<s>
Piggybacking	B-General_Concept
on	O
Internet	O
access	O
is	O
the	O
practice	O
of	O
establishing	O
a	O
wireless	O
Internet	O
connection	O
by	O
using	O
another	O
subscriber	O
's	O
wireless	O
Internet	O
access	O
service	O
without	O
the	O
subscriber	O
's	O
explicit	O
permission	O
or	O
knowledge	O
.	O
</s>
<s>
A	O
customer	O
of	O
a	O
business	O
providing	O
hotspot	B-Application
service	O
,	O
such	O
as	O
a	O
hotel	O
or	O
café	O
,	O
is	O
generally	O
not	O
considered	O
to	O
be	O
piggybacking	B-General_Concept
,	O
though	O
non-customers	O
or	O
those	O
outside	O
the	O
premises	O
who	O
are	O
simply	O
in	O
reach	O
may	O
be	O
.	O
</s>
<s>
Piggybacking	B-General_Concept
is	O
distinct	O
from	O
wardriving	B-General_Concept
,	O
which	O
involves	O
only	O
the	O
logging	O
or	O
mapping	O
of	O
the	O
existence	O
of	O
access	O
points	O
.	O
</s>
<s>
Piggybacking	B-General_Concept
has	O
become	O
a	O
widespread	O
practice	O
in	O
the	O
21st	O
century	O
due	O
to	O
the	O
advent	O
of	O
wireless	O
Internet	O
connections	O
and	O
wireless	B-Device
access	I-Device
points	I-Device
.	O
</s>
<s>
Computer	O
users	O
who	O
either	O
do	O
not	O
have	O
their	O
own	O
connections	O
or	O
who	O
are	O
outside	O
the	O
range	O
of	O
their	O
own	O
might	O
find	O
someone	O
else	O
's	O
by	O
wardriving	B-General_Concept
or	O
luck	O
and	O
use	O
that	O
one	O
.	O
</s>
<s>
However	O
,	O
those	O
residing	O
near	O
a	O
hotspot	B-Application
or	O
another	O
residence	O
with	O
the	O
service	O
have	O
been	O
found	O
to	O
have	O
the	O
ability	O
to	O
piggyback	O
off	O
such	O
connections	O
without	O
patronizing	O
these	O
businesses	O
,	O
which	O
has	O
led	O
to	O
more	O
controversy	O
.	O
</s>
<s>
Wi-Fi	B-Application
hotspots	I-Application
,	O
unsecured	O
and	O
secured	O
,	O
have	O
been	O
recorded	O
to	O
some	O
degree	O
with	O
GPS-coordinates	O
.	O
</s>
<s>
The	O
activity	O
of	O
finding	O
and	O
mapping	O
locations	O
has	O
also	O
been	O
crowdsourced	O
by	O
many	O
smartphone	B-Application
apps	O
.	O
</s>
<s>
Laptops	O
and	O
tablets	O
that	O
lack	O
external	O
antenna	O
jacks	O
can	O
rely	O
on	O
external	O
Wi-Fi	O
network	B-Architecture
cards	O
,	O
many	O
requiring	O
only	O
USB	O
,	O
which	O
the	O
laptop	O
can	O
itself	O
easily	O
provide	O
from	O
its	O
own	O
battery	O
.	O
</s>
<s>
Often	O
,	O
a	O
user	O
will	O
access	O
a	O
network	B-Architecture
completely	O
by	O
accident	O
,	O
as	O
the	O
network	B-Architecture
access	O
points	O
and	O
computer	O
's	O
wireless	O
cards	O
and	O
software	O
are	O
designed	O
to	O
connect	O
easily	O
by	O
default	O
.	O
</s>
<s>
This	O
is	O
common	O
when	O
away	O
from	O
home	O
or	O
when	O
the	O
user	O
's	O
own	O
network	B-Architecture
is	O
not	O
behaving	O
correctly	O
.	O
</s>
<s>
Such	O
users	O
are	O
often	O
unaware	O
that	O
they	O
are	O
