but now, you have a problem. what if you live in a densly populated area and you cant find out who the owner of the router is?
On the Path to the Streets of Gold: a Suebi AAR
Visited:![]()
![]()
![]()
![]()
![]()
![]()
![]()
![]()
![]()
![]()
![]()
![]()
![]()
Hvil i fred HoreToreA man who casts no shadow has no soul.
I don't think using the wifi of his neighbour is that bad. Ok, it's not done, but not worth to make a drama of it, let alone to call the police for it.
What bothers me more is the lack of respect the kid shows to his parents by circumventing the punishment (but then again, at that age, I would probably have done the same).
I do hope his parents find out and punish him a bit more thoroughly, by just taking away the kids' PC for a whole month.
Andres is our Lord and Master and could strike us down with thunderbolts or beer cans at any time. ~Askthepizzaguy
Ja mata, TosaInu
Kukri, I think you also need to consider the responsibility of a person who chooses not to secure their own "property," which in this case is broadcast well beyond the borders of their physical home. Let's say a hot brunette chooses to dance naked in front of her window. Is it voyeurism to look at her lithe body? Yes. But shouldn't she have considered closing the freakin' drapes?
The one does nothing to excuse the other, but I find your exclusive focus on the CRIMINALITY of using wide-open wifi to be a little monomaniacal.
I'd also like to point out that the only criminal case in which a man was charged for leeching a coffee shop's wifi was an extreme case. The staff even told the dude that if he would just buy a cup of coffee, they'd leave him alone; but he sat in his car leeching for days and days, and refused to patronize the business even slightly. In other words, he was a jerk, and was charged under conditions no normal person would provoke.
Is that even possible, to be "a little monomaniacal"? Like "a little pregnant"? :)
I think our disconnect on this is (I may be wrong; I can't read your mind, but your words lead me to believe that you think:) stealing must, by definition, involve some level of harm to the one who is stolen from.
I don't think stealing has to satisfy that requirement. The taking of that which is known to be owned by another, without permission, is enough.
Be well. Do good. Keep in touch.
Okay, let me come at this from another angle, since reading another person's newspaper seems like the best analogy so far:
You're at a coffeeshop reading your paper. You leave for a while. Do you, as the owner of that copy of the paper, have any obligation to, say, take your paper with you, or put it behind the counter, or do something to secure your own property? Or should you wait until someone picks it up and looks at it before you storm back in to declare that stealing is wrong?
I think "theft" is an inexact term for this situation, just as it would be not-quite-right for someone reading the paper over your shoulder. If another man sleeps with your girl, likewise, he's done you wrong, but "stealing" isn't quite right. I'm open to a better, more precise term.
Last edited by Lemur; 05-25-2009 at 17:45.
Had to read that 3 times. More like using a little washing powder someone left behind imho.
And as a term, what id wrong with 'using', nice term, and it already exists.
Last edited by Fragony; 05-25-2009 at 17:48.
There you go.
Like I said, someone is going to have to do the dirty work and unearth case law, technical protocols, industry standards. And it ain't me. I am working myself through a stack of secret emails that were passed to me and some of them have very interesting senders and receivers.
Yup, this could be an all-nighter.![]()
The bloody trouble is we are only alive when we’re half dead trying to get a paragraph right. - Paul Scott
On the Path to the Streets of Gold: a Suebi AAR
Visited:![]()
![]()
![]()
![]()
![]()
![]()
![]()
![]()
![]()
![]()
![]()
![]()
![]()
Hvil i fred HoreToreA man who casts no shadow has no soul.
This space intentionally left blank
Um, that would be bad form.
Seriously, there's not much in it that's newsworthy, but God this stuff is hilarious. My oh my, some of the people that govern this country are soooooo stoopid. Weeeeee!
Anyway, did anyone look into the jurisprudence on bandwidth use and abuse yet? Come on, there's gotta be an online library with that sort of stuff.
Last edited by Adrian II; 05-25-2009 at 22:09.
