Paul Timmins and Adam Botbyl stumbled onto an unsecured wireless fidelity (Wi-Fi) network while looking for wireless access points in 2003. Timmins wanted to check his email on his laptop. He later claimed that when he tried to surf the Web, he was routed to a corporate portal of Lowe's, the second-largest home improvement retailer in the U.S. Botbyl then returned with Brian Salcedo to access Lowe's corporate data center, as well as local networks at stores in six states. These roaming users allegedly accessed consumer credit information. The following year, Timmins pled guilty to a misdemeanor for checking his email through Lowe's network, the first criminal conviction for wardriving in the U.S. He was sentenced to two years probation. Botbyl pled guilty to one count of conspiracy and was sentenced to 26 months in federal prison followed by two years on parole. Salcedo pled guilty to conspiracy, transmitting computer code to cause damage to a computer, unauthorized computer access, and computer fraud and was sentenced to nine years in federal prison.
"Wireless technology," according to [2] "has opened the largest computer network security hole since the advent of modems." The use of Wi-Fi networks is increasing worldwide, projected to reach 707 million users by 2008, according to Pyramid Research. In 2004, approximately 5% of Americans had wireless local area networks (WLANs) in their homes [7]. Here, we compare the perspectives of roaming users and organizational providers who may incur financial costs, be subject to security risks, and potentially be held legally liable for user activity. We characterize types of roaming users in order to analyze the applicability of existing laws enacted before the advent of wireless technology. While protection is provided to organizations for malicious or destructive wireless hackers (whackers), laws are generally favorable to roaming users. In response, we call for a national (U.S.) public policy and ultimately a global solution to the risk of wireless intrusion.
Roaming users' views (see Table 1) provide insight into the motivation for, and defense of, roaming use:
Providers of wireless access are responsible for proper management of this resource. Organizations may see operational benefits (see Table 1) but also have concerns:
We characterize unauthorized roaming use along two dimensionsintentional or unintentional access and secured or unsecured Wi-Fi networkswhen determining whether such use is legal. The four combinations result in Cells IIV (see the Figure here):
Cell 1 (Whacking). Intentional access of secured wireless networks. Whackers may engage in destructive, malicious, theft, espionage, or entertainment activities. Organizations and ISPs could be liable for unwittingly partaking in illegal activities (such as spamming, sharing copyrighted files, accessing pornography, port scanning for vulnerable services on an Internet host, stealing, modifying, deleting, or viewing data, and otherwise causing harm;
Cell 2 (Joyriding). Intentional access of unsecured wireless networks. Joyriders are roaming users who intentionally access an unsecured wireless network without express prior consent. Indeed, a survey of 228,537 access points worldwide by participants in the 2004 "WorldWide WarDrive" (www.worldwidewardrive.org) revealed that only 38.3% had enabled wired equivalent privacy (WEP), a native security mechanism in the 802.11 WLAN standard. The GAO reported that a test of six federal agencies detected signal leakage at all six and that 13 of 24 major federal agencies do not require Wi-Fi networks to be secured;
Cell 3 (Accidental riding). Unintentional access of unsecured wireless networks. When unintentionally connecting to an unsecured Wi-Fi network, accidental riders may not realize the connection was made or believe it was made through their own networks; for example, the Microsoft Windows XP operating system contains a "zero configuration" feature to facilitate connecting to Wi-Fi networks, but this feature can also cause a user to connect unintentionally. Such use does not constitute "intentional" access required by most statutes; and
Cell 4 (Accidental intruder). Unintentional access of secured wireless networks. Accidental intruders "accidentally" or unintentionally gain access to a secured network. Such access is unlikely because a secured network would likely prompt for a username and password for user authentication, alerting the user to the presence of security. Such access could result from a security flaw.
Wardriving and warchalking. Wardrivers are not a type of roaming user, based on the narrow definition (limited to access-point identification) provided by the wardriving community [6]. U.S. Federal Bureau of Investigation agent Bill Shore unofficially warned in 2002 that identification of access points may not be illegal, but actual access may be a criminal violation of the Federal Computer Fraud and Abuse Statute, Theft of Trade Secrets, and other federal statutes. Wardriving may lead to warchalking, which may indeed constitute an invasion of the provider's privacy. Chalking the location of an open access point, without authorization, has been compared to placing a sign in front of a home that says "This door is unlocked; there is no security" [9].
The legal protection of an organization's Wi-Fi network from unauthorized roaming use is unclear. Legal acceptability depends on whether roaming use is an intentional intrusion by the user and unauthorized by the provider. However, what constitutes intentional and unauthorized Wi-Fi access is not explicitly defined by most legal jurisdictions.
We focus primarily on protections from joyriders and accidental usersCells IIIV in the figure. Existing laws apply to whackersCell Iin the same way they apply to a hacker who intentionally gains unauthorized access to a network, whether wired or wireless, making whacking illegal. The results of our analysis are outlined in Table 2.
Federal law. Applicable federal laws include the Computer Fraud and Abuse Act (CFAA) of 1986 and the Electronic Communications Privacy Act (ECPA) of 1986, both enacted before wireless technology came into widespread use.
