In several past threads… this one and this one, for example, the issue of whether or not using someone else’s wireless network without their permission was illegal was hotly debated. Some participants in those threads strongly urged the interpretation that if the wireless network was unprotected, the action was not illegal.
Last week, a story from Illinois gave the further lie to that interpretation. David Kauchak, was found guilty of remotely accessing another computer system without the owner’s approval. He had found an unprotected wireless network and deliberately connected to it.
Sounds like a specific midemeanor statute. This is a law that will shortly be moot, as the model of universal, free wireless internet takes over (see Earthlink and Google’s proposals for San Francisco).
Re: the OP - if there is a specific statute that makes it a misdemeanor to use someone else’s wireless internet connection, then there’s really not much to debate. It is interesting to try and come up with a tort claim – is there any actual damage done?
I don’t have an issue with the legality of using someone’s wireless network without their permission, so Bricker, please pardon this tiny hijack:
My tech knowledge may be insufficient, but how is this sort of thing traceable? In the case linked to above, a cop actually found the guy sitting in his car and getting his signal from there. In any other situation, I can’t think of a way it would be traced - how would it be discovered that one individual on their own individual laptop was doing this and could be charged?
[No, I’m not asking because I want to do this - I only have a desktop. Just curious.]
There is a general law prohibiting access to a computer or computer network without authorization. I am unaware of a specific law targeting wireless networks.
And what makes you think that model of free, universal wireless internet will take over?
The owner of the network could do an ARP on his network and discover the MAC address of the intruding device. Since hardware MAC addresses are unique, that would at least be a prima facie case against the owner of the device with the offending device.
There are six people in my building in that have wireless networks, I am the only one that doesn’t have it password protected. I couldn’t possibly care less if someone uses my network. So is it a matter of pressing charges? Or if joe schmo uses my network and gets busted is he automatically in trouble?
By the way, Chicago is also currently taking bids from ISPs to make the entire city wireless…well, I assume just downtown, not the whole city limits. I think it’s fantastic.
What if I were to accidentally connect to someone else’s wireless internet thinking that I had actually connected to my own? This is a concern of mine since I live in an apartment complex and have wireless of my own.
Let’s say my wireless hub is in the livingroom (which it is), 30 or so feet from my laptop and my neighbor’s hub is in their bedroom, 10 feet from my laptop. Would my laptop automatically connect to their hub since it’s considerably closer? If so, would I be in deep doo doo, even if I didn’t know?
This is not intended as legal advice. For legal advice, you must contact a lawyer licensed to practice in your jurisdiction.
For purposes of discussion of hypothetical situations, I’d say that a general principle of criminal law is that you must have a guilty mind as well as commit a guilty act. If someone accidentally connects to another network, not knowing what they have done, then I’d say that’s not a crime.
I live in a row of townhouses, and several of my neighbors clearly now have wireless. One of them leaves her hub wide open. One night when, due to all the interference from the other users, I couldn’t get onto my hub, a message popped up asking me if I’d like to connect to hers. I dunno what it’s like on a PC (I use a Mac/AirportX), but I think it should prompt you before you make a connection. You should be able to refuse.
Anyway, when I got the prompt, I clicked OK just to see what would happen, and sure enough I could connect. I immediately disconnected, and the next day, when I happened to see her getting into her car, I told her. She said she didn’t know how to enable security, and didn’t seem altogether bothered. After that, my iBook automatically connected to her hub one time when it couldn’t find mine, apparently remembering it as a “trusted network”. I had to tell it not to do that, and now it prompts me, as before. Again, not sure how it works on a Windows machine, but I imagine it’s similar.
I have to wonder sometimes what recourse she should have now that she knows anyone can jump onto her hub and use it, and she can’t be bothered to implement basic security. Then again, just because someone refuses to lock their door doesn’t mean I have the right to enter, so there you go. It’s just that in this case the signal is being projected into other domiciles, and if you’re fully aware your connection can be exploited and yet you do nothing, I wonder if any entrapment issues could be involved if one day you should decide to complain. Probably not, but it’s interesting to think about all the same.
I used to think that until someone pointed out that my neighbor could be using my network to surf kiddy porn. I’m sure I would be able to prove my eventual innocence, but that would be a big fat headache and guilt-by-association whispering campaign I could do without.
Until that does happen, though, you shouldn’t connect to someone else’s wireless network without their permission. Pay for your own internet connection and wireless router, don’t try to sponge off of mine. If you want to let anyone use your wireless network, that’s fine, but don’t assume that everybody with a wireless network feels that way or should feel that way.
Of course, people who don’t want others connecting to their wireless networks should be taking a few basic safety precautions (like using WEP) to keep them from getting in. But even if they’re running a totally open network, you shouldn’t assume that it’s OK for you to use it unless you have the owner’s permission to do so. Just like you shouldn’t open somebody’s unlocked front door and help yourself to the food in their fridge unless you have their permission to do that.
Even if and when the free wireless model does take over, some people may still have their own private wireless connections (probably will- I think the business model is to offer basic service for free, and higher-speed service for a fee). The existence of free wireless doesn’t and won’t mean that all wireless networks are or should be free for anyone to use.
Yes it does, yes you are. This is my first wireless-enabled laptop and it doesn’t start looking for alternative sources until I tell it to; not sure if that’s a changeable setting but I like it that way.
Let’s say I’m in the airport. I boot up, laptop looks for wire (not there), looks for known wireless networks (not there), gives me two messages for “no wire” and “no known wireless”. I tell it to scan, it does and gives me a list of every accesible network it finds and asks me to choose one. So it’s not like I can enter a network blindly.
I’m all for people protecting their own networks, but one argument against your particular point of view is: “I’ll stop using your unprotected wireless network when you stop it from trespassing on my property.”
I think that’s reasonable, morally if not legally.
But not logically. Name one radio-like device in which it is possible to modulate the transmissions to exist only within a user defined space: like all three levels of my house, but not an inch outside of my doors, windows, and walls. When it is technologically possible to do that, then it is a reasonable request.
But in all the broo-ha-ha about this matter, I’m surprised that the doctrine of “attractive nuisance” hasn’t come up.
To oversimplify, if I put a brightly colored swing set in my front lawn, and surround it with a small moat, alligators and a “no trespassing” sign, if a child gets eaten by an alligator while trying to climb on the swing, I can’t escape liability by saying he was trespassing and should have known better, because I have created an “attractive nuisance” with the swing.
Even if my action wasn’t intentional, I would be liable.
So the analogy would be: If I set up a wireless network that can easily be detected and connected to, I can’t complain that it is being used by unauthorized parties because it could be declared to be an “attractive nuisance.”
Not to mention the lack of harm if all the intruder did was use some bandwidth. That kind of argument (and the basis for existing laws) was based on the expensive CPU time and use of years ago. If you computed what downloading a couple of porn pix would cost in CPU cycles from a 24/7 2MB Internet access point, I’ll bet you will be pushing a petty penny in losses.