piggybacking	B-General_Concept
,	O
and	O
the	O
subscriber	O
has	O
not	O
noticed	O
.	O
</s>
<s>
Regardless	O
,	O
piggybacking	B-General_Concept
is	O
difficult	O
to	O
detect	O
unless	O
the	O
user	O
can	O
be	O
viewed	O
by	O
others	O
using	O
a	O
computer	O
under	O
suspicious	O
circumstances	O
.	O
</s>
<s>
Network	B-Architecture
owners	O
leave	O
their	O
networks	O
unsecured	O
for	O
a	O
variety	O
of	O
reasons	O
.	O
</s>
<s>
They	O
may	O
desire	O
to	O
share	O
their	O
Internet	O
access	O
with	O
their	O
neighbours	O
or	O
the	O
general	O
public	O
or	O
may	O
be	O
intimidated	O
by	O
the	O
knowledge	O
and	O
effort	O
required	O
to	O
secure	O
their	O
network	B-Architecture
while	O
making	O
it	O
available	O
to	O
their	O
own	O
devices	O
.	O
</s>
<s>
Some	O
wireless	B-General_Concept
networking	I-General_Concept
devices	O
may	O
not	O
support	O
the	O
latest	O
security	O
mechanisms	O
,	O
and	O
users	O
must	O
therefore	O
leave	O
their	O
network	B-Architecture
unsecured	O
.	O
</s>
<s>
For	O
example	O
,	O
the	O
Nintendo	B-Device
DS	I-Device
and	O
Nintendo	B-Device
DS	I-Device
Lite	I-Device
can	O
only	O
access	O
wireless	O
routers	O
using	O
the	O
discredited	O
WEP	B-Protocol
standard	O
,	O
however	O
,	O
the	O
Nintendo	B-Device
DSi	I-Device
and	O
Nintendo	B-Operating_System
3DS	I-Operating_System
both	O
support	O
WPA	O
encryption	O
.	O
</s>
<s>
Given	O
the	O
rarity	O
of	O
such	O
cases	O
where	O
hosts	O
have	O
been	O
held	O
liable	O
for	O
the	O
activities	O
of	O
piggybackers	O
,	O
they	O
may	O
be	O
unaware	O
or	O
unconcerned	O
about	O
the	O
risks	O
they	O
incur	O
by	O
not	O
securing	O
their	O
network	B-Architecture
,	O
or	O
of	O
a	O
need	O
for	O
an	O
option	O
to	O
protect	O
their	O
network	B-Architecture
.	O
</s>
<s>
Views	O
on	O
the	O
ethics	O
of	O
piggybacking	B-General_Concept
vary	O
widely	O
.	O
</s>
<s>
Opponents	O
to	O
piggybacking	B-General_Concept
compare	O
the	O
practice	O
to	O
the	O
following	O
:	O
</s>
<s>
That	O
is	O
especially	O
common	O
in	O
an	O
apartment	O
building	O
in	O
which	O
many	O
residents	O
live	O
within	O
the	O
normal	O
range	O
of	O
a	O
single	O
wireless	B-General_Concept
connection	I-General_Concept
.	O
</s>
<s>
Many	O
ISPs	O
charge	O
monthly	O
rates	O
,	O
however	O
,	O
and	O
so	O
there	O
is	O
no	O
difference	O
in	O
cost	O
to	O
the	O
network	B-Architecture
owner	O
.	O
</s>
<s>
Excessive	O
piggybacking	B-General_Concept
may	O
slow	O
the	O
host	O
's	O
connection	O
,	O
with	O
the	O
host	O
typically	O
unaware	O
of	O
the	O
reason	O
for	O
the	O
reduction	O
of	O
speed	O
.	O
</s>
<s>
That	O
leaves	O
network	B-Architecture
owners	O
subject	O
to	O
investigation	O
for	O
crimes	O
of	O
which	O
they	O
are	O
unaware	O
.	O
</s>
<s>
While	O
persons	O
engaging	O
in	O
piggybacking	B-General_Concept
are	O
generally	O
honest	O
citizens	O
