Skip to main content
Log in

Theft in a wireless world

  • Published:
Ethics and Information Technology Aims and scope Submit manuscript

Abstract

I explore philosophically the phenomenon of home wireless networks as used to share broadband Internet connections. Because such networks are frequently unsecured, third parties can use them to access the Internet. Here I consider carefully whether this kind of behaviour should be properly called theft. I begin with a brief non-technical introduction to 802.11 wireless networks. Subsequently, I present a four part argument – appealing to the unsecured nature of the networks discussed, entrenched software and hardware behaviours, trespass law, and the openness of ‹public park’ spectrum – suggesting that this kind of behaviour is permissible and should not be construed as theft. Substantively, I conclude that, despite the quite compelling considerations that these arguments bring to bear, this behaviour is theft. Additionally, I draw attention to significant flaws in the design and implementation of wireless technology (specifically in the out-of-the-box configuration for wireless access points and in the wireless connectivity of early versions of Windows XP) that facilitate the intentional and unintentional theft of Internet bandwidth. I suggest some simple mechanisms that could be incorporated into the technology which would serve to remove the ethical ambiguity in its usage by third parties, including adding the ability for a network owner to explicitly mark her network as not for public use,␣and changes to default hardware and software behaviours. I conclude by encouraging increased use of value-sensitive design practices in the development of future wireless technologies.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

Abbreviations

ACA:

Australian Communications Authority

CD:

Compact Disc

IEEE:

Institute of Electrical and Electronics Engineers

ISM:

International Scientific and Medical

WEP:

Wired Equivalent Privacy

Wi-Fi:

Wireless Fidelity

WPA-PSK:

Wi-Fi Protected Access Pre-Shared Key

References

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Luc Small.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Small, L. Theft in a wireless world. Ethics Inf Technol 9, 179–186 (2007). https://doi.org/10.1007/s10676-007-9139-1

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10676-007-9139-1

Keywords

Navigation