The New York Times recently took a front-page swipe at the (Internet) age-old question of whether an unprotected wireless network amounts to an open invitation for any piggybacker who happens by with a laptop.
Theft of service?…Or victimless “crime” of convenience? At this point the question has become pretty much a philosophical one: Either you’re OK with catch-as-catch-can wireless…or you’re not. But the story did get me thinking about the issue again.
First off, the Times quoted Edwin Caroso, a 21-year-old Miami Dade College student: “I don’t think it’s stealing. I always find people out there who aren’t protecting their connection, so I just feel free to go ahead and use it.” Imagine the swell of pride in the chests of Mr. and Mrs. Caroso as they see their little Edwin being quoted in the nation’s newspaper of record espousing such irrefutable logic. That’s our boy — the knucklehead.
I’m not unreasonable: The occasional quick sip out of an unprotected wireless stream — you’ve got to do something important, you don’t have an alternative and you don’t leave any trash where you troll — doesn’t make you a bad person. But doing it all the time? Sorry, Mom and Dad, that makes the lad a petty thief, no matter how unselfconscious he may be about the practice.The notion that irresponsible wireless users deserve to have their service degraded by freeloaders — and that the service providers have no stake in the freeloading — has always struck me as suspect.
Which brings us to another point: Absent a sudden pandemic of security consciousness among the wireless user masses, what might be done to dramatically reduce the temptations presented to Caroso and his fellow travelers in the what’s-yours-is-mine crowd?For insight on the question I turned to security expert Joel Snyder, a frequent Network World contributor and senior partner at Opus One, a consulting firm in Tucson, Ariz.
This captures the gist of what he proposes:“Here’s an answer: Put a switch on the access point,” Snyder writes. “I don’t mean an on-off switch. I mean a ‘secure/insecure’ switch. If there are only two common configurations: one wide open and one with [Wi-Fi Protected Access]-Personal encryption, then put a switch on the box.”
–You’re just dying to defend Edwin, right? The address is firstname.lastname@example.org.