1.1.
Surveillance Chess ^
1.2.
Sniffing out Art ^
1.3.
Where artists roam free ^
Soon however, warspying was turned by the hacking community into a competitive game. WarViewing became synonymous with the competitive hunt for unprotected 2.4 GHz video feeds that characterize open wireless networks, while for the more mundane applications, «wireless monitoring» is usually used as term. WarViewers typically combine the Wi-Fi-equipped device with a GPS device to record the location of the wireless networks that they discover. Websites like WiGLE, Wireless Geographic Logging Engine17 allow them to upload the data and transform it into maps of the network neighborhood. There are also educational uses: In 2004, 100 undergraduates from the Department of Communication at the University of Washington mapped the city of Seattle in this way. 44% of the more than 5000 access points that they found were secured with WEP encryption, 52% were open, and 3% were pay-for-access. Many of the open networks clearly identified themselves as open access, with network names like «Open to share, no porn please» or «Free access, be nice.» The information was published online in high-resolution maps.18 Today, warviewing has become mainstream, with even a Nintendo’s Treasure World game being based on the idea. Wardriving, WarWalking and similar derivations indicate the method of transport used by the WarViewer. WarChalking finally is the practice to leave physical signs in the vicinity of an open network that one has identified, to facilitate their use by other parties. This custom, based on the «Hobo signs» of the Great Depression creates additional security risks if a malicious user identifies a sign left by a benevolent hunter.19
2.
All is fair in law and war ^
2.1.
Every work of art is an uncommitted crime ^
Unproblematic again, though this time in favour of liability, is undoubtedly Surveillance Chess. While the Communications Act 2003 remains irrelevant, here an unauthorized modification of a computer system, a whacking, took place. The Computer Misuse Act applies as a result. That the intent is ultimately benevolent – entertaining the security officer and educating the public – is legally irrelevant. It is also possible that Bitnik violated section 1(2) RIPA. For this, their actions would have to be constructed as intentionally and without lawful authority, […] intercepting communication in the course of its transmission by means of a private telecommunication system. Questionable could be if a CCTV system is a «private communication system» for the purpose of RIPA. It is most certainly not a paradigmatic case – like intercepting emails in a company intranet – not the least because the sender in this case is an automated system. However, when Google got into trouble over the collection of payload data from Wi-Fi networks by its Street View service, the Metropolitan Police did consider a complaint by a privacy organization that this constituted a violation of RIPA29. Although it later decided «after consultation with the Information Commissioner’s Office» that «it would not be appropriate to launch a criminal investigation»30, much of this decision was based on the Google’s claim at the time that the collection of the data was accidental. A German police force closed its investigation in 2012 for similar reasons31. There are no precedents of the interception of CCTV footage that would settle the issue, but with the reluctance of UK judges to apply purposive interpretation, and the wording of the statute, a conviction seems at least possible. In this case, we should note that the argument applies just as well to Valentine’s example – both are cases of purely passive interception, but interception nonetheless.
2.2.
Creativity is knowing how to hide your sources ^
3.
References ^
Schafer, B. «Schlafwandelnd in den Überwachungsstaat?» Datenschutz und Datensicherheit 8, 483-489 (2009).
Ryan, P. S., War, Peace, or Stalemate: Wargames, Wardialing, Wardriving, and the Emerging Market for Hacker Ethics. Virginia Journal of Law & Technology,. 9, No. 7, (2004).
Berghel, H, Wireless Infidelity I: War Driving. Commun. ACM, 47, p 21-26 (2004).
Lawrence, E.; Lawrence, J , «Threats to the mobile enterprise: jurisprudence analysis of wardriving and warchalking,» Information Technology: Coding and Computing, 2004., vol.2, no., pp. 268- 273 (2004).
Kern, B., Whacking, Joyriding and War-Driving: Roaming Use of Wi-Fi and the Law, 21 Santa Clara Computer & High Tech. L.J. 101 (2004).
Tsow, A, M. Jakobsson, L. Yang, S. Wetzel. «Warkitting: the Drive-by Subversion of Wireless Home routers .» Journal of Digital Forensics Practice, Vol. 1, No. 3, , pp. 179-192 (2006).
Bierlein, M «Policing the Wireless World: Access Liability in the Open Wi-Fi Era». Ohio State Law Journal 67 (5). (2006).
Síthigh, D M «Law in the Last Mile: Sharing Internet Access Through WiFi», 6:2 SCRIPTed 355, http://www.law.ed.ac.uk/ahrc/script-ed/vol6-2/macsithigh.asp accessed: 23.1.2013 (2009).
Greenberg, L, The Art of Appropriation: Puppies, Piracy, and Post-Modernism, 11 Cardozo Arts & Ent. L.J. 1 (1992).
Smita Kheria, Daithi Mac Sithigh, Judith Rauhofer, Burkhard Schafer, University of Edinburgh, School of Law, SCRIPT Centre, Old College.
Work on this paper was supported by the RCUK CREATE network grant, www.create.ac.uk. We are also grateful to Raphael Satter, journalist for AP, whose query triggered this paper, and to the discussions with Jane Cornwell.
