Abstract
I explore philosophically the phenomenon of home wireless networks as used to share broadband Internet connections. Because such networks are frequently unsecured, third parties can use them to access the Internet. Here I consider carefully whether this kind of behaviour should be properly called theft. I begin with a brief non-technical introduction to 802.11 wireless networks. Subsequently, I present a four part argument – appealing to the unsecured nature of the networks discussed, entrenched software and hardware behaviours, trespass law, and the openness of ‹public park’ spectrum – suggesting that this kind of behaviour is permissible and should not be construed as theft. Substantively, I conclude that, despite the quite compelling considerations that these arguments bring to bear, this behaviour is theft. Additionally, I draw attention to significant flaws in the design and implementation of wireless technology (specifically in the out-of-the-box configuration for wireless access points and in the wireless connectivity of early versions of Windows XP) that facilitate the intentional and unintentional theft of Internet bandwidth. I suggest some simple mechanisms that could be incorporated into the technology which would serve to remove the ethical ambiguity in its usage by third parties, including adding the ability for a network owner to explicitly mark her network as not for public use,␣and changes to default hardware and software behaviours. I conclude by encouraging increased use of value-sensitive design practices in the development of future wireless technologies.
Similar content being viewed by others
Abbreviations
- ACA:
-
Australian Communications Authority
- CD:
-
Compact Disc
- IEEE:
-
Institute of Electrical and Electronics Engineers
- ISM:
-
International Scientific and Medical
- WEP:
-
Wired Equivalent Privacy
- Wi-Fi:
-
Wireless Fidelity
- WPA-PSK:
-
Wi-Fi Protected Access Pre-Shared Key
References
Attorney General’s Department. Criminal Code Act 1995. In Office of Legislative Drafting and Publishing, http://www.comlaw.gov.au/ComLaw/Legislation/ActCompilation1.nsf/framelodgmentattachments/2088CEAEEE78C 48BCA25725C00838526 (accessed 7 February, 2007), 2006
Australian Communications Authority. Wireless Local Area Networks: Frequently Asked Questions. In https:// www.aca.gov.au/consumer_info/frequently_asked_questions/WLANs_FAQ.pdf (accessed 22 June, 2005), 2004
N. Borisov, I. Goldberg and D. Wagner. Security of the Wep Algorithm. In http://www.isaac.cs.berkeley.edu/isaac/wep-faq.html (accessed 7 February, 2007)
Bradbrook, A., MacCallum, S., Moore, A. Australian Property Law: Cases and Materials. 2nd ed. Sydney: Thomson Lawbook Co, 2003
J.C. Dvorak. The Looming Legal Threat to Wi-Fi. In http://www.pcmag.com/article2/0,1759,1565274,00.asp?k c=PCRSS03079TX1K0000584 (accessed 22 June, 2005), 2004
S. Fogie, Cracking Wi-Fi Protected Access (WPA), Part 1. In http://www.informit.com/articles/printerfriendly.asp? p=369221&rl=1 (accessed 7 February, 2007), 2005
S. Fogie, Cracking Wi-Fi Protected Access (WPA), Part 2. In http://www.informit.com/articles/printerfriendly.asp? p=370636&rl=1 (accessed 7 February, 2007), 2005
Friedman, B. (1996) Value-Sensitive Design. Interactions 3(6): 16–23
Law Reform Commission. Discussion Paper 22 (1991) – Community Law Reform Program: Neighbour and Neighbour Relations. In http://www.lawlink.nsw.gov.au/lrc.nsf/pages/DP22CHP3 (accessed 22 June, 2005), 2002
Ministry of Justice. Theft Act 1968 (C. 60). In Ministry of Justice, http://www.statutelaw.gov.uk/content.aspx? activeTextDocId=1204238 (accessed 30 July, 2007), 1991
H. Nissenbaum. How Computer Systems Embody Values. Computer, 118–120, March 2001
S. Schiesel. Growth of Wireless Internet Opens New Path for Thieves. The New York Times, 19 March 2005