This is purely hypothetical...a rights issue.
If someone got into a secure network (unauthorized) and was piggybacking internet, does anyone see a problem with probing/monitoring the offending system to identify what it is, who it is, and what they're doing?
I figure if it's on MY network with MY connection without permission so they forfeited any right to privacy and I have the right to find out why by any means necessary.
It's like when I'm using the university's network they can (and do) monitor everything all the clients do, where they go, and log everything that's shared on (or sent via) their network. I don't see a problem with that, in that case I feel it's their connection so they have the right (and responsibility) to make sure it's used correctly and identify anyone using it incorrectly. If I don't want my stuff logged I should disable file-sharing (why would you enable it on a public network anyway) and watch what I transmit or get my own private cellular connection.
Tags: