Ryan Rix wrote:
Benjamin Francom wrote:
I came across this pretty amusing link about deterring your neighbors
from stealing your Internet.
It involved splitting the network, iptables, and some redirection.
http://www.ex-parrot.com/~pete/upside-down-ternet.html
I tried that last year... my parents were NOT happy :D
13-2316. _Computer tampering; venue; forfeiture; classification_
A. *A person who acts *_*without authority*_* or who *_*exceeds
authorization*_* of use commits computer tampering by:*
/READERS NOTE: Accessing a public wi-fi in a place such as as a coffee
shop COULD fall under section A because there may be an IMPLIED
authorization that the connection is for customers. Common sense would
dictate that a shop owner who puts in public wifi is doing so for the
convenience of customers while they are doing business with the shop,
not everyone in the neighborhood that is within range of the shops AP!/
1.
*Accessing,* altering, damaging or destroying any computer,
computer system or *network*, *or any part of a* computer,
computer system or *network*, _*with the intent*_* to devise or
*_*execute any scheme*_* or artifice to defraud* or deceive, or
to control property or services by means of false or fraudulent
pretenses, representations or promises.
2.
*Knowingly altering, *damaging, deleting or destroying computer
programs or* data.*
/_READERS NOTE: Modifying someone's router settings or logs OR
SIMPLY using someone's connection to get to the Internet could
fall under these sections, I read this as the "INTENT TO EXECUTE
WITHOUT AUTHORITY, A SCHEME" . That "SCHEME" being to use
someone else's system to access the internet. A class 3 felony
carrying up to a 31/2 year sentence if convicted!_/
3. Knowingly introducing a computer contaminant into any computer,
computer system or network.
4. Recklessly disrupting or causing the disruption of computer,
computer system or network services or denying or causing the denial
of computer or network services to any authorized user of a computer,
computer system or network.
5. Recklessly using a computer, computer system or network to engage
in a scheme or course of conduct that is directed at another person
and that seriously alarms, torments, threatens or terrorizes the
person. For the purposes of this paragraph, the conduct must both:
(a) Cause a reasonable person to suffer substantial emotional distress.
(b) Serve no legitimate purpose.
6. Preventing a computer user from exiting a site, computer system or
network-connected location in order to compel the user's computer to
continue communicating with, connecting to or displaying the content
of the service, site or system.
7. Knowingly obtaining any information that is required by law to be
kept confidential or any records that are not public records by
accessing any computer, computer system or network that is operated by
this state, a political subdivision of this state or a medical
institution.
*8. Knowingly accessing any* computer, computer system or *network *or
any computer software, program or data that is contained in a
computer, computer system or network.
/*READERS NOTE: Paragraph 8 is THE Mother Load! -- You cannot
KNOWNINGLY access a network without authority... PERIOD! A conviction
on this class 3 felony could land you in prison for 11/2 years! */
B. In addition to section 13-109, a prosecution for a violation of
this section may be tried in any of the following counties:
1. The county in which the victimized computer, computer system or
network is located.
2. The county in which the computer, computer system or network that
was used in the commission of the offense is located or in which any
books, records, documents, property, financial instruments, computer
software, data, access devices or instruments of the offense were used.
3. The county in which any authorized user was denied service or in
which an authorized user's service was interrupted.
4. The county in which critical infrastructure resources were tampered
with or affected.
*C. On conviction of a violation of this section, the court shall
order that any computer system or instrument of communication that was
owned or used exclusively by the defendant and that was used in the
commission of the offense be forfeited and sold, destroyed or
otherwise properly disposed. READER'S NOTE: Say GOODBYE to the
equipment you used to steal your connection.*
D. A violation of subsection A, paragraph 6 of this section
constitutes an unlawful practice under section 44-1522 and is in
addition to all other causes of action, remedies and penalties that
are available to this state. The attorney general may investigate and
take appropriate action pursuant to title 44, chapter 10, article 7.
E. _*Computer tampering pursuant to subsection A, paragraph 1 of this
section is a class 3 felony*_. Computer tampering pursuant to
subsection A, paragraph 2, 3 or 4 of this section is a class 4 felony,
unless the computer, computer system or network tampered with is a
critical infrastructure resource, in which case it is a class 2
felony. Computer tampering pursuant to subsection A, paragraph 5 of
this section is a class 5 felony. _*Computer tampering pursuant to
subsection A, paragraph 7 or 8 of this section is a class 6 felony.*_
---------------------------------------------------
PLUG-discuss mailing list - PLUG-discuss@lists.plug.phoenix.az.us
To subscribe, unsubscribe, or to change your mail settings:
http://lists.PLUG.phoenix.az.us/mailman/listinfo/plug-discuss