Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

The ethics of "stealing" a WiFi connection
Ars Technica ^ | January 03, 2008 | By Eric Bangeman

Posted on 01/07/2008 10:46:22 AM PST by SubGeniusX

Network security firm Sophos recently published a study on what it terms WiFi "piggybacking," or logging on to someone's open 802.11b/g/n network without their knowledge or permission. According to the company's study, which was carried out on behalf of The Times, 54 percent of the respondents have gone WiFi freeloading, or as Sophos put it, "admitted breaking the law [in the UK]."

Amazingly, accessing an unsecured, wide-open WiFi network without permission is illegal in some places, and not just in the UK. An Illinois man was arrested and fined $250 in 2006 for using an open network without permission, while a Michigan man who parked his car in front of a café and snarfed its free WiFi was charged this past May with "Fraudulent access to computers, computer systems, and computer networks." On top of that, it's common to read stories about WiFi "stealing" in the mainstream media.

It's time to put an end to this silliness. Using an open WiFi network is no more "stealing" than is listening to the radio or watching TV using the old rabbit ears. If the WiFi waves come to you and can be accessed without hacking, there should be no question that such access is legal and morally OK. If your neighbor runs his sprinkler and accidentally waters your yard, do you owe him money? Have you done something wrong? Have you ripped off the water company? Of course not. So why is it that when it comes to WiFi, people start talking about theft?

The issue is going to come to a head soon because more and more consumer electronics devices are WiFi-enabled, and many of them, including Apple's iPhone and most Skype phones we've used, come ready out of the box to auto-connect to open WiFi networks. Furthermore, as laptop sales continue to grow even beyond desktops, the use of open WiFi is only going to grow along with it.

Steal this WiFi connection!

When you steal something, there's typically a victim. With WiFi, Sophos thinks the ISPs are the victims. "Stealing WiFi Internet access may feel like a victimless crime, but it deprives ISPs of revenue," according to Sophos' senior technology consultant Graham Cluley. Furthermore, "if you've hopped onto your next door neighbors' wireless broadband connection to illegally download movies and music from the 'Net, chances are that you are also slowing down their Internet access and impacting on their download limit." In Sophos' view, then, both ISPs and everyday subscribers can be victims.

In one fell swoop, "stealing WiFi" gets mentioned in the same breath as "illegally" downloading movies and music. The fact is, people join open WiFis for all manner of reasons: to check e-mail, surf the web, look up directions to some place, etc. Those don't sound like nefarious activities, however, and certainly not activities which are likely to get someone in trouble. Of course if you run an open WAP (wireless access point) and it is heavily used for just e-mail, you could still hit your bandwidth cap (if you even have one), but that has to happen only once for that user to figure out what's up, and fix the problem. And let's be honest: it is their problem. No one forced that user to install a WAP or to leave it wide open. We'll get back to this in a minute.

The argument that using open WiFi networks deprives ISPs of significant revenue is also a red herring. Take the case of public WiFi hotspots: official hotspots aren't that difficult to find in major cities—every public library in Chicago has open WiFi, for instance. Are the public libraries and the countless other free hotspot providers helping defraud ISPs? No, they're not. There's no law that using the Internet requires payment of a fee to an ISP, and the myriad public hotspots prove this.

Really, there's only one time when you could argue that an ISP is being gypped, and that's when someone is repeatedly using his neighbor's open WiFi in lieu of paying for his own service. Is this really wrong? Let's consider some parallel examples. If the man in question were given a key and told that he could enter his neighbor's house whenever he wanted to use a PC to access the Internet, would this be wrong? Of course not. They key here (pun intended) is the "permission" given by the owner of the home. Our leeching friend would clearly be in the wrong if he were breaking into the house, of course, because he would be sidestepping something clearly set up to keep him out. If he has permission, I suppose one could argue that it's still not right, but you won't find a court that will punish such a person, nor will you find too many people thrilled at the idea that someone else can tell them who they can and can't allow into their homes for what purposes.

