Jump to content
Ban Hammer

NY case underscores Wi-Fi privacy dangers

 Share

8 posts in this topic

Recommended Posts

Filed: Citizen (apr) Country: Brazil
Timeline

BUFFALO, N.Y. – Lying on his family room floor with assault weapons trained on him, shouts of "pedophile!" and "pornographer!" stinging like his fresh cuts and bruises, the Buffalo homeowner didn't need long to figure out the reason for the early morning wake-up call from a swarm of federal agents.

That new wireless router. He'd gotten fed up trying to set a password. Someone must have used his Internet connection, he thought.

"We know who you are! You downloaded thousands of images at 11:30 last night," the man's lawyer, Barry Covert, recounted the agents saying. They referred to a screen name, "Doldrum."

"No, I didn't," he insisted. "Somebody else could have but I didn't do anything like that."

"You're a creep ... just admit it," they said.

Law enforcement officials say the case is a cautionary tale. Their advice: Password-protect your wireless router.

Plenty of others would agree. The Sarasota, Fla. man, for example, who got a similar visit from the FBI last year after someone on a boat docked in a marina outside his building used a potato chip can as an antenna to boost his wireless signal and download an astounding 10 million images of child porn, or the North Syracuse, N.Y., man who in December 2009 opened his door to police who'd been following an electronic trail of illegal videos and images. The man's neighbor pleaded guilty April 12.

For two hours that March morning in Buffalo, agents tapped away at the homeowner's desktop computer, eventually taking it with them, along with his and his wife's iPads and iPhones.

Within three days, investigators determined the homeowner had been telling the truth: If someone was downloading child pornography through his wireless signal, it wasn't him. About a week later, agents arrested a 25-year-old neighbor and charged him with distribution of child pornography. The case is pending in federal court.

It's unknown how often unsecured routers have brought legal trouble for subscribers. Besides the criminal investigations, the Internet is full of anecdotal accounts of people who've had to fight accusations of illegally downloading music or movies.

Whether you're guilty or not, "you look like the suspect," said Orin Kerr, a professor at George Washington University Law School, who said that's just one of many reasons to secure home routers.

Experts say the more savvy hackers can go beyond just connecting to the Internet on the host's dime and monitor Internet activity and steal passwords or other sensitive information.

A study released in February provides a sense of how often computer users rely on the generosity — or technological shortcomings — of their neighbors to gain Internet access.

The poll conducted for the Wi-Fi Alliance, the industry group that promotes wireless technology standards, found that among 1,054 Americans age 18 and older, 32 percent acknowledged trying to access a Wi-Fi network that wasn't theirs. An estimated 201 million households worldwide use Wi-Fi networks, according to the alliance.

The same study, conducted by Wakefield Research, found that 40 percent said they would be more likely to trust someone with their house key than with their Wi-Fi network password.

For some, though, leaving their wireless router open to outside use is a philosophical decision, a way of returning the favor for the times they've hopped on to someone else's network to check e-mail or download directions while away from home .

"I think it's convenient and polite to have an open Wi-Fi network," said Rebecca Jeschke, whose home signal is accessible to anyone within range.

"Public Wi-Fi is for the common good and I'm happy to participate in that — and lots of people are," said Jeschke, a spokeswoman for the Electronic Frontier Foundation, a San Francisco-based nonprofit that takes on cyberspace civil liberties issues.

Experts say wireless routers come with encryption software, but setting it up means a trip to the manual.

The government's Computer Emergency Readiness Team recommends home users make their networks invisible to others by disabling the identifier broadcasting function that allows wireless access points to announce their presence. It also advises users to replace any default network names or passwords, since those are widely known, and to keep an eye on the manufacturer's website for security patches or updates.

People who keep an open wireless router won't necessarily know when someone else is piggybacking on the signal, which usually reaches 300-400 feet, though a slower connection may be a clue.

For the Buffalo homeowner, who didn't want to be identified, the tip-off wasn't nearly as subtle.

It was 6:20 a.m. March 7 when he and his wife were awakened by the sound of someone breaking down their rear door. He threw a robe on and walked to the top of the stairs, looking down to see seven armed people with jackets bearing the initials I-C-E, which he didn't immediately know stood for Immigration and Customs Enforcement.

"They are screaming at him, 'Get down! Get down on the ground!' He's saying, 'Who are you? Who are you?'" Covert said.

"One of the agents runs up and basically throws him down the stairs, and he's got the cuts and bruises to show for it," said Covert, who said the homeowner plans no lawsuit. When he was allowed to get up, agents escorted him and watched as he used the bathroom and dressed.

The homeowner later got an apology from U.S. Attorney William Hochul and Immigration and Customs Enforcement Special Agent in Charge Lev Kubiak.

But this wasn't a case of officers rushing into the wrong house. Court filings show exactly what led them there and why.

On Feb. 11, an investigator with the Department of Homeland Security, which oversees cybersecurity enforcement, signed in to a peer-to-peer file sharing program from his office. After connecting with someone by the name of "Doldrum," the agent browsed through his shared files for videos and images and found images and videos depicting children engaged in sexual acts.

The agent identified the IP address, or unique identification number, of the router, then got the service provider to identify the subscriber.

Investigators could have taken an extra step before going inside the house and used a laptop or other device outside the home to see whether there was an unsecured signal. That alone wouldn't have exonerated the homeowner, but it would have raised the possibility that someone else was responsible for the downloads.

After a search of his devices proved the homeowner's innocence, investigators went back to the peer-to-peer software and looked at logs that showed what other IP addresses Doldrum had connected from. Two were associated with the State University of New York at Buffalo and accessed using a secure token that UB said was assigned to a student living in an apartment adjacent to the homeowner. Agents arrested John Luchetti March 17. He has pleaded not guilty to distribution of child pornography.

Luchetti is not charged with using his neighbor's Wi-Fi without permission. Whether it was illegal is up for debate.

"The question," said Kerr, "is whether it's unauthorized access and so you have to say, 'Is an open wireless point implicitly authorizing users or not?'

"We don't know," Kerr said. "The law prohibits unauthorized access and it's just not clear what's authorized with an open unsecured wireless."

In Germany, the country's top criminal court ruled last year that Internet users must secure their wireless connections to prevent others from illegally downloading data. The court said Internet users could be fined up to $126 if a third party takes advantage of their unprotected line, though it stopped short of holding the users responsible for illegal content downloaded by the third party.

The ruling came after a musician sued an Internet user whose wireless connection was used to download a song, which was then offered on an online file sharing network. The user was on vacation when the song was downloaded.

link

* ~ * Charles * ~ *
 

I carry a gun because a cop is too heavy.

 

USE THE REPORT BUTTON INSTEAD OF MESSAGING A MODERATOR!

Link to comment
Share on other sites

Filed: Citizen (apr) Country: Ecuador
Timeline

If Alexander Graham Bell were alive, he'd be spinning in his grave, si man.

Actually, former Vice-Perpetrator Algore invented the Internet. One could blame him, si man.

06-04-2007 = TSC stamps postal return-receipt for I-129f.

06-11-2007 = NOA1 date (unknown to me).

07-20-2007 = Phoned Immigration Officer; got WAC#; where's NOA1?

09-25-2007 = Touch (first-ever).

09-28-2007 = NOA1, 23 days after their 45-day promise to send it (grrrr).

10-20 & 11-14-2007 = Phoned ImmOffs; "still pending."

12-11-2007 = 180 days; file is "between workstations, may be early Jan."; touches 12/11 & 12/12.

12-18-2007 = Call; file is with Division 9 ofcr. (bckgrnd check); e-prompt to shake it; touch.

12-19-2007 = NOA2 by e-mail & web, dated 12-18-07 (187 days; 201 per VJ); in mail 12/24/07.

01-09-2008 = File from USCIS to NVC, 1-4-08; NVC creates file, 1/15/08; to consulate 1/16/08.

