Open WiFi leads to SWAT Team fail

Locutus

Adorable Deplorable
Jun 18, 2007
32,230
45
48
65
The long-standing, heavily documented militarization of even small-town American police forces was always going to create problems when it met anonymous Internet threats. And so it has, again—this time in Evansville, Indiana, where officers acted on some Topix postings threatening violence against local police. They then sent an entire SWAT unit to execute a search warrant on a local house, one in which the front door was open and an 18-year old woman sat inside watching TV.

The cops brought along TV cameras, inviting a local reporter to film the glorious operation. In the resulting video, you can watch the SWAT team, decked out in black bulletproof vests and helmets and carrying window and door smashers, creep slowly up to the house. At some point, they apparently "knock" and announce their presence—though not with the goal of getting anyone to come to the door. As the local police chief admitted later to the Evansville Courier & Press, the process is really just “designed to distract." (SWAT does not need to wait for a response.)

Officers break the screen door and a window, tossing a flashbang into the house—which you can see explode in the video. A second flashbang gets tossed in for good measure a moment later. SWAT enters the house.

On the news that night, the reporter ends his piece by talking about how this is "an investigation that hits home for many of these brave officers."

But the family in the home was released without any charges as police realized their mistake. Turns out the home had an open WiFi router, and the threats had been made by someone outside the house. Whoops.

So the cops did some more investigation and decided that the threats had come from a house on the same street. This time, apparently recognizing they had gone a little nuts on the first raid, the police department didn't send a SWAT team at all. Despite believing that they now had the right location and that a threat-making bomber lurked within, they just sent officers up to the door.
"We did surveillance on the house, we knew that there were little kids there, so we decided we weren't going to use the SWAT team," the police chief told the paper after the second raid. "We did have one officer with a ram to hit the door in case they refused to open the door. That didn't happen, so we didn't need to use it."

Their target appears to be a teenager who admits to the paper that he has a "smart mouth," dislikes the cops, and owns a smartphone—but who denies using it to make the threats.

While the open WiFi issue has caused many problems over the last five years—especially in child porn cases—the FBI is becoming more savvy about how it executes search warrants. As we noted last December, a well-run FBI child porn investigation (also in Indiana) took rather obvious precautions before executing a warrant:
On April 30, two FBI special agents drove past the Carmel home and noted the existence of two WiFi networks reachable from the property. One used WEP encryption, the other had the more robust WPA2, but the key point from the FBI's perspective was that neither network was unsecured. A search thus seemed much more likely to find its proper target.
Because most people aren't stupid enough to make obvious threats from their own home Internet connection, the corollary principle also holds: if a home does have an open WiFi connection, investigators might want to ease away from the flashbangs-and-SWAT-team approach; the threat of getting it wrong is a real one.

But Evansville police aren't backing down from their initial SWAT raid (read more about their later justification for using such force). And the targets of that raid aren't pleased. As the owner of the first house told the paper, "The front door was open. It’s not like anyone was in there hiding. To bring a whole SWAT team seems a little excessive."

The city will be paying to repair the damage it caused.

Not that all Evansville residents think the SWAT raid was in any way improper. Writing on the same Topix message boards where the initial threats emanated, one resident responded to critics: "They had a warrant. Sometimes warrants turn up nothing. Her home was repaired. On with your life now crusader!!! Lol"

"Noodle heads come on here thinking they are just big bad asses, threatening cops and their families," wrote another, "then the cops come back and bitch slap them with SWAT teams and flash bang grenades. Awesome. Teach these fools a lesson and make examples out of them."

But when all you have is an IP address, some non-trivial percentage of the time you teach a lesson to the wrong fools.


SWAT team throws flashbangs, raids wrong home due to open WiFi network | Ars Technica
 

SLM

The Velvet Hammer
Mar 5, 2011
29,151
3
36
London, Ontario
Do that many people really have an open WiFi? Everywhere I've ever gone, with the exception of some business establishments, has their signal locked.
 

DurkaDurka

Internet Lawyer
Mar 15, 2006
10,385
129
63
Toronto
Do that many people really have an open WiFi? Everywhere I've ever gone, with the exception of some business establishments, has their signal locked.

Many people with limited tech know how do, I see them all the time at my place in Toronto. I believe most routers sold now come with encryption enabled by default, which is a good thing if you don't want pedophiles etc doing illegal things with your connection.
 

shadowshiv

Dark Overlord
May 29, 2007
17,545
120
63
50
Many people with limited tech know how do, I see them all the time at my place in Toronto. I believe most routers sold now come with encryption enabled by default, which is a good thing if you don't want pedophiles etc doing illegal things with your connection.

Is there an option you can check on your computer that would allow you to check to see if the connection is secure or not? My OS is Windows XP if that makes a difference.
 

SLM

The Velvet Hammer
Mar 5, 2011
29,151
3
36
London, Ontario
Many people with limited tech know how do, I see them all the time at my place in Toronto. I believe most routers sold now come with encryption enabled by default, which is a good thing if you don't want pedophiles etc doing illegal things with your connection.

Really? Everyone around where I live is locked/password protected. (My favourite local WiFi is "IAMAVIRUS", lol. He's fooling no one ;))

Every router I've ever bought and set up has the password as part of the set up procedure, so it does surprise me that more people don't have one. Anyway, my understanding is that most private WiFi passwords can be broken if someone really targets you but it should prevent random strangers from accessing it.
 

dumpthemonarchy

House Member
Jan 18, 2005
4,235
14
38
Vancouver
www.cynicsunlimited.com
Whether it was my house, your house, this house, makes no difference... they were spending the money to try to look important so that they maintain their budget, etc.

Short term, of course, spend the money you have or you will get less next year. It is not responsible.

When it comes to terrorism, unless you have a gun and some materials, you can't be a threat to the state. Uttering threats here is meaningless. The police are a joke, they are wasting valuable resources and can't recognize a genuine threat. You don't treat all fools equally or seriously, it's called judgement and it's lacking here.

If a person utters a threat to someone, say on the street, that can be a clear incitement to immediate violence and a crime. A crime against a person is not terrorism, even if that person is terrified. A nut shooting a building is not terrorism. It's just a nut flying off the handle.

If that nut is a stooge or not, and there are others with a political agenda behind him, then yes it could be terrorism. But a disgruntled person, even with a weapon is not a terrorist. There must be an organisation, agenda and weapons.

The Toronto 18 were terrorists because they had an organisation, an agenda and fertilizer, to attack the state.
 

Niflmir

A modern nomad
Dec 18, 2006
3,460
58
48
Leiden, the Netherlands
Even with an encrypted network, if the default password is used, if the password is too short, if the protocol is WEP, if the attacker is determined to have anonymity, then the protection can be cracked.

An IP address is nothing more than circumstantial evidence that the owner of the connection may know more details about what happened.
 

dumpthemonarchy

House Member
Jan 18, 2005
4,235
14
38
Vancouver
www.cynicsunlimited.com
Even with an encrypted network, if the default password is used, if the password is too short, if the protocol is WEP, if the attacker is determined to have anonymity, then the protection can be cracked.

An IP address is nothing more than circumstantial evidence that the owner of the connection may know more details about what happened.

Shaky hi-tech evidence of the potential perps, and no real physical evidence. Obviously, the USA is under seige and war must be declared over and over and over.