Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

The ethics of "stealing" a WiFi connection
Ars Technica ^ | January 03, 2008 | By Eric Bangeman

Posted on 01/07/2008 10:46:22 AM PST by SubGeniusX

Network security firm Sophos recently published a study on what it terms WiFi "piggybacking," or logging on to someone's open 802.11b/g/n network without their knowledge or permission. According to the company's study, which was carried out on behalf of The Times, 54 percent of the respondents have gone WiFi freeloading, or as Sophos put it, "admitted breaking the law [in the UK]."

Amazingly, accessing an unsecured, wide-open WiFi network without permission is illegal in some places, and not just in the UK. An Illinois man was arrested and fined $250 in 2006 for using an open network without permission, while a Michigan man who parked his car in front of a café and snarfed its free WiFi was charged this past May with "Fraudulent access to computers, computer systems, and computer networks." On top of that, it's common to read stories about WiFi "stealing" in the mainstream media.

It's time to put an end to this silliness. Using an open WiFi network is no more "stealing" than is listening to the radio or watching TV using the old rabbit ears. If the WiFi waves come to you and can be accessed without hacking, there should be no question that such access is legal and morally OK. If your neighbor runs his sprinkler and accidentally waters your yard, do you owe him money? Have you done something wrong? Have you ripped off the water company? Of course not. So why is it that when it comes to WiFi, people start talking about theft?

The issue is going to come to a head soon because more and more consumer electronics devices are WiFi-enabled, and many of them, including Apple's iPhone and most Skype phones we've used, come ready out of the box to auto-connect to open WiFi networks. Furthermore, as laptop sales continue to grow even beyond desktops, the use of open WiFi is only going to grow along with it.

Steal this WiFi connection!

When you steal something, there's typically a victim. With WiFi, Sophos thinks the ISPs are the victims. "Stealing WiFi Internet access may feel like a victimless crime, but it deprives ISPs of revenue," according to Sophos' senior technology consultant Graham Cluley. Furthermore, "if you've hopped onto your next door neighbors' wireless broadband connection to illegally download movies and music from the 'Net, chances are that you are also slowing down their Internet access and impacting on their download limit." In Sophos' view, then, both ISPs and everyday subscribers can be victims.

In one fell swoop, "stealing WiFi" gets mentioned in the same breath as "illegally" downloading movies and music. The fact is, people join open WiFis for all manner of reasons: to check e-mail, surf the web, look up directions to some place, etc. Those don't sound like nefarious activities, however, and certainly not activities which are likely to get someone in trouble. Of course if you run an open WAP (wireless access point) and it is heavily used for just e-mail, you could still hit your bandwidth cap (if you even have one), but that has to happen only once for that user to figure out what's up, and fix the problem. And let's be honest: it is their problem. No one forced that user to install a WAP or to leave it wide open. We'll get back to this in a minute.

The argument that using open WiFi networks deprives ISPs of significant revenue is also a red herring. Take the case of public WiFi hotspots: official hotspots aren't that difficult to find in major cities—every public library in Chicago has open WiFi, for instance. Are the public libraries and the countless other free hotspot providers helping defraud ISPs? No, they're not. There's no law that using the Internet requires payment of a fee to an ISP, and the myriad public hotspots prove this.

Really, there's only one time when you could argue that an ISP is being gypped, and that's when someone is repeatedly using his neighbor's open WiFi in lieu of paying for his own service. Is this really wrong? Let's consider some parallel examples. If the man in question were given a key and told that he could enter his neighbor's house whenever he wanted to use a PC to access the Internet, would this be wrong? Of course not. They key here (pun intended) is the "permission" given by the owner of the home. Our leeching friend would clearly be in the wrong if he were breaking into the house, of course, because he would be sidestepping something clearly set up to keep him out. If he has permission, I suppose one could argue that it's still not right, but you won't find a court that will punish such a person, nor will you find too many people thrilled at the idea that someone else can tell them who they can and can't allow into their homes for what purposes.

Some people leave their wireless access points wide open deliberately. A friend of mine and recent seminary graduate lived in a campus-owned apartment building. In addition to being a man of the cloth, Peter is a longtime Linux user and open-source advocate. While living here in Chicago, he got his DSL from Speakeasy and shared the connection with others in his building... and anyone else who needed a quick Internet fix (Speakeasy even encouraged this). He even positioned his router so that anyone in the church across the street could pick up a signal. Obviously, not everyone is like Peter. But despite easy-to-read instructions and a plethora of warnings about the need to secure your WAP, some people just can't be bothered to enable the most basic security settings.

To the person with a laptop and a sudden need to check e-mail or surf the web, it's not possible to tell who is leaving their access points open deliberately and who just plain doesn't care. The access point is there and the virtual doors are unlocked, so why not take advantage of it if you're in need?

A couple of caveats: be familiar with the law of the land. As the examples at the beginning of this story show, it's illegal to access a WAP without permission—even if it's wide open—in some places. Also, you should never use an open point for anything illegal or even unneighborly. Don't log onto the first "linksys" WAP you see and fire up a torrent for your favorite, just-released Linux distro.

