Please create an account to participate in the Slashdot moderation system

 



Forgot your password?
typodupeerror
×

Jailtime For Leeching Wireless? 587

jginspace writes "A 17-year-old from Singapore is is facing three years' jailtime for accessing his neighbor's wireless network. His neighbor complained and now the unfortunate Tan Jia Luo is facing charges under the computer misuse act and is scheduled to appear in court on Wednesday."
This discussion has been archived. No new comments can be posted.

Jailtime For Leeching Wireless?

Comments Filter:
  • by Zerbey ( 15536 ) * on Sunday November 12, 2006 @12:32PM (#16814150) Homepage Journal
    Putting aside the fact that running an unsecured network should also be a punishable offence in this day and age, the kid was still in the wrong. Just because you can break into a network does not give you the right to do so. The question is whether or not he did it on purpose or if it was just another stupid Windows box attaching to the nearest open wireless access point (I've lost count of the number of times I've accidentally attached to my neighbour's WAP [1] ... telling Windows not too is like pulling teeth).

    I just hope the conviction isn't too harsh. A fine would be more appropriate than jail time.

    [1] And yes, I have told him to fix it. Even did the neighbourly thing and secured his network for for him. The following day he removed my configuration because "he didn't like entering a password". He'll learn the hard way eventually.

  • by Anonymous Coward on Sunday November 12, 2006 @12:40PM (#16814210)
    "Putting aside the fact that running an unsecured network should also be a punishable offence [sic] in this day and age, the kid was still in the wrong. Just because you can break into a network does not give you the right to do so."

    But if it was unsecured, it wasn't possible to break in.
  • Re:More info (Score:3, Insightful)

    by alienw ( 585907 ) <alienw.slashdot@ ... inus threevowels> on Sunday November 12, 2006 @01:04PM (#16814346)
    Uh, everyone knows WEP is not secure. That's why there is WPA, which is not crackable as far as I know.

    Besides, it's possible to open a typical house lock in about 30 seconds with a lockpick. This does not make it OK to break into someone's house. It's possible to snoop on someone's cordless phone. This is illegal. Using a wireless network without permission is the same thing.
  • by biggomez777 ( 948763 ) on Sunday November 12, 2006 @01:16PM (#16814424)
    To all of you that say he wasn't doing anything malicious: how do you know? And are you using your definition of malicious or the owner of the WAP? If my connection was open(it's not) and someone wanted to check their email, I wouldn't mind. Someone else might. However, probably everyone would mind if someone slammed their connection with torrent traffic 24/7. It might be all "legal" traffic, but it would still be damnned annoying, and malicious in my book.

    The only real solution I see to this is to secure ALL wireless networks out of the box. It would keep windows from auto-attaching, and would make anyone logging into one liable if someone complained. The argument "well I didn't know I wasn't supposed to be there" goes right out the window. Then, if you decide to unlock your network, everyone knows that you meant to, and not that you're some fool that said "I want a wireless network! yay!" without knowing what that really means.
  • by ranton ( 36917 ) on Sunday November 12, 2006 @01:18PM (#16814442)
    The problem here is that many people purposfully leave their wireless open so that others can use it.
    When I first turned on a new mac notebook recently, it auto searched for networks and found one. Would using that network be wrong?

    Yes, it is wrong. The user agreement for virtually all ISPs does not allow their users to share their internet connection wirelessly, no matter how generous your neighbors feel. Permission is not theirs to give. If a friend of mine had 1 Bears football ticket and tried to sneak me in with him, we would both be in the wrong.

    --
  • by Hizonner ( 38491 ) on Sunday November 12, 2006 @01:36PM (#16814564)
    The user agreement for virtually all ISPs does not allow their users to share their internet connection wirelessly, no matter how generous your neighbors feel.

    False. Yes, most consumer ISP service agreements forbid this. There are significant exceptions. And almost any ISP that has any non-consumer operations will sell you a connection that you can share if you're willing to give them enough money. I have a "legal" open wireless network, with the permission of my ISP, and so do lots of other people. There is no reason my users should assume my network isn't legitimate.

    If you leave a network wide open, you are doing the only thing you can to invite people to use it. Absent information to the contrary, there's no reason it should be forbidden to assume the good faith of such an invitation. If your ISP service agreement doesn't permit you to share the bandwidth, then you need to close down the network, or somehow put people on notice that they can't use it. Only you, not the users, are in the wrong if you don't.

  • by Ross D Anderson ( 1020653 ) on Sunday November 12, 2006 @01:38PM (#16814576)
    I have lived there, and by and large, this system works well because they publicise the laws so much. Spraypainting a wall is vandalism if whoever owns that wall does not want it there. If you want to avoid the punishment, I'd say it's fairly easy not to do the crime. I've never spraypainted anyones wall by accident anyway. If spraypainting is your thing, buy some canvas, or spraypaint your own house, at least then its you paying for your hobby, not somebody else having to pay to have it removed. The punishment for gum, though extreme, is also easily work aroundable. Don't chew gum. They make it even easier for you, as most places don't sell it. And I bet you can't visit without seeing a no-gum sign clearly visible throughout the country.
  • Re:More info (Score:5, Insightful)

    by Catbeller ( 118204 ) on Sunday November 12, 2006 @01:38PM (#16814580) Homepage
    Home locks are pickable so that police and locksmiths can open them. Your home is accessible by law.

    That said, radio devices are not homes, WEP is not a lock, and accessing a device which sole purpose by design is sharing access is not invading private property. Metaphors are not real. Radio is not "yours", ideas are not "yours". Such semantic confusion -- intentional confusion -- leads to things like 17 year old kids going to prison for a crime that only exists in the the minds of hornswoggled. The thing to look out for in the years ahead is the first execution of a person for "stealing" a metaphor. Probably going to happen a lot sooner than even I believe it will.
  • Re:More info (Score:5, Insightful)

    by cayenne8 ( 626475 ) on Sunday November 12, 2006 @01:39PM (#16814598) Homepage Journal
    I've got an old scanner that picks up old analog cordless phones and cell phones....I heard some VERY interesting conversations..about sexual liasons...and couldn't believe how people would freely give out bank and other private/financial info over the insecure air.

    That being said....with open wireless access points? Jail time? I mean, c'mon!! AS I posted on the story about 5-10 yrs. in prison for Dos attackers....let the sentence reflect the severity of the crime!!

    Violent offenders can and do get off for less than 3 years!!!

    If someone leaves an AP on and open...I think that is pretty much a free invite to join in...

    And if not...well, for sure it isn't worth imprisoning someone 3 years!!

  • by Anonymous Coward on Sunday November 12, 2006 @01:39PM (#16814600)
    But he didn't trespass. You don't make legal complaints or argue cases by analogy. That's why there are codified laws and rule of same - to prevent punishment of what we all "know" must be wrong but can't quite articulate. That nothing more than mob rule. While in this case it may run parallel to what you think is right, what about next time? Without rule of law we are subject to the passions of the times. Herein lies the problem with tech crimes - laws have yet to catch up with the criminals.

    While this may be cut and dried by Singapore legal standards, it is murky at best in most western countries. He clearly didn't break and enter in the physical or electronic sense as there was no security. Trespassing is also quite murky, as the completely unsecured signal reached into his residence as much as he reached back into the unsecured residence. So if he was trespassing why wasn't the signal's owner? Also, in no sense would the signal's owner have a reasonable expectation of privacy without even paying the slightest lip-service to security. The signal was being openly broadcast; how is anyone to know that something looking like a free wireless hotspot was in fact the network of an private citizen when they made no attempt to restrict public access? The accused does not have ESP. (To correct your analogy, this is like someone running their phone line into your house and mounting the phone on your wall.) Further, depending on the alleged criminal's operating system, it is quite possible that he had no knowledge of what was happening. This are but a few of the tracks I would use to argue the case were I still practicing.

    Before firing back more analogies, perhaps a letter to your congresscritter urging modernization of computer criminal statutes would be more useful. We can debate ad infinitum, but that will change nothing in the real world. Until there is recognized legal standing upon which precedence can be built, these types of activities will not be addressed in anything approaching a consistent manner.
  • by Anonymous Coward on Sunday November 12, 2006 @01:51PM (#16814684)
    Their poor business plan is not my problem. I'm paying for a line avertised as "xMbits unlimited internet tubes!" and I'll stuff as much data down it as It'll support, mine or otherwise.
  • by eebra82 ( 907996 ) on Sunday November 12, 2006 @01:55PM (#16814700) Homepage
    The way I see it, if I open up an insecure wireless network, I also tell others that they too are invited to it.

    An open network is OPEN.
    A password-protected network is CLOSED, but open to those who have the password.

    If anyone hacks the password-protected network and bypasses the password protection, this is trespassing and misuse.

    I live in a large house with lots of apartments with many neighbors who possess such unprotected networks. What if my router is down and my laptop connects to one of these networks? Am I then going to prison, because I never noticed it? Hell no.
  • Re:More info (Score:2, Insightful)

    by shrtckt ( 1006747 ) on Sunday November 12, 2006 @01:59PM (#16814732)
    WPA is very crackable in the hands of a knowledgeable linux user, it just takes a little more time than a 30 sec WEP job. :)
  • by b0s0z0ku ( 752509 ) on Sunday November 12, 2006 @01:59PM (#16814734)
    My SSID, OTOH, is "GetOut". i.e. no, you cannot use this AP.

    Why not just name it "JoeSchmoe" or whatever your name is and use strongest encryption? "GetOut" seems like waving a red flag in front of every 1337 script kiddie that wants to impress its friends by hax0ring.

    -b.

  • by tsm_sf ( 545316 ) on Sunday November 12, 2006 @02:03PM (#16814750) Journal
    Uh, an open AP is literally an invitation. Nobody is hacking your wirez, you are actually broadcasting the availability of a service. Another great example of getting pissed off at someone else because you didn't read the damn manual. It's a FIVE PAGE BOOKLET. It HAS PICTURES. They literally DREW A PICTURE FOR YOU.
  • by Reluctant Wizard ( 984280 ) on Sunday November 12, 2006 @02:04PM (#16814752)
    Actually, since:

    1.) _Most_ people who run an open wireless access point are doing so because they don't know it should be secured, or how to make it so,

    --and--

    2.) _Most_ ISPs providing connectivity to these people have within their TOS restrictions on "subletting" access;

    the ethical approach is to assume that any open wireless access point is private, and refrain from using it, unless there is some specific indication that it is intended for open, public use (perhaps the SSID could be something like "FREEWIRELESS").

    An approach of this sort would take most, if not all, of the second-guessing out of the situation. My take on the reaction to this, however, is that this would not satisfy most of those here who would rather have free access anywhere thay can find it, rather than having to actually purchase it.
  • Re:Nope (Score:1, Insightful)

    by Anonymous Coward on Sunday November 12, 2006 @02:05PM (#16814764)
    have you ever been to singapore? do you know a single factual thing about the country? i have been there and i have worked there. your comments are just dumbazass and not remotely true. i hope you aren't another idiotic american just repeating stupid things. i say that as an american who has worked hard to get out and see other countries.
  • by Hizonner ( 38491 ) on Sunday November 12, 2006 @02:06PM (#16814770)

    So, I assume that you call the operator of every Web server and get permission before you connect to it, right?

    No. You don't. You don't because setting up a Web server, and not doing anything to restrict access to it, implicitly authorizes people to use it, at least in any "normal" way.

    You also don't look around for an "OK to drink" sign before you use a public drinking fountain. Not even when that fountain is on private property. Also, by the way, you don't go around inquiring whether the drinking fountain operator has an agreement with the water company that permits her to give away the water. You just drink the damned water.

    We're talking about what norms should be established in a relatively new case. I claim that the norms should be consistent (meaning that the same norms that apply to T-Mobile should apply to me), that they should be practical (meaning that there's a reasonable way to have an open network and an reasonable way to have a closed one), and that they should comport with the way the installed technology behaves (meaning that, since the default configuration of practically every computer is to connect with any available open network, that behavior should be expected).

    The people who want closed networks already have methods available to them. It's trivial to mark a network as not being available-- don't beacon the SSID, or turn on MAC filtering, or turn on authentication or encryption. Those are simple, reasonable ways of marking the network as closed, and they work within the technological framework. Asking me to talk to every user or post a sign goes outside the technological framework and is an unreasonable burden.

  • Re:Nope (Score:3, Insightful)

    by IWannaBeAnAC ( 653701 ) on Sunday November 12, 2006 @02:12PM (#16814816)

    So, can you point to a subway system where blocking a door doesn't prevent the subway from moving???

    Also, some evidence of your claim about the reason for the ban on chewing gum would be appreciated. 'Cause I think you might be wrong.

  • by 4105 ( 819650 ) on Sunday November 12, 2006 @02:13PM (#16814820)
    I suspect how this person was caught would explain why he was arrested. If he lived in an adjacent apartment, and quietly surfed on his neighbors signal I suspect the chances of getting caught are extremely slim. On the other hand if he sat outside the guy's doorway and taunted him about stealing his signal, I suppose that would be another matter. It is highly likely that this person did something to provoke his neighbor. If you knew how to track down a person stealing your wireless, it is unlikely that you would have an unsecured connection.
  • Re:More info (Score:4, Insightful)

    by kdemetter ( 965669 ) on Sunday November 12, 2006 @02:21PM (#16814864)
    I think that is pretty much a free invite to join in

    I agree . If someone doesn't wont you to use their wireless , there are many ways to prevent it .



    It's even possible to use their wireless unintentionally . if the signal is strong enough , your computer may decide to use that one . So you can go to jail because your computer screwed you over .



  • by Pink Tinkletini ( 978889 ) on Sunday November 12, 2006 @02:21PM (#16814868) Homepage
    Perhaps the culture in Singapore is such that gum chewing is considered immoral, if everyone agrees that (a) when chewing gum, it's all too tempting to spit it on the sidewalk instead of finding a trash can, and if everyone also agrees (b) the best way to prevent people from chewing gum is to enforce strict punishments against it. Simply banning spitting on sidewalks wouldn't be considered an adequate solution because of (a) above. Now I understand Singapore's no democracy, but from what I've seen this is a completely reasonable assessment of mainstream Singaporean culture.

    In short, it's a mistake to force Western notions of freedom and morality on a culture that already has its own conceptions of both.
  • Dear Cisco... (Score:2, Insightful)

    by senorzapato ( 1017128 ) on Sunday November 12, 2006 @02:26PM (#16814892)
    "While there are no statistics on how commonplace the practice of piggybacking unsecured home wireless networks is, networking firm Cisco System's spokesman, Mr Rayson Cheo, said it is probably quite widespread here."

    Mr. Cheo, I have an Idea.
    How about making those Linksys WRT54G routers, which can be found in every house including dog houses doll houses and outhouses, secure?
    Why is it I can find an "unsecured wireless network" named "linksys" on any neighborhood street in America? And why would Cisco claim to be concerned with the matter - or are you simply more concerned with the matter that securing your boxes out-of-the-box would drive up support costs and drive down sales? (Rhetorical question.)
  • Re:More info (Score:5, Insightful)

    by cgenman ( 325138 ) on Sunday November 12, 2006 @02:35PM (#16814934) Homepage
    though Mr Cheo said software tools are available for download that can track who is using a network and what they are doing on it.

    Yeah, it's called your router's software.

    My old 802.11b wireless router died a few years back. I didn't have a laptop at the time, but my girlfriend did. It was literally 6 months before we noticed that her laptop wasn't connecting to our router, but rather a unsecured wireless router in the building. It was just automatically connecting to what's available.

    This is not "stealing" network access, or "breaking in" to your house. This is a device, available for everyone nearby, which is constantly broadcasting packets saying quite literally "Hey, I'm here! Does anyone want to connect to me?" Your computer then says "Hey, I'm a laptop. This is my network card identification. Can I get on your network?" The router then says "Sure, hop on. I'll route your packets."

    This is not someone coming to your house and attaching alligator clips to your phone line. This is YOUR router, working in YOUR stead, behaving exactly as YOU have configured it to. This is like a secretary whom you've told to let anyone into your building. If you can't be bothered to train the secretary in the simplest of fashions (and putting a password on a network isn't exactly rocket science), you shouldn't envoke the police when you find they have let random people into the building.

    If you can't spend the ten fucking minutes to put a password on your network, you shouldn't waste the judicial system's time when people access it.
  • Re:Nope (Score:3, Insightful)

    by KenSeymour ( 81018 ) on Sunday November 12, 2006 @02:35PM (#16814940)
    According to this [bbc.co.uk] the ban has been softened. You can now buy chewing gum with a prescription.

    Here are some other references to the chewing gum [expatsingapore.com] ban [usatoday.com].
  • by karmatic ( 776420 ) on Sunday November 12, 2006 @03:05PM (#16815164)
    I have an ISP that allows me to share my service. I want to make it available to those around me.

    How do I tell people it's free and available, without them connecting to me first?

    I run a web site. I want customers to access it. How can I let people know it's free and open, without them connecting to me first (and potentially "tresspassing" in the process).

    The answer to both is simple, and should be handled similarly to how physical property is handled. A front door is an invitation to tresspass, long enough to state your business (it has to be so, or you could never visit anyone). Trespass is when you extend your stay once you have been told to leave. With computer systems on publically accessible networks (internet), or publically accessable airways (wifi), the only sensible solution is to have a password or other authentication on things which shouldn't be public. When you get a big "Access Denied" message, it should be a hint that what you are accessing is considered private.

    Do you really want to live in a world where you need prior written permission to visit a neighbor, visit slashdot, or use the wifi at starbucks?
  • Re:More info (Score:3, Insightful)

    by ColaMan ( 37550 ) on Sunday November 12, 2006 @03:10PM (#16815216) Journal
    Welcome to the world of Big Business.

    Somewhere, some company lobbied for "tough penalties for data theft".
    This made their security somewhat easier to implement - as opposed to actually, you know, doing something credible to mitigate security risks - but you end up with crap like this. You can bet it's not homeowners lobbying for these laws.

    So, you can kill a man and get off in 3 years, but annoy a corporation and they will cripple you for life.

    Hey ho, it's a funny old world, eh?
  • by ultranova ( 717540 ) on Sunday November 12, 2006 @03:23PM (#16815356)

    Technically, functionally, you may be right. Morally and ethically might be a different question. The main question is..."if it is unsecured, is that a specific invitation to use it?"

    Yes. An unsecured wireles access point is constantly sending out an invitation to every device nearby. It's broadcasting "Hey, I'm here, connect to me!" to every device nearby.

    So yes, leaving a wireless access point unsecured means it's constantly and actively inviting everyone to connect to it. It's not just sitting there waiting for connections (like a HTTP server, for example), it's like a spammer sending e-mails with connection instructions to everyone nearby.

    Personally I say no. You and others may have a different opinion.

    This is not an opinion. This is how the Wi-Fi protocol works. Leaving an access point unsecured means it's constantly sending invitations to connect to every device nearby. Maybe that's not what the owner meant, but it's what his actions (or inaction) amount to anyway. And I, for one, am starting to get a bit tired on having to walk on eggshells because some morons can't be bothered to RTFM.

  • Re:More info (Score:5, Insightful)

    by FireFury03 ( 653718 ) <slashdot@NoSPAm.nexusuk.org> on Sunday November 12, 2006 @03:25PM (#16815378) Homepage
    If someone leaves an AP on and open...I think that is pretty much a free invite to join in...

    What I find most interesting is that an open accesspoint is actually broadcasting invitations - if accepting an invitation is considered illegal, how is accessing a web server legal? I mean, a web server doesn't broadcast it's presence so you have to actively try and connect.

    How can I tell the difference between an accesspoint that is intentionally open and one that has been set up by an idiot? Should I assume that everyone's an idiot? The next time I want to go to the pub, am I to assume that the building I'm about to enter isn't really a pub and the "Bar" sign hanging outside the door was put there accidentally?

    When you associate with an open network, it's not as if you're going down the road trying doors to see if they're open - you're actually getting invitations broadcast to you and many devices will connect without asking - are you responsible for your computer connecting to a random access point without asking you first?
  • Re:More info (Score:3, Insightful)

    by N3Roaster ( 888781 ) <{nealw} {at} {acm.org}> on Sunday November 12, 2006 @03:53PM (#16815588) Homepage Journal
    It's called being a bad neighbor. Suppose I have an unsecured wireless access point and neighbors close enough to see it. Suppose further that a neighbor uses it and I have a problem with that. So, I've gone through the trouble of figuring out who is accessing my WAP. The first thing I'd try is asking that person to please stop using my WAP. Hopefully that would work, but maybe the other person is a jerk who starts spouting nonsense about how the access point is open so it must be okay to use, even though I've just asked him to stop using it. My next step would be to take some step toward blocking access, perhaps by securing the WAP, setting up a MAC filter, or even just turning it off when I'm not using it (if I can figure out that somebody else is accessing my WAP and who it is, I can certainly do any of these). If he continues to access the WAP, then I might contact the authorities.
  • Re:More info (Score:4, Insightful)

    by no-body ( 127863 ) on Sunday November 12, 2006 @03:59PM (#16815646)
    You forget where this is - Singapure.


    Can't you get a jail sentence there for littering a cigarette bud, or something of that or similar "severeness"?

    If things continue as they are in US, this may come here too.


    Ever seen a new law or regulation coming out recently which gives more freedom or is sensible instead of making things tighter?

    This whole mechanism and attitude of people pulling the strings goes towards more control and punishment. Totally senseless and idiotic!

  • Re:More info (Score:3, Insightful)

    by Anonymous Coward on Sunday November 12, 2006 @04:27PM (#16815870)
    Yes, the "justice" systems of the world are crooked.

    3 years for joining a WiFi network that was wide open to the world, and NOT doing any harm (this guy)?

    6 or more years for breaking into networks but NOT causing harm, and reporting the vulnerabilities (mitnick)?

    280+ years for not evading taxes, but structuring withdrawls to avoid dealing with complicated invasive paperwork (Kent Hovind), and using an IRS-appointed jury and disallowing the defense's evidence?

    20+ years for dealing cocaine (one of my idiotic cousins)?

    MURDER someone in cold blood, sometimes get out in 5 months (many assholes)?

    Molest 40+ kids in Virginia causing irreparable mental anguish, get nothing but home arrest and possibly six months' probation (some fucking pervert in Vermont)?

    There is no justice in this world.
  • by Fulcrum of Evil ( 560260 ) on Sunday November 12, 2006 @04:34PM (#16815932)
    If you can't bother to tell people that this is private (the moral equivalent of installing a fence with a gate), then yes, you are inviting everyone to use your router. I don't care to hear anyone bitching that it's too technical, either. A subliterate moron could figure this stuff out.
  • Its a trap?! (Score:5, Insightful)

    by Anonymous Coward on Sunday November 12, 2006 @04:36PM (#16815950)
    The neighbor knew how to check if someone is using his wireless network, but doesn't know how to secure it? An open wireless network is an invitation for anyone to use it.

    Internet access through a wireless network that is probably connected to a ADSL modem has fixed costs. The guy really didn't lose anything. So he just doesn't want anyone else to benefit from something he has paid for.

    The charged teenager is 17 years old. The neighbor could have told his parents what he was doing and they could have told him to stop or take away his computer...

    Sounds like the neighbor wanted someone to use his network, so he could sue them.
  • Re:More info (Score:3, Insightful)

    by bhalter80 ( 916317 ) on Sunday November 12, 2006 @05:18PM (#16816304)
    Ahh but here's the nuance. Linksys routers ship with an ESSID of 'Linksys' so when I go to my grandparents' place I attach to their router named 'Linksys' it automatically gets added to my favorites list. I then go to a client's place where I whip out my laptop and begin taking notes of our meeting. Assuming in this setting that there were an open AP named 'Linksys' and there were no other suitable APs Windows would automatically associate. It doesn't do any checking around ok this is Linksys@12:23:34:45:56 so I shouldn't connect because its not the same Linksys that I was talking to last time when it was added to the favorites.

    IANAL but I do realize there is a difference of intent in these cases but intent is very difficult to establish and the courts have not been very forgiving WRT people who's networks have downloaded naughty things pr0n, music, videos their conculsion has been lately that if you are the one that owns the account unless you can come up with a better suspect you are guilty. The result is that people have become very protective of their wifi. Personally I use WPA which while not perfect gives me some feeling of security and if I were to find a chronic abuser would give me cause to have him/her arrested as it would be clear that they did not accidently associate.
  • by Fastolfe ( 1470 ) on Sunday November 12, 2006 @05:36PM (#16816430)
    In many jurisdictions, there is a "reasonable person" test that would probably apply here. Businesses don't have locked doors, and it's not trespassing for you to enter them without explicit permission. But the fact that there's a business name above the front door, and their front door is unlocked, is usually enough for one to assume that permission is implied.

    A wireless access point that is *announcing* itself as being open could be considered implied permission to use it. Note that the access point doesn't just have a sign on it that says "open". It is actively beaconing its "openness" to solicit users. This is all defined as part of the 802.11 "contract" between computer systems, and just because some owners don't understand what they're doing when they set up an 802.11 access point doesn't mean it's unreasonable for others to assume they do.

    Of course, when the owner of the access point tells someone to stop using it, that implied permission no longer exists, just like a business owner can tell someone to leave their store. You've been asked not to use it, so any continued use is legally actionable (though it still may not be illegal, depending on the laws in your area).
  • by jrumney ( 197329 ) on Sunday November 12, 2006 @06:25PM (#16816978)
    I thought the "Asian values" movement went out of fashion in the 1990s. Lets face it, authoritarian psuedo-democracies who met out excessive punishments for non-conformity are ugly, no matter whose notions of freedom and morality you use.
  • by DHM ( 35419 ) on Sunday November 12, 2006 @06:27PM (#16817000)
    You're right that the tendency to impose bans, with excessive punishments for violating the bans, is typically Singaporean. But to ban chewing gum because some people were sticking it on the elevator buttons takes it to a ridiculous extreme that took most Singaporeans by surprise. I was in Singapore in 1991, just before the ban, and by chance I happened to learn about it before it went into effect. When I told people that their government was about to ban chewing gum, they didn't believe me, and in fact thought I was making an insulting joke. Basically the gum-chewing ban was a terrible mistake. It made Singapore an international laughingstock, and it may have somewhat eroded many Singaporeans' respect for their government.

    In short, it's a mistake to force Western notions of freedom and morality on a culture that already has its own conceptions of both.

