Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

The ethics of "stealing" a WiFi connection
Ars Technica ^ | January 03, 2008 | By Eric Bangeman

Posted on 01/07/2008 10:46:22 AM PST by SubGeniusX

Network security firm Sophos recently published a study on what it terms WiFi "piggybacking," or logging on to someone's open 802.11b/g/n network without their knowledge or permission. According to the company's study, which was carried out on behalf of The Times, 54 percent of the respondents have gone WiFi freeloading, or as Sophos put it, "admitted breaking the law [in the UK]."

Amazingly, accessing an unsecured, wide-open WiFi network without permission is illegal in some places, and not just in the UK. An Illinois man was arrested and fined $250 in 2006 for using an open network without permission, while a Michigan man who parked his car in front of a café and snarfed its free WiFi was charged this past May with "Fraudulent access to computers, computer systems, and computer networks." On top of that, it's common to read stories about WiFi "stealing" in the mainstream media.

It's time to put an end to this silliness. Using an open WiFi network is no more "stealing" than is listening to the radio or watching TV using the old rabbit ears. If the WiFi waves come to you and can be accessed without hacking, there should be no question that such access is legal and morally OK. If your neighbor runs his sprinkler and accidentally waters your yard, do you owe him money? Have you done something wrong? Have you ripped off the water company? Of course not. So why is it that when it comes to WiFi, people start talking about theft?

The issue is going to come to a head soon because more and more consumer electronics devices are WiFi-enabled, and many of them, including Apple's iPhone and most Skype phones we've used, come ready out of the box to auto-connect to open WiFi networks. Furthermore, as laptop sales continue to grow even beyond desktops, the use of open WiFi is only going to grow along with it.

Steal this WiFi connection!

When you steal something, there's typically a victim. With WiFi, Sophos thinks the ISPs are the victims. "Stealing WiFi Internet access may feel like a victimless crime, but it deprives ISPs of revenue," according to Sophos' senior technology consultant Graham Cluley. Furthermore, "if you've hopped onto your next door neighbors' wireless broadband connection to illegally download movies and music from the 'Net, chances are that you are also slowing down their Internet access and impacting on their download limit." In Sophos' view, then, both ISPs and everyday subscribers can be victims.

In one fell swoop, "stealing WiFi" gets mentioned in the same breath as "illegally" downloading movies and music. The fact is, people join open WiFis for all manner of reasons: to check e-mail, surf the web, look up directions to some place, etc. Those don't sound like nefarious activities, however, and certainly not activities which are likely to get someone in trouble. Of course if you run an open WAP (wireless access point) and it is heavily used for just e-mail, you could still hit your bandwidth cap (if you even have one), but that has to happen only once for that user to figure out what's up, and fix the problem. And let's be honest: it is their problem. No one forced that user to install a WAP or to leave it wide open. We'll get back to this in a minute.

The argument that using open WiFi networks deprives ISPs of significant revenue is also a red herring. Take the case of public WiFi hotspots: official hotspots aren't that difficult to find in major cities—every public library in Chicago has open WiFi, for instance. Are the public libraries and the countless other free hotspot providers helping defraud ISPs? No, they're not. There's no law that using the Internet requires payment of a fee to an ISP, and the myriad public hotspots prove this.

Really, there's only one time when you could argue that an ISP is being gypped, and that's when someone is repeatedly using his neighbor's open WiFi in lieu of paying for his own service. Is this really wrong? Let's consider some parallel examples. If the man in question were given a key and told that he could enter his neighbor's house whenever he wanted to use a PC to access the Internet, would this be wrong? Of course not. They key here (pun intended) is the "permission" given by the owner of the home. Our leeching friend would clearly be in the wrong if he were breaking into the house, of course, because he would be sidestepping something clearly set up to keep him out. If he has permission, I suppose one could argue that it's still not right, but you won't find a court that will punish such a person, nor will you find too many people thrilled at the idea that someone else can tell them who they can and can't allow into their homes for what purposes.

Some people leave their wireless access points wide open deliberately. A friend of mine and recent seminary graduate lived in a campus-owned apartment building. In addition to being a man of the cloth, Peter is a longtime Linux user and open-source advocate. While living here in Chicago, he got his DSL from Speakeasy and shared the connection with others in his building... and anyone else who needed a quick Internet fix (Speakeasy even encouraged this). He even positioned his router so that anyone in the church across the street could pick up a signal. Obviously, not everyone is like Peter. But despite easy-to-read instructions and a plethora of warnings about the need to secure your WAP, some people just can't be bothered to enable the most basic security settings.

To the person with a laptop and a sudden need to check e-mail or surf the web, it's not possible to tell who is leaving their access points open deliberately and who just plain doesn't care. The access point is there and the virtual doors are unlocked, so why not take advantage of it if you're in need?

