A few weeks back, the annual Crimes Against Children Conference was held in Dallas. A few thousand attendees from law enforcement, child protective services, social work and other related disciplines gathered to share knowledge on protecting society’s most vulnerable group. The list of exhibitors at the conference included a fair number of computer- and network-related vendors.
As a father and frequent consultant to local law enforcement efforts, I’m glad that this sort of gathering takes place and that those professionals in the various related trenches fully realize that child exploitation has a significant technical component to be reckoned with. At the same time, the AirCheck press release shows that it’s easy to make potentially faulty decisions based on assumptions and lack of depth in knowing what you’re really up against.
Quick back story: Fluke Networks puts out some amazing test equipment and network appliances for both wired and wireless environments. I have several of its products, and have kicked the tires on many more. Fluke is the same company that now owns the Air Magnet wireless support tool line, and the AirCheck tester puts a lot of wireless environment analysis capability in the hands of those who wield it. But it takes more than just a good tool, especially when it comes to entering suspected criminals’ homes based on what you think you’re seeing on any analysis platform.
Getting back to the press release, I do agree with Fluke Network’s claims that AirCheck is a breeze to use for non-techies and those actually in the Wi-Fi network game alike. And I do agree with Sergeant Dave Mathers of the City of Martinez PD who said “Combating the growing threat of child pornography on the Internet is a nationwide priority” and that the AirCheck (and in my opinion, a number of other tools as well) can help quantify the technical lay of the RF space where bad guys work their misdeeds. But let’s get to what’s flawed about this press release.