In article , William Warren wrote: |Walter Roberson wrote: |> How much does your daughter's neighbour pay in "excess bandwidth" charges?
|Since hot spots don't usually have a sign on them saying "No |Trespassing" or even an SSID that looks, for example, like "PRIVATE |PROPERTY RESERVED FOR JOE SMITH AND FAMILY", I'll argue that you're |starting from the premise that the neighbor -
|A. Has a bandwidth-sensitive pricing plan, which is very rare.
The least expensive bandwidth *insensitive* plan I have found here is $C 395 per month, with a $C 2000 installation fee -- and that company can't deliver service to my area. If I recall correctly, the least expensive bandwidth insensitive plan that I can actually get at my house is $C 1185 per month with a $C 4000 installation fee. ($C 1 is about $US 0.80 at the moment.)
*Every* "residential" plan that I can actually get at my residence, from -every- provider I've been able to find in the city, has bandwidth restrictions and excess bandwidth charges. I've checked about a dozen completely independant providers (not just resellers of the same duopoly.)
I am not in a rural area: if I recall my calculation correctly, I am
3 km from the centre of the city (population 660000+, located on
-all- the cross-country long-haul data links). I am not in the top three poshest neighbourhoods, but I am in the area most in demand amongst those whose family incomes are between about $US 40000 and $US 150000 per annum -- what would probably be called "upper middle class". And two of the top three poshest neighbourhoods are very close by.
|Using "theft" of water as a simile for WiFi access ignores the practical |obstacle to committing the "crime" - noone has, after all, outlawed |theft of the Moon
Actually they have. There is a fellow in the USA who was able to successfully register title to the land on the Moon a number of years back (he went through the official land claim procedures), and now sells moon plots as a small business, and has been successful in suing other people who have attempted to offer moon plots or burial- on- the- Moon schemes. That land is *owned* in law, and that would make taking it or using it without permission an offence.
|Courts use a "Reasonable Man" standard when assesing damage and intent. |A reasonable man would not take water than was obviously intended for |another use (from, e.g., a scenic pond with fish in it) or which was |clearly being kept in reserve to benefit the community (a reservoir), or |which was, in and and of itself, harmful (toxic waste if properly posted).
Unfortunately it's done a lot, manufacturering firms sucking their water from a river, running the water through their processing plant, and dumping the water out again contaiminated. It's very hard to prosecute such cases: you have to get chemical tracers sufficient to prove beyond a doubt that the water came from the plant, and last I heard, the EPA had been specifically defunded for investigation of such matters. Some private citizens or environmental groups continue to gather the evidence, but the proof linking the clearly toxic waste to the manufacturing plant usually requires a visit to the plant to check for samples, which the plant seldom allows and which the EPA (which has the legal authority to investigate) is forbidden to spend money on persuing.
:> Your email address appears to indicate that you are somewhere in the :> USA. We're still debating some of the fine details of FCC regulations, :> so we can't tell you -exactly- where the line is. The FCC regulations :> say with respect to the ISR spectrum that if a certain kind of :> frequency hopping is being used and no attempt is made to encrypt the :> data, that it is not an offence against -that- section of the :> regulations to *record* the data [it would not be considered a :> wiretap].
:> If, though, the other kind of frequency hopping or spread spectrum is :> being used, or there is any kind of protection at all on the data, then :> it is an offence under that section.
:Please cite the NPRM and specific NFR.
I don't recognize the abbreviations "NPRM" or "NFR", but I have previously cited the exact URLs and paragraph numbers for this part of the FCC regulations.
:The question is not "whether, if caught, you'd most likely be :charged ...". The question is whether any actionable activity is taking :place.
It is. FCC regulations with a narrow exemption, the US Computer Fraud and Abuse Statutes, theft by conversion.
:The point, and I'm sorry to be so heavy-handed about it, is that there's :no "absolute" right, or "legal" behavior, that does not have exceptions :dictated by circumstance, custom, and practice. If you assume that :access to a WiFi hot spot without a specific invitation from it's :"owner" is inherently illegal and/or actionable, you ignore all :common-sense exceptions to the rules of private property.
The US Computer Fraud and Abuse Statutes are written as abolutes. There is no provision in them for "just a little" cracking or "having some harmless fun". There have been successful prosecutions (with jail term) for what many people would consider borderline at worst or harmless behaviour (e.g., inserting a "backdoor" in order to be able to bypass a security barrier so that the person could remotely undertake the work they had been lawfully contracted to do, in an organizational culture in which the person had been led to believe that no-one would care.)
If you do not know much about the Computer Fraud and Abuse Statutes, then that might be partly because on the face of them, they are written to only protect hospitals and big money (e.g., banks), and they look like they would have no jurisdiction at the local level (which would be State law or municipal bylaws.) There happens to be a clause in them, though, that activates them if the device accessed is one that is used for "interstate commerce"... which applies to any computer system or network that is used for electronic shopping intrastate, or for viewing electronic advertisements aimed at getting the reader to buy intrastate (near impossible to avoid these days), or for sending email intrastate. Computer systems and networks which are -not- covered because of that clause are as rare as the proverbial antique car in top shape previously owned by a "little old lady who only drove to church on Sunday."
:I could (and will) argue that a Reasonable Man finding an open WiFi :hotspot, unencrypted, without any notice forbidding access, would be :justified in assuming that its provider has chosen to contribute to a :common pool of wireless access, SO AS TO ENJOY THE BENEFIT PROVIDED BY :OTHERS FOR THE SAME PURPOSE.
I disagree. Anyone who has been a part of the computer culture for more than a couple of months knows that there are millions and millions of computer systems out there owned by people who don't have a clue how to properly secure their systems, or even that their systems need to be secured. When it comes to computers (taken even in the sense of embedded computers such as are in WiFi access points), if you don't have permission in advance, then the access is very likely a violation under US Federal law... with the sole exception of public information kiosks, which are fair game for anything you can do with them.