Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

Hey Neighbor, Stop Piggybacking on My Wireless
New York Times ^ | 3/5/06 | MICHEL MARRIOTT

Posted on 03/04/2006 11:44:18 PM PST by conservative in nyc

For a while, the wireless Internet connection Christine and Randy Brodeur installed last year seemed perfect. They were able to sit in their sunny Los Angeles backyard working on their laptop computers.

But they soon began noticing that their high-speed Internet access had become as slow as rush-hour traffic on the 405 freeway.

"I didn't know whether to blame it on the Santa Ana winds or what," recalled Mrs. Brodeur, the chief executive of Socket Media, a marketing and public relations agency.

The "what" turned out to be neighbors who had tapped into their system. The additional online traffic nearly choked out the Brodeurs, who pay a $40 monthly fee for their Internet service, slowing their access until it was practically unusable.

Piggybacking, the usually unauthorized tapping into someone else's wireless Internet connection, is no longer the exclusive domain of pilfering computer geeks or shady hackers cruising for unguarded networks. Ordinarily upstanding people are tapping in. As they do, new sets of Internet behaviors are creeping into America's popular culture.

"I don't think it's stealing," said Edwin Caroso, a 21-year-old student at Miami Dade College, echoing an often-heard sentiment.

"I always find people out there who aren't protecting their connection, so I just feel free to go ahead and use it," Mr. Caroso said. He added that he tapped into a stranger's network mainly for Web surfing, keeping up with e-mail, text chatting with friends in foreign countries and doing homework.

Many who piggyback say the practice does not feel like theft because it does not seem to take anything away from anyone. One occasional piggybacker recently compared it to "reading the newspaper over someone's shoulder."

(Excerpt) Read more at nytimes.com ...


TOPICS: Culture/Society
KEYWORDS: computerinfo; computers; crime; dishonesty; internet; thievery; wifi; wireless; wirelesssecurity
Navigation: use the links below to view more comments.
first 1-2021-4041-6061-80 ... 341-355 next last
I'm always amazed (but not shocked) by the number of totally unsecured wireless networks you can find in a place like New York City. I wonder how many of these people have been sued by the over-zealous RIAA when someone illegally downloaded music using their network.
1 posted on 03/04/2006 11:44:20 PM PST by conservative in nyc
[ Post Reply | Private Reply | View Replies]

To: conservative in nyc

Two words: WEP Key.


2 posted on 03/04/2006 11:52:12 PM PST by Jeff Chandler (Peace Begins in the Womb)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Blue Jays
Hi All-

Sitting in my suburban living room I have access to four wireless networks that aren't mine. I can't believe the signals are so strong they cut across the wooded neighborhood and through the walls of my home...but they do.

~ Blue Jays ~

3 posted on 03/04/2006 11:52:37 PM PST by Blue Jays (Rock Hard, Ride Free)
[ Post Reply | Private Reply | To 1 | View Replies]

To: conservative in nyc

It's called a WEP KEY. It's real easy to put on your router and then no more free rides.


4 posted on 03/04/2006 11:52:50 PM PST by txroadkill
[ Post Reply | Private Reply | To 1 | View Replies]

To: conservative in nyc

If you don't want to share, use WEP. If you leave it open, then assume it's going to be used.


5 posted on 03/04/2006 11:53:16 PM PST by ndt
[ Post Reply | Private Reply | To 1 | View Replies]

To: conservative in nyc

I have four other networks I could piggyback off right now if I wanted to. (I don't though)


6 posted on 03/04/2006 11:54:48 PM PST by Welsh Rabbit
[ Post Reply | Private Reply | To 1 | View Replies]

To: Jeff Chandler
Two words: WEP Key.

One word: USELESS

WEP is completely compromised. Only WPA will offer any protection. Also, turn off the SSID broadcast feature.

7 posted on 03/04/2006 11:54:53 PM PST by Petronski (I love Cyborg!)
[ Post Reply | Private Reply | To 2 | View Replies]

To: conservative in nyc

We were at a function recently and two people that had wireless turned on their computers and said they were definately getting a signal from someone else's service. They were trying to get their own. They said as they move through the neighborhood, they pick up diffent people's service.


8 posted on 03/04/2006 11:55:59 PM PST by BJungNan
[ Post Reply | Private Reply | To 1 | View Replies]

To: conservative in nyc

As an employee of a cable company (that offers broadband and wireless services) it comes actoss to me as the same logic as people who steal cable "nobody told me I couldn't use it, it was already there, blah, blah" but, IMO, if anybody transports a signal through the air space in my property and doesn't secure it, I ought to have the right to access it. That goes for satellite television, radio signals and, alas, wireless frequencies. You invaded my property so why should I not avail myself of your signal?