The CFAA, which prohibits intentional, unauthorized access to a computer, appears to apply to Cell I (whackers) and Cell II (joyriders who engage in a high volume of downloading); Cells III and IV are not included because such users lack intent. The CFAA requires the standard of "wrongful intent" by the user, among other legal criteria. For subsection 1030(a)(5)(A)(i) to be applicable, a user must "intend" to cause damage; it would seem this section applies only to whackers (Cell I), whose activities are damaging. However, joyriders (Cell II) may also fall within this realm if excessive file downloading resulted in, say, damage exceeding the required minimum of $5,000 over the course of a year. The cost of excessive use includes bandwidth and processing power, coupled with costs related to slowed performance for other users (such as customers).
The ECPA, which prohibits intentional unauthorized interception of encrypted communications, may apply to whackers (Cell I). Whackers who intentionally access secure Wi-Fi networks and encrypted content may be subject to federal penalties. The ECPA does not apply to Cell II (joyriders) and Cell III (accidental riders) using unsecured Wi-Fi connections with no encryption capabilities enabled. Similarly, the ECPA does not apply to Cell IV because accidental intruders lack the legal intent criterion.
Meanwhile, various state criminal statutes supplement federal law, prohibiting access to networks, theft of service, interruption or degradation of service, interception of communications, and facilitation of access to networks (see Table 2). As with the CFAA, intent is often a key element in legally determining whether a criminal violation was committed by a roaming user.
In state common law, uninvited roaming users could be trespassing. According to the common law Restatement (Second) of Torts, b 217, "[a] trespass to chattel, [or personal property], may be committed by intentionally:
Trespass to chattels has not been applied to roaming use but could be applied to all types of roaming users in a future criminal prosecution.
Table 3 outlines our own recommendations for roaming use. "Security is the paramount concern in evaluating any...wireless offering" [11]. Security measures include encryption software, firewalls, authenticating user devices, and virtual private networks for password protection. However, the three main security protocolsWEP, Wi-Fi Protected Access and Extensible Authentication Protocol, and Cisco Systems' proprietary implementation Lightweight EAP, or LEAhave all been hacked [1]. Periodic monitoring of security measures detect unauthorized devices, inappropriate communications, and signal leakage to help assure compliance with ISP user agreements and security provisions in the law. Training and support for employee use from home and while in transit is fundamental to securing home networks and portable access devices. Acceptable use of publicly accessible Wi-Fi should state what information may be communicated. An enterprisewide wireless plan should provide standardization, allowing improved implementation, management, and support.
It may seem to roaming users that the burden of responsibility should be on the broadcaster, since wireless devices may access the first signal detected. Such access is unintended but could become intentional, with unclear legal consequences to the user.
Ubiquity in publicly accessible wireless networks must be encouraged to increase value to society. Roaming users should not be responsible for determining whether a connection is achieved through a public or private network. Wi-Fi network providers should be responsible for reasonably managing their resources and protecting against unauthorized use.
We would all be better off with open Wi-Fi access, facilitating greater mobility, information access, and efficiency. This position is unobjectionable as long as public use is intended. Unauthorized use can subject roaming users to civil and criminal liability. Organizations are exposed to potential system disruption and degradation, increased costs, security risk, and liability to third parties. National legislation, and ultimately a global solution, must therefore balance the competing interests of roaming users vs. the proprietary rights of organizational Wi-Fi network providers.
1. Berghel, H. and Uecker, J. WiFi attack vectors. Commun. ACM 48, 8 (Aug. 2005), 2128.
2. Berghel, H. Wireless infidelity I: War driving. Commun. ACM 47, 9 (Sept. 2004), 2126.
3. Frost & Sullivan. Free Hotspots Restrict Revenues for Wi-Fi service Providers. Presss Release, July 30, 2003; www.frost.com/prod/servlet/press-release.pag?docid=5115637&ctxixpLink=FcmCtx6 &ctxixpLabel=FcmCtx7.
4. Goldsborough, R. Leveraging the Internet's marketplace of ideas. Tech Directions 64, 5 (Dec. 2004), 9.
5. Hines, M. Worried about Wi-Fi security? CNET News.com (Jan. 19, 2005); news.com.com/Worried+about+Wi-Fi+security/2100-7347_3-5540969.html.
6. Hurley, C., Puchol, M. (Ed.), Rogers, R., and Thornton, F. WarDriving: Drive, Detect, Defend, A Guide to Wireless Security. Syngress Publishing, Inc., Rockland, MA, 2004.
7. Kapica, J. Consumers still hazy on Wi-Fi facts: Study. Globeandmail.com, a division of CTVglobalmedia Publishing, Inc., Toronto (Feb. 25, 2004); www.globetechnology.com/servlet/story/RTGAM.20040225.gtWi-ifeb25/ BNStory /Technology.
8. Mullins, M. Be aware of wireless threats. TechRepublic, a CNET Networks site (Oct. 21, 2005); insight.zdnet.co.uk/communications/wireless/0,39020430,39232729,00.htm.
9. Ryan, P. War, peace, or stalemate: Wargames, wordily, wardriving, and the emerging market for hacker ethics. Virginia Journal of Law & Technology 9, 7 (Summer 2004), 157.
10. Webb, R. The untethered business. Communication News 42, 3 (Mar. 2005), 50.
11. Zenel, B. and Toy, A. Enterprise-grade wireless. Queue 3, 4 (May 2005), 3037.
Table 1. Roaming-user vs. organizational perspective.
Table 2. Applicability of U.S. law to wardriving and roaming use.
©2007 ACM 0001-0782/07/0800 $5.00
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. To copy otherwise, to republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee.
The Digital Library is published by the Association for Computing Machinery. Copyright © 2007 ACM, Inc.
No entries found