Can stolen computers be traced directly through the Internet?

  • #1
3,106
4
Does a virtual "LoJack" for computers exist? By means of their informational nature, does not a computer trade data concerning their identity with whomever they come in contact with? Such a communication, if it exists, could put an eventual damper on hardware cybertheft.
 

Answers and Replies

  • #2
345
3
if the computer has a network card there's alway the possibility of tracing it through the MAC address, which is unique to every network card out there. Not exactly a trivial task, but possible.

In order for a computer 'LoJack' system to be effective, the computer itself would have to connected to a network or be able to broadcast a signal somehow. It would have to be something that's integrated into hardware and not easy to remove (software can always be deleted).

Then someone would have to be able to detect the signal the stolen computer sends out. Locating it physically would be the next challenge. It's easy to tell if a computer is operating. Finding out where it's operating is the hard part.
 
  • #3
223
0
if the computer has a network card there's alway the possibility of tracing it through the MAC address

Well, you can always take the ethernet card out, or change the MAC address, Mac addys are administravely changeable
 
  • #4
dduardo
Staff Emeritus
1,891
3
You can basically do what lo-jack does by installing a GPS device and a becon into the computer. If the computer is stolen you activate the becon and the GPS device will allow you to locate the computer.
 
  • #5
223
0
unless you rip of/out the becon ;-)
 
  • #6
dduardo
Staff Emeritus
1,891
3
Not if it is built right into the motherboard.
 
  • #7
551
1
What's "lo-jack"? :confused:
 
  • #8
921
0
Nylex said:
What's "lo-jack"?
It is a beacon for your automobile that allows police to track and recover that automobile if you report it stolen. The name is a play on the word hijack.

http://www.lojack.com
 
  • #9
russ_watters
Mentor
20,877
7,404
imabug said:
if the computer has a network card there's alway the possibility of tracing it through the MAC address, which is unique to every network card out there. Not exactly a trivial task, but possible.
A similar concept is the unique identifier now put on Intel chips. That was supposed to be for security purposes (internet ID theft deterrent) anyway.
 
  • #10
1
0
Ethernet ID

russ_watters said:
A similar concept is the unique identifier now put on Intel chips. That was supposed to be for security purposes (internet ID theft deterrent) anyway.

How is that possible? Can my stolen Mac mini being traced by that?

Thanks.
 
  • #11
-Job-
Science Advisor
1,151
2
Build a windows service that runs in the background, and at any time (like boot up) accesses a web page (a script) which logs information like IP, etc. I built such a service for my server, watch out. :)
 
  • #12
187
0
http://www.brigadoonsoftware.com/

this company setup something like u sent an email to their server eveytime u log on to internet and they can trace where u from.
 
  • #13
rhody
Gold Member
675
3
http://www.pcmag.com/article2/0,2817,2386305,00.asp" [Broken]

No funny comments on necroposting either, hehe... and that includes you, Jimmy... this is a legitimate post.

The app is called Hidden. It functions by tracking the laptop's movements through collecting network data and taking photos of the culprit and screenshots of the computer in use.

Kaufman's laptop was stolen on March 21. He filed a police report with the Oakland Police Deparment that same day, and he began to use Hidden to collect photos and location data. Much to his dismay, there was little progress with his case.

Two months later on May 27, he launched a web campaign, This Guy Has My MacBook, via Tumblr. He updated his tumblelog with photos taken of who he suspected stole the laptop.

One of the images shows Albedashi with his shirt off in bed. Another shows Albedashi asleep on his couch. Kaufman cross-posted his Tumblr to Twitter on May 31 and picked up thousands of hits and tweets.

With the steady increase in popularity of his campaign and calls from several media outlets, Oakland police reopened the case. On May 31, Kaufman was contacted by Officer Holly Joshi that the police were moving forward with his case.

Undercover officers contacted Albedashi's taxi company and had them arrange a pickup for the suspect. Upon arriving at the location, Albedashi was arrested and the laptop was retrieved.

Kaufman concluded his campaign with, "ARRESTED! An Oakland police officer just called me to let me know that they arrested the guy in my photos! BOOYA!"

Nice to know such things exist, especially with students who fall victim to thieves in college and are tech savy, now, you have a way to protect yourselves and fight back.