,	O
a	O
smaller	O
number	O
are	O
breaking	O
the	O
law	O
in	O
that	O
manner	O
and	O
so	O
avoid	O
identification	O
by	O
investigators	O
.	O
</s>
<s>
That	O
in	O
particular	O
has	O
led	O
to	O
some	O
anti-piggybacking	O
laws	O
.	O
</s>
<s>
Jeffrey	O
L	O
.	O
Seglin	O
,	O
an	O
ethicist	O
for	O
the	O
New	O
York	O
Times	O
,	O
recommends	O
notifying	O
network	B-Architecture
owners	O
if	O
they	O
are	O
identifiable	O
,	O
but	O
he	O
says	O
there	O
is	O
nothing	O
inherently	O
wrong	O
with	O
accessing	O
an	O
open	O
network	B-Architecture
and	O
using	O
the	O
connection	O
.	O
</s>
<s>
Similarly	O
,	O
Randy	O
Cohen	O
,	O
the	O
author	O
of	O
The	O
Ethicist	O
column	O
for	O
The	O
New	O
York	O
Times	O
Magazine	O
and	O
National	O
Public	O
Radio	O
,	O
says	O
that	O
one	O
should	O
attempt	O
to	O
contact	O
the	O
owner	O
of	O
a	O
regularly	O
used	O
network	B-Architecture
and	O
offer	O
to	O
contribute	O
to	O
the	O
cost	O
.	O
</s>
<s>
However	O
,	O
he	O
points	O
out	O
that	O
network	B-Architecture
owners	O
can	O
easily	O
password	O
protect	O
their	O
networks	O
and	O
quotes	O
the	O
attorney	O
Mike	O
Godwin	O
to	O
conclude	O
that	O
open	O
networks	O
likely	O
represent	O
indifference	O
on	O
the	O
part	O
of	O
the	O
network	B-Architecture
owner	O
and	O
so	O
accessing	O
them	O
is	O
morally	O
acceptable	O
,	O
if	O
it	O
is	O
not	O
abused	O
.	O
</s>
<s>
He	O
says	O
that	O
borrowing	O
a	O
neighbour	O
's	O
Wi-Fi	O
is	O
like	O
sharing	O
a	O
cup	O
of	O
sugar	O
,	O
and	O
leaving	O
a	O
network	B-Architecture
open	O
is	O
just	O
being	O
a	O
good	O
neighbour	O
.	O
</s>
<s>
Techdirt	O
blogger	O
Mike	O
Masnick	O
responded	O
to	O
an	O
article	O
in	O
Time	O
Magazine	O
to	O
express	O
his	O
disagreement	O
with	O
why	O
a	O
man	O
was	O
arrested	O
for	O
piggybacking	B-General_Concept
a	O
cafe	O
's	O
wireless	O
medium	O
.	O
</s>
<s>
The	O
writer	O
himself	O
is	O
not	O
sure	O
what	O
that	O
title	O
really	O
means	O
or	O
how	O
it	O
applies	O
to	O
contemporary	O
society	O
since	O
the	O
code	O
was	O
established	O
regarding	O
computers	O
and	O
their	O
networks	O
during	O
the	O
Cold	B-Application
War	I-Application
era	O
.	O
</s>
<s>
Lev	O
Grossman	O
,	O
with	O
Time	O
Magazine	O
,	O
is	O
on	O
the	O
side	O
of	O
most	O
specialist	O
and	O
consumers	O
,	O
who	O
believe	O
the	O
fault	O
,	O
if	O
there	O
is	O
any	O
,	O
is	O
mostly	O
that	O
of	O
the	O
network	B-Architecture
's	O
host	O
or	O
owner	O
.	O
</s>
<s>
An	O
analogy	O
commonly	O
used	O
in	O
this	O
arena	O
of	O
debate	O
equates	O
wireless	O
signal	O
piggybacking	B-General_Concept
with	O
entering	O
a	O
house	O
with	O
an	O
open	O
door	O
.	O
</s>
<s>
Equally	O
,	O
wireless	B-Device
access	I-Device
point	I-Device
owners	O
should	O
be	O
aware	O
that	O
security	O
risks	O
exist	O
when	O
they	O
leave	O
their	O
network	B-Architecture
unprotected	O
.	O
</s>
<s>
Laws	O
do	O
not	O
have	O
the	O
physical	O
ability	O
to	O
prevent	O
such	O
action	O
from	O
occurring	O
,	O
and	O
piggybacking	B-General_Concept
may	O
be	O
practiced	O
with	O
negligible	O
detection	O
.	O
</s>
<s>
The	O
owner	O
of	O
any	O
wireless	B-General_Concept
connection	I-General_Concept
has	O
the	O
ability	O
to	O
block	O
access	O
from	O
outsiders	O
by	O
engaging	O
wireless	B-Application
LAN	I-Application
security	I-Application
measures	O
.	O
</s>
<s>
More	O
security-conscious	O
network	B-Architecture
operators	O
may	O
choose	O
from	O
a	O
variety	O
of	O
security	O
measures	O
to	O
limit	O
access	O
to	O
their	O
wireless	B-General_Concept
network	I-General_Concept
,	O
including	O
:	O
</s>
<s>
Hobbyists	O
,	O
computer	O
professionals	O
and	O
others	O
can	O
apply	O
Wired	B-Protocol
Equivalent	I-Protocol
Privacy	I-Protocol
(	O
WEP	B-Protocol
)	O
to	O
many	O
access	O
points	O
without	O
cumbersome	O
setup	O
,	O
but	O
it	O
offers	O
little	O
in	O
the	O
way	O
of	O
practical	O
security	O
against	O
similarly	O
studious	O
piggybackers	O
.	O
</s>
<s>
In	O
practice	O
,	O
this	O
may	O
simply	O
mean	O
that	O
nearby	O
non-WEP	O
networks	O
are	O
more	O
accessible	O
targets	O
.	O
</s>
<s>
WEP	B-Protocol
is	O
sometimes	O
known	O
to	O
slow	O
down	O
network	B-Architecture
traffic	O
in	O
the	O
sense	O
that	O
the	O
WEP	B-Protocol
implementation	O
causes	O
extra	O
packets	O
to	O
be	O
transmitted	O
across	O
the	O
network	B-Architecture
.	O
</s>
<s>
Some	O
claim	O
that	O
"	O
Wired	B-Protocol
Equivalent	I-Protocol
Privacy	I-Protocol
"	O
is	O
a	O
misnomer	O
,	O
but	O
it	O
generally	O
fits	O
because	O
wired	O
networks	O
are	O
not	O
particularly	O
secure	O
either	O
.	O
</s>
<s>
Wi-Fi	O
Protected	O
Access	O
(	O
WPA	O
)	O
,	O
as	O
well	O
as	O
WPA2	O
and	O
EAP	O
are	O
more	O
secure	O
than	O
WEP	B-Protocol
.	O
</s>
<s>
As	O
of	O
May	O
2013	O
,	O
44.3	O
percent	O
of	O
all	O
wireless	B-General_Concept
networks	I-General_Concept
surveyed	O
by	O
WiGLE	B-General_Concept
use	O
WPA	O
or	O
WPA2	O
.	O
</s>
<s>
MAC	O
address	O
authentication	O
in	O
combination	O
with	O
discretionary	O
DHCP	B-Protocol
server	I-Protocol
settings	O
allow	O
a	O
user	O
to	O
set	O
up	O
an	O
"	O
allowed	O
MAC	O
address	O
"	O
list	O
.	O
</s>
<s>
Under	O
this	O
type	O
of	O
security	O
,	O
the	O
access	O
point	O
will	O
only	O
give	O
an	O
IP	B-Protocol
Address	I-Protocol
to	O
computers	O
whose	O
MAC	O
address	O
is	O
on	O
the	O
list	O
.	O
</s>
<s>
Thus	O
,	O
the	O
network	B-Architecture
administrator	O
would	O
obtain	O
the	O
valid	O
MAC	O
addresses	O
from	O
each	O
of	O
the	O
potential	O
clients	O
in	O
their	O
network	B-Architecture
.	O
</s>
<s>
Methods	O
to	O
defeat	O
this	O
type	O
of	O
security	O
include	O
MAC	O
address	O
spoofing	O
,	O
detailed	O
on	O
the	O
MAC	O
address	O
page	O
,	O
whereby	O
network	B-Architecture
traffic	O
is	O
observed	O
,	O
valid	O
MACs	O
are	O
collected	O
,	O
and	O
then	O
used	O
to	O
obtain	O
DHCP	B-Protocol
leases	O
.	O
</s>
<s>
It	O
is	O
also	O
often	O
possible	O
to	O
configure	O
IP	O
for	O
a	O
computer	O
manually	O
,	O
ignoring	O
DHCP	B-Protocol
,	O
if	O
sufficient	O
information	O
about	O
the	O
network	B-Architecture
is	O
known	O
(	O
perhaps	O
from	O
observed	O
network	B-Architecture
traffic	O
)	O
.	O
</s>
<s>
IP	B-Protocol
security	I-Protocol
(	O
IPsec	B-Protocol
)	O
can	O
be	O
used	O
to	O
encrypt	O
traffic	O
between	O
network	B-Architecture
nodes	O
,	O
reducing	O
or	O
eliminating	O
the	O
amount	O
of	O
plain	O
text	O
information	O
transmitted	O
over	O
the	O
air	O
.	O
</s>
<s>
Difficulty	O
of	O
setting	O
up	O
IPsec	B-Protocol
is	O
related	O
to	O
the	O
brand	O
of	O
access	O
point	O
being	O
used	O
.	O
</s>
<s>
Some	O
access	O
points	O
may	O
not	O
offer	O
IPsec	B-Protocol
at	O
all	O
,	O
while	O
others	O
may	O
require	O
firmware	O
updates	O
before	O
IPsec	B-Protocol
options	O
are	O
available	O
.	O
</s>
<s>
about	O
the	O
IPsec	B-Protocol
installation	O
.	O
</s>
<s>
VPN	B-Application
options	O
such	O
as	O
tunnel-mode	O
IPSec	B-Protocol
or	O
OpenVPN	B-Language
can	O
be	O
difficult	O
to	O
set	O
up	O
,	O
but	O
often	O
provide	O
the	O
most	O
flexible	O
,	O
extendable	O
security	O
,	O
and	O
as	O
such	O
are	O
recommended	O
for	O
larger	O
networks	O
with	O
many	O
users	O
.	O
</s>
<s>
Wireless	O
intrusion	O
detection	O
systems	O
can	O
be	O
used	O
to	O
detect	O
the	O
presence	O
of	O
rogue	B-Device
access	I-Device
points	I-Device
which	O
expose	O
a	O
network	B-Architecture
to	O
security	O
breaches	O
.	O
</s>
<s>
Flash	O
a	O
3rd	O
party	O
firmware	O
such	O
as	O
OpenWrt	B-Application
,	O
Tomato	B-Protocol
or	O
DD-WRT	B-Protocol
with	O
support	O
for	O
RADIUS	B-Protocol
.	O
</s>
<s>
Honeypot	O
(	O
computing	O
)	O
involves	O
setting	O
up	O
a	O
computer	O
on	O
a	O
network	B-Architecture
just	O
to	O
see	O
who	O
comes	O
along	O
and	O
does	O
something	O
on	O
the	O
open	O
access	O
point	O
.	O
</s>
<s>
But	O
worse	O
,	O
a	O
device	O
that	O
once	O
connected	O
to	O
a	O
hidden	O
SSID	O
will	O
continuously	O
transmit	O
probe	O
requests	O
for	O
this	O
SSID	O
and	O
is	O
vulnerable	O
to	O
the	O
Evil	B-Protocol
Twin	I-Protocol
attack	I-Protocol
.	O
</s>
<s>
There	O
are	O
several	O
alternatives	O
to	O
piggybacking	B-General_Concept
.	O
</s>
<s>
Internet	O
access	O
is	O
available	O
on	O
many	O
data	O
plans	O
for	O
smartphones	B-Application
and	O
PDAs	B-Application
.	O
</s>
<s>
Also	O
known	O
as	O
tethering	O
,	O
one	O
can	O
interface	O
to	O
their	O
phone	O
either	O
wirelessly	O
using	O
Bluetooth	B-Protocol
or	O
Wi-Fi	O
or	O
wired	O
via	O
cable	O
