Absolute Software Corporation, the maker of theft recovery software named Computrace LoJack, has released some pretty amazing stories about their notebook theft recovery efforts over the last year. This might make lowlifes think twice before lifting your laptop!
The way Computrace software works is that if your laptop is stolen and then a thief uses the laptop to connect to the internet in any way, Absolute Software Corporation can track where the user has logged on and then work with local law enforcement authorities to track down the thief and obtain an arrest warrant. For more information on Absolute Software and its range of Computer Theft Recovery and Secure Asset Tracking solutions, please visit www.absolute.com.
Stolen Laptop Given Honorable Dischargefrom Iraq
In October 2005, a laptop reported stolen from a college in Illinois began calling in to the Absolute Monitoring Center from an Army barracks stateside. Before a recovery could be attempted, the laptop began calling in from Iraq. The user of the laptop had joined the National Guard and, once contacted in Iraq, indicated he had bought the laptop from someone at the college. The soldier promptly shipped the laptop back to the States where it was returned to its rightful owner. As a token of support to the troops, Absolute provided the serviceman with a new replacement computer.
Chop Shop Uncovered Thanks to Computrace
In Texas, Computrace led police to an auto repair shop, where they found not only the laptop that had been reported stolen, but a stolen luxury SUV, worth over $50,000. Numerous arrests ensued, and the case continues.
Santa Returns Laptops Stolen During Hurricane Katrina
Three laptops reported stolen during Hurricane Katrina were purchased by a woman in Alabama over an online auction service. The buyer kept one of the laptops for herself, and arranged for Santa to give the other two to her kids for Christmas. When informed that the used laptops she had purchased were stolen, Santa Mom offered up the computers. Not wanting to ruin Christmas for the kids, local law enforcement gave Santa a few days grace, giving her time to purchase two identical new laptops, transfer the electronic files over while the kids slept, and then replace the laptops, with the kids none the wiser!
Laptop Takes World Tour, Calls Home Often
A laptop reported stolen from a student in New Jersey in October 2005, called in to Absolute's Monitoring Center five days later from Hong Kong. Shortly thereafter, the laptop began calling in from England, then Dubai, then England again, and next from a hotel in Florida. When the laptop popped up in Massachusetts the next day, state police apprehended an astonished Hong Kong businessman who had bought the computer through an online auction service. A detective who helped crack the case sums it up: "I don't think I'd ever want you guys chasing me."
Stolen Laptops Flunk Student
Two laptops reported stolen from a university in Florida began calling from the same location. Detectives discovered the suspect was a student at the university - and was using the laptops to send out graduation invitations to his family and friends. When a detective knocked on the door and asked the student if he knew why he was there, he replied, matter-of-factly, that he'd stolen two laptops from school. Despite the student's admirable - though belated - cooperation, the youth was charged with two counts of grand theft and will not be graduating.
Over 100 Laptops Recovered for Independent School District
Over 100 stolen or missing laptops have been recovered for one of the nation's largest Independent School Districts (ISD) since they installed Computrace on the district's 15,000 computers. Laptops belonging to this ISD have been recovered from Texas to New Jersey to California after having been purchased by unsuspecting bargain-hunters at pawn shops, flea markets, garage sales, parking lots - even a car wash. Computers belonging to this ISD have been recovered along with other stolen goods and narcotics.
Police Use Computrace-Enabled Laptop in Sting Operation
A Police Department in Texas arranged for a laptop protected by Computrace to end up in the hands of an individual under surveillance. The Computrace-enabled laptop helped police to ultimately break up a crime ring involved in identity theft and the production of counterfeit credit cards.
Stolen Laptop Brings Down House of Crime
A stolen laptop recently pointed authorities in North Carolina to an individual allegedly involved in a wide range of criminal activity. According to local law enforcement officers, the ensuing investigation of the residence revealed not only the stolen laptop, but various other allegedly stolen goods, including another computer ready to ship to an unsuspecting shopper from an online auction service. Also found at the residence were large amounts of contraband. Numerous charges are pending, while the investigation continues.
-
-
Wouldn't this software be useless if theives would just perform a HD reformating?
-
Yeah l was thinking the same thing ctyau. That or they took out the wifi card and never used the internet on it.
-
Interesting....
-
maybe the company shouldn't advertise how succesful they are with their technique. Just makes the crooks wise up to the fact they have to do a fresh install pronto.
-
yah, i don't get it either. a complete wipe should render this program useless...and it would seem logical that the thief would format (to get rid of the owner's files)
-
Wow if I had a mother that bought me a laptop for Christmas that would be sweet.
Tim -
Still you have this big brother thing in your notebook . -
I think the assumption is most people will boot the notebook first to look for goodies. They may have other safeguards in place though, I haven't investigated. Something on a hidden partition would be pretty tricky.
-
The Computrace/Absolute is built into the BIOS of some manufactor IBM/Lenovo/HP/Dell buisness models. Even if you remove the harddrive it is still in the BIOS and will send info when you connect to the internet.
So if you do steal one. It is no use to you as a "whole computer". The most you can do is gut out the CPU,RAM,HD,DVD/CD. Or you can just use the computer for everything execpt internet.
You have to consider for companies, it's not the physical hardware but the confidential information on the laptop. -
Brian:
"Stealth" software programs can be useful in tracking down and, if all the stars align, actually apprehending thieves.
But our firm's roots remain firmly planted in the realm of prevention. Indeed, while managing laptop theft prevention ain't easy, it's always easier to STOP a thief than to catch one.
Best regards,
Doug Belfiore
STOP Security Tracking of Office Property
www.stoptheft.com
The Most Interesting Notebook Theft Recoveries of the Last Year
Discussion in 'Notebook News and Reviews' started by Brian, May 16, 2006.