I know the law says you can't but common sense says you should. If somebody leaves a crate of oranges on my doorstep, is it wrong of me to eat them? Same principle.
Now if the user protects the signal from being used/intercepted, it should not be fair game for hackers but people who just expose themselves to this sort of thing probably deserve the inconvenience of freeloaders.

FWIW, I have never taken signals unlawfully. My employer comps my cable and internet.


9 posted on 03/04/2006 11:56:11 PM PST by Tall_Texan (Hate means never having to say you're crazy.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Petronski

You are correct of course, but the problem in most cases is just causal leaching. If someone is actively trying to break into your network the casual leach is the least of your problems.


10 posted on 03/04/2006 11:57:18 PM PST by ndt
[ Post Reply | Private Reply | To 7 | View Replies]

To: Petronski
WEP futility. There are also commonly available cracking tools that will bust open WEP with zero difficulty or expertise.
11 posted on 03/04/2006 11:57:50 PM PST by Petronski (I love Cyborg!)
[ Post Reply | Private Reply | To 7 | View Replies]

To: conservative in nyc
"I didn't know whether to blame it on the Santa Ana winds or what," recalled Mrs. Brodeur, the chief executive of Socket Media, a marketing and public relations agency.

Wow. This sort of imbecility is what paases for "chief executive" these days? Or is she Socket's only employee?

12 posted on 03/04/2006 11:57:50 PM PST by Dont Mention the War (This tagline is false.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: conservative in nyc
Hey Neighbor, Stop Piggybacking on My Wireless

Hey Neighbor, stop broadcasting your unprotected connection.

13 posted on 03/04/2006 11:58:59 PM PST by USNBandit (sarcasm engaged at all times)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Petronski
I prefer MAC address registering.
14 posted on 03/04/2006 11:59:41 PM PST by Private_Sector_Does_It_Better (The UN did such a great job with Oil for Food in Iraq, let's let them run the whole country)
[ Post Reply | Private Reply | To 7 | View Replies]

To: Petronski
Here's a more accessible comparo. WPA is not perfect either, but put it this way: WEP is the equivalent of closing your front door, WPA is more like closing it, latching and locking it, and securing the deadbolt as well.
15 posted on 03/05/2006 12:00:43 AM PST by Petronski (I love Cyborg!)
[ Post Reply | Private Reply | To 11 | View Replies]

To: Private_Sector_Does_It_Better
I prefer MAC address registering.

Excellent. The truly diligent will do all three: WPA, no-SSID broadcast, and MAC registration.

16 posted on 03/05/2006 12:01:44 AM PST by Petronski (I love Cyborg!)
[ Post Reply | Private Reply | To 14 | View Replies]

To: conservative in nyc

Hey Neighbor, Stop Piggybacking on My Wireless"

Hey idiot, set up some security


17 posted on 03/05/2006 12:04:51 AM PST by philetus (Keep doing what you always do and you'll keep getting what you always get.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: conservative in nyc

Im on my laptop right now in the kitchen, and i have the option of 4 different wireless connections right now! LOL! Most of the time when i boot up it automatically chooses one of the neighbors wireless network. I wonder how this wireless thing can be good in terms of security with the CIA and the tracking of bad guys since anyone can roam around and tap into anyones wireless network...


18 posted on 03/05/2006 12:05:11 AM PST by Echo Talon
[ Post Reply | Private Reply | To 1 | View Replies]

To: conservative in nyc
Turn off SSID beacons. Turn on WPA. Turn off DHCP. Assign static IP addresses to each MAC address of devices you are willing to have connected to your wireless. Check your wireless router logs often to see if you have a hard core thief willing to clone your MAC addresses.

My son invited one of his hacker buddies to my home. He holds every conceivable computer associated certificate. The kid is obsessive/compulsive about passing every one of the exams. He was sure he could break in. He never succeeded.

19 posted on 03/05/2006 12:06:07 AM PST by Myrddin
[ Post Reply | Private Reply | To 1 | View Replies]

To: Dont Mention the War
Wow. This sort of imbecility is what paases for "chief executive" these days? Or is she Socket's only employee?

Check the recent press on the former CEO of Radio Shack. That will give you a clue.

20 posted on 03/05/2006 12:07:31 AM PST by Myrddin
[ Post Reply | Private Reply | To 12 | View Replies]


Navigation: use the links below to view more comments.
first 1-2021-4041-6061-80 ... 341-355 next last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson