Laws regarding "unauthorized access of a
computer network
A computer network is a collection of communicating computers and other devices, such as printers and smart phones. In order to communicate, the computers and devices must be connected by wired media like copper cables, optical fibers, or b ...
" exist in many legal codes, though the wording and meaning differs from one to the next. However, the interpretation of terms like "access" and "authorization" is not clear, and there is no general agreement on whether
piggybacking (intentional access of an open
Wi-Fi network without
harmful intent) falls under this classification.
Some jurisdictions prohibit it, some permit it, and others are not well-defined.
For example, a common but untested argument is that the
802.11 and
DHCP
The Dynamic Host Configuration Protocol (DHCP) is a network management protocol used on Internet Protocol (IP) networks for automatically assigning IP addresses and other communication parameters to devices connected to the network using a clie ...
protocols operate on behalf of the owner, implicitly requesting permission to access the network, which the
wireless router
A wireless router or Wi-Fi router is a device that performs the functions of a router and also includes the functions of a wireless access point. It is used to provide access to the Internet or a private computer network. Depending on the m ...
then authorizes. (This would not apply if the user has other reason to know that their use is unauthorized, such as a written or unwritten notice.)
In addition to laws against unauthorized access on the user side, there are the issues of
breach of contract
Breach of contract is a legal cause of action and a type of civil wrong, in which a binding agreement or bargained-for exchange is not honored by one or more of the parties to the contract by non-performance or interference with the other part ...
with the
Internet service provider
An Internet service provider (ISP) is an organization that provides a myriad of services related to accessing, using, managing, or participating in the Internet. ISPs can be organized in various forms, such as commercial, community-owned, no ...
on the network owner's side. Many
terms of service prohibit bandwidth sharing with others, though others allow it. The
Electronic Frontier Foundation
The Electronic Frontier Foundation (EFF) is an American international non-profit digital rights group based in San Francisco, California. It was founded in 1990 to promote Internet civil liberties.
It provides funds for legal defense in court, ...
maintains a list of ISPs that allow sharing of the Wi-Fi signal.
Australia
Under Australian Law, "unauthorized access, modification or impairment" of data held in a computer system is a federal offence under the Criminal Code Act 1995. The act refers specifically to ''data'' as opposed to network resources (connection).
Canada
In
Canadian law
The legal system of Canada is pluralist: its foundations lie in the English common law system (inherited from its period as a colony of the British Empire), the French civil law system (inherited from its French Empire past), and Indigenous ...
, unauthorized access is addressed the ''
Criminal Code
A criminal code or penal code is a document that compiles all, or a significant amount of, a particular jurisdiction's criminal law. Typically a criminal code will contain offences that are recognised in the jurisdiction, penalties that might ...
'', s 342.1, which provides that "Every one who, fraudulently and without
colour of right" obtains "computer services" from an access point is subject to criminal charges.
Section 326(1) of the ''Criminal Code'' may also be used to address unauthorized access of a computer network: '(1) Every one commits theft who fraudulently, maliciously, or without
colour of right', '(b) uses any telecommunication facility or obtains any telecommunication service.'
In
Morrisburg, Ontario in 2006, a man was arrested under section 326 of the ''Criminal Code''. Ultimately the arrest was poorly reported, there does not seem to be any information available with regards to conviction.
European Union
In September 2016, the
European Court of Justice
The European Court of Justice (ECJ), officially the Court of Justice (), is the supreme court of the European Union in matters of European Union law. As a part of the Court of Justice of the European Union, it is tasked with interpreting ...
decided in "McFadden" C-484/14 that "a businessman providing a public wifi network is not responsible for copyright infringement incurred by users. But he can be ordered to protect the network with a password, to prevent copyright infringement". The
Electronic Frontier Foundation
The Electronic Frontier Foundation (EFF) is an American international non-profit digital rights group based in San Francisco, California. It was founded in 1990 to promote Internet civil liberties.
It provides funds for legal defense in court, ...
had lobbied for not requiring passwords.
Germany
Hong Kong
Under HK Laws. Chapter 200 ''Crimes Ordinance'' Section 161 ''Access to computer with criminal or dishonest intent'':
Italy
Unauthorized access to a protected system is illegal.
Japan
On 28 April 2017 the
Tokyo District Court
is a district court located at 1-1-4 Kasumigaseki, Chiyoda, Tokyo, Japan.
See also
*Judicial system of Japan
In the judicial system of Japan, the Constitution of Japan guarantees that "all judges shall be independent in the exercise of thei ...
ruled that accessing a wireless LAN network without authorization is not a crime, even if the network is protected with a password. In a case brought before the court involved a man named Hiroshi Fujita, who was accused of accessing a neighbors wi-fi network without authorization and sending virus-infected emails, and then using that to steal internet banking information and send funds to his own bank account without authorization. Hiroshi was found guilty of most of what he was accused of and sentenced to 8 years in prison. Regarding the unauthorized access of wireless networks, prosecutors argued that wi-fi passwords fall under the category of "secrets of wireless transmission" (無線通信の秘密) and that therefore obtaining and using passwords without permission of the network operator would fall under the category of unauthorized use of wireless transmission secrets, which is prohibited by law. However, the court ruled that the defendant is not guilty, stating in their ruling that wi-fi passwords do not fall under that category and therefore the unauthorized obtainment of passwords and subsequent accessing of protected wireless networks is not a crime.
Russia
Although Russian criminal law does not explicitly forbid access to another person's network, there is a common judicial practice to qualify these cases as an "unauthorized access to an information" (a broadly interpreted concept in Russian law regarding computer crimes) according to Article 272 of the Criminal Code. To construct the accusation, one considers ISP's billing data the information which has been accessed.
In addition, if the defendant have used any program (network scanner, for example) to access the network, he may also be charged by Article 273 (creation, usage and distribution of malware).
Singapore
Piggybacking another person's unsecured wireless network is illegal in Singapore under section 6(1)(a) of the Computer Misuse and Cybersecurity Act.
The offender is liable to a fine of $10,000, imprisonment for up to 3 years, or both.
In November 2006, the 17-year-old Garyl Tan Jia Luo, was arrested for tapping into his neighbour's wireless Internet connection. On 19 December, Tan pleaded guilty to the charge, and on 16 January 2007 he became the first person in Singapore to be convicted of the offense. He was sentenced by the
Community Court to 18 months' probation, half of which was to be served at a boys' home. For the remaining nine months, he had to stay indoors from 10:00 pm to 6:00 am. He was also sentenced to 80 hours of community service and banned from using the Internet for 18 months; his parents risked forfeiting a
S$5,000 bond if he failed to abide by the ban. Tan was also given the option of enlisting early for
National Service
National service is a system of compulsory or voluntary government service, usually military service. Conscription is mandatory national service. The term ''national service'' comes from the United Kingdom's National Service (Armed Forces) Act ...
. If he did so, he would not have to serve whatever remained of his sentence.
On 4 January 2007, Lin Zhenghuang was charged for using his neighbour's unsecured wireless network to post a bomb hoax online. In July 2005, Lin had posted a message entitled "Breaking News –
Toa Payoh
Toa Payoh ( or , , ) is a Planning areas of Singapore, planning area and New towns of Singapore, mature residential town located in the northern part of the Central Region, Singapore, Central Region of Singapore. Toa Payoh planning area borde ...
Hit by Bomb Attacks" on a forum managed by
HardwareZone
HardwareZone is an IT-oriented Internet portal based in Singapore. It is operated by Hardware Zone Private Limited, which is a wholly owned subsidiary of SPH Media. Some features of the portal are: IT price lists for several countries, feature a ...
. Alarmed by the message, a user reported it to the authorities through the
Government of Singapore
The government of Singapore is defined by the Constitution of Singapore, Constitution of the Republic of Singapore to consist of the President of Singapore, President and the Executive. Executive authority of Singapore is vested in the Presi ...
's eCitizen website. Lin faced an additional 60 charges for having used his notebook computer to repeatedly access the wireless networks of nine people in his neighborhood.
Lin pleaded guilty to one charge under the Telecommunications Act and another nine under the Computer Misuse Act on 31 January. He apologised for his actions, claiming he had acted out of "stupidness" and not due to any "malicious or evil intent".
On 7 February he was sentenced by District Judge Francis Tseng to three months' jail and a S$4,000 fine. The judge also set sentencing guidelines for future 'mooching' cases, stating that offenders would be liable to fines and not to imprisonment unless offences were "committed in order to facilitate the commission of or to avoid detection for some more serious offence", as it was in Lin's case.
United Kingdom
The
Computer Misuse Act 1990
The Computer Misuse Act 1990 (c. 18) is an act of the Parliament of the United Kingdom, introduced partly in response to the decision in ''R v Gold & Schifreen'' (1988) 1 AC 1063. Critics of the bill complained that it was introduced hastily, w ...
, section 1 reads:
In
London
London is the Capital city, capital and List of urban areas in the United Kingdom, largest city of both England and the United Kingdom, with a population of in . London metropolitan area, Its wider metropolitan area is the largest in Wester ...
, 2005, Gregory Straszkiewicz was the first person to be convicted of a related crime, "dishonestly obtaining an electronics communication service" (under s.125
Communications Act 2003
The Communications Act 2003 (c. 21) is an Act of the Parliament of the United Kingdom. The act, which came into force on 25 July 2003, superseded the Telecommunications Act 1984. The new act was the responsibility of Culture Secretary Tessa ...
). Local residents complained that he was repeatedly trying to gain access to residential networks with a laptop from a car. There was no evidence that he had any other
criminal intent. He was fined £500 and given a 12-month
conditional discharge.
In early 2006, two other individuals were arrested and received an official caution for "dishonestly obtaining electronic communications services with intent to avoid payment."
United States
There are federal and state laws (in all 50 states) addressing the issue of unauthorized access to wireless networks.
[ The laws vary widely between states. Some criminalize the mere unauthorized access of a network, while others require monetary damages for intentional breaching of security features. The majority of state laws do not specify what is meant by "unauthorized access". Regardless, enforcement is minimal in most states even where it is illegal, and detection is difficult in many cases.]
Some portable devices, such as the Apple iPad
The iPad is a brand of tablet computers developed and marketed by Apple Inc., Apple that run the company's mobile operating systems iOS and later iPadOS. The IPad (1st generation), first-generation iPad was introduced on January 27, 2010. ...
and iPod Touch
The iPod Touch (stylized as iPod touch) is a discontinued line of iOS-based mobile devices designed and formerly marketed by Apple Inc. with a touchscreen-controlled user interface. As with other iPod models, the iPod Touch can be used as a po ...
, allow casual use of open Wi-Fi networks as a basic feature, and often identify the presence of specific access points within the vicinity for user geolocation
Geopositioning is the process of determining or estimating the geographic position of an object or a person.
Geopositioning yields a set of Geographic coordinate system, geographic coordinates (such as latitude and longitude) in a given map datum ...
.
Arrests
In St. Petersburg
Saint Petersburg, formerly known as Petrograd and later Leningrad, is the second-largest city in Russia after Moscow. It is situated on the River Neva, at the head of the Gulf of Finland on the Baltic Sea. The city had a population of 5,601, ...
, 2005, Benjamin Smith III was arrested and charged with "unauthorized access to a computer network", a third-degree felony in the state of Florida
Florida ( ; ) is a U.S. state, state in the Southeastern United States, Southeastern region of the United States. It borders the Gulf of Mexico to the west, Alabama to the northwest, Georgia (U.S. state), Georgia to the north, the Atlantic ...
, after using a resident's wireless network from a car parked outside.
An Illinois
Illinois ( ) is a U.S. state, state in the Midwestern United States, Midwestern United States. It borders on Lake Michigan to its northeast, the Mississippi River to its west, and the Wabash River, Wabash and Ohio River, Ohio rivers to its ...
man was arrested in January 2006 for piggybacking on a Wi-Fi
Wi-Fi () is a family of wireless network protocols based on the IEEE 802.11 family of standards, which are commonly used for Wireless LAN, local area networking of devices and Internet access, allowing nearby digital devices to exchange data by ...
network. David M. Kauchak was the first person to be charged with "remotely accessing another computer system" in Winnebago County. He had been accessing the Internet through a nonprofit agency's network from a car parked nearby and chatted with the police officer about it. He pleaded guilty and was sentenced to a fine of $250 and one year of court supervision.
In Sparta, Michigan, 2007, Sam Peterson was arrested for checking his email each day using a café's wireless Internet access from a car parked nearby. A police officer became suspicious, stating, "I had a feeling a law was being broken, but I didn't know exactly what". When asked, the man explained to the officer what he was doing, as he did not know the act was illegal. The officer found a law against "unauthorized use of computer access", leading to an arrest and charges that could result in a five-year felony and $10,000 fine. The café owner was not aware of the law, either. "I didn't know it was really illegal, either. If he would have come in o the coffee shopit would have been fine." They did not press charges, but he was eventually sentenced to a $400 fine and 40 hours of community service. This case was featured on ''The Colbert Report
''The Colbert Report'' ( ) is an American late night television, late-night Late-night talk show, talk and news satire television program hosted by Stephen Colbert that aired four days a week on Comedy Central from October 17, 2005, to December ...
''.
In 2007, in Palmer, Alaska
Palmer is a city in and the county seat, borough seat of the Matanuska-Susitna Borough, Alaska, United States, located northeast of Anchorage on the Glenn Highway in the Matanuska-Susitna Valley, Matanuska Valley. It is the List of cities in A ...
, 21-year-old Brian Tanner was charged with "theft of services" and had his laptop confiscated after accessing a gaming website at night from the parking lot outside the Palmer Public Library, as he was allowed to do during the day. The night before, the police had asked him to leave the parking lot, which he had started using because they had asked him not to use residential connections in the past. He was not ultimately charged with theft, but could still be charged with trespassing or not obeying a police order. The library director said that Tanner had not broken any rules, and local citizens criticized police for their actions.
Legislation
In 2003, the New Hampshire
New Hampshire ( ) is a U.S. state, state in the New England region of the Northeastern United States. It borders Massachusetts to the south, Vermont to the west, Maine and the Gulf of Maine to the east, and the Canadian province of Quebec t ...
House Bill 495 was proposed, which would clarify that the duty to secure the wireless network lies with the network owner, instead of criminalizing the automatic access of open networks. It was passed by the New Hampshire House in March 2003 but was not signed into law. The current wording of the law provides some affirmative defense
An affirmative defense to a civil lawsuit or criminal charge is a fact or set of facts other than those alleged by the plaintiff or prosecutor which, if proven by the defendant, defeats or mitigates the legal consequences of the defendant's ...
s for use of a network that is not explicitly authorized:
There are additional provisions in the NH law, Section 638:17 Computer Related Offenses, as found by searching NH RSA's in December 2009. They cover actual use of someone else's computer rather than simply "access":
New York
New York most commonly refers to:
* New York (state), a state in the northeastern United States
* New York City, the most populous city in the United States, located in the state of New York
New York may also refer to:
Places United Kingdom
* ...
law is the most permissive. The statute against unauthorized access only applies when the network "is equipped or programmed with any device or coding system, a function of which is to prevent the unauthorized use of said computer or computer system". In other words, the use of a network would only be considered unauthorized and illegal if the network owner had enabled encryption or password protection and the user bypassed this protection, or when the owner has explicitly given notice that use of the network is prohibited, either orally or in writing. Westchester County
Westchester County is a county located in the southeastern portion of the U.S. state of New York, bordering the Long Island Sound and the Byram River to its east and the Hudson River on its west. The county is the seventh most populous cou ...
passed a law, taking effect in October 2006, that requires any commercial business that stores, utilizes or otherwise maintains personal information electronically to take some minimum security measures (e.g., a firewall, SSID
In IEEE 802.11 wireless local area networking standards (including Wi‑Fi), a service set is a group of wireless network devices which share a ''service set identifier'' (''SSID'')—typically the natural language label that users see as a netw ...
broadcasting disabled, or using a non-default SSID) in an effort to fight identity theft
Identity theft, identity piracy or identity infringement occurs when someone uses another's personal identifying information, like their name, identifying number, or credit card number, without their permission, to commit fraud or other crimes. ...
. Businesses that do not secure their networks in this way face a $500 fine. The law has been criticized as being ineffectual against actual identity thieves and punishing businesses like coffee house
A coffeehouse, coffee shop, or café (), is an establishment that serves various types of coffee, espresso, latte, Caffè americano, americano and cappuccino, among other hot beverages. Many coffeehouses in West Asia offer ''shisha'' (actually ...
s for normal business practices.
See also
* Piggybacking (Internet access)
* Wardriving
References
{{reflist
Wireless networking
Wireless access points
Piggybacking