After London riot, a stolen laptop is recovered (2024)

by Jeremy Kirk

news

Aug 16, 20114 mins

CareersPasswords

IT security consultant Greg Martin recovered his stolen MacBook Pro using the open-source application Prey

When Greg Martin returned home last Wednesday morning after a night of intense rioting in London, his West End apartment had been ransacked.

Martin, 29, an IT security consultant with the HP-owned security company ArcSight, had spent the previous evening with his girlfriend in southwest London after the two had encountered riot-related trouble and decided to hunker down for the night.

[ Get the no-nonsense explanations and advice you need to take real advantage of cloud computing in the InfoWorld editors’ 21-page Cloud Computing Deep Dive PDF special report. | Stay up on the cloud with InfoWorld’s Cloud Computing Report newsletter. ]

But when he arrived at his apartment in West Kensington in the morning, he found the bars on a window had been pried open with a scaffolding pole. Inside, it was a mess: drawers had been rifled through, money and small electronics had been taken, and gone was his MacBook Pro laptop.

“They just totally turned the place upside down,” said Martin, who has lived in London for two months.

Martin was concerned since he used the laptop for work. The laptop was password protected and the hard disk was encrypted, but it contained sensitive work-related information and personal material.

Martin remembered he’d installed Prey, an open-source application that can track the location of a device once it has connected to the Internet. The application, from a company called Fork with offices in Santiago and Hong Kong, is one of many tracking applications on the market. Fork offers a free version of Prey that allows users to track up to three devices.

Prey’s tracking feature is activated through a Web-based portal by users when they’ve noticed their device is missing. Prey will send periodic reports plotting the location of the device on a Google map using Google’s index of Wi-fi hotspots collected through its Street View imagery cars. Google assigns a GPS geolocation marker to a wireless access point. The frequency with reports are sent can be adjusted and the webcam be turned on as well with Prey.

Although the laptop had a password, Martin suspects that the intruder used Mac OSX installation software to create a new account on the computer, which eventually allowed him to connect to the Internet but also activating Prey.

Martin was having dinner in Luxembourg on a business trip when the first report came in. “It was a really incredible feeling,” he said. “I nearly fell out of my chair. I see this guy staring back at me, and I have his address.”

He ran back to his hotel and upgraded his Prey account to receive more frequent reports, an advanced feature of the paid version. He watched for two hours as the 18-year-old cruised the Internet on his computer, visiting Muslim religious sites, shopping for a car on AutoTrader, and even trying to apply for a Tesco gas card using someone else’s identity.

Prey also takes a screenshot when it compiles its reports. It was only a matter of time before the young man logged into Facebook.

Martin quickly had his name, where he graduated from high school, and his address. The man was just two blocks away, and Martin actually recognized a building that appeared in the background of a photograph taken by the webcam. He was even able to give police an estimate of what floor the suspect lives on.

The police had trouble getting a search warrant immediately, but when Martin returned from his trip, they sent him an email asking the location of the suspect.

“I almost gave them [the police] an entire dossier on the guy,” said Martin, whose laptop was returned to him by police. “They had no problems picking him up.”

The teenager has been charged with handling stolen goods and is expected to appear in court on Friday, Martin said.

Send news tips and comments to jeremy_kirk@idg.com.

Related content

  • analysisHow to choose the right low-code, no-code, or process automation platform Which low-code, no-code, or process automation platform is right for your organization? It depends on how well the platform meets your business objectives. Here are seven questions to help you narrow the field. By Isaac SacolickJul 29, 202414 minsDevelopment ToolsEnterprise Buyer’s GuidesNo Code and Low Code
  • reviewsQdrant review: A highly flexible option for vector search Vector database offers on-prem, cloud-native, or SaaS deployment, leading performance, a rich set of integrations and language drivers, and a dizzying array of optimization options. By Martin HellerJul 29, 202414 minsGenerative AIDatabasesArtificial Intelligence
  • analysisThe other shoe drops on generative AI As open source moves to dominate large language models and artificial intelligence, we need to decide if we care.By Matt AsayJul 29, 20245 minsTechnology IndustryGenerative AIOpen Source
  • featureGet ready for more Java licensing changes The license for Oracle JDK 17 will revert to the Oracle Technology Network License Agreement in September, and users will have some decisions to make. By Simon RitterJul 29, 20245 minsJavaProgramming LanguagesSoftware Development
  • Resources
  • Videos
After London riot, a stolen laptop is recovered (2024)

References

Top Articles
Anatomy Drawing Lessons
Vocabulary Workshop Level G Unit 6 Completing the Sentence - Flashcards | StudyHippo.com
Use Copilot in Microsoft Teams meetings
Faint Citrine Lost Ark
Missing 2023 Showtimes Near Cinemark West Springfield 15 And Xd
Prosper TX Visitors Guide - Dallas Fort Worth Guide
Braums Pay Per Hour
Compare the Samsung Galaxy S24 - 256GB - Cobalt Violet vs Apple iPhone 16 Pro - 128GB - Desert Titanium | AT&T
Bme Flowchart Psu
Tiger Island Hunting Club
What Does Dwb Mean In Instagram
Chastity Brainwash
Detroit Lions 50 50
Cnnfn.com Markets
Local Collector Buying Old Motorcycles Z1 KZ900 KZ 900 KZ1000 Kawasaki - wanted - by dealer - sale - craigslist
272482061
Apne Tv Co Com
Mbta Commuter Rail Lowell Line Schedule
History of Osceola County
Equipamentos Hospitalares Diversos (Lote 98)
Equibase | International Results
How To Cancel Goodnotes Subscription
Lonesome Valley Barber
Buy Swap Sell Dirt Late Model
Copart Atlanta South Ga
Www.publicsurplus.com Motor Pool
Milanka Kudel Telegram
Greenville Sc Greyhound
Bay Area Craigslist Cars For Sale By Owner
When His Eyes Opened Chapter 3123
Stockton (California) – Travel guide at Wikivoyage
Biografie - Geertjan Lassche
Ugly Daughter From Grown Ups
Bfri Forum
Mia Malkova Bio, Net Worth, Age & More - Magzica
"Pure Onyx" by xxoom from Patreon | Kemono
Persona 4 Golden Taotie Fusion Calculator
Dreamcargiveaways
Watchdocumentaries Gun Mayhem 2
Cvb Location Code Lookup
The 38 Best Restaurants in Montreal
Laurin Funeral Home | Buried In Work
Is The Nun Based On a True Story?
Craigslist Florida Trucks
Brandon Spikes Career Earnings
Setx Sports
Dwc Qme Database
705 Us 74 Bus Rockingham Nc
Holzer Athena Portal
The Cutest Photos of Enrique Iglesias and Anna Kournikova with Their Three Kids
Mcoc Black Panther
Latest Posts
Article information

Author: Duane Harber

Last Updated:

Views: 5367

Rating: 4 / 5 (71 voted)

Reviews: 86% of readers found this page helpful

Author information

Name: Duane Harber

Birthday: 1999-10-17

Address: Apt. 404 9899 Magnolia Roads, Port Royceville, ID 78186

Phone: +186911129794335

Job: Human Hospitality Planner

Hobby: Listening to music, Orienteering, Knapping, Dance, Mountain biking, Fishing, Pottery

Introduction: My name is Duane Harber, I am a modern, clever, handsome, fair, agreeable, inexpensive, beautiful person who loves writing and wants to share my knowledge and understanding with you.