Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Risk

5/9/2008
02:41 PM
50%
50%

Internet Users Help Nab Accused Child Predator

Interpol credits Internet users with helping to identify and locate a suspected child predator, who was arrested in New Jersey.

For once, the Internet has been praised for helping -- rather than hindering -- the ability of adults to protect children.

Interpol, an international police organization, has credited Internet users with helping locate a suspected child predator. Interpol announced the arrest of Wayne Nelson Corliss, of Union City, N.J., after receiving tips from Internet users in the United States.

Investigators accuse Corliss, 58, of using the Internet to distribute images of him sexually abusing children in Southeast Asia. After being unable to identify Corliss internally, the investigators posted pictures of Corliss on the Web. Three people in the United States recognized him. Those Internet users e-mailed their tips to Interpol's headquarters in Lyon, France. The tips were relayed to police in New Jersey, where Corliss was arrested.

"Two days ago, this man's nationality, identity and location were totally unknown," Interpol Secretary General Ronald K. Noble, said in a news announcement. "All we had to go by were a series of graphic photographs in which the suspect was seen sexually abusing young children and our confidence that the public and police worldwide would once again respond to Interpol's call for assistance. Then two days later, the primary suspect is now in custody is an outstanding achievement and a credit to the citizens, media and law enforcement worldwide who responded to Intelpol's call."

Julie L. Myers, homeland security assistant secretary for U.S. Immigration and Customs Enforcement, said the case should hearten all who value children's safety and well-being.

While debate rages over how to protect children from predators who stalk and lure victims online, the case highlights how technology can help law enforcement efforts to find sex predators.

Interpol said that it recorded nearly 250,000 site visits to its Web site within 24 hours of launching a global appeal to help identify the suspect. The organization said that's more than 10 times the traffic the Web site normally draws.

"There should be no doubt that the public deeply cares about helping the police to identify the man pictured sexually abusing boys aged between six and 10 in a series of around 100 images found on the Internet and retrieved from the computer of a convicted pedophile," the organization explained in a statement.

A trial date has not yet been set.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Kaytana22
50%
50%
Kaytana22,
User Rank: Apprentice
3/4/2015 | 3:47:01 PM
Re: Hackers Can and Do Help
I agree, if you can get hackers to infiltrate suspects of child abuse (not just sexually but any other form as well), then I believe that the world would be a better place in the internet world. Thats the bad thing about any kind of technology, it can be used for good, and it can be used for bad. Since the 90's sick individuals have been using the internet to satisfy their un-natural sexual preferences. I could never wrap my finger around why people can look at a child and actually be sexually attracted to them. Must be the innocence of them or demonic influence. But either way, we need to find a way to be more preventive about this area, rather then just catch them after an act has been done upon a child, destroying they're lives forever.
RetiredUser
100%
0%
RetiredUser,
User Rank: Ninja
6/20/2014 | 6:42:52 PM
Hackers Can and Do Help
 

First, we don't see enough stories like this. It may have been the equivalent of posting a picture on power poles in a neighborhood, but it worked. You know what else works? Employing hackers to track these criminals down. Pedophiles seem to be under the impression they can get away with anything when the truth is that often it is simply the methodologies being used to track them that are flawed. Give the right team of hackers carte blanche on tracking down people like Wayne Nelson Corliss and task them with getting the child pornography off the web, out of encrypted chat rooms and etc, and you'd find these people dropping like flies.

Glad to see that since this article, Wayne Nelson Corliss has been put away, whether the sentence fits the crime or not is another discussion. HD Moore of Metasploit deserves praise and should be emulated for his anti-pedophile work, in particular trying to track pedophiles using Tor networks. The more of the community step up and flush out these criminals online the better.  Kudos to Anonymous for their war on pedaphiles, too.
Microsoft Patches Wormable RCE Vulns in Remote Desktop Services
Kelly Sheridan, Staff Editor, Dark Reading,  8/13/2019
The Mainframe Is Seeing a Resurgence. Is Security Keeping Pace?
Ray Overby, Co-Founder & President at Key Resources, Inc.,  8/15/2019
GitHub Named in Capital One Breach Lawsuit
Dark Reading Staff 8/14/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
7 Threats & Disruptive Forces Changing the Face of Cybersecurity
This Dark Reading Tech Digest gives an in-depth look at the biggest emerging threats and disruptive forces that are changing the face of cybersecurity today.
Flash Poll
The State of IT Operations and Cybersecurity Operations
The State of IT Operations and Cybersecurity Operations
Your enterprise's cyber risk may depend upon the relationship between the IT team and the security team. Heres some insight on what's working and what isn't in the data center.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-15132
PUBLISHED: 2019-08-17
Zabbix through 4.4.0alpha1 allows User Enumeration. With login requests, it is possible to enumerate application usernames based on the variability of server responses (e.g., the "Login name or password is incorrect" and "No permissions for system access" messages, or just blocki...
CVE-2019-15133
PUBLISHED: 2019-08-17
In GIFLIB before 2019-02-16, a malformed GIF file triggers a divide-by-zero exception in the decoder function DGifSlurp in dgif_lib.c if the height field of the ImageSize data structure is equal to zero.
CVE-2019-15134
PUBLISHED: 2019-08-17
RIOT through 2019.07 contains a memory leak in the TCP implementation (gnrc_tcp), allowing an attacker to consume all memory available for network packets and thus effectively stopping all network threads from working. This is related to _receive in sys/net/gnrc/transport_layer/tcp/gnrc_tcp_eventloo...
CVE-2019-14937
PUBLISHED: 2019-08-17
REDCap before 9.3.0 allows time-based SQL injection in the edit calendar event via the cal_id parameter, such as cal_id=55 and sleep(3) to Calendar/calendar_popup_ajax.php. The attacker can obtain a user's login sessionid from the database, and then re-login into REDCap to compromise all data.
CVE-2019-13069
PUBLISHED: 2019-08-17
extenua SilverSHielD 6.x fails to secure its ProgramData folder, leading to a Local Privilege Escalation to SYSTEM. The attacker must replace SilverShield.config.sqlite with a version containing an additional user account, and then use SSH and port forwarding to reach a 127.0.0.1 service.