Unsecured wireless network

Posted on 2011-05-11
Medium Priority
Last Modified: 2012-05-11
what would be the legal and ethical implications if I was use a unsercued wireless network without permission?
Question by:mc87
LVL 22

Expert Comment

by:Jakob Digranes
ID: 35736250
it's hard to pinpoint any legal threats - as laws are different i most countries.
There's no law directly pinpointed at using unsecured wireless networks.

When it comes to ethical - if this is a home user, you're just a cheating of his or hers bandwidth, which is not nice. If this is a company - (shame on the business!!), you can consider yourself somewhat trespassing ... But if it is a business; they might need that wake up call of users on their wireless.
For home user - they wouldn't know better -- too bad.
My advice - stay out, for being nice
Stay out - for YOUR security !! all wireless traffic you send is unencrypted. Maybe the unsecured wireless is a honey pot for stealing your usernames and password? pop, ftp and some websites send username/password in clear text - easy to read for anyone ...

so --- stay away
LVL 88

Expert Comment

ID: 35736368
Here in Switzerland the owner of the unsecured wireless AP is responsible. So if you connect to his unsecured connection you aren't at fault unless there is a disclaimer that shows up when you connect. Many Companies provide an unsecured wireless hotspot for visitors, but have a disclaimer pop up when you connect to it, which will only allow you to use it once you have agreed to it. That then makes you responsible...

Expert Comment

ID: 35736460
In Sweden it is not against the law to use an unsecured network, since the air that contains the signals do not belong to anyone person it is the responsibility of the network ower to secure his network. However if you damage anything in the network you are ofcource responible for your actions just as all outher vandals are who break things in a public places.

It is ALWAYS the owner of the internet connection who is responsible for what anyone uses the internet connection for. And if the owner can not prove that anyone else has used his network he is ofcource responible. I am shure that you signed an agreement with your ISP when you became a custemer with that company.
Put Machine Learning to Work--Protect Your Clients

Machine learning means Smarter Cybersecurity™ Solutions.
As technology continues to advance, managing and analyzing massive data sets just can’t be accomplished by humans alone. It requires huge amounts of memory and storage, as well as the high-speed power of the cloud.

LVL 22

Expert Comment

by:Jakob Digranes
ID: 35736506
@tresss: You cannot be held responsible for any actions or harm done to a network on an unsecured wireless network. First of all, it's the owner of the network is responsible for securing it, and secondly - he's not able to trace or audit who did the wrongdoings on the network

LVL 16

Accepted Solution

AlexPace earned 2000 total points
ID: 35738414
Ethically you could look at it like this:  

The wireless access point is broadcasting a beacon into your space and sending electromagnetic radiation through your body.  So, in a sense, their network is tresspassing in YOU.  Also, iIf they were broadcasting sound waves instead of a radio waves you would have no choice but to listen to it.  Your computer is basically "listening" to the wireless network radio waves and also sending it own radio waves.
LVL 16

Expert Comment

ID: 36166097
Something ethical may not be legal, for example physician-assisted suicide for terminally ill patients in horrible pain.

The US Justice Department has challenged Google to justify the fact that their mapping vans secretely created a map of unsecured WiFi networks across the nation and hinted this might be an illegal wiretap.  Meanwhile, the government's own use of warantless wiretaps is at an all-time high.  

Ethical != Legal

Featured Post

NFR key for Veeam Backup for Microsoft Office 365

Veeam is happy to provide a free NFR license (for 1 year, up to 10 users). This license allows for the non‑production use of Veeam Backup for Microsoft Office 365 in your home lab without any feature limitations.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

If you thought ransomware was bad, think again! Doxware has the potential to be even more damaging.
Sometimes clients can lose connectivity with the Lotus Notes Domino Server, but there's not always an obvious answer as to why it happens.   Read this article to follow one of the first experiences I had with Lotus Notes on a client's machine, my…
This Micro Tutorial will show you how to maximize your wireless card to its maximum capability. This will be demonstrated using Intel(R) Centrino(R) Wireless-N 2230 wireless card on Windows 8 operating system.
Viewers will learn how to connect to a wireless network using the network security key. They will also learn how to access the IP address and DNS server for connections that must be done manually. After setting up a router, find the network security…
Suggested Courses

862 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question