Legality of piggybacking
   HOME

TheInfoList



OR:

Laws regarding "unauthorized access of a
computer network A computer network is a set of computers sharing resources located on or provided by network nodes. The computers use common communication protocols over digital interconnections to communicate with each other. These interconnections are ...
" exist in many legal codes, though the wording and meaning differs from one to the next. However, the interpretation of terms like "access" and "authorization" is not clear, and there is no general agreement on whether piggybacking (intentional access of an open
Wi-Fi network Wi-Fi () is a family of wireless network Communication protocol, protocols, based on the IEEE 802.11 family of standards, which are commonly used for Wireless LAN, local area networking of devices and Internet access, allowing nearby digital d ...
without harmful intent) falls under this classification. Some jurisdictions prohibit it, some permit it, and others are not well-defined. For example, a common but untested argument is that the
802.11 IEEE 802.11 is part of the IEEE 802 set of local area network (LAN) technical standards, and specifies the set of media access control (MAC) and physical layer (PHY) protocols for implementing wireless local area network (WLAN) computer com ...
and
DHCP The Dynamic Host Configuration Protocol (DHCP) is a network management protocol used on Internet Protocol (IP) networks for automatically assigning IP addresses and other communication parameters to devices connected to the network using a cli ...
protocols operate on behalf of the owner, implicitly requesting permission to access the network, which the
wireless router A wireless router is a device that performs the functions of a router and also includes the functions of a wireless access point. It is used to provide access to the Internet or a private computer network. Depending on the manufacturer and mode ...
then authorizes. (This would not apply if the user has other reason to know that their use is unauthorized, such as a written or unwritten notice.) In addition to laws against unauthorized access on the user side, there are the issues of breach of contract with the
Internet service provider An Internet service provider (ISP) is an organization that provides services for accessing, using, or participating in the Internet. ISPs can be organized in various forms, such as commercial, community-owned, non-profit, or otherwise privat ...
on the network owner's side. Many terms of service prohibit bandwidth sharing with others, though others allow it. The Electronic Frontier Foundation maintains a list of ISPs that allow sharing of the Wi-Fi signal.


Australia

Under Australian Law, "unauthorized access, modification or impairment" of data held in a computer system is a federal offence under the Criminal Code Act 1995. The act refers specifically to ''data'' as opposed to network resources (connection).


Canada

In
Canadian law The legal system of Canada is pluralist: its foundations lie in the English common law system (inherited from its period as a colony of the British Empire), the French civil law system (inherited from its French Empire past), and Indigenous ...
, unauthorized access is addressed the ''
Criminal Code A criminal code (or penal code) is a document that compiles all, or a significant amount of a particular jurisdiction's criminal law. Typically a criminal code will contain offences that are recognised in the jurisdiction, penalties that might ...
'', s 342.1, which provides that: "Every one who, fraudulently and without colour of right" obtains "computer services" from an access point is subject to criminal charges. Section 326(1) of the ''Criminal Code'' may also be used to address unauthorized access of a computer network: '(1) Every one commits theft who fraudulently, maliciously, or without colour of right', '(b) uses any telecommunication facility or obtains any telecommunication service.' In
Morrisburg, Ontario Morrisburg is an unincorporated community in the Municipality of South Dundas, located in Eastern Ontario, Canada. History On November 11, 1813, the Battle of Crysler's Farm, at which a British force repelled an invading American army, took pla ...
in 2006, a man was arrested under section 326 of the ''Criminal Code''. Ultimately the arrest was poorly reported, there does not seem to be any information available with regards to conviction.


European Union

In September 2016, the European Court of Justice decided in "McFadden" C-484/14 that "a businessman providing a public wifi network is not responsible for copyright infringement incurred by users. But he can be ordered to protect the network with a password, to prevent copyright infringement". The Electronic Frontier Foundation had lobbied for not requiring passwords.


Germany


Hong Kong

Under HK Laws. Chapter 200 ''Crimes Ordinance'' Section 161 ''Access to computer with criminal or dishonest intent'':


Italy

Unauthorized access to a protected system is illegal.


Japan

On April 28, 2017 the
Tokyo District Court is a district court located at 1-1-4 Kasumigaseki, Chiyoda, Tokyo, Japan Japan ( ja, 日本, or , and formally , ''Nihonkoku'') is an island country in East Asia. It is situated in the northwest Pacific Ocean, and is bordered on the ...
ruled that accessing a wireless LAN network without authorization is not a crime, even if the network is protected with a password. In a case brought before the court involved a man named Hiroshi Fujita, who was accused of accessing a neighbors wi-fi network without authorization and sending virus-infected emails, and then using that to steal internet banking information and send funds to his own bank account without authorization. Hiroshi was found guilty of most of what he was accused of and sentenced to 8 years in prison. Regarding the unauthorized access of wireless networks, prosecutors argued that wi-fi passwords fall under the category of "secrets of wireless transmission" (無線通信の秘密) and that therefore obtaining and using passwords without permission of the network operator would fall under the category of unauthorized use of wireless transmission secrets, which is prohibited by law. However, the court ruled that the defendant is not guilty, stating in their ruling that wi-fi passwords do not fall under that category and therefore the unauthorized obtainment of passwords and subsequent accessing of protected wireless networks is not a crime.


Russia

Although Russian criminal law does not explicitly forbid access to another person's network, there is a common judicial practice to qualify these cases as an "unauthorized access to an information" (a broadly interpreted concept in Russian law regarding computer crimes) according to Article 272 of the Criminal Code. To construct the accusation, one considers ISP's billing data the information which has been accessed. In addition, if the defendant have used any program (network scanner, for example) to access the network, he may also be charged by Article 273 (creation, usage and distribution of malware).


Singapore

Piggybacking another person's unsecured wireless network is illegal in Singapore under section 6(1)(a) of the Computer Misuse and Cybersecurity Act. The offender is liable to a fine of $10,000, imprisonment for up to 3 years, or both. In November 2006, the 17-year-old Garyl Tan Jia Luo, was arrested for tapping into his neighbour's wireless Internet connection. On 19 December, Tan pleaded guilty to the charge, and on 16 January 2007 he became the first person in Singapore to be convicted of the offense. He was sentenced by the Community Court to 18 months' probation, half of which was to be served at a boys' home. For the remaining nine months, he had to stay indoors from 10:00 pm to 6:00 am. He was also sentenced to 80 hours of community service and banned from using the Internet for 18 months; his parents risked forfeiting a S$5,000 bond if he failed to abide by the ban. Tan was also given the option of enlisting early for
National Service National service is the system of voluntary government service, usually military service. Conscription is mandatory national service. The term ''national service'' comes from the United Kingdom's National Service (Armed Forces) Act 1939. The ...
. If he did so, he would not have to serve whatever remained of his sentence. On 4 January 2007, Lin Zhenghuang was charged for using his neighbour's unsecured wireless network to post a bomb hoax online. In July 2005, Lin had posted a message entitled "Breaking News –
Toa Payoh Toa Payoh (, ta, தோ பாயோ) is a planning area and matured residential town located in the northern part of the Central Region of Singapore. Toa Payoh planning area borders Bishan and Serangoon to the north, the Central Water Catc ...
Hit by Bomb Attacks" on a forum managed by
HardwareZone HardwareZone is an IT-oriented Internet portal based in Singapore. It is operated by Hardware Zone Private Limited, which is a wholly owned subsidiary of SPH Media Trust. Some features of the portal are: IT price lists for several countries, fea ...
. Alarmed by the message, a user reported it to the authorities through the Government of Singapore's eCitizen website. Lin faced an additional 60 charges for having used his notebook computer to repeatedly access the wireless networks of nine people in his neighborhood. Lin pleaded guilty to one charge under the Telecommunications Act and another nine under the Computer Misuse Act on 31 January. He apologised for his actions, claiming he had acted out of "stupidness" and not due to any "malicious or evil intent". On 7 February he was sentenced by District Judge Francis Tseng to three months' jail and a S$4,000 fine. The judge also set sentencing guidelines for future 'mooching' cases, stating that offenders would be liable to fines and not to imprisonment unless offences were "committed in order to facilitate the commission of or to avoid detection for some more serious offence", as it was in Lin's case.


United Kingdom

The Computer Misuse Act 1990, section 1 reads: In
London London is the capital and List of urban areas in the United Kingdom, largest city of England and the United Kingdom, with a population of just under 9 million. It stands on the River Thames in south-east England at the head of a estuary dow ...
, 2005, Gregory Straszkiewicz was the first person to be convicted of a related crime, "dishonestly obtaining an electronics communication service" (under s.125
Communications Act 2003 The Communications Act 2003 is an Act of the Parliament of the United Kingdom. The act, which came into force on 25 July 2003, superseded the Telecommunications Act 1984. The new act was the responsibility of Culture Secretary Tessa Jowell. It ...
). Local residents complained that he was repeatedly trying to gain access to residential networks with a laptop from a car. There was no evidence that he had any other criminal intent. He was fined £500 and given a 12-month
conditional discharge A discharge is a type of sentence imposed by a court whereby no punishment is imposed. An absolute discharge is an unconditional discharge whereby the court finds that a crime has technically been committed but that any punishment of the defend ...
. In early 2006, two other individuals were arrested and received an official caution for "dishonestly obtaining electronic communications services with intent to avoid payment."


United States

There are federal and state laws (in all 50 states) addressing the issue of unauthorized access to wireless networks. The laws vary widely between states. Some criminalize the mere unauthorized access of a network, while others require monetary damages for intentional breaching of security features. The majority of state laws do not specify what is meant by "unauthorized access". Regardless, enforcement is minimal in most states even where it is illegal, and detection is difficult in many cases. Some portable devices, such as the Apple
iPad The iPad is a brand of iOS and iPadOS-based tablet computers that are developed by Apple Inc. The iPad was conceived before the related iPhone but the iPhone was developed and released first. Speculation about the development, operating ...
and iPod Touch, allow casual use of open Wi-Fi networks as a basic feature, and often identify the presence of specific access points within the vicinity for user
geolocation Geopositioning, also known as geotracking, geolocalization, geolocating, geolocation, or geoposition fixing, is the process of determining or estimating the geographic position of an object. Geopositioning yields a set of geographic coordinates ...
.


Arrests

In
St. Petersburg Saint Petersburg ( rus, links=no, Санкт-Петербург, a=Ru-Sankt Peterburg Leningrad Petrograd Piter.ogg, r=Sankt-Peterburg, p=ˈsankt pʲɪtʲɪrˈburk), formerly known as Petrograd (1914–1924) and later Leningrad (1924–1991), i ...
, 2005, Benjamin Smith III was arrested and charged with "unauthorized access to a computer network", a third-degree felony in the state of
Florida Florida is a state located in the Southeastern region of the United States. Florida is bordered to the west by the Gulf of Mexico, to the northwest by Alabama, to the north by Georgia, to the east by the Bahamas and Atlantic Ocean, and to ...
, after using a resident's wireless network from a car parked outside. An
Illinois Illinois ( ) is a state in the Midwestern United States. Its largest metropolitan areas include the Chicago metropolitan area, and the Metro East section, of Greater St. Louis. Other smaller metropolitan areas include, Peoria and Rockf ...
man was arrested in January 2006 for piggybacking on a
Wi-Fi Wi-Fi () is a family of wireless network protocols, based on the IEEE 802.11 family of standards, which are commonly used for local area networking of devices and Internet access, allowing nearby digital devices to exchange data by radio wav ...
network. David M. Kauchak was the first person to be charged with "remotely accessing another computer system" in Winnebago County. He had been accessing the Internet through a nonprofit agency's network from a car parked nearby and chatted with the police officer about it. He pleaded guilty and was sentenced to a fine of $250 and one year of court supervision. In Sparta, Michigan, 2007, Sam Peterson was arrested for checking his email each day using a café's wireless Internet access from a car parked nearby. A police officer became suspicious, stating, "I had a feeling a law was being broken, but I didn't know exactly what". When asked, the man explained to the officer what he was doing, as he did not know the act was illegal. The officer found a law against "unauthorized use of computer access", leading to an arrest and charges that could result in a five-year felony and $10,000 fine. The café owner was not aware of the law, either. "I didn't know it was really illegal, either. If he would have come in o the coffee shopit would have been fine." They did not press charges, but he was eventually sentenced to a $400 fine and 40 hours of community service. This case was featured on ''
The Colbert Report ''The Colbert Report'' ( ) is an American late-night talk and news satire television program hosted by Stephen Colbert that aired four days a week on Comedy Central from October 17, 2005, to December 18, 2014, for 1,447 episodes. The show fo ...
''. In 2007, in
Palmer, Alaska Palmer (Ahtna: ''Nił'etse'it'aade'' or ''Nuutah''; Dena'ina: ''Denal'i Kena'') is a city in and the borough seat of the Matanuska-Susitna Borough, Alaska, United States, located northeast of Anchorage on the Glenn Highway in the Matanuska ...
, 21-year-old Brian Tanner was charged with "theft of services" and had his laptop confiscated after accessing a gaming website at night from the parking lot outside the Palmer Public Library, as he was allowed to do during the day. The night before, the police had asked him to leave the parking lot, which he had started using because they had asked him not to use residential connections in the past. He was not ultimately charged with theft, but could still be charged with trespassing or not obeying a police order. The library director said that Tanner had not broken any rules, and local citizens criticized police for their actions.


Legislation

In 2003, the
New Hampshire New Hampshire is a state in the New England region of the northeastern United States. It is bordered by Massachusetts to the south, Vermont to the west, Maine and the Gulf of Maine to the east, and the Canadian province of Quebec to the nor ...
House Bill 495 was proposed, which would clarify that the duty to secure the wireless network lies with the network owner, instead of criminalizing the automatic access of open networks. It was passed by the New Hampshire House in March 2003 but was not signed into law. The current wording of the law provides some affirmative defenses for use of a network that is not explicitly authorized: There are additional provisions in the NH law, Section 638:17 Computer Related Offenses, as found by searching NH RSA's in December 2009. They cover actual use of someone else's computer rather than simply "access": New York law is the most permissive. The statute against unauthorized access only applies when the network "is equipped or programmed with any device or coding system, a function of which is to prevent the unauthorized use of said computer or computer system". In other words, the use of a network would only be considered unauthorized and illegal if the network owner had enabled encryption or password protection and the user bypassed this protection, or when the owner has explicitly given notice that use of the network is prohibited, either orally or in writing.
Westchester County Westchester County is located in the U.S. state of New York. It is the seventh most populous county in the State of New York and the most populous north of New York City. According to the 2020 United States Census, the county had a population ...
passed a law, taking effect in October 2006, that requires any commercial business that stores, utilizes or otherwise maintains personal information electronically to take some minimum security measures (e.g., a firewall, SSID broadcasting disabled, or using a non-default SSID) in an effort to fight
identity theft Identity theft occurs when someone uses another person's personal identifying information, like their name, identifying number, or credit card number, without their permission, to commit fraud or other crimes. The term ''identity theft'' was c ...
. Businesses that do not secure their networks in this way face a $500 fine. The law has been criticized as being ineffectual against actual identity thieves and punishing businesses like
coffee house A coffeehouse, coffee shop, or café is an establishment that primarily serves coffee of various types, notably espresso, latte, and cappuccino. Some coffeehouses may serve cold drinks, such as iced coffee and iced tea, as well as other non- ...
s for normal business practices.


See also

* Piggybacking (Internet access) *
Wardriving Wardriving is the act of searching for Wi-Fi wireless networks, usually from a moving vehicle, using a laptop or smartphone. Software for wardriving is freely available on the internet. Warbiking, warcycling, warwalking and similar use the sam ...


References

{{reflist Wireless networking Wireless access points Piggybacking