The bloody trouble is we are only alive when we’re half dead trying to get a paragraph right. - Paul Scott
Well, in terms of the law, here's a discussion from some knowledgeable people about that fellow in Michigan who got sentenced to some community service, where they doubt if any crime was committed in the first place:
So legally, it seems like it could be quite hard indeed to prosecute someone for using your wi-fi.But did Peterson actually commit a crime? The answer hinges on Michigan's somewhat unique computer crime law, and in particular on its definition of the meaning of "authorization." Like every state — and like the federal government — Michigan has an unauthorized access statute that serves as the basic computer crime law. (For my take on these statutes, see this article.) Here's Michigan's law, Section 752.795(a):
A person shall not intentionally and without authorization or by exceeding valid authorization . . . Access or cause access to be made to a computer program, computer, computer system, or computer network to acquire, alter, damage, delete, or destroy property or otherwise use the service of a computer program, computer, computer system, or computer network.
So far, this is a pretty standard unauthorized access statute. But Michigan does something that is pretty unique; it has a statutory presumption against access being authorized:
It is a rebuttable presumption in a prosecution for a violation of section 5 that the person did not have authorization from the owner, system operator, or other person who has authority from the owner or system operator to grant permission to access the computer program, computer, computer system, or computer network or has exceeded authorization unless 1 or more of the following circumstances existed at the time of access:
(a) Written or oral permission was granted by the owner, system operator, or other person who has authority from the owner or system operator to grant permission of the accessed computer program, computer, computer system, or computer network.
(b) The accessed computer program, computer, computer system, or computer network had a pre-programmed access procedure that would display a bulletin, command, or other message before access was achieved that a reasonable person would believe identified the computer program, computer, computer system, or computer network as within the public domain.
(c) Access was achieved without the use of a set of instructions, code, or computer program that bypasses, defrauds, or otherwise circumvents the pre-programmed access procedure for the computer program, computer, computer system, or computer network.
If I had been Peterson's attorney, I would have had a bunch of arguments in his defense. First, I would argue that having a statutory presumption is unconstitutional under Sandstrom v. Montana, 442 U.S. 510 (1979). A presumption that a material element of a criminal statute has been satisfied violates the Due Process clause, which requires the government to provide each element beyond a reasonable doubt. Id. at 524. Second, I would argue that even if the presumption is constitutional, it doesn't apply here: under (c), "[a]ccess was achieved without the use of a set of instructions, code, or computer program that bypasses, defrauds, or otherwise circumvents the pre-programmed access procedure for the computer program, computer, computer system, or computer network." And finally, the access was not unauthorized or in excess of authorization because the coffee shop intentionally made the wi-fi available to anyone. What's the rule — no hopping on wifi from a coffee shop unless you enter the shop? Unless you actually buy something? What if you're outside waiting for a friend to join you for a latte, but you haven't gone in yet? Where do such rules come from, and what notice does a defendant have before being held criminally liable? I've written before about how unauthorized access statutes threaten to punish an incredible amount of conduct online, and this seems like the latest evidence in support of the point.
CR
Last edited by Crazed Rabbit; 05-25-2009 at 23:23.
Ja Mata, Tosa.
The poorest man may in his cottage bid defiance to all the forces of the Crown. It may be frail; its roof may shake; the wind may blow through it; the storm may enter; the rain may enter; but the King of England cannot enter – all his force dares not cross the threshold of the ruined tenement! - William Pitt the Elder
but the main problem with everything is this:
lets take my area. im on my laptop right now. i have a powerful wifi antennae. i detect 7 networks right now- one is mine (locked down), 5 other locked down networks, and an unsecured network called "linksys." about 100 meters behind my house there is an apartment complex. i also have 2 neighbors. i know what my neighbors networks are called, and the unsecured one isnt theirs. now, if i was in my friends position, how would i find whos network was unlocked? the name of the network is a brand name, so its very hard to find out. my neighbor has her network as her name+"house" so its easy, but not here. the only thing i can think of is to go to every person in the apartment complex and asking whos network is "linksys."
