Thursday, February 21, 2008

Steal More Wifi, part 2.

See Part 1: Where It is Concluded that Part 15 Spectrum and Wifi are part of the Commons and Cannot be Stolen

We have two spaces. One is a commons; the other is . . . well, we don’t know. We’ll call it the proximate space. These two spaces exist next to each other. But where is the boundary? It’s not visible; it’s not detectable; there are no sign posts. As the individual moves from the commons space to the next space, how is the individual to know that a boundary has been crossed.

And this proximate space, the individuals lacks knowledge as to the nature of this space. Is it a public or a private space? Is access open or restricted?

The individual can move between the common space and the proximate space easily without knowledge that a boundary has been crossed. Indeed the Internet was designed not to announce boundaries between networks but to eliminate them.

What does it mean for an individual to move from the common space to proximate space? Specifically, what does it mean to say that the access to the proximate space is “unauthorized?”

It has been suggested that the proper way to analyze this is a Trespass to Chattels analysis. There is Trespass to Real Property where the issue is unauthorized access to land, and there is every other deprivation of property – such as “borrowing” someone’s Ferrari 250 GT California. Since computer networks aren’t real property (aka land), then, the argument goes, the analysis must be Trespass to Chattels.

But access to a network that is proximate to a commons network is not a deprivation issue; the individual is not backing a box truck up the back of a coffee house and hauling away the network equipment. This is an access issue and if the question is access, then the proper analysis is real property. We want to be able to answer the question, “I am here; am I allowed to be here?”

Real Property Law

In general, the owner of real property must provide notice to exclude would be trespassers. This notice can come through actual notice communicated directly to the individual (ie, “Hey, you kids! Getouttahere!”) or through posted notices (such as Piglet’s “Trespassers Will”).

The tort of trespass to real property is intentional; an individual generally cannot be said to be trespassing unless the individual has knowledge and intent. Lacking knowledge that one is on private land and that access is restricted, the individual generally is not trespassing.

These principals particularly come into play where an owner wishes to restrict access to private property which is somehow proximate to public or common property (for example, a public shopping mall with private offices attached). The boundary where the common space becomes restricted space generally must have clear notice such that the individual can identify the boundary and the restriction.

With WiFi networks, there is a network in a commons space where no one has ownership rights, no one can be excluded, and no one has supreme claims to anyone else - proximate to an unknown space - the same predicament as the real property situation.

When can it be said that crossing from this commons to this proximate space is “unauthorized?”

Presented in this framework, the answer is clear. The owner of the proximate space must provide notice of boundary and restriction. Lacking notice, the individual can soundly assume that access to the space is not unauthorized (oh no! a double negative!).

This might be difficult when using a network, the Internet, which by design eradicates boundaries. Fortunately, with the WiFi protocol, there is an easy means for the network owner to provide notice. WiFi Access Points can inform potential interacting individuals with the information of whether the network behind the AP is open or secure, and what the SSID is. If the AP informs the individual that it is secure (that while the individual and the AP can interact with each other, the individual cannot interact with the network on the other side of the AP which is outside of the commons space), then the individual knows that the AP is the boundary and that what lies beyond is restricted.

If the AP informs the individual that the network behind the AP is open, and here is the SSID, then the individual has not been informed that access is unauthorized, and the individual is not even sure that the AP is a boundary (the AP could simply be a node with both networks connected in the commons). The precedent establishes the sound policy that the owner must provide notice of boundary and restriction, and lacking notice, the individual’s access cannot be said to be unauthorized.

Based on the notice provided by the AP, the individual can now answer the question, “I am here; is my access authorized?”

Next: Part 3: Where We Explore Some Philosophy of Law Drivel That Supports this Conclusion

Photo: Wikipedia. [Disclaimer]

Saturday, February 09, 2008

TPRC Call for Papers

TPRC Presents
The 36th Research Conference on Communication, Information, and Internet Policy
Hosted by the Center for Technology and the Law, George Mason University Law School, Arlington, Virginia
Friday, September 26, 2008 through Sunday, September 28

TPRC is an annual conference on communication, information, and internet policy that convenes international and interdisciplinary practitioners and researchers from academia, industry, government, and nonprofit organizations together with policy makers. The purpose of the conference is to acquaint policymakers with the best of recent research and to familiarize researchers with the knowledge requirements of policymakers and industry. The conference will consist of papers selected from reviewed, submitted abstracts, student posters, and selected panel submissions.

TPRC is now soliciting abstracts of papers, student papers, panel proposals, and student posters for presentation at the 2008 conference. Proposals should be based on current theoretical or empirical research relevant to communication and information policy, and may be from any disciplinary perspective. TPRC seeks submissions of disciplinary, comparative, multidisciplinary or interdisciplinary excellence.

Subject areas of particular interest include, but are not limited to the following (for more detailed descriptions see

1. Network Competition, Policy and Management
2. Next Generation and all-IP Networks: Policy, Regulatory, Architectural and Societal Issues
3. Spectrum Management and Wireless Futures: Anywhere, Anytime Communications and its Implications
4. Societal Issues: Universality and Affordable Access; ICTs for Development and Growth
5. The Transformation and Future of Media in an Age of User- and Community-Produced Creativity
6. The Transformation and Future of Intellectual Property and Digital Rights
7. Privacy, Security, Identity and Trust
8. Internet Governance and Institutional Strategies for Information Policy
9. Other Emerging Topics

Submissions are due by May 2, 2008. Please see the guidelines for authors for additional information.

Abstracts, panel proposals and poster submissions must be submitted electronically at For posters and abstract, please identify the methods, central ideas, and outcomes (obtained or expected) of the research. A secondary classification of the method used in the research will be requested upon submission to assure appropriate review. Abstracts are not to exceed 500 words. Poster sessions will be available to enable the display of current student work.

Responses will be made by May 30, 2008. Selected papers will be due to TPRC on August 15th and authors are expected to present the accepted submission.

Students are encouraged to submit papers for the student paper competition (see the Student Call for Papers for complete details). Full Student papers must be submitted by May 2, 2008. Students only are recommended to enter the poster competition.

We welcome industry-specific but not vendor-specific panels.

Thursday, February 07, 2008

How a Bill Becomes a Law

"I'm Just a Bill, Up on Capitol Hill...." All us old farts know the song. Someone asked me how a Bill becomes a law. I looked for a good diagram. I assumed that there must be one. And did not find one. So with my great artistic talent, I gave it a go. Well, its something. I never claimed to be a great graphic artist.