Chance are, you have a wifi network in your home. According to the Wi-Fi Alliance, an estimated 201 million households worldwide use WiFi networks. While many people properly lock down their Wi-Fi networks, several people do not. According to a recent poll conducted by the Alliance, 32% of 18 to 32 year olds acknowledged trying to access a Wi-Fi network that wasn’t theirs.
While some people, such as cyber libertarians, do not lock down their network for ideological reasons, others simply do not know how to protect themselves. Leaving your WiFi network exposed can create serious financial and legal problems. A recent Associated Press article reported that Barry Covert, a Buffalo, New York homeowner, was awoke in the middle of the night by a SWAT unit with an arrest warrant. They believed he was a child pornographer who went by the name “Doldrum.” After being arrested, Covert continued to proclaim his innocence, though he had to prove that he was not who the investigators thought. After searching through his personal computers,the police ultimately determined that Covert had been telling the truth–”About a week later, agents arrested a 25-year-old neighbor and charged him with distribution of child pornography. The case is pending in federal court.” Cover was lucky, but the article reports on other cases, showing that this is not an uncommon problem. Orin Kerr, a professor at George Washington University Law School, notes that this is one reason to secure a WiFi network: “Whether you’re guilty or not, you look like the suspect.” We’ve already blogged, to some degree, on this topic for businesses. So in this article we want to cover ways to securing your WiFi network. For more see Bradley Mitchell’s article posted on About.com.
Obviously, if you find that your network has been improperly used, hire a private investigative company skilled at computer forensics. Whether you are building a defense case or taking preemptive measures, private investigators can help you track down people who have illegally used your network and help build a case for civil or criminal pursuit or defense. |
Equipment is importantCovert Investigations uses Gen-3 military grade night vision on all night surveillance. See a demo at:
http://www.covert-pi.com/services.html and http://www.covert-pi.com/ Gen-3 equipment gives you facial recognition from long distances in the middle of the night and with little to no light. The Gen-3 equipment is not to be confused with the inadequate night shot feature that comes standard with all video cameras. That video when produced only gives silhouetted images and is useless for evidence purposes. If you have an assignment at night and you want quality identifiable evidence please call me or search a company that has similar equipment. If an agency says they have Gen-3 equipment demand it be used and refuse to pay for the assignment if the it is not used. Covert Investigations will never bill a client for failure on our part. Your evidence is important to your case. Be sure your Investigator has that equipment. Observations & Interviews, a blog by Chet EngstromChet Engstrom is owner of Covert Investigations Services, a private investigations firm located in Lewisville, Texas (DFW area). Texas license number: C10745. Archives
February 2017
Categories
All
|
Location4101 McEwen, Dallas, TX, 75244
|
|