Language Selection

English French German Italian Portuguese Spanish

Wi-Fi mooching and the law

Filed under
Legal

A man sitting in a Chevy Blazer in a residential neighborhood reportedly was poking around nearby wireless networks in violation of computer crime laws, according to local police.

This appears to be the first arrest in which the sole offense was allegedly accessing a wireless network without prior authorization, and it's already being viewed as a probable test case. CNET News.com interviewed legal scholars to ask what rules apply to Wi-Fi (also called 802.1x) hot spots.

Is it legal to use someone's Wi-Fi connection to browse the Web if they haven't put a password on it?
Nobody really knows. "It's a totally open question in the law," says Neal Katyal, a professor of criminal law at Georgetown University. "There are arguments on both sides."

That doesn't make much sense. Is there a specific law that regulates Wi-Fi access?
Sort of. The primary law is the federal Computer Fraud and Abuse Act.

You can read it for yourself, but the important part (check out paragraph (a)(2)) covers anyone who "intentionally accesses a computer without authorization or exceeds authorized access." Nobody knows exactly what that means in terms of wireless connections. The law was written in 1986 to punish computer hacking--and nobody contemplated 802.1x wireless links back then.

What do prosecutors think?

Full Article.

More in Tux Machines

KDE Applications 14.12 - New Features, Frameworks Ports

Today KDE released KDE Applications 14.12, delivering new features and bug fixes to more than a hundred applications. Most of these applications are based on KDE Development Platform 4 but the first applications have been ported to KDE Frameworks 5. Frameworks is a set of modularized libraries providing additional functionality for Qt5, the latest version of the popular Qt cross-platform application framework. KDE app dragons This release marks the beginning of a new style of releases replacing the threesome of KDE Workspaces, Platform and Applications in the 4 series which ended with the latest KDE Applications update last month. Read more

What To Expect In 2015: Robots Join The Open-Source Revolution

The number of downloads doubled in 2014, to 3.5 million, and Gerkey expects adoption to spike again with the release of ROS 2.0 this summer. The upgrade will coordinate swarms, improve walking, and support smart sensors—basically, assimilate the world’s robots. Read more

New Input Drivers Coming For Linux 3.19 Kernel

One of the latest pull requests for the Linux 3.19 kernel is the input driver subsystem pull, which includes numerous updates along with a few new drivers. The new drivers will benefit some Google Chromebooks in running the latest upstream kernel. Read more

Docker and the Linux container ecosystem

Linux container technology is experiencing tremendous momentum in 2014. The ability to create multiple lightweight, self-contained execution environments on the same Linux host simplifies application deployment and management. By improving collaboration between developers and system administrators, container technology encourages a DevOps culture of continuous deployment and hyperscale, which is essential to meet current user demands for mobility, application availability, and performance. Read more