How to fend off the pigs

The New York Times recently took a front-page swipe at the (Internet) age-old question of whether an unprotected wireless network amounts to an open invitation for any piggybacker who happens by with a laptop.

Theft of service?…Or victimless “crime” of convenience? At this point the question has become pretty much a philosophical one: Either you’re OK with catch-as-catch-can wireless…or you’re not. But the story did get me thinking about the issue again.

First off, the Times quoted Edwin Caroso, a 21-year-old Miami Dade College student: “I don’t think it’s stealing. I always find people out there who aren’t protecting their connection, so I just feel free to go ahead and use it.” Imagine the swell of pride in the chests of Mr. and Mrs. Caroso as they see their little Edwin being quoted in the nation’s newspaper of record espousing such irrefutable logic. That’s our boy — the knucklehead.

I’m not unreasonable: The occasional quick sip out of an unprotected wireless stream — you’ve got to do something important, you don’t have an alternative and you don’t leave any trash where you troll — doesn’t make you a bad person. But doing it all the time? Sorry, Mom and Dad, that makes the lad a petty thief, no matter how unselfconscious he may be about the practice.The notion that irresponsible wireless users deserve to have their service degraded by freeloaders — and that the service providers have no stake in the freeloading — has always struck me as suspect.

Which brings us to another point: Absent a sudden pandemic of security consciousness among the wireless user masses, what might be done to dramatically reduce the temptations presented to Caroso and his fellow travelers in the what’s-yours-is-mine crowd?For insight on the question I turned to security expert Joel Snyder, a frequent Network World contributor and senior partner at Opus One, a consulting firm in Tucson, Ariz.

This captures the gist of what he proposes:“Here’s an answer: Put a switch on the access point,” Snyder writes. “I don’t mean an on-off switch. I mean a ‘secure/insecure’ switch. If there are only two common configurations: one wide open and one with [Wi-Fi Protected Access]-Personal encryption, then put a switch on the box.”

QuickLink: 069970

–You’re just dying to defend Edwin, right? The address is buzz@nww.com.

Would you recommend this article?

Share

Thanks for taking the time to let us know what you think of this article!
We'd love to hear your opinion about this or any other story you read in our publication.


Jim Love, Chief Content Officer, IT World Canada

Featured Download

Featured Articles

Cybersecurity in 2024: Priorities and challenges for Canadian organizations 

By Derek Manky As predictions for 2024 point to the continued expansion...

Survey shows generative AI is a top priority for Canadian corporate leaders.

Leaders are devoting significant budget to generative AI for 2024 Canadian corporate...

Related Tech News

Tech Jobs

Our experienced team of journalists and bloggers bring you engaging in-depth interviews, videos and content targeted to IT professionals and line-of-business executives.

Tech Companies Hiring Right Now