Icarus
Newbie
- Joined
- Oct 13, 2003
- Messages
- 1,829
- Reaction score
- 0
Law Student chiming in agian.
Can people stop saying that he "has" to do things you say. Most of your suggestions have good intent but are misguided.
As pertaining to wireless access, here you go.
After more research, laws are in place to prevent "war driving" which is when hackers drive around with a laptop on to see if they can get on a network.
It is the number 1 type of cybercrime, not counting filesharing.
Law enforcement agencies all around the world are cracking down on it, because it opens the door to other cybercrime, including identity theft.
Can people stop saying that he "has" to do things you say. Most of your suggestions have good intent but are misguided.
As pertaining to wireless access, here you go.
AN ACT relative to unauthorized access to a wireless computer network.
1 Computer Related Offenses; Network Security. Amend RSA 638:17, I to read as follows:
I.(a) A person is guilty of the computer crime of unauthorized access to a computer or computer network when, knowing that the person is not authorized to do so, he or she knowingly accesses or causes to be accessed any computer or computer network without authorization. It shall be an affirmative defense to a prosecution for unauthorized access to a computer or computer network that:
[(a)] (1) The person reasonably believed that the owner of the computer or computer network, or a person empowered to license access thereto, had authorized him or her to access; or
[(b)] (2) The person reasonably believed that the owner of the computer or computer network, or a person empowered to license access thereto, would have authorized the person to access without payment of any consideration; or
[(c)] (3) The person reasonably could not have known that his or her access was unauthorized.
After more research, laws are in place to prevent "war driving" which is when hackers drive around with a laptop on to see if they can get on a network.
It is the number 1 type of cybercrime, not counting filesharing.
Law enforcement agencies all around the world are cracking down on it, because it opens the door to other cybercrime, including identity theft.