wireless

I got a note today from a reader of mine who has essentially been put into a position where he is poaching a wifi signal automatically! I wonder how many people out there have this happen and just think that their sudden Internet connectivity is part of something bulit-in to the computer system. “Hmm, free Internet. Cool!”

letter submitted by F.L.

Dear Mr. John Dvorak

I read your column on “The Looming Legal Threat on WI-Fi” PC Mag May 4, 2004 issue. I’ve just buy a new Wireless G PC Card “D-Link AirPlus Xtreme G (DWL-G650).” I installed the software and the card in the package I bought, then it works well. I allow Windows XP to configure and set my wireless card to connect in the Internet. Then after restarting my computer then plugging the card it picks a signal and connects to a wireless network. Due to my curiosity, I try to connect in the internet. I was surprissed, I can now access in the Internet. Before continuing other things, I asked myself is it legal? Ive read the wireless network settings it says there “This network is configured for open access.” Am I be jailed/arrested for trespassing on their network? Is there a law on it in New York? What is your advice?

Thank you very much and more power to you!!!

Like I said in this column, once the signal leaves the premises it should be considered in the public domain. Recently some companies have begun to sell special insultion to stop wifi signals from leaving the room.

Minimally, if you do not want your signal poached, encrypt it. The legality is up in the air.



  1. g quaglia says:

    I agree with you John, if the signal is not encrypted, then its up for grabs. Maybe wireless companies should ship their product with encyption turned on and this wouldn’t be as big a problem.

  2. Lars Ekdahl says:

    So do I also, although I do have and pay for an Internet connection of my own.

    In my 5 rooms flat my wireless Internet connection cannot reach all the rooms. To my surprise I found another signal, with no encryption, I also could use.

    After that discovery I checked in every room for a connection and found futher one more.

    Yes, many people forget to encrypt the wireless connections.

    Lars Ekdahl

  3. Greg K. says:

    Poaching? Uh, where did you get that term?

  4. John C. Dvorak says:

    The word poaching is in the dictionary.

    I commonly use it in the context of signal poaching. I originated the phrase a couple of years ago.

  5. Wired2phone says:

    See:
    http://www.guardian.co.uk/print/0,3858,5096165-110837,00.html
    Neighbourhood Wi-Fi watch

    Is it OK to borrow someone else’s wireless network without their
    permission? And how do you stop others doing the same to you? David
    McCandless goes hacking for answers
    David McCandless
    Thursday January 6, 2005
    …..

  6. Mike Voice says:

    The question is not “is it legal”? but “can they catch you?” 🙂

  7. Anonymous says:

    It’s funny when someone buys a wireless notebook with no wireless router and uses the internet unaware that something is amiss.

  8. MaryTee says:

    I just spoke on the phone with a non-technical friend of mine in LA who recently installed a wireless network. After I guided her through the web admin pages for her D-Link router, she discovered that someone is poaching her signal. She initially was ambivalent until I pointed out the liability issues concerning what this person visits or downloads. She now has the instructions for encrypting her signal and tying down the MAC addresses. I hope she takes care of it.

    I am amazed that the companies who sell wireless equipment (and the broadband providers, too) don’t do a better job of making sure that their customers take care of security first. Maybe the companies don’t want all the support calls that securing the network would probably generate.

  9. T.C. Moore says:

    I’m talking with my sister on the phone, who’s no dummy but not computer savvy, trying to diagnose why her wireless network won’t work. I can’t even get her to tell me if she’s looking at configuration in Windows for her network settings, or in a browser at settings for the router.

    Normal consumers don’t understand networking, let alone wireless networks.

    Getting them to activate encryption or securing their network is impossible (given the current setup programs).
    Having encryption turned on would have made diagnosis in this case 5 times harder. (theoretically…)

    Oh, turns out when she plugs in a cable to the wired network, it turns off the wireless connection. Okie Dokie.
    It’s the new “Is the computer plugged in, sir?” question for the wireless age.

  10. Hank C says:

    I’m a long-time radio scanner and ham operator. The general rule is that if someone beams it into your house, car or public place, it’s yours to listen.

    It’s like if someone threw a letter over your fence. You’d have a right to read it.

    However, there are limitations on how you can USE that information. For instance, we scanners are not supposed to record a cell phone conversation and pass it on.

    With WiFi this get’s tricky, because you are TRANSMITTING and CONTROLLING their equipment and resources — not just passively receiving. I’m guessing that the courts are going to say this is illegal.

    But practically? It is the WiFi owners responsibility.

    Did I hear that some states made it ILLEGAL for cities to give away free WiFi? Is this law possible? If so, this is a scandal.

  11. Hank C says:

    I think John’s comment is hilarious that some people are going to accidentially hit WiFi and think their new Christmas present computer came with the Internet already installed!

    It’s funny because I can totally picture this happening to half of my family and friends.


0

Bad Behavior has blocked 4452 access attempts in the last 7 days.