Besides the places listed, Changi Airport T2 transit area and if you travel to KLIA also can use Wireless LAN to access Internet.
Now, come the config part. To gain access, need to know 2 parameters, SSID(Site ID) and Encryption key. In most of these site with free access, the encryption key is turn off, i.e do not use encryption at all. As for SSID, 2 choices. First choice use the client utility come with the PCMCIA card to do a scan on the base station. Once you got the SSID name, key in the SSID in the client configuration setup. Second method, if you have Avaya/Orinoco or Cisco PCMCIA card, use the following SSID.
Avaya/Orinoco - SSID use "ANY"
Cisco - SSID use "tsunami"
If you have Avaya/Orinoco or Cisco product, use the above SSID and turn off the encryption key. This will allow you you to gain access to any public site which offer free access without the need to key in the specific site ID.
The Mac address on its own is not traceable, after all no register is kept of who has what Mac address, however it's a data item you can be tracked with.
If the crime was sufficiently bad enough, they could pull MAC address logs from every 'public' site, cross reference them all - and maybe get an association with a login ID, then account details, etc...
Simple detective work.
We track MAC addresses on our LAN (Sydney University). I can track them to ports on ethernet switches. Whe know what port (thus what room/desk) the machine is located in, the IP address and often then we can work out the user...) Wireless has only just gone in, but the same information is available.
If some one did some serious hacking from wireless, we would just watch for that MAC address to pop up again and look at when and where. Eventually the user would access some service that required authentication with that wireless card and the gaps in their identity would fall into place.....