All that will end up happening is that the real violators will begin 'sharing' on connections other than their own. Technology adapts...always.
In the area that I live, I can pick up a minimum of 4 wifi access points that are wide open. A few others are WEP encrypted (which can be hacked in less than 5 minutes) and the rest are WPA/WPA2 encrypted (which can also be hacked, but it's easy to socially engineer ways to get the key in any event).
And then there is IP address spoofing and botnet control - no Wifi needed.
The process being touted to identify these persons also makes it quite easy for them to be set up.
Like I alluded to before in another debate we had about this issue, the tactics that are being used may appear to be productive, but will backfire eventually.
It's only a matter of time before the names of a few judges/lawyers/politicians start popping up on that "porn pirate" list and then they will become quite aware of how easy it is to spoof an IP or get into a wifi network.
Cases after that point will not go very far.
__________________

|