Feeds

US Wi-Fi piggybacking won't put you in pokey

Proposed bill likely to be blown down

The Power of One Infographic

A US politician who tried to make Wi-Fi piggybacking punishable with three years in jail looks set to have his proposed bill overturned.

Maryland-based LeRoy Myers proposed in the bill, heard last week, that those who used others' Wi-Fi connections without permission should face up to 36 months behind bars plus a fine of up to $1,000.

He also proposed that those who hacked into a password-protected system should face up to ten years in jail, and a fine of up to $10,000.

Myers' Wi-Fi network had recently fallen victim to his neighbour, according to local rag The Herald-Mail.

But Myers' attempts to get his bill passed appear to have since been thwarted by the local House Judiciary Committee, which has made it clear it will oppose the bill.

The Committee said that it's easy to make the mistake of logging on to someone else's network if you're within range, and it added that users not wanting random punters to use their bandwidth should just secure the connection in the first place.

There's been a great deal of dithering over whether Wi-Fi piggybacking is really a crime. In the UK, BT had originally prohibited connection-sharing, but then encouraged its customers to do just that as part of its deal with WiFi sharing company Fon.

A man from Chiswick, west London, was even arrested last August for using someone's unsecured connection while sitting on a wall outside their home, though the Met Police argued it wasn't part of a wider crackdown.

Two men were arrested in Northumbria last month for checking their emails and surfing seemingly innocent websites on someone else's connection. Police confirmed it was an offence, but released the pair on bail pending further enquiries. ®

The Power of One Brief: Top reasons to choose HP BladeSystem

More from The Register

next story
You! Pirate! Stop pirating, or we shall admonish you politely. Repeatedly, if necessary
And we shall go about telling people you smell. No, not really
UK Parliament rubber-stamps EMERGENCY data grab 'n' keep bill
Just 49 MPs oppose Drip's rushed timetable
MPs wave through Blighty's 'EMERGENCY' surveillance laws
Only 49 politcos voted against DRIP bill
EU's top data cops to meet Google, Microsoft et al over 'right to be forgotten'
Plan to hammer out 'coherent' guidelines. Good luck chaps!
US judge: YES, cops or feds so can slurp an ENTIRE Gmail account
Crooks don't have folders labelled 'drug records', opines NY beak
Delaware pair nabbed for getting saucy atop Mexican eatery
Burrito meets soft taco in alleged rooftop romp outrage
LightSquared backer sues FCC over spectrum shindy
Why, we might as well have been buying AIR
'Two-speed internet' storm turns FCC.gov into zero-speed website
Deadline for comments on net neutrality shake-up extended to Friday
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.
Mobile application security vulnerability report
The alarming realities regarding the sheer number of applications vulnerable to attack, and the most common and easily addressable vulnerability errors.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.