And as always, don't leave your own 802.11b/g/n router wide open unless you're comfortable with random surfers using your 'Net access for their own purposes.

Open WiFi is clearly here to stay.


TOPICS: Crime/Corruption; Culture/Society; Government; Philosophy
KEYWORDS: ethics; wardriving; wifi; wireless
Navigation: use the links below to view more comments.
first previous 1-20 ... 121-140141-160161-180 ... 281-283 next last
To: Myrddin
Let's compare apples and apples here. My neighbor hired a contractor to install a fence. The contractor pulled an extension cord over to my driveway and connected to the power socket to run his saw. He did that without asking my permission.

Still apples & oranges.

Better example: You saw your neighbor hired a contractor to install a fence, and you offered him an extention cord before he asked for one. ... then you called the police when your breaker tripped.

141 posted on 01/07/2008 1:54:15 PM PST by ctdonath2
[ Post Reply | Private Reply | To 137 | View Replies]

To: GATOR NAVY

Well, then maybe you should stop offering free Wi-Fi access to the world, eh? If your SSID is being broadcast, and anyone can connect, then it’s not their fault they didn’t know you had a bandwidth limit. Stop broadcasting the SSID, turn on WEP, or use MAC screening.


142 posted on 01/07/2008 1:56:00 PM PST by ctdonath2
[ Post Reply | Private Reply | To 140 | View Replies]

To: ctdonath2
First off, the term "theft" and "stealing" in this discussion is much better served by the term "tresspass": nobody is taking anything, just using a path from point A to B - and whether that usage is permitted is what's in question.

I disagree. My daily activities require frequent downloads from the SVN repository on a computer on the east coast. That occurs over a secured VPN connection that employs the bandwidth of my DSL line. That download time is part of my billable hours to the customer. If someone is stealing my bandwidth, the download time will be extended. The time billed to my customer goes up. The bandwidth thief is indirectly raising the costs of my services to my customer. My customer is directly the victim of monetary theft by the WiFi thief. When someone is stealing WiFi bandwidth, is it not reasonable to assume it is harmless.

143 posted on 01/07/2008 1:56:52 PM PST by Myrddin
[ Post Reply | Private Reply | To 133 | View Replies]

To: TChris

Sorry, reading too fast.


144 posted on 01/07/2008 1:57:00 PM PST by ctdonath2
[ Post Reply | Private Reply | To 136 | View Replies]

To: weegee
Is he a customer if he buys one cup of coffee and sits inside for 2 hours?

If you don't ask him to order more or leave, yes.

145 posted on 01/07/2008 1:58:01 PM PST by ctdonath2
[ Post Reply | Private Reply | To 135 | View Replies]

To: weegee

At that point its up to the business. When he sits out in the car and leeches the people who pay for the bandwidth dont have a say do they?


146 posted on 01/07/2008 1:58:38 PM PST by N3WBI3 (Ah, arrogance and stupidity all in the same package. How efficient of you. -- Londo Mollari)
[ Post Reply | Private Reply | To 135 | View Replies]

To: ctdonath2
Better example: You saw your neighbor hired a contractor to install a fence, and you offered him an extention cord before he asked for one. ... then you called the police when your breaker tripped.

The contractor trespassed onto my property and connected an electrical his own electrical cord to my power socket.

If a water tanker truck pulled up in front of your hose, connector a hose to your faucet and made off with 10,000 gallons of water, would that be theft? After all, it is just a path for water to go from the aquifer to the truck.

147 posted on 01/07/2008 2:00:56 PM PST by Myrddin
[ Post Reply | Private Reply | To 141 | View Replies]

To: Natural Law

ping for bookmark


148 posted on 01/07/2008 2:03:10 PM PST by The SISU kid (I feel really homesick all the time & so do all the other aliens.....)
[ Post Reply | Private Reply | To 32 | View Replies]

To: Myrddin
The contractor trespassed onto my property and connected an his own electrical cord to my power socket.

If a water tanker truck pulled up in front of your hose, connected a hose to your faucet and made off with 10,000 gallons of water, would that be theft? After all, it is just a path for water to go from the aquifer to the truck.

149 posted on 01/07/2008 2:03:49 PM PST by Myrddin
[ Post Reply | Private Reply | To 147 | View Replies]

To: SubGeniusX; Squantos

What about watching pr0n flicks at the drive-in from a hill outside the fence? Was that stealing, I mean, would it have been stealing, if I, er, someone, actually did it?


150 posted on 01/07/2008 2:04:01 PM PST by Larry Lucido (Hunter 2008)
[ Post Reply | Private Reply | To 1 | View Replies]

To: SubGeniusX

I see this more akin to cooling off by standing on the public sidewalk outside your neighbor’s house and waiting until the sprinkler goes by.


