Neighbors Leeching Off Your Wireless? "Try Upside-Down-Ternet" - THE LAW

wayne waydavis at cox.net
Sat Aug 29 18:51:51 MST 2009


Ryan Rix wrote:
> Benjamin Francom wrote:
>   
>> I came across this pretty amusing link about deterring your neighbors
>> from stealing your Internet.
>> It involved splitting the network, iptables, and some redirection.
>>
>> http://www.ex-parrot.com/~pete/upside-down-ternet.html
>>     
>
> I tried that last year... my parents were NOT happy :D
>
>   
>
> 13-2316. _Computer tampering; venue; forfeiture; classification_
>
> A. *A person who acts *_*without authority*_* or who *_*exceeds 
> authorization*_* of use commits computer tampering by:*
>
> /READERS NOTE: Accessing a public wi-fi in a place such as as a coffee 
> shop COULD fall under section A because there may be an IMPLIED 
> authorization that the connection is for customers. Common sense would 
> dictate that a shop owner who puts in public wifi is doing so for the 
> convenience of customers while they are doing business with the shop, 
> not everyone in the neighborhood that is within range of the shops AP!/
>
>   1.
>
>       *Accessing,* altering, damaging or destroying any computer,
>       computer system or *network*, *or any part of a* computer,
>       computer system or *network*, _*with the intent*_* to devise or
>       *_*execute any scheme*_* or artifice to defraud* or deceive, or
>       to control property or services by means of false or fraudulent
>       pretenses, representations or promises.
>
>   2.
>
>       *Knowingly altering, *damaging, deleting or destroying computer
>       programs or* data.*
>
>       /_READERS NOTE: Modifying someone's router settings or logs OR
>       SIMPLY using someone's connection to get to the Internet could
>       fall under these sections, I read this as the "INTENT TO EXECUTE
>       WITHOUT AUTHORITY, A SCHEME" . That "SCHEME" being to use
>       someone else's system to access the internet. A class 3 felony
>       carrying up to a 31/2 year sentence if convicted!_/
>
> 3. Knowingly introducing a computer contaminant into any computer, 
> computer system or network.
>
> 4. Recklessly disrupting or causing the disruption of computer, 
> computer system or network services or denying or causing the denial 
> of computer or network services to any authorized user of a computer, 
> computer system or network.
>
> 5. Recklessly using a computer, computer system or network to engage 
> in a scheme or course of conduct that is directed at another person 
> and that seriously alarms, torments, threatens or terrorizes the 
> person. For the purposes of this paragraph, the conduct must both:
>
> (a) Cause a reasonable person to suffer substantial emotional distress.
>
> (b) Serve no legitimate purpose.
>
> 6. Preventing a computer user from exiting a site, computer system or 
> network-connected location in order to compel the user's computer to 
> continue communicating with, connecting to or displaying the content 
> of the service, site or system.
>
> 7. Knowingly obtaining any information that is required by law to be 
> kept confidential or any records that are not public records by 
> accessing any computer, computer system or network that is operated by 
> this state, a political subdivision of this state or a medical 
> institution.
>
> *8. Knowingly accessing any* computer, computer system or *network *or 
> any computer software, program or data that is contained in a 
> computer, computer system or network.
>
> /*READERS NOTE: Paragraph 8 is THE Mother Load! -- You cannot 
> KNOWNINGLY access a network without authority... PERIOD! A conviction 
> on this class 3 felony could land you in prison for 11/2 years! */
>
> B. In addition to section 13-109, a prosecution for a violation of 
> this section may be tried in any of the following counties:
>
> 1. The county in which the victimized computer, computer system or 
> network is located.
>
> 2. The county in which the computer, computer system or network that 
> was used in the commission of the offense is located or in which any 
> books, records, documents, property, financial instruments, computer 
> software, data, access devices or instruments of the offense were used.
>
> 3. The county in which any authorized user was denied service or in 
> which an authorized user's service was interrupted.
>
> 4. The county in which critical infrastructure resources were tampered 
> with or affected.
>
> *C. On conviction of a violation of this section, the court shall 
> order that any computer system or instrument of communication that was 
> owned or used exclusively by the defendant and that was used in the 
> commission of the offense be forfeited and sold, destroyed or 
> otherwise properly disposed. READER'S NOTE: Say GOODBYE to the 
> equipment you used to steal your connection.*
>
> D. A violation of subsection A, paragraph 6 of this section 
> constitutes an unlawful practice under section 44-1522 and is in 
> addition to all other causes of action, remedies and penalties that 
> are available to this state. The attorney general may investigate and 
> take appropriate action pursuant to title 44, chapter 10, article 7.
>
> E. _*Computer tampering pursuant to subsection A, paragraph 1 of this 
> section is a class 3 felony*_. Computer tampering pursuant to 
> subsection A, paragraph 2, 3 or 4 of this section is a class 4 felony, 
> unless the computer, computer system or network tampered with is a 
> critical infrastructure resource, in which case it is a class 2 
> felony. Computer tampering pursuant to subsection A, paragraph 5 of 
> this section is a class 5 felony. _*Computer tampering pursuant to 
> subsection A, paragraph 7 or 8 of this section is a class 6 felony.*_
>

-------------- next part --------------
An HTML attachment was scrubbed...
URL: http://lists.PLUG.phoenix.az.us/pipermail/plug-discuss/attachments/20090829/9a1b3c96/attachment.htm 


More information about the PLUG-discuss mailing list