Last edited by Hooahguy; 05-26-2009 at 02:26.
On the Path to the Streets of Gold: a Suebi AAR
Visited:![]()
![]()
![]()
![]()
![]()
![]()
![]()
![]()
![]()
![]()
![]()
![]()
![]()
Hvil i fred HoreToreA man who casts no shadow has no soul.
Analogies are a tricky business, but I think accessing someone else's network would be more akin to tresspass than reading a paper that they've left lying around. By using someone's wi-fi you're accessing their home network. If you're doing it without their permission it's not much different than accessing any other property without permission. You could cross someone's yard without their permission if they didn't put up a fence. But, just because they don't have their yard encased in razor wire doesn't mean its open for public use.
Call it what you want, but what it really boils down to is that you're using someone's property without their permission. Not a capital offense, but it's not exactly good manners either and could be illegal in many jurisdictions.
Last edited by Xiahou; 05-26-2009 at 03:45.
"Don't believe everything you read online."
-Abraham Lincoln
From the US standpoint: I still adhere to the principle that the airwaves are public (regulated to prevent interference, but still public). Anything broadcast should be fair game to any citizen that has the ability and knowledge to receive and translate it (don't get me started on my state's ban on radar detectors...).
The wifi routers and network cards are all approved for use by the FCC. How they get used beyond that approval is up to the owners. Some people like to leave their wifi access open, either out of kindness or for plausible deniability purposes. Others are ignorant, but that's no real excuse. And then there are those that lock down their access points as tight as possible.
I had my connection open for a while, then some neighbor started chewing up obnoxious amounts of my bandwidth (must have been downloading movies and such, it got really slow). So I fixed it. Turned on the best encryption offered and added MAC filtering. If you don't want your connection used, take the antenna off your router and put a terminator on the connector. Or at least turn on some form of encryption. Plug your PCs into the router with Cat5. Don't buy cordless phones, don't use cell phones. Otherwise don't be too surprised if your transmissions are intercepted or manipulated.
The .Org's MTW Reference Guide Wiki - now taking comments, corrections, suggestions, and submissions
If I werent playing games Id be killing small animals at a higher rate than I am now - SFTS
Si je n'étais pas jouer à des jeux que je serais mort de petits animaux à un taux plus élevé que je suis maintenant - Louis VI The Fat
"Why do you hate the extremely limited Spartan version of freedom?" - Lemur
There's a difference between monitoring a signal and transmitting thru/communicating over their equipment.
By connecting to their access point, you are communicating with their wireless network (not just monitoring) and are connecting yourself to their home network- without permission. Using your cordless phone example- it'd be the difference between listening to their calls vs using their cordless phone's base station to place your own phone calls from your house.
Using the victim's stupidity is no justification for doing something to them that you shouldn't be doing.
edit: Again, to be clear, I'm not advocating that wifi freeloaders should be given the death penalty. I'm just pointing out that it's a very gray area at best and probably technically illegal in most jurisdictions. I've done it before and may even do so again(though I don't make a practice of it)- but I recognize it for what it is.
Last edited by Xiahou; 05-26-2009 at 18:32.
"Don't believe everything you read online."
-Abraham Lincoln
The law here is pretty clear. Unauthorised access isn't allowed.
Days since the Apocalypse began
"We are living in space-age times but there's too many of us thinking with stone-age minds" | How to spot a Humanist
"Men of Quality do not fear Equality." | "Belief doesn't change facts. Facts, if you are reasonable, should change your beliefs."
But the router authorises it.
![]()
An enemy that wishes to die for their country is the best sort to face - you both have the same aim in mind.
Science flies you to the moon, religion flies you into buildings.
"If you can't trust the local kleptocrat whom you installed by force and prop up with billions of annual dollars, who can you trust?" Lemur
If you're not a liberal when you're 25, you have no heart. If you're not a conservative by the time you're 35, you have no brain.