151 posted on 01/07/2008 2:05:46 PM PST by Larry Lucido (Hunter 2008)
[ Post Reply | Private Reply | To 1 | View Replies]

To: KarenMarie

You open another argument: Wouldn’t it be legal to snoop on all of your neighbor’s traffic if he’s using your WiFi without your permission? After all, you have no agreement with him, and you are only sniffing traffic on your own personal network.


152 posted on 01/07/2008 2:06:38 PM PST by antiRepublicrat
[ Post Reply | Private Reply | To 112 | View Replies]

To: SubGeniusX
Using an open WiFi network is no more "stealing" than is listening to the radio or watching TV using the old rabbit ears.

Mr. Bangeman is right about one thing: using an unprotected WiFi network is not stealing. It is, however, unauthorized trespass and potentially fraud, if the connection is used to access other networks.

The funny thing is that Mr. Bangeman is comparing a private resource (a wireless network connection) to public resources (radio and television broadcasts).

If your neighbor runs his sprinkler and accidentally waters your yard, do you owe him money?

If your neighbor leaves his door open, does that mean it's okay for you to go in and raid his fridge?

(This does not excuse the stupidity of the resident who leaves his door wide open and unsecured.)

. . . . .

Somehow, I think Mr. Bangeman will sing a different tune when someone (using a spoofed MAC address) hacks into his home's access point and downloads child pornography. The Feds will, of course, come knocking on his door.

153 posted on 01/07/2008 2:07:32 PM PST by rabscuttle385 (It takes courage to grow up and turn out to be who you really are.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: ctdonath2

I’m WPA secured, thanks. That doesn’t change the fact the fact that unauthorized use of my connection would be theft, not trespass.


154 posted on 01/07/2008 2:07:42 PM PST by GATOR NAVY
[ Post Reply | Private Reply | To 142 | View Replies]

To: SubGeniusX
I think it is stealing. I am disgusted by people who steal cable from their neighbors or say they only need one cable site but then make it all over the house. There is a lot of thieves.
155 posted on 01/07/2008 2:10:26 PM PST by napscoordinator
[ Post Reply | Private Reply | To 1 | View Replies]

To: Jimmy Valentine's brother
I cannot, for the life of me, figure out why people do not simply take the 5 minutes to encrypt their connection. You're right...it ain't hard.

I am amazed at the number of networks out there...many within my own neighborhood...that are named "Linksys", "DLink" and "Netgear". These people have simply plugged these units in and turned them on...without even reading the stinking manual.

156 posted on 01/07/2008 2:11:42 PM PST by Bloody Sam Roberts (Great spirits will always encounter violent opposition from mediocre minds.)
[ Post Reply | Private Reply | To 5 | View Replies]

To: DBrow
Plus, what IP address is seen? The router, right? Not the laptop or computer node, correct me if I'm wrong on this.

Nodes behind the gateway have private, non-routable IP addresses and will appear to the public Internet using the IP address of the gateway.

If it is the wireless router that is "seen" as the IP address, who gets the responsibility for illegal actions, like downloading illegal music or pictures?

The point of contact for the connection, or in other words, if you are subscribing to a cable Internet or DSL and pay the bills, you are legally responsible.

And, with the recent RIAA insanity, it appears that the point of contact will be held liable for any illegalities that occur, regardless of whether he or she committed the act in question.

157 posted on 01/07/2008 2:12:15 PM PST by rabscuttle385 (It takes courage to grow up and turn out to be who you really are.)
[ Post Reply | Private Reply | To 13 | View Replies]

To: capt. norm
I know hackers can always find a way

Yup. But, in general, you only need to be a step faster than your slowest neighbor.

When I turn on my laptop, I get my own Wifi connection, plus 4 of my neighbors.

My setup is totally secure. Neighbors' are not. Which one do you think a hacker will check out?

The one setup that I could ID - I mentioned to the guy. HE said 'Pah' and waved his hand. Wonder if he'd do the same thing if I presented him with copies of his tax returns, CC numbers, bank PINs, etc. I haven't hacked his system because I figure that it's none of my business. Doubt that others think the same way.

158 posted on 01/07/2008 2:17:20 PM PST by wbill
[ Post Reply | Private Reply | To 58 | View Replies]

To: All

I have used my neighbor’s WIFI before I got a router, and I did not consider it stealing.

You are taking some bandwidth, yes, but not that much unless you use it for downloading movies etc.

The big thing is...computers will connect even without your permission at times. So, you have to keep that in mind before judging it wrong. How can it be wrong if you don’t even know you are using somebody else’s?


159 posted on 01/07/2008 2:17:58 PM PST by rwfromkansas
[ Post Reply | Private Reply | To 16 | View Replies]

To: wbill

Very first ROT (Rule of thumb) for any machine that will be connecting to a wireless network.

Turn OFF file sharing!


160 posted on 01/07/2008 2:19:59 PM PST by djf (...and dying in your bed, many years from now, did you donate to FR?)
[ Post Reply | Private Reply | To 158 | View Replies]


Navigation: use the links below to view more comments.
first previous 1-20 ... 121-140141-160161-180 ... 281-283 next last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson