tag:blogger.com,1999:blog-3253720194278084558.post1060999491524548145..comments2024-03-27T21:32:07.383+00:00Comments on Area Trace No Search: WiFiArea Trace No Searchhttp://www.blogger.com/profile/04397885435594392278noreply@blogger.comBlogger37125tag:blogger.com,1999:blog-3253720194278084558.post-39895725527545122752013-05-09T23:10:04.026+01:002013-05-09T23:10:04.026+01:00I am truly grateful to the owner of this web site ...I am truly grateful to the owner of this web site who <br />has shared this enormous post at here.<br /><br />Check out my blog post: <a href="http://wiki.dev.simbs.com/index.php?title=Ascertain_To_Play_Classical_Guitar" rel="nofollow">acoustic guitar chord</a>Anonymousnoreply@blogger.comtag:blogger.com,1999:blog-3253720194278084558.post-86310203489469076162009-04-19T04:17:00.000+01:002009-04-19T04:17:00.000+01:00Abstracting Electricity comes to mind.. (Oh yeah, ...Abstracting Electricity comes to mind.. (Oh yeah, I'm slightly intoximicated so I've not ready further than Lola's post..)<br /><br />Or indeed something under the new Fraud Act of whenever it was done.. Or perhaps under the Computer Misuse act...<br /><br />There is an offence that can be moulded to fit, guaranteed... and if anyone can make something fit then I am sure it'd be me ;)<br /><br />If not any of the above I'm sure I can find something under Ecclesiastical Courts Jurisdiction Act 1860... If not that the Chichester Byways, Highways, Fields and Barbwire Act of 1949 as ammended.Unknownhttps://www.blogger.com/profile/08632701212926606278noreply@blogger.comtag:blogger.com,1999:blog-3253720194278084558.post-13700914937608462972009-01-30T19:37:00.000+00:002009-01-30T19:37:00.000+00:00Anonymous maybe you misread my post , or I did not...Anonymous maybe you misread my post , or I did not make myself clear. I think that ATNS is in the clear. The only controversy would seem to be around the access of a private (home or office) WiFi network in which case I would think your point about accessing a network or a computer is too fine to rely on, as the act stats any computer and any data, therefore connecting to a network and accessing data on another computer could be enough. The CMA was deliberately drawn as wide as possible to encompass all situations, but as I am not a specialist lawyer I could be wrong on this. As you correctly pointed out the issue is about authorisation. As The CMA is Criminal law and Trespass is (mostly) a Tort the “no trespassing” sign is not a good analogy. If there was a sign saying no access then by definition, if you access a computer you have the intent. It could be argued that as some people deliberately leave their WiFi open, if the system name is silent as to this there would be a presumed invitation, but again I would not like to argue this is court. I am not familiar with CA 2002 s 125, but intent is intent<BR/><BR/>Joseph K.Anonymousnoreply@blogger.comtag:blogger.com,1999:blog-3253720194278084558.post-72537362725511935382009-01-30T15:25:00.000+00:002009-01-30T15:25:00.000+00:00@Mosher 29 January 2009 15:49Your analogy is obtus...@Mosher 29 January 2009 15:49<BR/><BR/>Your analogy is obtuse. To be accurately analogous to an unsecured network the door would need to have an invitation written above it (or over loudspeaker, if you want to continue with the blind theme), advertising it's presence and asking people to walk in.<BR/><BR/>That is what an unsecured WiFi point _does_.<BR/><BR/>The "are you sure" is to check that you are happy to join an unencrypted network. This is, as you pointed out, because unencrypted networks are open to man in the middle attacks. Inferring the additional functionality of this being part of the authorisation process is ridiculous.<BR/><BR/>With Windows / Linux / OSX (the standard is platform agnostic), the device will read the broadcasting WiFi, and attempt to connect (whether automated, or with a manual confirm). This attempt involve a handshake. That handshake says "can I connect". The WiFi device will then _authorise_ that connection.<BR/><BR/>"remind me not to call upon *your* services if I'm ever looking for IT staff" Wise words. It would be embarrassing for you to be shown up by a new hire. Or was it merely a clumsy attempt at repartee.<BR/><BR/><BR/>@Joseph K<BR/><BR/>1(1)a) Does not apply, as the connection is with a network, not any program or data held in a computer<BR/><BR/>1(1)b) Does not apply, as the connection is authorised. <BR/><BR/>1(1)c) Does not apply, see b) above. How does the user know? Because the WiFi point was explicitly asked "May I connect", by the wireless device, to which it responded "Yes, you may". If it had not, there would be no connection.<BR/><BR/>If the unsecured network was not broadcasting its SSID, or it was in any way encrypted, then CMA S1 would apply.<BR/><BR/>An SSID such as JohnSmithprivatehome might lend some credence to 1(1)c), but what if the connection were automatic, or the user never needed to see the SSID label? It holds as much lawful authority as a sign saying "No Trespassing" on non-crown property. i.e. None.<BR/><BR/>Section 125 of the Communications Act 2003 - Dishonestly obtaining electronic communications services may be applicable. But intent would need to be proven.Anonymousnoreply@blogger.comtag:blogger.com,1999:blog-3253720194278084558.post-42518605315321636172009-01-29T16:49:00.000+00:002009-01-29T16:49:00.000+00:00May I remind people that the crime under the CMA i...May I remind people that the crime under the CMA is in three parts 1) causing a computer to access, the exact mechanism does not matter. 2) The access is unauthorised, and 3) you know or believe the access to be unauthorised. So it does not mater what mechanism you use to access a computer WiFi, of just using a terminal that has been left on. Once you have gained access the only question is to intent. As stated above if the network is called FREEWiFi you are probably OK. You are less on far dodgier ground if the network is JohnSmithprivatehome. <BR/><BR/>Joseph K.Anonymousnoreply@blogger.comtag:blogger.com,1999:blog-3253720194278084558.post-13554212433948015932009-01-29T15:49:00.000+00:002009-01-29T15:49:00.000+00:00Anon: "the wireless device (pda etc.) asks the Wif...Anon: "the wireless device (pda etc.) asks the Wifi point for permission to connect."<BR/><BR/>So the person *using* said device does not, correct? For a bizarre analogy, that's like a blind man being accused of trespass for walking into the wrong (unlocked) house because his dog led him there. Again - what side of the fence do you fall on? Is it his for not training the dog properly? Or the owner of the house for not closing the door? Only now we're blaming the kit/dog and not the person using it.<BR/><BR/>There are two sides to this - the people who don't lock down their wi-fi and the people who don't prevent their laptop, PDA, whatever from automatically connecting to a network without asking.<BR/><BR/>I do know that XP, by default, will ask permission so perhaps you better check your own IT qualifications before having a go at me. I'm in Ubuntu right now so can't give you the exact wording, but if the system attempts to connect to a SSID to which it's not previously been connected and said SSID is not encrypted, XP will ask "are you sure"? This is more a warning about people being able to packet-sniff, but does involve an active decision by the user - NOT an automatic one by the machine.<BR/><BR/>Actually, now I think about it I don't recall my laptop (or any of our company ones, or the desktops) connecting to a wi-fi network without being explicitly told to in the first instance.<BR/><BR/>The one breach of this is if you connect to one network called, for instance, "NETGEAR". If another with the same name, also unencrypted, is encountered then the machine will happily hop onto it.<BR/><BR/>So I don't know what kit you're using. But remind me not to call upon *your* services if I'm ever looking for IT staff ;)Mosherhttps://www.blogger.com/profile/00374548021605224698noreply@blogger.comtag:blogger.com,1999:blog-3253720194278084558.post-31411214294152298662009-01-28T15:42:00.000+00:002009-01-28T15:42:00.000+00:00"If someone parks their bike at some railings and ..."If someone parks their bike at some railings and doesn't lock it, does that mean that you'll decide to use it to cycle home?"<BR/><BR/>It does if it has a sign advertising its free us:<BR/><BR/>http://www.viewlondon.co.uk/whatson/borrow-the-bike-london-feature-1344.htmlAnonymousnoreply@blogger.comtag:blogger.com,1999:blog-3253720194278084558.post-85897503012846309492009-01-28T15:36:00.000+00:002009-01-28T15:36:00.000+00:00Just to add to that - During the handshake, the wi...Just to add to that - During the handshake, the wireless device (pda etc.) asks the Wifi point for permission to connect.<BR/><BR/>Remind me not to employ you when IT is involved.Anonymousnoreply@blogger.comtag:blogger.com,1999:blog-3253720194278084558.post-84332576456105743402009-01-28T15:33:00.000+00:002009-01-28T15:33:00.000+00:00Mosher - the invitaion being displayed by an open ...Mosher - the invitaion being displayed by an open wifi point is not literal, in the sense that the broadcast SSID is labeled "CONNECT_HERE_FOR_FREE".<BR/><BR/>The protocols for a broadcasting WiFi point are, for some routers, open by default.<BR/><BR/>The point is that an open Wifi point is not _just_ open. A point I have gone to pains to make. It is _actively_ advertising and inviting people to join. It is broadcasting a signal that says "join me".<BR/><BR/>Most wireless devices will, by default, connect to the nearest and strongest signal that it can. <BR/><BR/>The access point advertises its presence and invites the connection. The wireless device (laptop, pda, phone) receives the signal, and executes a handshake, joining it to the network.<BR/><BR/>Bringing up the McKinnon case is puerile and obtuse, inasmuch as it is irrelevant.Anonymousnoreply@blogger.comtag:blogger.com,1999:blog-3253720194278084558.post-79135759967985019272009-01-28T13:19:00.000+00:002009-01-28T13:19:00.000+00:00Anon - garbage. Nobody puts a sign up on their unl...Anon - garbage. Nobody puts a sign up on their unlocked door the same way that nobody unwittingly gives their wifi the name "FREE_USE".<BR/><BR/>You may as well argue that as NASA didn't have full operative security in place that the guy who's currently risking extradition to the US and a ridiculously long prison sentence is innocent on the basis that their system was open to hacking.<BR/><BR/>Just because something is "open" doesn't mean that it's free for use. If someone parks their bike at some railings and doesn't lock it, does that mean that you'll decide to use it to cycle home? Remind me to guard my possessions closely when you're in the vicinity.Mosherhttps://www.blogger.com/profile/00374548021605224698noreply@blogger.comtag:blogger.com,1999:blog-3253720194278084558.post-61774184659008635102009-01-28T12:18:00.000+00:002009-01-28T12:18:00.000+00:00@ Anonymous 27 January 2009 17:11"How do you know ...@ Anonymous 27 January 2009 17:11<BR/><BR/>"How do you know if the owner of an open WiFi network intends it to be used by the general public"<BR/><BR/>If the WiFi point is broadcasting and open, it is intended to be used by anyone.<BR/><BR/>It may be that the owner of the WiFi point does not realise this, but that's an issue of personal responsibility.<BR/><BR/>If the owner does not realise that they have the door open and a sign above it saying "come on in", that does not mean that someone walking in is committing an act of trespass, let alone an illegal act.Anonymousnoreply@blogger.comtag:blogger.com,1999:blog-3253720194278084558.post-40760481166305855122009-01-27T22:43:00.000+00:002009-01-27T22:43:00.000+00:00if you were outside my house, you'd find an open w...if you were outside my house, you'd find an open wireless point. it's open deliberately, not through stupidity. easier than trying to remember yet another pasword and add friend's laptop mac addresses tot he authorised list, so when friends are round with anythgin that needs net access they help themselves. also my neighbour shares my net connection the one night a week he's home and checking his email. and he always asks if its okay befoer doing so.<BR/><BR/>i'm not fussed, so long as you're not using ALL my bandwidth, share and share alike.Anonymousnoreply@blogger.comtag:blogger.com,1999:blog-3253720194278084558.post-5250537864765078592009-01-27T17:11:00.000+00:002009-01-27T17:11:00.000+00:00There seems to be a fundamental with the situation...There seems to be a fundamental with the situation as it stands. How do you know if the owner of an open WiFi network intends it to be used by the general public, in which case using it is fine, or if he intends it to be restriced for personal use or paying customers, in which case it could be illegal.Anonymousnoreply@blogger.comtag:blogger.com,1999:blog-3253720194278084558.post-76860220481589445792009-01-27T10:10:00.000+00:002009-01-27T10:10:00.000+00:00The relevant law is The Computer Misuse Act 1990, ...The relevant law is <BR/>The Computer Misuse Act 1990, Section 1<BR/>1(1) A person is guilty of an offence if –<BR/><BR/>(a) he causes a computer to perform any function with intent to secure access to any program or data held in any computer, or to enable any such access to be secured;<BR/>(b) the access he intends to secure or enable to be secured is unauthorised; and<BR/>(c) he knows at the time when he causes the computer to perform the function that that is the case.<BR/>All parts of the offence must be present , as 1 (1) (e) requires unauthorised access, and Mac Donald’s have by setting up a WIFI network have implicitly given access (It is a public place, they could turn it off when the store is shut and most importantly they advertise the fact.) There can be no offence.<BR/>Likewise any offence under the Theft Act 1968, such as s13 theft of electricity, there can be no offence as the access is authorised. The time you would be committing an offence is if you intercepted communication (s1 RIPA 2000) or if you try and commit an offence you access will then not be authorised and you may fall foul of s2 of the Computer misuse Act, which states<BR/>2(1) A person is guilty of an offence under this section if he commits an offence under section 1 above (‘the unauthorised access offence’) with intent-<BR/>a) to commit an offence to which this section applies; or<BR/>b) to facilitate the commission of such an offence (whether by himself or by any other person).<BR/><BR/>In short as long as you have authorisation use the WIFI and do not use the access to commit a separate offence you are fine.<BR/><BR/>Joseph K.Anonymousnoreply@blogger.comtag:blogger.com,1999:blog-3253720194278084558.post-55396235507353566362009-01-26T13:13:00.000+00:002009-01-26T13:13:00.000+00:00I remember someone being raided for being involved...I remember someone being raided for being involved in child porn etc. Turns out that their computers were completely clean and they were totally innocent. However their wireless network was insecure so someone had being using a laptop to download/upload material. As you can imagine they were not caught.<BR/><BR/>Dishonestly obtaining electronic communications services with intent to avoid payment under the Communications Act 2003 is the offence. I suppose if the person leaves the connection open on purpose then it is not an offence. but if they are ignorant/object it will be.Anonymousnoreply@blogger.comtag:blogger.com,1999:blog-3253720194278084558.post-57265965743414994032009-01-26T12:54:00.000+00:002009-01-26T12:54:00.000+00:00It's far from theft - It's using something that is...It's far from theft - It's using something that is being offered to you free of charge.<BR/><BR/>WiFi works on the principle that it is an open invitation. Much like having an open door with a big sign outside saying "come in, help yourself".<BR/><BR/>The fella that took a caution for just using his neighbour's WiFi is a fool for taking a caution.<BR/><BR/>Cracking a secured WiFi point (which is almost trivial these days), on the other hand, is more likely to be an offence under Computer Misuse Act.Anonymousnoreply@blogger.comtag:blogger.com,1999:blog-3253720194278084558.post-58680504314254823662009-01-26T11:49:00.000+00:002009-01-26T11:49:00.000+00:00Also, because most of these kind of phones continu...Also, because most of these kind of phones continually connect to available wifi, I'd hazard (hope) that unless you actually are accessing the network by actively going on the net, there's no problem? Mine does it all the time, unless I deactivate the functionality, and surely if just connecting was illegal, the actual functionality would be illegal?Anonymousnoreply@blogger.comtag:blogger.com,1999:blog-3253720194278084558.post-36038679075284310252009-01-26T11:31:00.000+00:002009-01-26T11:31:00.000+00:00http://networks.silicon.com/mobile/0,39024665,3916...http://networks.silicon.com/mobile/0,39024665,39166790,00.htm<BR/><BR/>http://www.vnunet.com/vnunet/news/2200710/mcdonald-serves-free-wi-uk<BR/><BR/>The second one of these quotes a macdonalds representative as saying "The company also said that there will be no restrictions to customers using the service, regardless of the purchase made."<BR/><BR/>I think in general, even if the person whose connection it is leaves it open deliberately, they themselves might be in violation of the contract they have with their ISP. Your phone company might have advice, but I'm fairly sure there is no device liability on their, or the handset manufacturers part as far as connecting goes.Anonymousnoreply@blogger.comtag:blogger.com,1999:blog-3253720194278084558.post-42246984699500245752009-01-26T09:39:00.000+00:002009-01-26T09:39:00.000+00:00Are you sure they didn't throw the pie away and ea...Are you sure they didn't throw the pie away and eat the cat?Old BEhttps://www.blogger.com/profile/06974090439936326476noreply@blogger.comtag:blogger.com,1999:blog-3253720194278084558.post-60305584795574612812009-01-26T09:34:00.000+00:002009-01-26T09:34:00.000+00:00Bridge: Similar tale from a sink estate up north: ...Bridge: Similar tale from a sink estate up north: The pie was cooling outside a back door when a cat came along and crapped on it. They had to throw half of it away.Hogdayafternoonhttps://www.blogger.com/profile/06188146617570775741noreply@blogger.comtag:blogger.com,1999:blog-3253720194278084558.post-13826467491332960812009-01-26T04:55:00.000+00:002009-01-26T04:55:00.000+00:00That reminds me of a story I heard as a lad:One da...That reminds me of a story I heard as a lad:<BR/><BR/>One day a man was walking by a farmhouse when he noticed a pie cooling on the window. He stopped for a moment to enjoy the smell of the pie cooling when the cook came out and demanded payment for him smelling the food she had just cooked.<BR/><BR/>The man reached into his pocket and pulled out a pound note, which he then started to fold and rub.<BR/><BR/>"What are you doing?" asked the cook.<BR/><BR/>"I'm paying for the smell of your cooking with the sound of me folding my money," replied the man.<BR/><BR/>Happy surfing.Bridgehttps://www.blogger.com/profile/18313701092861282382noreply@blogger.comtag:blogger.com,1999:blog-3253720194278084558.post-88268837076914557152009-01-26T01:40:00.000+00:002009-01-26T01:40:00.000+00:00Drat. pressed submit half way through.Anyway, what...Drat. pressed submit half way through.<BR/><BR/>Anyway, whatever it is it will not be strict liability but will require intent. Accordingly, unless you are 'wilfully blind' if your phone logs on to a net over which it is not authorised and you have no knowledge, that's not a problem.<BR/><BR/>With McDonalds, one could probably suggest they are giving implied permission by offering 'free wifi'. There is no express communication saying it is conditional on a purchase, whatever the niceties.<BR/><BR/>All in all, I think you are pretty safe unless you rock up outside No 10 Arcacia Av and start blantly ripping the ar*e out of it.Anonymousnoreply@blogger.comtag:blogger.com,1999:blog-3253720194278084558.post-49829775021856266652009-01-26T01:36:00.000+00:002009-01-26T01:36:00.000+00:00ASNT,Not my area of legal expertise, but it has be...ASNT,<BR/><BR/>Not my area of legal expertise, but it has been suggested by the papers that the offence has been treated as theft. I am unsure if it is indeed a Theft Act offence, and not an instance of the papers over-simplying and misusing a technically precise term. Since theft requires an intention to permanently deprive, I fail to see how it ever can be.Anonymousnoreply@blogger.comtag:blogger.com,1999:blog-3253720194278084558.post-12439680373530575732009-01-26T00:48:00.000+00:002009-01-26T00:48:00.000+00:00Without looking at the news story, my memory tells...Without looking at the news story, my memory tells me that the "owner" of the wifi signal didn't lodge a complaint - the chap in question was arrested by the police on their own.<BR/><BR/>Which doesn't really answer your question.<BR/><BR/>There seem to be 2 schools of thought. Those who say "if it's open, then help yourself. Either they want you to make use of it, or they're too stupid to lock it"; and those who argue that "it's like saying someone's too daft to lock their front door then saying it's OK for you to walk in and steal their stereo".<BR/><BR/>Technically, it does seem to be theft, however unwittingly you may be using it.Mosherhttps://www.blogger.com/profile/00374548021605224698noreply@blogger.comtag:blogger.com,1999:blog-3253720194278084558.post-47162175409773397502009-01-25T22:15:00.000+00:002009-01-25T22:15:00.000+00:00Mobile broadband isn't as quick as wired, yet, but...Mobile broadband isn't as quick as wired, yet, but it isn't bad.Old BEhttps://www.blogger.com/profile/06974090439936326476noreply@blogger.com