The best argument against democracy is a five minute talk with the average voter. Winston Churchill
If you weren't calling long distance, why would it be a problem? It doesn't cost anything.If you call long distance, then you are stealing, because that will cost the equipment owner money.
My views on the fair use of the electromagnetic spectrum are somewhat extreme. By removing the physical aspect (wires) from the equation, communications security is non-existent. This is compounded by the desired "ease of use" aspect of computer products. If you are going to buy something that has potentially huge implications, you should learn how to use it properly.
The .Org's MTW Reference Guide Wiki - now taking comments, corrections, suggestions, and submissions
If I werent playing games Id be killing small animals at a higher rate than I am now - SFTS
Si je n'étais pas jouer à des jeux que je serais mort de petits animaux à un taux plus élevé que je suis maintenant - Louis VI The Fat
"Why do you hate the extremely limited Spartan version of freedom?" - Lemur
But that is it, right? If you buy something (in this case, both hardware, and monthly broadband service), do you not have the right of ownership of that product/service? And the right of assent/refusal to share that product/service? And if someone besides you uses that product/service, without your assent, is he not stealing?
That was the question posed by the thread title:
and OP.using a neighbors wifi: is it stealing?
The past 3 pages of tech discussion is why I switched "wifi" for "car". Not because I tried to make car a universal analogy (Lemur was right, it was weak), but because as soon as the topic involves 'tech', we get caught up in the minutiae of what is possible, instead of what is right. You guys are correct IMO, that anyone who buys, installs, and uses devices that employ the IIEE 802.11 a thru n protocols ought to rtdm and understand the implications of broadcasting, and appropriate measures for security. If they don't, shame on them. But they are protected by the same concept that protects mini-skirted girlies from being harrassed, fondled, brutalized, or worse. Her selection of clothing is no invitation to rape, no matter her ignorance.
But in the end, all that is irrelevant to whether the 'taking' of something not your's is stealing. It is. It has been for at least 6000 years, and it is today.
If I were an active duty cop, would I arrest the kid? No. It costs too much to prosecute such a petty offense against humanity, and laws are unclear.
If I were the lad's father, and found out about this? No computer for 6 months, bread and water for a week.
But that's just me. :)
Be well. Do good. Keep in touch.
But isn't sharing really the whole point of wi-fi? That's what people with interesting glasses and haircuts have been telling me.
http://en.wikipedia.org/wiki/Legality_of_piggybacking
Here it is anyway, in the UK, it comes with fine and conditional discharge.
Last edited by Beskar; 05-27-2009 at 04:18.
Days since the Apocalypse began
"We are living in space-age times but there's too many of us thinking with stone-age minds" | How to spot a Humanist
"Men of Quality do not fear Equality." | "Belief doesn't change facts. Facts, if you are reasonable, should change your beliefs."
The sharer usually knows he is sharing. And a "thank you" is usually in order from the recipient. But that might tip off the "friendly neighbor" who doesn't realize he's sharing anything.
This whole issue boils down to what assumptions you are willing to make about the situation.
When I got Verizon fiber optic service a couple of years ago they provided their own wireless router. From what I read and what I was told, when the tech set it up the router would be secure and protected. I took them at their word. Several months later I had to tweak the router settings to play an online game and when I went into the router setting for the first time I realized I had been broadcasting free internet to the whole neighborhood. I was rather annoyed with Verizon and told them so.
Some of the assumptions made above would have me labelled as "one heck of a nice guy" or "an idiot that should know how to secure his router" - both wrong.
This space intentionally left blank
In this case, we get caught up in the question of what it is that we've bought. It's not just a gadget, it's a gadget that offers access to the GHz 2,4 band which is free, but probably subject to intricate legislation or jurisprudence.Originally Posted by KukriKhan
Most property analogies fail. Even the yak.
The bloody trouble is we are only alive when we’re half dead trying to get a paragraph right. - Paul Scott
Bookmarks