Tuesday, April 21, 2026
HomeUsing Someone Else’s Wi-Fi Without Permission Is a Criminal Offence

Using Someone Else’s Wi-Fi Without Permission Is a Criminal Offence

You are sitting at home. Your data is exhausted. Your phone screen stares back at you with that dreaded notification: No Internet Connection. Then, almost like a gift, you open your Wi-Fi settings and see it, a neighbour’s network, unlocked, full bars, practically calling your name.

You connect. You browse. You stream. You move on with your evening.

It feels completely harmless. After all, you did not break anything. You did not take anything physical. Nobody even noticed. What exactly is the crime?

As it turns out , quite a lot.

THE DIGITAL TRESPASS MOST PEOPLE DO NOT KNOW EXISTS

The law has always protected physical spaces. You cannot walk into someone’s house without permission, even if the door is left open.

The same principle, perhaps surprisingly to many, extends to the digital world.

A Wi-Fi router is not merely a piece of plastic sitting on someone’s shelf. In the eyes of cybercrime legislation adopted across Kenya,Nigeria, Ghana, the United Kingdom, the United States, and many other countries, a router is a computer system. And a network is a protected space.

Connecting to it without the owner’s authorisation is classified as unauthorised access, a criminal offence that carries real legal consequences.

The law does not ask whether you caused any damage. It does not ask what you used the connection for. The question the law asks is far simpler: Did you have permission? If the answer is no, the offence is already complete.

THE RISKS PEOPLE NEVER CONSIDER

Beyond personal legal exposure, there is a broader danger that most people never pause to consider.

When you connect to someone else’s network without permission, you become part of their digital footprint.

Every website visited, every file downloaded, every platform accessed through that connection is logged under their IP address, not yours.

If anything illegal passes through that network while you are connected, the trail leads first to the account holder.

You may have introduced a vulnerability into someone’s home without their knowledge, and they may bear the initial burden of proving they were not responsible.

Conversely, if authorities ever trace suspicious activity to the network you were secretly using, your unauthorised presence on it becomes an additional problem you will need to explain.

There is no good outcome hiding in this scenario.

“BUT THE NETWORK WAS UNLOCKED”

This is the most common defence, and it is the weakest one available.

An unlocked door does not grant you entry into someone’s home. An open window does not mean you are invited through it.

The absence of a password on a Wi-Fi network does not constitute consent.

Consent, in law, must be expressed or clearly implied, and a network existing within range of your device implies nothing of the sort.

Courts have consistently rejected the argument that an unsecured network is a public network.

It is private property, digitally speaking, and your decision to access it without asking is treated as a deliberate choice, not an innocent accident.

WHAT THE LAW ACTUALLY SAYS

Under cybercrime laws operative in many jurisdictions, accessing a computer system or network, intentionally and without authorisation, is an offence. Depending on the specific law and the country in question, conviction can attract:

  • Significant monetary fines
  • Community service orders
  • A criminal record
  • Imprisonment, particularly where the access is repeated or where harm results

Nigeria’s Cybercrimes (Prohibition, Prevention, Etc.) Act, for instance, criminalises unauthorised access to computer systems. Similar provisions exist under the UK Computer Misuse Act, Kenya’s Computer Misuse and Cybercrimes Act, and the United States Computer Fraud and Abuse Act, among many others.

The offence is not theoretical. Prosecutions have occurred. People have been convicted.

A SMALL DECISION WITH A LONG SHADOW

The reason this offence catches so many people off guard is precisely because it feels insignificant in the moment.

There is no confrontation. No alarm. No visible victim standing before you. You simply tap a name on a list and move on.

But the law is not built on feelings. It is built on facts. And the fact is this: you accessed a system that did not belong to you, using access that was never granted to you, for purposes the owner was never consulted about.

That, in the plain language of criminal law, is an offence.

THE SIMPLE SOLUTION

Ask. That is it. If your data runs out and you need to use someone’s connection, knock on the door or send a message.

Permission takes ten seconds to request and completely changes your legal position.

The difference between borrowing and trespassing, in the digital world, is a single question you did not ask.

Before you connect to a network that isn’t yours, pause. The signal may be free. The consequences will not be.

⚖ The law does not wait for you to know it. It simply applies.

RELATED ARTICLES

Most Popular