #28), but no one has directly addressed that point. Can you explain why you think it’s “inapposite”?
Leaving aside the fact that at the time of my last post, this discussion appeared to have turned into an indeed technically incorrectly placed discussion of ethics, I would not trust you if you said the sky was blue, despite the fact that you appear to be entirely correct. However:
I REALLY WISH YOU WOULD STOP YELLING! Also, I believe the discussion of whether a thing should be legal, while not actually the question on hand, seems appropriate to the question of actual persecution, and arrests thereof, which seems implicit in the OP.
Because the right of passage through land, and implied easement, is a matter of common - and sometimes statutory law. That is, you have a general right to walk up someone’s sidewalk and ring the doorbell, even if you were not given explicit authority to enter their private property, as a matter of common law.
Common law does not address access to computer networks.
Of course, you may say, “I think the law SHOULD be written to conform to an analogy of land use.” As a useful model, I agree it has some value.
I may equally well say, “I think the law should conform to a personal property model - you can’t use someone else’s car, even if the doors are unlocked and the key is in the ignition.”
Right now, the law does not conform to your land use analogy. You are welcome to petition your legislators for change. But your analogy is inapposite because the state of the law, right now, treats computer networks like your car, not your land, in requiring permission before use.
And such a discussion would undoubtedly flourish in GD, or the Pit, or MPSIMS. In a forum devoted to factual answers to factual questions, however, it is not appropriate.
As a lawyer, than surely you know that this argument is pure bullplop, at least as you write it. I can be charged with kidnapping the friggin’ queen of England, but that doesn’t make me guilty. What was the outcome, for crying out loud?
Boy, Bricker, you love to repeat yourself almost as much as I do. Your last post was pointless, for it simply repeats what I said in the very quote you ummm…quoted. See how the first section I bolded states the same point you are making when you keep harping on the word inappropriate?
As I said in that other thread, I know next to nothing about wireless networking. It is all Greek to me. Until two months ago, I couldn’t tell you what SSID means, I still have no idea what WAP stands for (although I assume W stands for wireless), and I’m not very good at picking up new technological concepts.
But I picked up a wireless router about six months ago for my new house. Never had one before. I had a bear of a time setting it up, and literally until that other thread came up, I had no idea from the confusing literature enclosed with my router that it was a very, very good idea to turn on encryption. At that time, I assumed that any security features would default to “on” if they were so important. After all, if security was so important, why would the manufacturer leave it off?
So, most of you folks can go ahead and call me stupid for leaving my Wifi connection open for several months. Go ahead, do it.
Now, if my neighbor started using my DSL via the wireless connection I left open, please tell me how I would have, in any way, given him my consent to do so. At that time, I never made a concious choice to leave the security off, for I had no idea that those features existed at all. I certainly haven’t talked to my neighbor to say it was okay for him to use my computer and my DSL. So how did I in any way consent to allowing my neighbor, or a total stranger, to use my wifi connection?
Hint: Bricker is right.
I never authorized anyone to use my computer network, and if I had magically caught someone doing it, I’d want them to be in trouble.
Is this merely because the laws in question were written before network access was commonly wireless, when any unauthorized use of a computer by its nature involved knowingly violating someone’s property rights by physically tampering with the machine or the network cable? It is hard to conceive of anyone committing such acts innocently, but that is not the case with accessing a broadcast network signal.
What determines whether something falls under common law? Could a reasonable case be made that wireless networks do fall under common law, not property law, because they are by their nature different from physical hardware?
So it sounds like there has only been one case in which this issue was addressed, and the court may, in fact, have ruled that the situation conforms to the “personal property model” you described. But I think others could argue successfully that the “land use model” is more appropriate. I don’t agree at all that my analogy was “inapposite.”
I would like to see this settled, either through statutory law or through additional case law.
And as for the issue of the Terms and Conditions of one’s ISP, that varies, obviously. The T&C for my home DSL account may prohibit my sharing my connection with those not in my household. (I don’t know what it says; I’d need to check.) But I suspect that a corporate T1 connection does not have that restriction.
Completely different. You can easily configure things so that others can access the public internet via your WiFi network without any access to your LAN.
FTR, 18 USC 1030 is the CFAA which I cited above when I brought up Shurgard Storage Centers v. Safeguard Self Storage (119 F. Supp. 2d 1121 (W.D. Wash. 2000)).
Why do you suspect this? I mean, what reason leads you to suspect this? The line is leased from a provider, and the provider often does not allow subleasing or sharing of the lines with other legal/business entities without some sort of compensation.
FTR as well, at my sample size of one company, my IT staff who I called just now claim that the standard package which our T1 and other digital lines fall under absolutely prohibit any subleasing or sharing whatsoever whatsoever. In addition, we are under contractual compunction to “maintain network security to prevent unauthorized use” along those lines…whatever that’s worth.
By e-logic’s contract with his ISP, any roommates using the service and or paying part of the bill for this service is in breach of contract.
After reading some of the links I guess I conceed that there are some states that apparently have laws governing this. I also would like to point out, Like Dewey did, that there is a different between acessing files in the network and acessing the internet. I personally have my whole network set so that no file sharing is possible, and no acess other than internet is available. Of course, I not only have my service encrypted, I have my network hidden from view so people driving by don’t even know I have one.
I think there will be a distinction made in the law in this. In this regard, as technology grows and more and more businesses allow open networks for the public, laws will change, and these silly lawsuits by big companies that have unencrypted networking (stupid stupid stupid) will be a thing of the past.
If acessing open networks that aren’t yours is illegal, IHOP, Barnes and Nobles, The library, the schools, Starbucks, and the handful of other businesses or public places would not be allowed to have open networks, or lots of people would be getting prosecuted.
If any laws need to be passed, it be that wireless routers be legally required to have auto-encryption for those that don’t know how to turn them on. SBCs routers automatically have them encrypted, and in fact it is impossible to alter them. My router I had to set to be encrypted, but it should be the default.
I say “accepted by the court” because that’s relevant to the point you’re making. If you were charged with kidnapping the friggin’ queen of England, and decided to plead guilty, the court will not simply say, “OK, he’s charged and he’s pleading guilty, so I’ll find him guilty.” The prosecution must lay out the factual basis for the charge, and you must admit to the elements of the crime.
According to the story, these people did more than just check their email. If you read the whole article, they caused 2.5 million dollars in losses by accessing credit card information and a variety of other acts. If they had checked their email and never returned to do cause havoc, they would never have been prosecuted.
So, do you have a case in which somebody was prosecuted by “18 USC § 1030” for merely accessing the network for internet access alone? You know, in cases where computer hacking has not been the major crime?
For those not aware of what 18 USC § 1030 refers to, here is a link: Notice how quotes have been taken out of context to imply that merely accessing somebodies internet connection is illegal.