Some people leave their wireless access points wide open deliberately. A friend of mine and recent seminary graduate lived in a campus-owned apartment building. In addition to being a man of the cloth, Peter is a longtime Linux user and open-source advocate. While living here in Chicago, he got his DSL from Speakeasy and shared the connection with others in his building... and anyone else who needed a quick Internet fix (Speakeasy even encouraged this). He even positioned his router so that anyone in the church across the street could pick up a signal. Obviously, not everyone is like Peter. But despite easy-to-read instructions and a plethora of warnings about the need to secure your WAP, some people just can't be bothered to enable the most basic security settings.

To the person with a laptop and a sudden need to check e-mail or surf the web, it's not possible to tell who is leaving their access points open deliberately and who just plain doesn't care. The access point is there and the virtual doors are unlocked, so why not take advantage of it if you're in need?

A couple of caveats: be familiar with the law of the land. As the examples at the beginning of this story show, it's illegal to access a WAP without permission—even if it's wide open—in some places. Also, you should never use an open point for anything illegal or even unneighborly. Don't log onto the first "linksys" WAP you see and fire up a torrent for your favorite, just-released Linux distro.

And as always, don't leave your own 802.11b/g/n router wide open unless you're comfortable with random surfers using your 'Net access for their own purposes.

Open WiFi is clearly here to stay.


TOPICS: Crime/Corruption; Culture/Society; Government; Philosophy
KEYWORDS: ethics; wardriving; wifi; wireless
Navigation: use the links below to view more comments.
first previous 1-2021-4041-6061-80 ... 281-283 next last
To: SubGeniusX
Ummmm....I'm pretty sure they should arrest all librarians....and now that I think about it, in giving me hand-me-downs I'm pretty sure my mother deprived Buster Brown of legitimate shoe sales....My mother's a CRIMINAL, right?

Shouldn't we handcuff air for improperly transmitting music?

21 posted on 01/07/2008 11:08:51 AM PST by gaijin
[ Post Reply | Private Reply | To 2 | View Replies]

To: Right Cal Gal
Well, maybe. Just stay away from sky lights, especially if you hear hovering coppers and boots on the roof.

Anyways, it’s almost all done. Over. Fini.

Google is buying the old over the air TV spectrum from the FCC. Around 4.5 billion dollars.

Next five years, everything will be a data cloud, on line, networked out there, some where.

You won’t be able to tell where your phone starts and your computer ends.

Anyways, until then, lay low, move often, have others pick up your mail. Leave chalk marks on telephone poles. Avoid dark stairwells and small midgets gangs.

22 posted on 01/07/2008 11:10:20 AM PST by Leisler
[ Post Reply | Private Reply | To 14 | View Replies]

To: KoRn

Bruce Schneier, one of the world’s most famous cryptographers, wrote an RC2-cracking screen saver. (The original WEP is based on RC2.)


23 posted on 01/07/2008 11:11:13 AM PST by flintsilver7
[ Post Reply | Private Reply | To 18 | View Replies]

To: SubGeniusX

Actually...

As a ham radio operator, I can operate WiFi at higher power levels than the normal routers come with, and I can NOT use encryption to prevent others from using the system.

(I COULD lock out all but my given MAC addresses, and there are a few other things I can do)....But I MUST ID my wifi with my callsign for connection and identification purposes.

So, theoretically, if I open mine up like that for Ham use, I can’t BLOCK it (to other hams) and I can’t encrypt it to prevent NON hams from using it (if they can get in).

That’s in the FCC regs. So, it isn’t stealing if I leave my stuff open. On the other hand if I leave my car unlocked and someone takes the car, then... it’s a stolen vehicle.


24 posted on 01/07/2008 11:11:51 AM PST by Rick.Donaldson (http://www.transasianaxis.com - Visit for lastest on DPRK/Russia/China/Etc --Fred Thompson for Prez.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Wil H

Are you the type that folds toilet paper four times before using it?