- 1 While the artists claim on their website that they are indeed capable of taking over the CCTV feed, this claim could not be independently verified. For the purpose of this analysis however, we will assume that they were indeed capable of not receiving the wireless transmission, but to send images directly from their computer to the CCTV controlling station.
- 2 http://vimeo.com/46236909 accessed: 23.1.2013.
- 3 http://chess.bitnik.org/about.html accessed: 23.1.2013.
- 4 http://www.woz.ch/1039/zensur/der-lange-arm-der-ubs accessed: 23.1.2013.
- 5 http://www.haus-ek.org/de/node/164?loc=PVA accessed: 23.1.2013.
- 6 http://www.hacking-the-city.org/artists-and-projects/mediengruppe-bitnik.html accessed: 23.1.2013.
- 7 http://www.kismetwireless.net/documentation.shtml accessed: 23.1.2013.
- 8 The Observers 15/09/2008, http://observers.france24.com/content/20080915-cctv-surveillance-video-artists-sniffing accessed: 23.1.2013.
- 9 Ibid.
- 10 Schafer, «Schlafwandelnd in den Überwachungsstaat?» (2009) Datenschutz und Datensicherheit. 8 483-489
- 11 Satter, Olympic WiFi police on hunt for rogue hotspots, http://www.cbc.ca/news/technology/story/2012/08/02/tech-ioc-wifi-hotspots-banned.html
- 12 http://stakeholders.ofcom.org.uk/binaries/consultations/london2012/statement/statement.pdf
- 13 Reyes, Sorry, No Social Sharing at the London Olympics, Technorati May 06, 2012 at http://technorati.com/social-media/article/sorry-no-social-sharing-at-the/
- 14 Ryan, War, Peace, or Stalemate: Wargames, Wardialing, Wardriving, and the Emerging Market for Hacker Ethics. Virginia Journal of Law & Technology, Vol. 9, No. 7, Summer 2004.
- 15 Berghel, Wireless Infidelity I: War Driving. Communications of the ACM, September 2004/Vol. 47, No. 9 p 21-26 at p. 21.
- 16 Ibid p. 23.
- 17 http://wigle.net/ accessed: 23.1.2013.
- 18 Marwick, (15 February 2005). «Seattle WiFi Map Project». Students of COM300, Fall 2004 - Basic Concepts of New Media. http://depts.washington.edu/wifimap/ accessed: 23.1.2013.
- 19 Lawrence, E.,/Lawrence, J., «Threats to the mobile enterprise: jurisprudence analysis of wardriving and warchalking,» Information Technology: Coding and Computing, 2004. Proceedings. ITCC 2004. International Conference on , vol.2, no., pp. 268- 273 Vol.2, 5-7 April 2004.
- 20 http://www.stumbler.net/ accessed: 23.1.2013.
- 21 See e.g. Griffiths, (2007-04-18), «Two cautioned over wireless «piggy-backing» http://www.reuters.com/article/2007/04/18/us-britain-wireless-idUSL1848090220070418 accessed: 23.1.2013.
- 22 Kern, Whacking, Joyriding and War-Driving: Roaming Use of Wi-Fi and the Law, 21 Santa Clara Computer & High Tech. L.J. 101 (2004)
- 23 Tsow/Jakobsson/Yang/Wetzel, «Warkitting: the Drive-by Subversion of Wireless Home routers .» Journal of Digital Forensics Practice, Vol. 1, No. 3, 2006, pp. 179-192.
- 24 State v Allen 260 Kan. 107 (1996).
- 25 Bierlein, «Policing the Wireless World: Access Liability in the Open Wi-Fi Era». Ohio State Law Journal 67 (5). (2006).
- 26 Mac Síthigh, «Law in the Last Mile: Sharing Internet Access Through WiFi», (2009) 6:2 SCRIPTed 355, http://www.law.ed.ac.uk/ahrc/script-ed/vol6-2/macsithigh.asp accessed: 23.1.2013.
- 27 Wakefield. Wireless hijacking under scrutiny, http://news.bbc.co.uk/1/hi/technology/4721723.stm accessed: 23.1.2013.
- 28 LG Wuppertal, Beschluss vom 19. Oktober 2010 - 25 Qs-10 Js 1977/08-177/10 in: MIR 2010, Dok. 156.
- 29 Google under investigation by Met police, BBC News online, http://www.bbc.co.uk/news/10391096 accessed: 23.1.2013.
- 30 Worth, Met Police clears Google over Wi-Fi data collection, http://www.v3.co.uk/v3-uk/news/1965782/met-police-clears-google-wi-fi-collection accessed: 23.1.2013.
- 31 Mullin. Google won’t be prosecuted over Street View in Germany, http://arstechnica.com/tech-policy/2012/11/google-wont-be-prosecuted-over-street-view-in-germany/ accessed: 23.1.2013.
- 32 Durant v Financial Services Authority [2003] EWCA Civ 1746
- 33 Greenberg, The Art of Appropriation: Puppies, Piracy, and Post-Modernism, 11 Cardozo Arts & Ent. L.J. 1 (1992).