skip navigation


Register for Latest Research

Stay Informed
Register with NCJRS to receive NCJRS's biweekly e-newsletter JUSTINFO and additional periodic emails from NCJRS and the NCJRS federal sponsors that highlight the latest research published or sponsored by the Office of Justice Programs.

NCJRS Abstract

The document referenced below is part of the NCJRS Virtual Library collection. To conduct further searches of the collection, visit the Virtual Library. See the Obtain Documents page for direction on how to access resources online, via mail, through interlibrary loans, or in a local library.


NCJ Number: 228666 Find in a Library
Title: Wireless Crime, Wireless Criminals: Investigating 802.11 Networks and the People Who Abuse Them
Journal: Law Enforcement Technology  Volume:36  Issue:7  Dated:July 2009  Pages:10,12,15
Author(s): Christa Miller
Date Published: July 2009
Page Count: 5
Type: Instructional Material; Issue Overview
Format: Article
Language: English
Country: United States of America
Annotation: This article cites criminal abuses of wireless computer networks, suggests how such crimes should be investigated by police, and how users of wireless networks can improve their security.
Abstract: Created to improve mobility for business users, wireless network technology has also appealed to home-computer users who want to create “peer to peer" networks that link computers, gaming, and other entertainment devices. The expanded use of wireless technology has been facilitated by a decline in the cost of routers and access points, network interface cards, and computers themselves. Speed has also improved. Improvements will continue with the approval of a new standard, 802.11n, later in 2009. In addition to experiencing fewer dead spots, consumers of wireless technology will be able to download and save video from their computer to wireless-enabled devices such as televisions. These improvements will also benefit criminals and present greater challenges to law enforcement in the investigation of crimes committed through wireless networks. Wireless networking power makes it easier for criminals to create, download, and share materials, such as pornography. It will also enable them to steal networking from their neighbors from much farther away. Given this new capacity and means for committing computer-related crime, investigators must know what to look for in terms of evidence, how to look for it, and what to do with it once it is found. A key part of investigating the wireless crime scene is router interrogation. This involves determining how many IP addresses were leased in a wireless network. Leases indicate how many devices might be found on a network. This article provides guidelines for investigating routers in order to obtain useful information for identifying a suspect involved in computer-related crime. Suggestions are also offered for how users of wireless systems can make them more secure against crime and abuse.
Main Term(s): Police policies and procedures
Index Term(s): Computer abuse; Computer aided investigations; Computer crime investigative Training; Computer crime prevention measures; Computer evidence; Computer privacy and security; Computer related crime; Computers; Investigative techniques; Police computer training
To cite this abstract, use the following link:

*A link to the full-text document is provided whenever possible. For documents not available online, a link to the publisher's website is provided. Tell us how you use the NCJRS Library and Abstracts Database - send us your feedback.