Rhody... :smile:
 
Last edited by a moderator:
  • #14
2,745
22
Nice to know such things exist, especially with students who fall victim to thieves in college and are tech savy, now, you have a way to protect yourselves and fight back.

Rhody... :smile:

Macs have similar software that has gained a lot of publicity recently.

They track the computer and take pictures and a few reports have come in of people being arrested with it.

I know iPhones have the same tech too, with a number of people being caught with them.
 
  • #15
rhody
Gold Member
675
3
Macs have similar software that has gained a lot of publicity recently.

They track the computer and take pictures and a few reports have come in of people being arrested with it.

I know iPhones have the same tech too, with a number of people being caught with them.

Jared,

Isn't technology wonderful ?! Yep...

Rhody... :smile:
 
  • #16
2,745
22
I've always been curious why nobody implemented it earlier. Seems like a no brainer now it's here...
 
  • #17
MATLABdude
Science Advisor
1,657
4
There's a whole swack of device tracking software nowadays:
http://en.wikipedia.org/wiki/Comparison_of_device_tracking_software

The aforementioned PCPhoneHome is a rootkit that claims to be able to survive a format. LoJack resides in the BIOS / EFI.

Nevertheless, sufficiently persistent thieves could probably work around these issues. It'd make theft cost-prohibitive (maybe), but it's not impossible to overcome.
 
  • #18
Borg
Science Advisor
Gold Member
1,918
2,524
http://www.pcmag.com/article2/0,2817,2386305,00.asp" [Broken]

No funny comments on necroposting either, hehe... and that includes you, Jimmy... this is a legitimate post.



Nice to know such things exist, especially with students who fall victim to thieves in college and are tech savy, now, you have a way to protect yourselves and fight back.

Rhody... :smile:
I saw this story this morning and got a good laugh. These recovery stories are becoming more common as the software becomes more popular. Here's one of the snapshots that came from the stolen laptop. :rofl:
http://www.cnn.com/2011/TECH/web/06/02/stolen.laptop.returned/index.html" [Broken]

t1larg.thisguy.courtesy.jpg
 
Last edited by a moderator:
  • #19
rhody
Gold Member
675
3
Borg,

That is almost as good as one of Jimmy Synder's zingers, thanks... You just made my day and it hasn't started yet ! What an ugly little twerp of a thief too.

Rhody... :rofl:

P.S. Long ago, on any home laptop I use, if I want privacy at home, I put a piece of tape over the camera in the top of the laptop. Now you can see why, even for rightful owners, too bad I can't disable the built in microphone as well.
 
Last edited:
  • #20
Borg
Science Advisor
Gold Member
1,918
2,524
Borg,

That is almost as good as one of Jimmy Synder's zingers, thanks... You just made my day and it hasn't started yet ! What an ugly little twerp of a thief too.

Rhody... :rofl:

P.S. Long ago, on any home laptop I use, if I want privacy at home, I put a piece of tape over the camera in the top of the laptop. Now you can see why, even for rightful owners, too bad I can't disable the built in microphone as well.
Glad that you enjoyed it. He is pretty goofy looking.

Here's another stupid criminal but, the owner didn't need tracking software.
http://www.dailymail.co.uk/news/art...ts-leering-picture-owners-Facebook-page.html"

That's right. Not his own Facebook page but the victim's page. The picture should have included a sign saying please put me in jail.
 
Last edited by a moderator:
  • #22
1
0
As I know after computer is stolen it continue to run common tasks: check for email, go to startup page when browser opens, etc.
And this activity is recorded to logs on mail server, startup page server, etc.
You (or police) can contact these companies and ask for these logs/records so you will get IP address and time of connection - which point to new user of computer...
 
  • #23
2,981
5
Sorry, how can a "beacon" give GPS data?
 
  • #24
I am thinking to build a .NET based windows application that can send MAC id and IP information along with keylogs to a personal email address.
I dont know how to take pics using webcam yet in .NET .

Btw, My friend lost his laptop recently :(.
 

Related Threads on Can stolen computers be traced directly through the Internet?

  • Last Post
Replies
5
Views
6K
  • Last Post
Replies
4
Views
1K
Replies
3
Views
2K
  • Last Post
Replies
5
Views
3K
  • Last Post
Replies
8
Views
3K
Replies
6
Views
2K
  • Last Post
Replies
18
Views
3K
  • Last Post
Replies
16
Views
3K
Replies
2
Views
2K
Top