25 posted on 01/07/2008 11:12:16 AM PST by steve86 (Acerbic by nature, not nurtureā„¢)
[ Post Reply | Private Reply | To 10 | View Replies]

To: SubGeniusX
“It’s time to put an end to this silliness.”

I am out of my league here, as I have never had a laptop and never used a WiFi connection, but there are many WiFi
systems set up to serve the public at large.
How is one to know which is which?
Here in Bratislava, many cafes advertise free WiFi, and in the same block, the city offers Wifi in the center square.
I see as many as 15 users on park benches with laptops.

I assume that one’s private WiFi can be secured so it should be up to the owner of the network to secure it.

If a neighbor shoots fireworks on the 4th of July, is it against the law for me to watch?

26 posted on 01/07/2008 11:13:08 AM PST by AlexW (Reporting from Bratislava, Slovakia. Happy not to be back in the USA for now.)
[ Post Reply | Private Reply | To 2 | View Replies]

To: capt. norm
It is very easy to secure your wi-fi/router..

Not really..

Using commercially available encryption schemes or MAC Filtering will secure your network from the vast majority of would-be pilferers but it is no more a guarantee of security than is say, locking your car and setting a car alarm, that your car won't be stolen.

Any hacker worth his salt can break WEP or WPA encrpytion schemes within a few minutes.

27 posted on 01/07/2008 11:13:43 AM PST by Wil H
[ Post Reply | Private Reply | To 12 | View Replies]

To: Leisler

You made my morning, darlin’ - thanks!

It’s really hard to know what the state of the law is, isn’t it. I’m in my car, checking Safari (no, not driving, honest) and I get router options for the WiFi. It’s confusing. I just want to check something - maps, weather, quick peek at current Freeper headlines! But, of course, I want to keep things correct - I don’t want my neighbors’ connections to suffer because my iPhone latches onto their WiFi connect.

I have no idea how that works, as a matter of fact. When it prompts it - there are some WiFi options that have what looks like a little “lock” and all ask me for a password. However, they put me through without it.


28 posted on 01/07/2008 11:15:18 AM PST by Right Cal Gal (Remember Billy Dale!!!)
[ Post Reply | Private Reply | To 22 | View Replies]

To: Cicero
If you don’t password protect, then it’s not really stealing.

Don't ever leave your house unlocked , I might just help myself, after all, it's not really stealing, is it?

29 posted on 01/07/2008 11:15:55 AM PST by Wil H
[ Post Reply | Private Reply | To 15 | View Replies]

To: SubGeniusX
If someone was arrested because they piggy-backed on my wi-fi, I would probably bail them out and testify in their defense because I was too stupid to control what I was broadcasting.

This could all be fixed with small, simple steps. The government and law-enforcement should not be wasting time and money on this.

jw

30 posted on 01/07/2008 11:17:04 AM PST by JWinNC (www.anailinhisplace.net)
[ Post Reply | Private Reply | To 1 | View Replies]

To: DBrow

“...if you leave your front door accidentally unlocked, you should not complain when your stuff is stolen.”

I don’t think that’s an apt analogy. It’s more like - if you throw 10,000 pennies up in the air and they scatter in all directions and fall into others’ backyards, don’t complain if they get picked up.

The owner of the wireless router is transmitting. So, if anyone is trespasssing first, it’s him. But these analogies from the world of physical property and physical access just don’t work that well for the issues surrounding intellectual property, information assets, bandwidth, etc...


31 posted on 01/07/2008 11:17:37 AM PST by swain_forkbeard (Rationality may not be sufficient, but it is necessary.)
[ Post Reply | Private Reply | To 13 | View Replies]

To: SubGeniusX

This will make it even easier:

http://www.turnpoint.net/wireless/cantennahowto.html


32 posted on 01/07/2008 11:18:30 AM PST by Natural Law
[ Post Reply | Private Reply | To 1 | View Replies]

To: swain_forkbeard

re:#31

ditto


33 posted on 01/07/2008 11:19:24 AM PST by JWinNC (www.anailinhisplace.net)
[ Post Reply | Private Reply | To 31 | View Replies]

To: DBrow

Packets destined for your particular router are for all users of that router’s subnet and are addressed to the router. The packets contain your individual machine’s MAC address, though, so assuming no black hat shenanigans sorting router traffic by machine is trivial.


