Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


02:41 PM

Internet Users Help Nab Accused Child Predator

Interpol credits Internet users with helping to identify and locate a suspected child predator, who was arrested in New Jersey.

For once, the Internet has been praised for helping -- rather than hindering -- the ability of adults to protect children.

Interpol, an international police organization, has credited Internet users with helping locate a suspected child predator. Interpol announced the arrest of Wayne Nelson Corliss, of Union City, N.J., after receiving tips from Internet users in the United States.

Investigators accuse Corliss, 58, of using the Internet to distribute images of him sexually abusing children in Southeast Asia. After being unable to identify Corliss internally, the investigators posted pictures of Corliss on the Web. Three people in the United States recognized him. Those Internet users e-mailed their tips to Interpol's headquarters in Lyon, France. The tips were relayed to police in New Jersey, where Corliss was arrested.

"Two days ago, this man's nationality, identity and location were totally unknown," Interpol Secretary General Ronald K. Noble, said in a news announcement. "All we had to go by were a series of graphic photographs in which the suspect was seen sexually abusing young children and our confidence that the public and police worldwide would once again respond to Interpol's call for assistance. Then two days later, the primary suspect is now in custody is an outstanding achievement and a credit to the citizens, media and law enforcement worldwide who responded to Intelpol's call."

Julie L. Myers, homeland security assistant secretary for U.S. Immigration and Customs Enforcement, said the case should hearten all who value children's safety and well-being.

While debate rages over how to protect children from predators who stalk and lure victims online, the case highlights how technology can help law enforcement efforts to find sex predators.

Interpol said that it recorded nearly 250,000 site visits to its Web site within 24 hours of launching a global appeal to help identify the suspect. The organization said that's more than 10 times the traffic the Web site normally draws.

"There should be no doubt that the public deeply cares about helping the police to identify the man pictured sexually abusing boys aged between six and 10 in a series of around 100 images found on the Internet and retrieved from the computer of a convicted pedophile," the organization explained in a statement.

A trial date has not yet been set.


Recommended Reading:

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
User Rank: Apprentice
3/4/2015 | 3:47:01 PM
Re: Hackers Can and Do Help
I agree, if you can get hackers to infiltrate suspects of child abuse (not just sexually but any other form as well), then I believe that the world would be a better place in the internet world. Thats the bad thing about any kind of technology, it can be used for good, and it can be used for bad. Since the 90's sick individuals have been using the internet to satisfy their un-natural sexual preferences. I could never wrap my finger around why people can look at a child and actually be sexually attracted to them. Must be the innocence of them or demonic influence. But either way, we need to find a way to be more preventive about this area, rather then just catch them after an act has been done upon a child, destroying they're lives forever.
User Rank: Ninja
6/20/2014 | 6:42:52 PM
Hackers Can and Do Help

First, we don't see enough stories like this. It may have been the equivalent of posting a picture on power poles in a neighborhood, but it worked. You know what else works? Employing hackers to track these criminals down. Pedophiles seem to be under the impression they can get away with anything when the truth is that often it is simply the methodologies being used to track them that are flawed. Give the right team of hackers carte blanche on tracking down people like Wayne Nelson Corliss and task them with getting the child pornography off the web, out of encrypted chat rooms and etc, and you'd find these people dropping like flies.

Glad to see that since this article, Wayne Nelson Corliss has been put away, whether the sentence fits the crime or not is another discussion. HD Moore of Metasploit deserves praise and should be emulated for his anti-pedophile work, in particular trying to track pedophiles using Tor networks. The more of the community step up and flush out these criminals online the better.  Kudos to Anonymous for their war on pedaphiles, too.
COVID-19: Latest Security News & Commentary
Dark Reading Staff 7/2/2020
Ripple20 Threatens Increasingly Connected Medical Devices
Kelly Sheridan, Staff Editor, Dark Reading,  6/30/2020
DDoS Attacks Jump 542% from Q4 2019 to Q1 2020
Dark Reading Staff 6/30/2020
Register for Dark Reading Newsletters
White Papers
Current Issue
How Cybersecurity Incident Response Programs Work (and Why Some Don't)
This Tech Digest takes a look at the vital role cybersecurity incident response (IR) plays in managing cyber-risk within organizations. Download the Tech Digest today to find out how well-planned IR programs can detect intrusions, contain breaches, and help an organization restore normal operations.
Flash Poll
The Threat from the Internetand What Your Organization Can Do About It
The Threat from the Internetand What Your Organization Can Do About It
This report describes some of the latest attacks and threats emanating from the Internet, as well as advice and tips on how your organization can mitigate those threats before they affect your business. Download it today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2020-07-02
Apache Guacamole 1.1.0 and older may mishandle pointers involved inprocessing data received via RDP static virtual channels. If a userconnects to a malicious or compromised RDP server, a series ofspecially-crafted PDUs could result in memory corruption, possiblyallowing arbitrary code to be executed...
PUBLISHED: 2020-07-02
A vulnerability in the web-based management interface of Cisco Unified Communications Manager, Cisco Unified Communications Manager Session Management Edition, Cisco Unified Communications Manager IM & Presence Service, and Cisco Unity Connection could allow an unauthenticated, remote attack...
PUBLISHED: 2020-07-02
In versions 3.0.0-3.5.0, 2.0.0-2.9.0, and 1.0.1, when users run the command displayed in NGINX Controller user interface (UI) to fetch the agent installer, the server TLS certificate is not verified.
PUBLISHED: 2020-07-02
In versions 3.0.0-3.5.0, 2.0.0-2.9.0, and 1.0.1, the Neural Autonomic Transport System (NATS) messaging services in use by the NGINX Controller do not require any form of authentication, so any successful connection would be authorized.
PUBLISHED: 2020-07-02
In versions 3.0.0-3.5.0, 2.0.0-2.9.0, and 1.0.1, the NGINX Controller installer starts the download of Kubernetes packages from an HTTP URL On Debian/Ubuntu system.