Ryan Rix wrote: > Benjamin Francom wrote: > >> I came across this pretty amusing link about deterring your neighbors >> from stealing your Internet. >> It involved splitting the network, iptables, and some redirection. >> >> http://www.ex-parrot.com/~pete/upside-down-ternet.html >> > > I tried that last year... my parents were NOT happy :D > > > > 13-2316. _Computer tampering; venue; forfeiture; classification_ > > A. *A person who acts *_*without authority*_* or who *_*exceeds > authorization*_* of use commits computer tampering by:* > > /READERS NOTE: Accessing a public wi-fi in a place such as as a coffee > shop COULD fall under section A because there may be an IMPLIED > authorization that the connection is for customers. Common sense would > dictate that a shop owner who puts in public wifi is doing so for the > convenience of customers while they are doing business with the shop, > not everyone in the neighborhood that is within range of the shops AP!/ > > 1. > > *Accessing,* altering, damaging or destroying any computer, > computer system or *network*, *or any part of a* computer, > computer system or *network*, _*with the intent*_* to devise or > *_*execute any scheme*_* or artifice to defraud* or deceive, or > to control property or services by means of false or fraudulent > pretenses, representations or promises. > > 2. > > *Knowingly altering, *damaging, deleting or destroying computer > programs or* data.* > > /_READERS NOTE: Modifying someone's router settings or logs OR > SIMPLY using someone's connection to get to the Internet could > fall under these sections, I read this as the "INTENT TO EXECUTE > WITHOUT AUTHORITY, A SCHEME" . That "SCHEME" being to use > someone else's system to access the internet. A class 3 felony > carrying up to a 31/2 year sentence if convicted!_/ > > 3. Knowingly introducing a computer contaminant into any computer, > computer system or network. > > 4. Recklessly disrupting or causing the disruption of computer, > computer system or network services or denying or causing the denial > of computer or network services to any authorized user of a computer, > computer system or network. > > 5. Recklessly using a computer, computer system or network to engage > in a scheme or course of conduct that is directed at another person > and that seriously alarms, torments, threatens or terrorizes the > person. For the purposes of this paragraph, the conduct must both: > > (a) Cause a reasonable person to suffer substantial emotional distress. > > (b) Serve no legitimate purpose. > > 6. Preventing a computer user from exiting a site, computer system or > network-connected location in order to compel the user's computer to > continue communicating with, connecting to or displaying the content > of the service, site or system. > > 7. Knowingly obtaining any information that is required by law to be > kept confidential or any records that are not public records by > accessing any computer, computer system or network that is operated by > this state, a political subdivision of this state or a medical > institution. > > *8. Knowingly accessing any* computer, computer system or *network *or > any computer software, program or data that is contained in a > computer, computer system or network. > > /*READERS NOTE: Paragraph 8 is THE Mother Load! -- You cannot > KNOWNINGLY access a network without authority... PERIOD! A conviction > on this class 3 felony could land you in prison for 11/2 years! */ > > B. In addition to section 13-109, a prosecution for a violation of > this section may be tried in any of the following counties: > > 1. The county in which the victimized computer, computer system or > network is located. > > 2. The county in which the computer, computer system or network that > was used in the commission of the offense is located or in which any > books, records, documents, property, financial instruments, computer > software, data, access devices or instruments of the offense were used. > > 3. The county in which any authorized user was denied service or in > which an authorized user's service was interrupted. > > 4. The county in which critical infrastructure resources were tampered > with or affected. > > *C. On conviction of a violation of this section, the court shall > order that any computer system or instrument of communication that was > owned or used exclusively by the defendant and that was used in the > commission of the offense be forfeited and sold, destroyed or > otherwise properly disposed. READER'S NOTE: Say GOODBYE to the > equipment you used to steal your connection.* > > D. A violation of subsection A, paragraph 6 of this section > constitutes an unlawful practice under section 44-1522 and is in > addition to all other causes of action, remedies and penalties that > are available to this state. The attorney general may investigate and > take appropriate action pursuant to title 44, chapter 10, article 7. > > E. _*Computer tampering pursuant to subsection A, paragraph 1 of this > section is a class 3 felony*_. Computer tampering pursuant to > subsection A, paragraph 2, 3 or 4 of this section is a class 4 felony, > unless the computer, computer system or network tampered with is a > critical infrastructure resource, in which case it is a class 2 > felony. Computer tampering pursuant to subsection A, paragraph 5 of > this section is a class 5 felony. _*Computer tampering pursuant to > subsection A, paragraph 7 or 8 of this section is a class 6 felony.*_ >