Unsecured Wi-Fi Networks: A Hiding Place For Online Criminals - InformationWeek

InformationWeek is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


Unsecured Wi-Fi Networks: A Hiding Place For Online Criminals

Officials with the Internet Crimes Against Children task force are concerned that consumers and businesses are unaware they're contributing to the problem.

Though it's used by millions of law-abiding Internet surfers, looks like Wi-Fi also is offering safe haven to criminals who like the anonymity the wireless technology offers.

According to a report in this week's Washington Post, the 46,000 public access Wi-Fi points scattered across the U.S. offer a new vehicle for criminals to carry out their evil business. Law enforcement authorities, who so far have been focusing their investigations primarily on child pornography and other exploitation of children, say they are growing concerned that the anonymous use of unsecured wireless networks will grow.

Their finding? People with mischief on their minds simply log on to unsecured public Wi-Fi access sites or, in some reported cases, piggyback onto private unsecured networks.

"We're not sure yet how to combat that," law enforcement agent Kevin West in North Carolina told the Post. "Free wireless spots are everywhere and it makes it easy for people ... to sit there and do their nefarious acts. The fear is that if we talk about it, people will learn about it and say, 'I can go to a parking lot, and no one will catch me.' But we need to talk about it so that we can figure out how to solve it."

More than 45 multi-jurisdictional task forces from the Internet Crimes Against Children task force carry out sting operations designed to catch sex offenders who target children. The operation is multi-jurisdictional because the perpetrators often work across municipal and state lines. But recently the task forces have been running into situations in which they are about to pounce on a child molester only to find the suspect was hiding behind an unsecured wireless network.

"Technology just makes the park no longer the only place where the pervert goes," said West.

Law enforcement officers continue to use software and other tracking devices to hunt pederasts and other offenders by tracing their IP addresses; that tactic, of course, can't work with sex offenders hiding behind a wireless network.

One solution to the growing problem, law enforcement authorities say, is for networks to be secured. A two-part article published this month in Network Systems Designline on how to secure your home wireless network serves up several suggestions.

We welcome your comments on this topic on our social media channels, or [contact us directly] with questions about the site.
Comment  | 
Print  | 
More Insights
InformationWeek Is Getting an Upgrade!

Find out more about our plans to improve the look, functionality, and performance of the InformationWeek site in the coming months.

10 Things Your Artificial Intelligence Initiative Needs to Succeed
Lisa Morgan, Freelance Writer,  4/20/2021
Tech Spending Climbs as Digital Business Initiatives Grow
Jessica Davis, Senior Editor, Enterprise Apps,  4/22/2021
Optimizing the CIO and CFO Relationship
Mary E. Shacklett, Mary E. Shacklett,  4/13/2021
White Papers
Register for InformationWeek Newsletters
The State of Cloud Computing - Fall 2020
The State of Cloud Computing - Fall 2020
Download this report to compare how cloud usage and spending patterns have changed in 2020, and how respondents think they'll evolve over the next two years.
Current Issue
Successful Strategies for Digital Transformation
Download this report to learn about the latest technologies and best practices or ensuring a successful transition from outdated business transformation tactics.
Flash Poll