Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


02:41 PM

Internet Users Help Nab Accused Child Predator

Interpol credits Internet users with helping to identify and locate a suspected child predator, who was arrested in New Jersey.

For once, the Internet has been praised for helping -- rather than hindering -- the ability of adults to protect children.

Interpol, an international police organization, has credited Internet users with helping locate a suspected child predator. Interpol announced the arrest of Wayne Nelson Corliss, of Union City, N.J., after receiving tips from Internet users in the United States.

Investigators accuse Corliss, 58, of using the Internet to distribute images of him sexually abusing children in Southeast Asia. After being unable to identify Corliss internally, the investigators posted pictures of Corliss on the Web. Three people in the United States recognized him. Those Internet users e-mailed their tips to Interpol's headquarters in Lyon, France. The tips were relayed to police in New Jersey, where Corliss was arrested.

"Two days ago, this man's nationality, identity and location were totally unknown," Interpol Secretary General Ronald K. Noble, said in a news announcement. "All we had to go by were a series of graphic photographs in which the suspect was seen sexually abusing young children and our confidence that the public and police worldwide would once again respond to Interpol's call for assistance. Then two days later, the primary suspect is now in custody is an outstanding achievement and a credit to the citizens, media and law enforcement worldwide who responded to Intelpol's call."

Julie L. Myers, homeland security assistant secretary for U.S. Immigration and Customs Enforcement, said the case should hearten all who value children's safety and well-being.

While debate rages over how to protect children from predators who stalk and lure victims online, the case highlights how technology can help law enforcement efforts to find sex predators.

Interpol said that it recorded nearly 250,000 site visits to its Web site within 24 hours of launching a global appeal to help identify the suspect. The organization said that's more than 10 times the traffic the Web site normally draws.

"There should be no doubt that the public deeply cares about helping the police to identify the man pictured sexually abusing boys aged between six and 10 in a series of around 100 images found on the Internet and retrieved from the computer of a convicted pedophile," the organization explained in a statement.

A trial date has not yet been set.

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
User Rank: Apprentice
3/4/2015 | 3:47:01 PM
Re: Hackers Can and Do Help
I agree, if you can get hackers to infiltrate suspects of child abuse (not just sexually but any other form as well), then I believe that the world would be a better place in the internet world. Thats the bad thing about any kind of technology, it can be used for good, and it can be used for bad. Since the 90's sick individuals have been using the internet to satisfy their un-natural sexual preferences. I could never wrap my finger around why people can look at a child and actually be sexually attracted to them. Must be the innocence of them or demonic influence. But either way, we need to find a way to be more preventive about this area, rather then just catch them after an act has been done upon a child, destroying they're lives forever.
User Rank: Ninja
6/20/2014 | 6:42:52 PM
Hackers Can and Do Help

First, we don't see enough stories like this. It may have been the equivalent of posting a picture on power poles in a neighborhood, but it worked. You know what else works? Employing hackers to track these criminals down. Pedophiles seem to be under the impression they can get away with anything when the truth is that often it is simply the methodologies being used to track them that are flawed. Give the right team of hackers carte blanche on tracking down people like Wayne Nelson Corliss and task them with getting the child pornography off the web, out of encrypted chat rooms and etc, and you'd find these people dropping like flies.

Glad to see that since this article, Wayne Nelson Corliss has been put away, whether the sentence fits the crime or not is another discussion. HD Moore of Metasploit deserves praise and should be emulated for his anti-pedophile work, in particular trying to track pedophiles using Tor networks. The more of the community step up and flush out these criminals online the better.  Kudos to Anonymous for their war on pedaphiles, too.
Deliver a Deadly Counterpunch to Ransomware Attacks: 4 Steps
Mathew Newfield, Chief Information Security Officer at Unisys,  12/10/2019
Intel's CPU Flaws Continue to Create Problems for the Tech Community
Irfan Ahmed, Assistant Professor in the Department of Computer Science at Virginia Commonwealth University,  12/10/2019
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: Our Endpoint Protection system is a little outdated... 
Current Issue
The Year in Security: 2019
This Tech Digest provides a wrap up and overview of the year's top cybersecurity news stories. It was a year of new twists on old threats, with fears of another WannaCry-type worm and of a possible botnet army of Wi-Fi routers. But 2019 also underscored the risk of firmware and trusted security tools harboring dangerous holes that cybercriminals and nation-state hackers could readily abuse. Read more.
Flash Poll
Rethinking Enterprise Data Defense
Rethinking Enterprise Data Defense
Frustrated with recurring intrusions and breaches, cybersecurity professionals are questioning some of the industrys conventional wisdom. Heres a look at what theyre thinking about.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2019-12-12
Intesync Solismed 3.3sp1 allows Local File Inclusion (LFI), a different vulnerability than CVE-2019-15931. This leads to unauthenticated code execution.
PUBLISHED: 2019-12-12
Cacti through 1.2.7 is affected by multiple instances of lib/functions.php unsafe deserialization of user-controlled data to populate arrays. An authenticated attacker could use this to influence object data values and control actions taken by Cacti or potentially cause memory corruption in the PHP ...
PUBLISHED: 2019-12-12
An issue was discovered in Intesync Solismed 3.3sp1. An flaw in the encryption implementation exists, allowing for all encrypted data stored within the database to be decrypted.
PUBLISHED: 2019-12-12
A reflected XSS issue was discovered in DAViCal through 1.1.8. It echoes the action parameter without encoding. If a user visits an attacker-supplied link, the attacker can view all data the attacked user can view, as well as perform all actions in the name of the user. If the user is an administrat...
PUBLISHED: 2019-12-12
The Scoutnet Kalender plugin 1.1.0 for WordPress allows XSS.