BUFFALO, N.Y. – Lying on his family room floor with assault weapons trained on him, shouts of “pedophile!” and “pornographer!” stinging like his fresh cuts and bruises, the Buffalo home-owner didn’t need long to figure out the reason for the early morning wake-up call from a swarm of federal agents.

That new wireless router. He’d gotten fed up trying to set a password. Someone must have used his Internet connection, he thought.

“We know who you are! You downloaded thousands of images at 11:30 last night,” the man’s lawyer, Barry Covert, recounted the agents saying.

“Somebody else could have, but I didn’t do anything like that,” he said.

“You’re a creep … just admit it,” they said.

Law enforcement officials say the case is a cautionary tale. Their advice: Password-protect your wireless router.

Advertisement

Plenty of others would agree. The Sarasota, Fla., man, for example, who got a similar visit from the FBI last year after someone on a boat docked in a marina outside his building used a potato chip can as an antenna to boost his wireless signal and download 10 million images of child porn.

Or the North Syracuse, N.Y., man who in December 2009 opened his door to police who had been following a trail of illegal videos and images. The man’s neighbor pleaded guilty April 12.

For two hours that March morning in Buffalo, agents tapped away at the homeowner’s desktop computer, eventually taking it with them, along with his and his wife’s iPads and iPhones.

Within three days, investigators determined the homeowner had been telling the truth: If someone was downloading child pornography through his wireless signal, it wasn’t him. About a week later, agents arrested a 25-year-old neighbor and charged him with distribution of child pornography. The case is pending in federal court.

It’s unknown how often unsecured routers have brought legal trouble for subscribers. Besides the criminal investigations, the Internet is full of anecdotal accounts of people who have had to fight accusations of illegally downloading music or movies.

Whether you’re guilty or not, “you look like the suspect,” said George Washington University Law School professor Orin Kerr, who said that’s one of many reasons to secure home routers.

Advertisement

Experts say the more savvy hackers can go beyond just connecting to the Internet on the host’s dime and steal passwords or other sensitive data.

A study released in February provides a sense of how often computer users rely on their neighbors to gain Internet access.

The poll conducted for the Wi-Fi Alliance, the industry group that promotes wireless technology standards, found that among 1,054 Americans age 18 and older, 32 percent acknowledged trying to access a Wi-Fi network that wasn’t theirs. An estimated 201 million households worldwide use Wi-Fi networks, according to the alliance.

The same study, conducted by Wakefield Research, found that 40 percent said they would be more likely to trust someone with their house key than with their Wi-Fi network password.

For some, though, leaving their wireless router open to outside use is is a philosophical decision. For example, Rebecca Jeschke’s home signal is accessible to anyone within range.

“Public Wi-Fi is for the common good and I’m happy to participate in that — and lots of people are,” said Jeschke, a spokeswoman for the Electronic Frontier Foundation, a nonprofit that takes on cyberspace civil liberties issues.

Advertisement

Experts say wireless routers come with encryption software, but setting it up means a trip to the manual.

The government’s Computer Emergency Readiness Team recommends that home users disable the identifier broadcasting function that allows wireless access points to announce their presence. It also advises users to replace default network names or passwords and to check the manufacturer’s website for security updates.

People who keep an open wireless router won’t necessarily know if someone else is piggybacking on the signal, but a slower connection may be a clue.

For the Buffalo homeowner, who didn’t want to be identified, the tip-off wasn’t nearly as subtle.

It was 6:20 a.m. March 7 when he and his wife heard someone breaking down their rear door. At the top of the stairs, he looked down to see seven armed people with jackets bearing the initials I-C-E, which he didn’t immediately know stood for Immigration and Customs Enforcement.

“They are screaming at him, ‘Get down on the ground!’ He’s saying, ‘Who are you? Who are you?’” Covert said.

Advertisement

“One of the agents runs up and basically throws him down the stairs, and he’s got the cuts and bruises to show for it,” said Covert, who said the home-owner plans no lawsuit. When he was allowed to get up, agents watched as he used the bathroom and dressed.

U.S. Attorney William Hochul and ICE Special Agent in Charge Lev Kubiak later apologized to the homeowner.

But this wasn’t a case of officers rushing into the wrong house. Court filings show what led them there and why.

On Feb. 11, an investigator with the Department of Homeland Security, which oversees cybersecurity enforcement, signed in to a peer-to-peer file sharing program from his office. After connecting with someone by the screen name of “Doldrum,” the agent browsed through his shared files and found images and videos depicting children engaged in sexual acts.

The agent identified the IP address, or unique identification number, of the router, then got the service provider to identify the subscriber.

Investigators could have taken an extra step before going inside the house and used a laptop or other device outside the home to see whether there was an unsecured signal. That would have raised the possibility that someone other than the homeowner was responsible for the downloads.

Advertisement

After a search of his devices proved the homeowner’s innocence, investigators looked at logs that showed what other IP addresses Doldrum had connected from. Two were associated with the State University of New York at Buffalo and accessed using a secure token that UB said was assigned to a student living near the homeowner.

Agents arrested John Luchetti on March 17. He has pleaded not guilty to distribution of child pornography.

Luchetti is not charged with using his neighbor’s Wi-Fi without permission. Whether it was illegal is up for debate.

“The question,” said Kerr, “is whether it’s unauthorized access and so you have to say, ‘Is an open wireless point implicitly authorizing users or not?’

“We don’t know,” Kerr said. “The law prohibits unauthorized access, and it’s just not clear what’s authorized with an open unsecured wireless.”

 


Only subscribers are eligible to post comments. Please subscribe or login first for digital access. Here’s why.

Use the form below to reset your password. When you've submitted your account email, we will send an email with a reset code.