Posted on 06/26/2012 10:19:42 AM PDT by Altariel
EVANSVILLE Stephanie Milan, 18, was relaxing in her familys living room Thursday watching the Food Network when a heavily armed squad of Evansville police officers arrived on the front porch.
Dressed in full protective gear, police broke the storm door of the home at 616 East Powell Ave. the Milans front door was already open on the hot summer day. They also broke a front window. They tossed a flashbang stun grenade into the living room that made a deafening blast. A short distance away, a local television crews cameras were rolling. The police had invited the station to videotape the forced entry of the residence.
Stephanie Milan said she managed to remain calm because she knew her family hadnt done anything wrong. Still, she was stunned and confused.
After speaking to Milan and her grandmother, Louise, police determined those inside the house had nothing to do with their investigation.
Police were executing a search warrant for computer equipment, which they said was used to make anonymous and specific online threats against police and their families on the website topix.com.
The front door was open. Its not like anyone was in there hiding, said Ira Milan, Stephanie's grandfather and owner of the property for many years. To bring a whole SWAT team seems a little excessive.
Ira Milan said the perpetrator of the threats likely used Stephanies Internet service connection from an outside location, which led police to the East Powell Avenue address.
But Police Chief Billy Bolin said, We have no way of being able to tell that, and the concerning Internet posts definitely come back to that address.
I think it was a show of force that they are not going to tolerate this, said Ira Milan, But what about the residents and what they have to tolerate?
After noting he has lived there for 30 years, Milan said, No one has ever been arrested at my house.
Bolin said Friday that department records indicated relatives associated with the address had criminal histories.
Mayor Lloyd Winnecke said Friday he spoke to Bolin about the incident and was satisfied that police were justified in forcibly entering the home.
They had what they thought were very specific threats against police officers, their families and the communities, Winnecke said.
He said police told him that the Milans storm door and window were being repaired at city expense.
Workers were at the Milan home on Friday repairing the storm door and broken window. Carpet inside the house was stained with black residue from the flashbang grenade.
Ira Milan said police offered to pay for the damage. Laptops and a cellphone belonging to Stephanie Milan a May graduate of Signature School who will attend the University of Southern Indiana this fall and major in radiology were seized in the raid and remained in police possession on Friday.
Bolin said the SWAT team used its standard knock and announce procedure of knocking on the wall and repeating the words police search warrant three times before entering.
The police chief said the procedure doesnt require officers to wait for a response.
Its designed to distract, he said.
The decision to use force
Police used what they called a law enforcement threat matrix to determine the proper response to information in the posts. One post mentioned explosives, and another specifically named Bolin and referenced the area where he lives. But no other officers names or addresses were identified.
Sgt. Jason Cullum, a police department spokesman, said one person had posted that he possessed explosives, and that Evansville is going to feel the pain. That threat, Cullum said, played a major role in dictating the police response.
Cullum said the conversation at topix.com which concerned officers began under a blog headline.
It said, EPD leak: Officers addresses given out, or something along those lines. There were some generalized comments about people not liking the police, and that didnt really concern us, Cullum said, but then the threats became more specific and suggested officers families could be at risk.
Time stamps on the postings indicated that they were made Wednesday evening. Cullum defended the departments action.
We brought them out and talked to them, Cullum said of the Milans. They were released at the scene. Investigators felt they were not involved in the posting.
This is a little more difficult that a traditional crime scene, because were dealing with the Internet. They definitely werent expecting (a SWAT team at the door). The reason we did that is the threats were specific enough, and the potential for danger was there.
This is a big deal to us, Cullum said. This may be just somebody who was online just talking stupid. What I would suggest to anybody who visits websites like that is that their comments can be taken literally.
The search warrant
Police were executing a search warrant approved by a judge. Such warrants are routinely filed in the Vanderburgh County Clerks Office, but officials in the clerks office said Friday afternoon they had no record of a warrant served on that address.