01-23-2008 = Consulate gets file; outdated Packet 4 mailed to fiancee 1/27/08; rec'd 3/3/08.

04-29-2008 = Fiancee's 4-min. consular interview, 8:30 a.m.; much evidence brought but not allowed to be presented (consul: "More proof! Second interview! Bring your fiance!").

05-05-2008 = Infuriating $12 call to non-English-speaking consulate appointment-setter.

05-06-2008 = Better $12 call to English-speaker; "joint" interview date 6/30/08 (my selection).

06-30-2008 = Stokes Interrogations w/Ecuadorian (not USC); "wait 2 weeks; we'll mail her."

07-2008 = Daily calls to DOS: "currently processing"; 8/05 = Phoned consulate, got Section Chief; wrote him.

08-07-08 = E-mail from consulate, promising to issue visa "as soon as we get her passport" (on 8/12, per DHL).

08-27-08 = Phoned consulate (they "couldn't find" our file); visa DHL'd 8/28; in hand 9/1; through POE on 10/9 with NO hassles(!).

Link to comment
Share on other sites

Not securing your homes wireless network is nuts but people do it all the time.

B and J K-1 story

  • April 2004 met online
  • July 16, 2006 Met in person on her birthday in United Arab Emirates
  • August 4, 2006 sent certified mail I-129F packet Neb SC
  • August 9, 2006 NOA1
  • August 21, 2006 received NOA1 in mail
  • October 4, 5, 7, 13 & 17 2006 Touches! 50 day address change... Yes Judith is beautiful, quit staring at her passport photo and approve us!!! Shaming works! LOL
  • October 13, 2006 NOA2! November 2, 2006 NOA2? Huh? NVC already processed and sent us on to Abu Dhabi Consulate!
  • February 12, 2007 Abu Dhabi Interview SUCCESS!!! February 14 Visa in hand!
  • March 6, 2007 she is here!
  • MARCH 14, 2007 WE ARE MARRIED!!!
  • May 5, 2007 Sent AOS/EAD packet
  • May 11, 2007 NOA1 AOS/EAD
  • June 7, 2007 Biometrics appointment
  • June 8, 2007 first post biometrics touch, June 11, next touch...
  • August 1, 2007 AOS Interview! APPROVED!! EAD APPROVED TOO...
  • August 6, 2007 EAD card and Welcome Letter received!
  • August 13, 2007 GREEN CARD received!!! 375 days since mailing the I-129F!

    Remove Conditions:

  • May 1, 2009 first day to file
  • May 9, 2009 mailed I-751 to USCIS CS
Link to comment
Share on other sites

Filed: AOS (pnd) Country: Canada
Timeline

If the agents were acting in that manner, that's inexcusable.

Breaking down doors of innocent people seems to be the norm these days.

As far as the wireless networks go? Open is a bit much without some other form of security,

nfrsig.jpg

The Great Canadian to Texas Transfer Timeline:

2/22/2010 - I-129F Packet Mailed

2/24/2010 - Packet Delivered to VSC

2/26/2010 - VSC Cashed Filing Fee

3/04/2010 - NOA1 Received!

8/14/2010 - Touched!

10/04/2010 - NOA2 Received!

10/25/2010 - Packet 3 Received!

02/07/2011 - Medical!

03/15/2011 - Interview in Montreal! - Approved!!!

Link to comment
Share on other sites

Filed: Other Country: Russia
Timeline

For some, though, leaving their wireless router open to outside use is a philosophical decision, a way of returning the favor for the times they've hopped on to someone else's network to check e-mail or download directions while away from home .

"I think it's convenient and polite to have an open Wi-Fi network," said Rebecca Jeschke, whose home signal is accessible to anyone within range.

That's kind of silly. I wonder if she also leaves her front door open, so people can come in and use the restroom?

"Public Wi-Fi is for the common good and I'm happy to participate in that — and lots of people are," said Jeschke, a spokeswoman for the Electronic Frontier Foundation, a San Francisco-based nonprofit that takes on cyberspace civil liberties issues.

It's all good until you get dragged out of bed at gunpoint.

Investigators could have taken an extra step before going inside the house and used a laptop or other device outside the home to see whether there was an unsecured signal. That alone wouldn't have exonerated the homeowner, but it would have raised the possibility that someone else was responsible for the downloads.

That's probably a good idea. The extra 10 seconds is a good trade off to avoid the multi million dollar law suit.

QCjgyJZ.jpg

Link to comment
Share on other sites

so it was only after ice assaulted the wrong damn guy that their investigators actually went and looked for other ip addresses that username had been connected to? that sounds like some sh1tty original investigative work too.

I-love-Muslims-SH.gif

c00c42aa-2fb9-4dfa-a6ca-61fb8426b4f4_zps

Link to comment
Share on other sites

so it was only after ice assaulted the wrong damn guy that their investigators actually went and looked for other ip addresses that username had been connected to? that sounds like some sh1tty original investigative work too.

And they could easily have pulled up to the driveway and used any wireless device to determine the wi-fi was unsecured too. Crappy police work indeed.

Still secure your damn wi-fi!

B and J K-1 story

  • April 2004 met online
  • July 16, 2006 Met in person on her birthday in United Arab Emirates
  • August 4, 2006 sent certified mail I-129F packet Neb SC
  • August 9, 2006 NOA1
  • August 21, 2006 received NOA1 in mail
  • October 4, 5, 7, 13 & 17 2006 Touches! 50 day address change... Yes Judith is beautiful, quit staring at her passport photo and approve us!!! Shaming works! LOL
  • October 13, 2006 NOA2! November 2, 2006 NOA2? Huh? NVC already processed and sent us on to Abu Dhabi Consulate!
  • February 12, 2007 Abu Dhabi Interview SUCCESS!!! February 14 Visa in hand!
  • March 6, 2007 she is here!
  • MARCH 14, 2007 WE ARE MARRIED!!!
  • May 5, 2007 Sent AOS/EAD packet
  • May 11, 2007 NOA1 AOS/EAD
  • June 7, 2007 Biometrics appointment
  • June 8, 2007 first post biometrics touch, June 11, next touch...
  • August 1, 2007 AOS Interview! APPROVED!! EAD APPROVED TOO...
  • August 6, 2007 EAD card and Welcome Letter received!
  • August 13, 2007 GREEN CARD received!!! 375 days since mailing the I-129F!

    Remove Conditions:

  • May 1, 2009 first day to file
  • May 9, 2009 mailed I-751 to USCIS CS
Link to comment
Share on other sites

That's kind of silly. I wonder if she also leaves her front door open, so people can come in and use the restroom?

It's all good until you get dragged out of bed at gunpoint.

That's probably a good idea. The extra 10 seconds is a good trade off to avoid the multi million dollar law suit.

:thumbs: and :thumbs: and :thumbs:

Edited by Vi-Jay

Be Shrewd! Be Astute and be aware who's watching ya!

Link to comment
Share on other sites

 

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now
- Back to Top -

Important Disclaimer: Please read carefully the Visajourney.com Terms of Service. If you do not agree to the Terms of Service you should not access or view any page (including this page) on VisaJourney.com. Answers and comments provided on Visajourney.com Forums are general information, and are not intended to substitute for informed professional medical, psychiatric, psychological, tax, legal, investment, accounting, or other professional advice. Visajourney.com does not endorse, and expressly disclaims liability for any product, manufacturer, distributor, service or service provider mentioned or any opinion expressed in answers or comments. VisaJourney.com does not condone immigration fraud in any way, shape or manner. VisaJourney.com recommends that if any member or user knows directly of someone involved in fraudulent or illegal activity, that they report such activity directly to the Department of Homeland Security, Immigration and Customs Enforcement. You can contact ICE via email at Immigration.Reply@dhs.gov or you can telephone ICE at 1-866-347-2423. All reported threads/posts containing reference to immigration fraud or illegal activities will be removed from this board. If you feel that you have found inappropriate content, please let us know by contacting us here with a url link to that content. Thank you.
×
×
  • Create New...