A couple of caveats: be familiar with the law of the land. As the examples at the beginning of this story show, it's illegal to access a WAP without permission—even if it's wide open—in some places. Also, you should never use an open point for anything illegal or even unneighborly. Don't log onto the first "linksys" WAP you see and fire up a torrent for your favorite, just-released Linux distro.

And as always, don't leave your own 802.11b/g/n router wide open unless you're comfortable with random surfers using your 'Net access for their own purposes.

Open WiFi is clearly here to stay.


TOPICS: Crime/Corruption; Culture/Society; Government; Philosophy
KEYWORDS: ethics; wardriving; wifi; wireless
Navigation: use the links below to view more comments.
first previous 1-20 ... 161-180181-200201-220 ... 281-283 next last
To: Myrddin
If you happen to intercept information while sniffing the packet streams

LOL! Connecting to an open wi-fi is not "sniffing the packet streams." I'm not sure that you even know what you are talking about at this point.

181 posted on 01/07/2008 4:10:30 PM PST by FreedomCalls (Texas: "We close at five.")
[ Post Reply | Private Reply | To 174 | View Replies]

To: Andonius_99; DBrow

My understanding is that if you leave the connection unencrypted you are in a better position in court, because the prosecutors can’t prove you were the one doing the illegal downloading (etc.)


182 posted on 01/07/2008 4:16:12 PM PST by nickcarraway
[ Post Reply | Private Reply | To 126 | View Replies]

To: Myrddin
No, it isn't broadcasting an "invitation". That is YOUR misinterpretation. It is broadcasting an identifier.

It IS an invitation. Why are you broadcasting it other than to invite connections? You already know it and any computer you want to connect to it already knows it. It's only purpose is to solicit new connections. That's why you are supposed to turn off broadcasting it if you don't want anyone else to use it. Duh.

183 posted on 01/07/2008 4:17:15 PM PST by FreedomCalls (Texas: "We close at five.")
[ Post Reply | Private Reply | To 174 | View Replies]

To: Myrddin

Read the post I was responding to.


184 posted on 01/07/2008 4:21:52 PM PST by mamelukesabre
[ Post Reply | Private Reply | To 180 | View Replies]

To: All
Follow this link to learn the details of FCC Part 15 devices.

Title 47, Chapter 1, Part 15, Subpart A, Section 15.9 addresses the issue of eavesdropping. Here is a textual link

185 posted on 01/07/2008 4:23:22 PM PST by Myrddin
[ Post Reply | Private Reply | To 180 | View Replies]

To: mamelukesabre
Do you have a license to transmit that signal onto my property?

I don't need a licence so long as I am within frequency and power requirements set by the FCC.

Nor does my signal interfere with you in any way unless YOU specifically request access to it by attempting to connect to it.

So your argument has no merit.

186 posted on 01/07/2008 4:24:20 PM PST by Wil H
[ Post Reply | Private Reply | To 178 | View Replies]

To: Wil H

I don’t need a license to receive TV, so your argument has no merit.


187 posted on 01/07/2008 4:26:01 PM PST by mamelukesabre
[ Post Reply | Private Reply | To 186 | View Replies]

To: Larry Lucido; hiredhand

I only use this ............:o)

http://www.google.com/tisp/install.html

Course all I can get on it is crap !


188 posted on 01/07/2008 4:29:25 PM PST by Squantos (Be polite. Be professional. But, have a plan to kill everyone you meet. ©)
[ Post Reply | Private Reply | To 150 | View Replies]

To: FreedomCalls
LOL! Connecting to an open wi-fi is not "sniffing the packet streams." I'm not sure that you even know what you are talking about at this point.

I've posted links to the some of the relevant FCC regulations. I'm familiar with the legal constraints as I have both an FCC First Class Radiotelephone license and an Extra Class amateur radio license. Certifying that a device meets FCC specs before going on the air includes signing my name and license number. I've also been building computer systems since 1980...including security. While employed at the phone company, I had to sign an affidavit concerning privacy of communications annually. The relevant sections of the Communications Act of 1934 were excerpted regarding interception of communications and the penalties for divulging the information.

What's your relevant experience on the topic?

189 posted on 01/07/2008 4:31:46 PM PST by Myrddin
[ Post Reply | Private Reply | To 181 | View Replies]

To: KarenMarie
Is it legally or morally ok, therefore, to send viruses to the computers stealing/sharing the bandwidth?

I don't think so. That would fall under "destruction of property." You can, however, forcibly kick them off your network by properly securing the network so that it denies unauthorized access attempts. Plus, if they get away with a virus-infested computer, they can infect other networks and systems.

Now, a friend of a friend set up a trap on his wireless network so that any unauthorized nodes would be commandeered, their hard drives wiped, and Linux installed.