allowing	O
access	O
to	O
the	O
Internet	O
anywhere	O
there	O
is	O
a	O
cell	O
network	B-Architecture
signal	O
.	O
</s>
<s>
Many	O
jurisdictions	O
have	O
been	O
experimenting	O
with	O
statewide	O
,	O
province-wide	O
,	O
county-wide	O
or	O
municipal	O
wireless	B-General_Concept
network	I-General_Concept
access	O
.	O
</s>
<s>
On	O
September	O
20	O
,	O
2005	O
,	O
Google	B-Device
WiFi	I-Device
was	O
announced	O
as	O
a	O
municipal	O
wireless	O
mesh	B-Architecture
network	I-Architecture
in	O
Mountain	O
View	O
,	O
California	O
.	O
</s>
<s>
When	O
the	O
service	O
was	O
expanded	O
to	O
more	O
public	O
areas	O
in	O
2014	O
,	O
Baltimore	O
's	O
acting	O
chief	O
technology	O
officer	O
,	O
L	O
.	O
Jerome	O
Mullen	O
,	O
remarked	O
,	O
"	O
Projects	O
like	O
this	O
are	O
just	O
the	O
beginning	O
of	O
the	O
opportunities	O
that	O
remain	O
as	O
we	O
strengthen	O
and	O
expand	O
the	O
City	O
's	O
fiber	B-Architecture
optic	I-Architecture
network	B-Architecture
.	O
</s>
<s>
We	O
are	O
building	O
digital	B-Device
city	I-Device
infrastructure	O
,	O
and	O
the	O
possibilities	O
are	O
endless.	O
"	O
</s>
<s>
On	O
November	O
17	O
,	O
2014	O
,	O
the	O
mayor	O
of	O
New	O
York	O
City	O
,	O
Bill	O
de	O
Blasio	O
,	O
announced	O
LinkNYC	O
,	O
an	O
infrastructure	O
project	O
to	O
create	O
a	O
free	O
,	O
encrypted	O
,	O
gigabit	O
wireless	B-General_Concept
network	I-General_Concept
to	O
cover	O
New	O
York	O
City	O
by	O
replacing	O
the	O
city	O
's	O
payphones	O
with	O
Wi-Fi	B-Application
hotspots	I-Application
and	O
web	O
browser	O
kiosks	O
where	O
free	O
phone	O
calls	O
could	O
also	O
be	O
made	O
.	O
</s>
<s>
Free	O
Internet	O
access	O
hotspots	B-Application
have	O
also	O
been	O
opened	O
by	O
a	O
wide	O
range	O
of	O
organisations	O
.	O
</s>
<s>
Companies	O
sell	O
hardware	O
and	O
network	B-Architecture
management	O
services	O
to	O
establish	O
hotspots	B-Application
.	O
</s>
<s>
Other	O
hotspot-based	O
efforts	O
have	O
been	O
launched	O
with	O
the	O
intention	O
of	O
providing	O
global	O
,	O
low-cost	O
or	O
free	O
Internet	O
access	O
.	O
</s>
<s>
Guifi.net	O
is	O
a	O
free	O
,	O
open	O
,	O
international	O
telecommunications	O
community	O
network	B-Architecture
organized	O
and	O
expanded	O
by	O
individuals	O
,	O
companies	O
and	O
administrations	O
.	O
</s>
<s>
On	O
November	O
27	O
,	O
2012	O
,	O
the	O
Electronic	O
Frontier	O
Foundation	O
and	O
a	O
coalition	O
of	O
nine	O
other	O
groups	O
launched	O
OpenWireless.org,	O
an	O
Internet	O
activism	O
project	O
which	O
seeks	O
to	O
increase	O
Internet	O
access	O
by	O
encouraging	O
individuals	O
and	O
organisations	O
to	O
configure	O
their	O
wireless	O
routers	O
to	O
offer	O
a	O
separate	O
public	O
wireless	O
guest	O
network	B-Architecture
or	O
to	O
open	O
their	O
network	B-Architecture
completely	O
.	O
</s>