34 posted on 01/07/2008 11:20:22 AM PST by flintsilver7
[ Post Reply | Private Reply | To 13 | View Replies]

To: steve86

How about I just piggyback on your cellphone account and use your minutes instead of mine?

That works for me if you have no problem with other people hi-jacking your paid-for communications transmission services.

Thanks, What’s your number?


35 posted on 01/07/2008 11:21:46 AM PST by Wil H
[ Post Reply | Private Reply | To 25 | View Replies]

To: JWinNC

Great point. Some people seem to assume two things.
1. The wifi hotspot owner doesn’t want you to use it.
2. Using it has caused the owner some harm.

These two conditions are by no means universal. It’s ISPs that really have an interest in creating this new ‘crime’ and then cracking down on it.


36 posted on 01/07/2008 11:22:08 AM PST by swain_forkbeard (Rationality may not be sufficient, but it is necessary.)
[ Post Reply | Private Reply | To 30 | View Replies]

To: Wil H

WPA encryption weaknesses rest in weak passwords, not in the inherent security of WPA.


37 posted on 01/07/2008 11:23:07 AM PST by flintsilver7
[ Post Reply | Private Reply | To 27 | View Replies]

To: Wil H

A person actually owns the house, but no one owns the medium that wi-fi travels through.


38 posted on 01/07/2008 11:24:19 AM PST by stuartcr (Election year.....Who we gonna hate, in '08?)
[ Post Reply | Private Reply | To 29 | View Replies]

To: swain_forkbeard
The owner of the wireless router is transmitting. So, if anyone is trespasssing first, it’s him. But these analogies from the world of physical property and physical access just don’t work that well for the issues surrounding intellectual property, information assets, bandwidth, etc...

Technically, no. He's not trespassing. All routers are designed under FCC rules and regulations (FCC Part 15 regs) that those devices can and do transmit without licensing, must NOT interfere with other services, and MUST ACCEPT interference from other services.

Basically, this means that the owner of ANY router is not required to have a license to transmit. So, he is not "trespassing".

To access a router, however you MUST make an EFFORT to make the connection. That is, you must tell the computer (under windows for instance) that you WANT to connect to "an unsecured device" - because Windows ASKS this question of you when it notices the router broadcast.

As I mentioned before, I can set up and modify a router to have a much HIGHER power out put, different antennas and so forth, and be able to say, connect to my home router from 20 miles away. I can NOT legally encrypt that signal either, and must allow other Amateur Radio operators to use it. Others who are not hams could legitimately use that signal if their equipment is close enough and I can't do much about it. I CAN protect it by hiding the id broadcast, but under FCC rules, I can't do that either. I CAN lock out all wireless addresses EXCEPT those I am using with my machines. Thus, I can protect, without using any encryption at all, my system

So technically, a radio signal isn't really 'trespassing'.. /shrug
39 posted on 01/07/2008 11:26:41 AM PST by Rick.Donaldson (http://www.transasianaxis.com - Visit for lastest on DPRK/Russia/China/Etc --Fred Thompson for Prez.)
[ Post Reply | Private Reply | To 31 | View Replies]

To: SubGeniusX

It would seem to me it is covered under the 1930’s laws that the airways are free and belong to the people on receive mode only. When you broadcast out it might be different.


40 posted on 01/07/2008 11:27:31 AM PST by bmwcyle (BOMB, BOMB, BOMB,.......BOMB, BOMB IRAN)
[ Post Reply | Private Reply | To 1 | View Replies]


Navigation: use the links below to view more comments.
first previous 1-2021-4041-6061-80 ... 281-283 next last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson