Wireless Hijacker Dealt First UK Punishment 663
paella_dodger writes "The BBC is reporting on a recent UK court case whereby a man was fined £500, sentenced to 12 months' conditional discharge and had his laptop confiscated for browsing the 'net on his neighbour's wireless Internet conenction. Perhaps I should secure my neighbour's wireless connection for him before Windows automagically connects to it and gets me arrested!"
In Perspective... (Score:3, Insightful)
Typical... (Score:3, Insightful)
Sigh. You know you're on Slashdot when anything bad, no matter how remote, gets blamed on Windows and/or Microsoft.
Re:In Perspective... (Score:5, Insightful)
He is obviously not very smart, either, considering he was seen for the past three months in the same locations. That usualy means he was using the same network for the same deeds each time.
Honestly, I do not blame the UK government for going down on this guy; he deserves it. Especially since he was stupid enough to get caught the way he did. Sure, war driving is one thing, but blatently sitting infront of someone's home, leeching their network is a whole different case.
Sadly, this is just like what happened to the term "hacker" back in the day - it was idiots, like this guy, that ruined it for the real "hackers" out there; the script kiddies. Now, guys like this, and the other guy that got caught doing it, will give the term "war driving" a bad name. Hell, you mention "war driving" somewhere and people are going to start believing you're a "hacker" who uses "linux" to steal credit cards from them.
All in all, people should learn to secure their wireless networks. If they are unable to, or know nothing about the processes, they should be wired like the other drones. Or they should simply hire someone to secure it for them -- It's honestly not that difficult these days, especially with a linksys router. You simply type in a few things and click a coulpe check boxes and you're done. But this does prove that the common person, joe sixpack if you will, does not care enough about computer security to do anything until someone takes advantage of them. Then they cry foul.
Re:Unsecure network ? (Score:2, Insightful)
Re:I, for one, (Score:5, Insightful)
Of course not. Anything you decide to do becomes their problem. And, well, it's just rude! If it's one of the low cap broadband connections, perhaps you're going to push them over their limit? Or several people using it will do that?
Still alright to cost them money?
All it takes is a nip round to your neighbour's place and say "Look, you've got a wireless point there and broadband.. Mind if I chuck you a bit of cash each month and piggyback on top of the link, 'cos I can't really afford it?". Many would say to just hop on anyway if it's not used, without you paying anything. That's certainly the arrangement I have with my neighbours that can't afford the link (now have 3 people on mine).
Nothing wrong with sharing a link, it's just good manners to ASK before taking things.
Idiot (Score:3, Insightful)
Wrong. It's more like going up a private road which isn't marked as a private road, and which you have contacted Google to tell them to put it on their maps. Don't want people to go driving up your private road? Put some signs up or a gate.
It's very simple - put WEP or WPA on. To be honest, if someone goes through your WEP, then that counts as a deliberate break-in in my book. If you don't have it no, don't complain when people go using it.
Re:I, for one, (Score:2, Insightful)
Theft these days is so easy that it takes real moral strength just to not do it. I understand perfectly why some would choose not to exercise their moral muscles; it's just too hard.
Re:Accident? (Score:1, Insightful)
He's not in his home, he's on the public airwaves. There is an established protocol for open access points and his access point behaves exactly according to that protocol. It's his responsibility to clearly state his intentions in the public space if he doesn't want to be misunderstood. You learn how to safely use a car before you use it on public roads. Why do people think it's ok to use the ISM bands without so much as a thought about what it is they're doing?
Re:How do u Hijack an OPEN network??? (Score:5, Insightful)
Bad analogy - that would involve tresspass; there is a physical boundary of someone else's property that implies private access.
A better analogy would be if those cookies were floating through the air, coming in MY window and out my door, and I happened to eat a few as they went by.
Although it may not reflect the law, I personally believe that unsecured wifi should be public domain. WEP (even 1-bit for god's sake, to show that the intention for it to be private) should be enabled by default on routers, and it should be blatantly clear that you're providing public access (with consent) if you turn it off.
MadCow.
Intentional doesn't mean criminal (Score:5, Insightful)
Except for one thing, you can't know if he neighbours INTENT was to share his open wireless connection for sharing. Thats the whole point of Open WiFi afterall, sharing. By doing this they're making Open WiFi illegal, because not only does your computer have to get permission to connect to the network (via the login) but now extra permission is needed too.
Let me put it another way. Suppose you have free open municiple wifi and Fred Bloggs open wifi, you computer has no way of telling which is the free Municiple open wifi and which is not so it connects to Fred Blogs's net, attempts to login and is given permission -> crime comitted. You had the intent to connect to an open network, but not the method to determine which network is permitted.
Or rather you did have the way, the login, but the court ignored that.
Re:Accident? (Score:5, Insightful)
If a hospital network isn't secured, IMO it is GROSS negligence on the part of the IT staff of the hospital.
Re:How do u Hijack an OPEN network??? (Score:3, Insightful)
Open networks require a handshake between the router and PC. This is analogous to authorising use.
One says 'Hi, can I use your network'
The other says 'Yes'
The owner of the network authorised this by turning the thing on.
I don't agree with the top post though - I leave my network open, I don't mind people using it. If they abuse it, they get kicked. I use other people's networks to send and receive email and to do the odd bit of surfing.
If I commit a crime on their network, then I am a criminal. But using a network which I have been authorised to use to do legal things is very different.
Comment removed (Score:5, Insightful)
Service theft (Score:2, Insightful)
Your side
there side
and the truth
Theft of bandwidth on a home internet conenction beacuse of an un-securt WLAN would be viewed thus.
Every secong xMbit of unused bandwisth is wasted, I was simply using something that the owner was throwing away. Besides it should of been secured, its' like leaving your shopping on the front garden wall.
It was my property and as it is part of my network you invaded my privacy, it is like walking into my house and decanting the hot water out of my kettle after I'd just made a cup of tea.
You ARE stealing and you ARE gaining unlawful access to a private network. If you want to share bandwidth (I do so with my neighbours as they are very light users and I have a loverly fat pipe) then it should be done openly. Although you could argue it is the owners responcibility to secure there own network it is no different to seeing a house with an open window and going in to nick the biscutes.
So Say'th lord Timebrwolf.
Re:In Perspective... (Score:3, Insightful)
The.
Same.
Thing.
Maybe, just MAYBE, if folks in your town payed a flat fee for water, and you walked down the street checking everyone's outdoor water nozzles, and took a drink where they were turned on for use, MAYBE that analogy might relate to the story. But the unlocked door analogy, especially in this situation, is NOT THE FUCKING SAME THING.
Re:In Perspective... (Score:4, Insightful)
What?!? All it does is remove the SSID information - you can still see that there's a network on a particular channel if you do a scan! You just can't connect to it
If you can't rely on SSID broadcasts, then how can anyone know when a network is public and when it's private? Perhaps, as you say, there needs to be a more unambiguous code for this
Geeks need to get out of the habit of assuming that a default configuration amounts to "permission to use". It doesn't. Only permission to use is permission to use.
Except that SSID broadcast without encryption has been assumed to be permission to use, by hardware manufacturers and even by certain OS software companies! Perhaps that's unfortunate, and perhaps it shouldn't be like that. I take your point, though, that there's no formal definition that a broadcast SSID equates to an open network, and that it's wrong to assume that that's so.
Similar to mobile phones (Score:3, Insightful)
Yet his computer asked for concent and was told it was OK.
Your cell phone for example is a very similar device. You drive around, it gets a good connection to a nearby tower, and you make your call.
You don't get extra permission to use that tower, you assume because your phone says its ok that its ok.
You visit a website, its password protected so you don't use it. You visit a website and its not password protected so you do use it.
Did you get extra permission? Internets also a shared public network, just like WiFi.
Re:Knock knock (Score:3, Insightful)
Man 1: "Knock knock",
Man 2: Door swings open by itself.
Man 1: Goes in.
Man 1 repeats this many times over a 3 month period.
Man 2: Police arrest that man.
Man 1: But I knocked and the door opened
Man 2: But that was a misconfiguration, if I wanted you to come in I would have said so myself.
A wireless router is not a person, and therefor cannot be compared to the person saying come in.
Re:Knock knock (Score:3, Insightful)
Door: *swings open*
Man 1: *goes in*
Man 2: Police arrest that man.
Man 1: But the door opened for me, and thus gave me permission that I could come in
Man 2: I forgot to lock it, if I wanted you to come in I would have put a "FreeToComeIn" sign on my door.
Re:Several of These analogies are way off base (Score:2, Insightful)
not only is it pretty clear that no one would want strangers in their house - It is clear to me that some people might not want strangers using their modem/router and possibly volume-capped broadband service.
but that you are also trespassing on someone else's property - Trespass is a good example of a crime that is technically victimless but which most people agree should be in place. It is a precident for a "cyber-tresspass" law that would address this issue and others, like zombie networks.
The police also consider open doors fair game for entry - I'd be surprised if this is true. I certainly don't want the police entering my house without a warrant!
Rather like if a webserver is publicly accessible, then anyone can connect to it is a bogus analogy. A website is like a shop or a library. That is what the web was set up for. But that wouldn't ligitamise knowingly accessing a private corporate intranet just because the IT guy accidentally left it open one day any more than it is legitimate to enter a shop that is closed just because the owner forgot to lock up.
how can you differentiate what access points you are allowed to access? - Questions like this arise with almost every property-related law. You must find out from the owner first either by direct communication or via a notice. If you cannot/will not do that then you will have many problems fitting into society quite apart from internet access.
businesses especially pollsters and advertisers are allowed to assume that any phone number is fair game to be called unless it is on the federal do not call list - The problem is that many people would like to receive certain unsolicited calls eg from someone who found your lost cat, and you can't announce the fact that you will allow such calls in the case of telephones. But you can indicate that your WiFi is available by various means.
Another analogy is potentially FM radio - That's not remotely close. FM broadcasting is purely opt-in by both parties. No-one is taking control of anyone else's communication equipment or consuming other people's pay-for services.
I and most other people don't care if they use some of my lawn as long as it isn't too close to the house - And what if they do get too close to the house? You will ask them to stay clear of the house, then you will ask them to keep off your garden altogether, and finally you will call the police and get them arrested. All the while they may have done no damage at all. My point? No-one should assume they have a monopoly on what is reasonable in the context of sharing.
I have an [blah blah] for those that do want to use it - I'm glad you're rich enough to be generous to people who own WIFI laptops but won't shell out for a broadband connection of their own.
If there's one kind of champaigne socialist that really gets my goat, it's people in the top 0.1% of global earnings who can afford to make expensive but insincere and ineffectual gestures of generosity, and then snobbishly expect everyone else to do the same. I hope the neighbours' kids tread the f**k out of your garden, especially in the forbidden part right next to the house.
Remember, it's easier for a camel to pass through the eye of a needle than for a rich hippie to get over his guilt complex.
Re:In Perspective... (Score:1, Insightful)
When you pick a flower, it's not there anymore. Use a network, and the owner still has the network.
Your analogies aren't any good either. It's more like using a private road that isn't marked as private and carries normal looking street signs.
IP != Person (Score:3, Insightful)
An IP Address is not an identity
An IP Address is not an identity
An IP Address is not an identity!
If a crime is committed and it is traced back to an IP, that is A START of an investigation and should NEVER be the end of it! Far too often do we instantly assume that just because the crime came from a certain IP address, the person who owns the machine is the person who committed the crime.
All an IP gives you is the "place" part of the puzzle. Worse than this is the fact that it is virtual and multi-dimensional. The "place" where the crime occurred actually exists in many physical locations at once and can be nearly limitless in scope.
More important in these types of investigations is the "means" and the "motive". If neither exist for the person behind the IP, it is likely that his machine (or connection) merely acted as a proxy.
It just seems *WAY* too easy to frame someone for an Internet-related crime. Just find some motive and place "the means" on their machine.
If I were on a jury for any sort of Internet crime, the amount of evidence against the accused would have to be ENORMOUS for me to even consider a "conclusion beyond a reasonable doubt".
Re:In Perspective... (Score:5, Insightful)
If I see a store with a sign labeled 'open' on the front of it, would you consider me a burglar if I walked into it without asking the shopkeeper first? If there's a bus sitting on the curb and the door is open, am I hijacking the bus if I just walk into it? If there's a house with a sign labeled "garage sale" out front am I tresspassing if I start wandering around the front yard looking at things sitting out?
The AP this guy connected to had a big giant sign *actively* saying "OPEN" on it. 802.11 provides many ways to make that sign say CLOSED instead. This AP used none of them. The guy's laptop sent a message to the AP saying "hi, is it ok if I connect" and the AP said back "sure, here's an association for you and an IP address you can use.".
Re:In Perspective... (Score:3, Insightful)
"This is more like getting into an unlocked car and driving it around just because the owner left the keys in the ignition. Hardly fair or legal."
It's more like someone listening to their radio really loudly and you listening to it from next to their house. Hardly unfair, and perfectly legal. Don't give IP's or routes to unauthorized clients.
Then again, I think it should be perfectly legal to do whatever you want with any signal thats being forced onto your land. This goes for any wireless networking, EM radiation, satalites, etc. If you're stuck with the downsides (cancer, signal collision, etc), you should atleast be able to do what you want with it(Like decode directtv's video theyre sending you).