190 posted on 01/07/2008 4:32:58 PM PST by rabscuttle385 (It takes courage to grow up and turn out to be who you really are.)
[ Post Reply | Private Reply | To 167 | View Replies]

To: mamelukesabre
You were replying to a subject of the United Kingdom. The laws in the UK are very different from the laws in the United States. Most countries are VERY restrictive about what you are allowed to receive and even more restrictive about what you may transmit. The U.S. is the most lenient government on earth with respect to freedoms permitted with the electromagnetic spectrum. Still, we do not operate in a state of anarchy. There are laws on the books and penalties for violating them. Receiving unencrypted TV broadcasts over the air doesn't require any special authorization or license in the U.S. It does require a license in the U.K.
191 posted on 01/07/2008 4:37:33 PM PST by Myrddin
[ Post Reply | Private Reply | To 184 | View Replies]

To: FreedomCalls
It IS an invitation. Why are you broadcasting it other than to invite connections?

Incorrect. The SSID, or Service Set Identifier, identifies a particular wireless network in range. It does not, however, constitute or imply an "invitation" or authorization to connect to the network.

192 posted on 01/07/2008 4:40:06 PM PST by rabscuttle385 (It takes courage to grow up and turn out to be who you really are.)
[ Post Reply | Private Reply | To 183 | View Replies]

To: Myrddin
No wonder businesses place legal banners on their systems informing users that they may be monitored.
193 posted on 01/07/2008 4:41:05 PM PST by rabscuttle385 (It takes courage to grow up and turn out to be who you really are.)
[ Post Reply | Private Reply | To 185 | View Replies]

To: nickcarraway
My understanding is that if you leave the connection unencrypted you are in a better position in court, because the prosecutors can’t prove you were the one doing the illegal downloading (etc.)

The recent RIAA litigation success may show otherwise.

194 posted on 01/07/2008 4:41:13 PM PST by rabscuttle385 (It takes courage to grow up and turn out to be who you really are.)
[ Post Reply | Private Reply | To 182 | View Replies]

To: rabscuttle385
Now, a friend of a friend set up a trap on his wireless network so that any unauthorized nodes would be commandeered, their hard drives wiped, and Linux installed.

That would be vandalism. Your friend's rights stopped when he inflicted damage on the other system's hard disk. Had he stopped at logging the MAC address and barring further communication, he would not have had a problem. What a lovely tort the victim would have if his business records were destroyed. There might even be criminal penalties if the act occurred in a state with the appropriate laws on the books.

195 posted on 01/07/2008 4:42:30 PM PST by Myrddin
[ Post Reply | Private Reply | To 190 | View Replies]

To: Myrddin
That would be vandalism.

Yes, I know. I heard the story through the grapevine. As I understand, the network in question was also heavily secured against unauthorized access, so I don't think anyone's hard drive was wiped.

But yes, under Virginia law, it would be a crime. We have both laws for computer network trespass and property destruction here.

196 posted on 01/07/2008 4:45:49 PM PST by rabscuttle385 (It takes courage to grow up and turn out to be who you really are.)
[ Post Reply | Private Reply | To 195 | View Replies]

To: rabscuttle385
No wonder businesses place legal banners on their systems informing users that they may be monitored.

That is precisely the reason for the legal banners. It was once common for the login process on UNIX systems to have a phrase similar to "Welcome to System XXXX". That was interpreted in court as tacit permission access the system. There was a mad scramble to update every system in the company to emit the legal prohibition banners in a manner visible before an attempt to login occurs. I had to modify the UNIX systems on 12 UNISYS mainframes in August 1984 to comply with company security. My colleagues with the 3B20S systems had many more systems to update.

197 posted on 01/07/2008 4:47:14 PM PST by Myrddin
[ Post Reply | Private Reply | To 193 | View Replies]

To: Myrddin
I had to modify the UNIX systems on 12 UNISYS mainframes in August 1984 to comply with company security.

Hats off, you've been in industry since before I was born (sixteen months after the referenced date).

198 posted on 01/07/2008 4:49:04 PM PST by rabscuttle385 (It takes courage to grow up and turn out to be who you really are.)
[ Post Reply | Private Reply | To 197 | View Replies]

To: mamelukesabre

LOL, I love it!


199 posted on 01/07/2008 4:52:30 PM PST by ItisaReligionofPeace
[ Post Reply | Private Reply | To 178 | View Replies]

To: SubGeniusX

Pay ‘em???? I’m thinking of charging a fee to everyone that beams an electron into my wireless laptop. It’s my wireless card, keep your unauthorized electrons out of it....That applies to all you TV satellites broadcasting signals thru my roof and all radios beaming thru my walls.


200 posted on 01/07/2008 4:56:51 PM PST by Drango (A liberal's compassion is limited only by the size of someone else's wallet.)
[ Post Reply | Private Reply | To 1 | View Replies]


Navigation: use the links below to view more comments.
first previous 1-20 ... 161-180181-200201-220 ... 281-283 next last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson