Neighbors Leeching Off Your Wireless? "Try Upside-Down-Ternet" - THE LAW
wayne
waydavis at cox.net
Sat Aug 29 18:51:51 MST 2009
Ryan Rix wrote:
> Benjamin Francom wrote:
>
>> I came across this pretty amusing link about deterring your neighbors
>> from stealing your Internet.
>> It involved splitting the network, iptables, and some redirection.
>>
>> http://www.ex-parrot.com/~pete/upside-down-ternet.html
>>
>
> I tried that last year... my parents were NOT happy :D
>
>
>
> 13-2316. _Computer tampering; venue; forfeiture; classification_
>
> A. *A person who acts *_*without authority*_* or who *_*exceeds
> authorization*_* of use commits computer tampering by:*
>
> /READERS NOTE: Accessing a public wi-fi in a place such as as a coffee
> shop COULD fall under section A because there may be an IMPLIED
> authorization that the connection is for customers. Common sense would
> dictate that a shop owner who puts in public wifi is doing so for the
> convenience of customers while they are doing business with the shop,
> not everyone in the neighborhood that is within range of the shops AP!/
>
> 1.
>
> *Accessing,* altering, damaging or destroying any computer,
> computer system or *network*, *or any part of a* computer,
> computer system or *network*, _*with the intent*_* to devise or
> *_*execute any scheme*_* or artifice to defraud* or deceive, or
> to control property or services by means of false or fraudulent
> pretenses, representations or promises.
>
> 2.
>
> *Knowingly altering, *damaging, deleting or destroying computer
> programs or* data.*
>
> /_READERS NOTE: Modifying someone's router settings or logs OR
> SIMPLY using someone's connection to get to the Internet could
> fall under these sections, I read this as the "INTENT TO EXECUTE
> WITHOUT AUTHORITY, A SCHEME" . That "SCHEME" being to use
> someone else's system to access the internet. A class 3 felony
> carrying up to a 31/2 year sentence if convicted!_/
>
> 3. Knowingly introducing a computer contaminant into any computer,
> computer system or network.
>
> 4. Recklessly disrupting or causing the disruption of computer,
> computer system or network services or denying or causing the denial
> of computer or network services to any authorized user of a computer,
> computer system or network.
>
> 5. Recklessly using a computer, computer system or network to engage
> in a scheme or course of conduct that is directed at another person
> and that seriously alarms, torments, threatens or terrorizes the
> person. For the purposes of this paragraph, the conduct must both:
>
> (a) Cause a reasonable person to suffer substantial emotional distress.
>
> (b) Serve no legitimate purpose.
>
> 6. Preventing a computer user from exiting a site, computer system or
> network-connected location in order to compel the user's computer to
> continue communicating with, connecting to or displaying the content
> of the service, site or system.
>
> 7. Knowingly obtaining any information that is required by law to be
> kept confidential or any records that are not public records by
> accessing any computer, computer system or network that is operated by
> this state, a political subdivision of this state or a medical
> institution.
>
> *8. Knowingly accessing any* computer, computer system or *network *or
> any computer software, program or data that is contained in a
> computer, computer system or network.
>
> /*READERS NOTE: Paragraph 8 is THE Mother Load! -- You cannot
> KNOWNINGLY access a network without authority... PERIOD! A conviction
> on this class 3 felony could land you in prison for 11/2 years! */
>
> B. In addition to section 13-109, a prosecution for a violation of
> this section may be tried in any of the following counties:
>
> 1. The county in which the victimized computer, computer system or
> network is located.
>
> 2. The county in which the computer, computer system or network that
> was used in the commission of the offense is located or in which any
> books, records, documents, property, financial instruments, computer
> software, data, access devices or instruments of the offense were used.
>
> 3. The county in which any authorized user was denied service or in
> which an authorized user's service was interrupted.
>
> 4. The county in which critical infrastructure resources were tampered
> with or affected.
>
> *C. On conviction of a violation of this section, the court shall
> order that any computer system or instrument of communication that was
> owned or used exclusively by the defendant and that was used in the
> commission of the offense be forfeited and sold, destroyed or
> otherwise properly disposed. READER'S NOTE: Say GOODBYE to the
> equipment you used to steal your connection.*
>
> D. A violation of subsection A, paragraph 6 of this section
> constitutes an unlawful practice under section 44-1522 and is in
> addition to all other causes of action, remedies and penalties that
> are available to this state. The attorney general may investigate and
> take appropriate action pursuant to title 44, chapter 10, article 7.
>
> E. _*Computer tampering pursuant to subsection A, paragraph 1 of this
> section is a class 3 felony*_. Computer tampering pursuant to
> subsection A, paragraph 2, 3 or 4 of this section is a class 4 felony,
> unless the computer, computer system or network tampered with is a
> critical infrastructure resource, in which case it is a class 2
> felony. Computer tampering pursuant to subsection A, paragraph 5 of
> this section is a class 5 felony. _*Computer tampering pursuant to
> subsection A, paragraph 7 or 8 of this section is a class 6 felony.*_
>
-------------- next part --------------
An HTML attachment was scrubbed...
URL: http://lists.PLUG.phoenix.az.us/pipermail/plug-discuss/attachments/20090829/9a1b3c96/attachment.htm
More information about the PLUG-discuss
mailing list