When asked by the Courier & Press for access to the document that allowed them to force entry to the home, Bolin refused. He said it might contain information that would compromise their investigation. However, he said the document didnt contain names of any suspects.
We have an idea in our mind who it is, but we dont have evidence yet, Bolin said.
Vanderburgh County Prosecutor Nick Hermann also refused to release the warrant.
The Courier & Press filed Freedom of Information requests Friday afternoon seeking the document from the police department, clerks office and prosecutors office.
IPs and MAC addresses can be spoofed with little effort. Something as simple as changing the Reply-To address in MSOutlook or Thunderbird can mislead someone into thinking you’re someone you’re not.
There’s no surefire way to be safe in the digital age except to reduce your digital footprint as much as possible. In the age of social media, it’s really as simple as searching the web for someone with an opposing viewpoint and targeting them. Easy solution? Stay off of social media.
I agree with your assessment, Gads, and there need to be more legal avenues to prosecute police and SWAT for errant raids.
Ah, that makes more sense now, I read your post wrong.
I also turn off SID broadcasting in addition to the encryption as well as MAC filtering.
So many manufacturers have done this “one touch setup” crap that completely removes the human element from security and creates simple-to-guess garbage passwords with poor wireless security.
I’ve demonstrated to numerous neighbors how easy it was to get into their networks, and they’ve all asked me to help secure them. I never charge when they ask. Heck, even my wireless network got broken into a few years ago after I neglected to turn off port forwarding for a test I was conducting. There ARE ethical hackers out there, but they’re a lot fewer than those who wish to exploit you.
This should be normally turned off by default I believe, but that is definitely one of those that can be easily missed.
Brilliant!
I run numerous services from my domain, so I have port forwarding on for a lot of ports. If you have something answering on the other end, it’s not so bad, but if you just have ports wide open with nothing there, it’s an avenue into your network.
Unfortunately mine was a SQL port which was used to attempt a back door brute force attack on a voice server, but I use 160 - 220 bit randomly-generated passwords saved to a key database on an encrypted thumb drive, so the chances of them actually doing any damage was pretty small; and I caught the attempt through DDoS logging on my router.
You got that some’bitch locked up nice and tight, I run a web server on an obscure port for testing purposes, but pretty much everything else is plugged up like public toilet.
*Evansville ping*
For your edification.
The comments at the article mostly support the stormtroopers.
The zombies outnumber us.
Been involved in IT security and networking for over 10 years. The threats evolve but even the oldest exploits are still around and lurking.
I’m actually disappointed in retail-level manufacturers like Linksys (Cisco), dLink, and NetGear for releasing products that are so faulty. Sure it’s on the consumer to lock down their networks, but when they make it as easy as pressing a button to make a connection, you have to expect that those with the know-how are going to exploit it.
Easy does not mean secure.
Update Hell! And lose this cornucopia of opportunities to practice their methods and maybe shoot some dogs or even citizens and get paid vacations as rewards for their “mistakes?”
There are many instances of hired techs installing back door spyware.
Make sure the person helping is certified and undergoes regular background checks. Also, even if you turn off your wireless feature and use wired connections, the router / firewall still needs to be secured properly. A web crawler could still seek to penetrate the firewall (like Stuxnet).
Can you say “pigs” ? “Wannabe nazi ninja storm troopers” ? “Scum that should be fired and prosecuted” ?
I knew you could. Police officers (no relation to the above) should be disgusted by such tactics.
Make threats against a (non-VIP) private citizen, and the police will yawn. Make threats against the police, and the SWAT team will "make an example" of you.
Yes. Heaven forbid some goon's family might be at risk. I can't really understand why some might not like the police.
Perhaps it's because the cops don't really care who's house they break into or who's grandmother is rousted/shot/killed?/i
Turning off SSID broadcast doesn’t do much except keep the really stupid criminals out. There are plenty of free tools which will still find your network.
Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.