    I'm sure it wasn't meant to be, but in a way that seems like a condescending attitude. It's as if to say that we should apply lower standards of freedom or morality to Singapore, because some of their attitudes are different from mainstream Western attitudes, the implication being that Singapore is somehow inferior.
  • by IchBinEinPenguin ( 589252 ) on Sunday November 12, 2006 @06:28PM (#16817004)
    of someone's life, then it's worth spending some time to harden it in the first place.
    Yes, what the guy did was wrong, yes he should be punished, but 3 years for the next best thing to entrapment?

    If you reported your car stolen after leaving it unlocked with the engine running and the keys in the ignition in a bad part of town you'd be laughed out of the police station.
    Stealing the car is still wrong, but surely you can't expect it not to be stolen under those circumstances. Doesn't that make it entrapment?

    Why is it that the IT equivalent of exploiting such gross stupidity is demonized?
  • by Jartan ( 219704 ) on Sunday November 12, 2006 @06:35PM (#16817068)
    If what you said were true about ANY culture it would be wrong. It's not a "mistake" to force well established "notions" of freedom (specifically freedom) on another culture that has it's own notions of such. Cultures are not free to just do whatever they feel like just because the majority agrees.

    Your attempt to be "culturally open" in this example ignores the fact that someone who likes to chew gum isn't doing anything wrong and is having his right to do so taken away simply because other people might spit it out on a sidewalk. If that society agrees that spitting gum on the sidewalk is just too unacceptable the only proper way to stop it is too inflict an extreme harsh penalty on the act of spitting gum.

    For further reading see here: http://en.wikipedia.org/wiki/Majoritarianism [wikipedia.org]
  • by darkonc ( 47285 ) <stephen_samuel@b ... m ['n.c' in gap]> on Monday November 13, 2006 @01:32AM (#16819978) Homepage Journal
    Most people who buy wifi don't know that they need to secure their networks... This is more like blaming a 3 year old girl for walking around naked when she gets abused by a pediophile. She doesn't know enough to put her knickers on, and the pediophile is presumed to know enough to ignore the 3-year old.

    Yes, I realize that sometimes people will accidently end up on an unsecured network that's not theirs -- but that's more like shooting the 4 year old who ends up playing 'doctor' with the 3 year old... He should get a firm talking-to, but throwing the 4-year old in jail for statutory rape is just a stupid as telling the 3 year old that it's all her fault.

  • by Fastolfe ( 1470 ) on Monday November 13, 2006 @10:56AM (#16823398)

    If your house has the front door standing open and your name is on the mail box, is it okay for me to cruise by, see it, come on in ...

    If my house had a "Fastolfe's Widgets and More!" sign above it, and a reasonable person would think my home looks like a business. Bear in mind that in many older cities, buildings have been converted from homes and apartments into shops and businesses with little change in the appearance of the building. In these areas, it's the signs that make it clear.

    ... and take something you own?

    That's just stealing, and you'd get in trouble for it even if my home were a legitimate business. When it's snowing outside and you walk into a store, you're "taking" their heat and shelter. They have to pay money to keep you warm and dry. Are you leeching off someone else's dollar? Let's assume you entered the store specifically for that reason, and you have no intention of shopping there. Even that isn't illegal, or even legally actionable by itself. They're free to ask you to leave, however, if/when they discover that you aren't a real customer.

    The difference between someone leeching and someone making legitimate use of something legitimately shared rests entirely with the intent of the owner of the access point. Unfortunately, 802.11 does not distinguish between someone legitimately attempting to share their access point with little or no compensation, and an idiot plugging in an access point and bulldozing their way through every question/setting that prevents their wireless laptop from working, without reading the instructions or understanding the ramifications of their choices.

    Think of a row house where someone puts a fake business sign on their door, and some fake "We accept Visa/MasterCard" stickers on the window, because they think it'd be funny. Do they have a right to call the cops on every person that walks through their front door thinking it's a business? A proper solution is to put up a sign that says "Not open to the public" or take down the signs that make it look like it is. In 802.11 terms, this means securing the access point.

Beware of Programmers who carry screwdrivers. -- Leonard Brandwein

Working...