Tracking a Stolen Computer
If your computer is stolen, is there any way to track it down based on someone using it and downloading program updates, or some other method?
This question was answered on October 17, 2008. Much of the information contained herein may have changed since posting.The fact that virtually every computer contains sensitive personal or business information has added to the computer theft problem for everyone.
What was once an easy item for thieves to sell for quick cash at a pawn shop is now also the target of sophisticated identity thieves, so the likelihood that you will have a computer stolen in your lifetime is getting pretty good.
When a computer is stolen, there are two primary concerns; the obvious loss of property and the not so obvious loss of proprietary information How many of us really know exactly how much personal information is stored in all the nooks and crannies of our computers?
Since we know that the potential for identity theft from a stolen computer is high, taking steps to protect yourself in the event of a theft before it happens is extremely wise.
Before I get into the tracking options, here are a few basic steps everyone should consider (especially if you own a laptop):
- Make sure you set a password in the computer’s operating system (Windows or MacOS) Laptop users may want to consider adding an additional password that is set at the hardware level in the “BIOS” of the computer as well.
- Minimize or remove any automatically saved usernames and passwords, especially for e-mail programs which are the gateways to taking over your online identity.
- Set a password on any documents or spreadsheets that may contain your personal information
- Use encryption to scramble sensitive files, especially for business laptops Encryption is built into some operating systems (Windows XP Pro, Windows Vista Ultimate and MacOS X) or require a third party program such as TrueCrypt - http://www.truecrypt.org
Your primary goal with these steps is to make it difficult to search through your computer files before they pawn it or reuse it for other purposes.
Since virtually every computer connects to the Internet these days, you can install special software on your computer that will allow you to determine where on the Internet it connects (via the IP address) should it ever be stolen.
In order for these programs to work, the thief must a) Not wipe out or replace the computer’s hard drive and b) Connect to the Internet with your stolen unit.
The basic overview of how these services work is that you install a program that has what equates to a tracking beam in it that can be monitored and once you report your computer stolen, the tracking system starts “listening” for your computer to “phone home”.
Once it gets a signal from your computer, which includes the IP address used to connect, they or you can report the information to law enforcement based on the location (an IP address along with a few other coordinates can be used to obtain a general local).
These systems are not perfect and how fast or effective local law enforcement will be with the information reported by the software varies widely.
One very cool option that several of the vendors offer is the ability to remotely “kill” all the sensitive files on your stolen computer the first time that it connects to the Internet and some can even remotely “retrieve” those sensitive files as well.
You may not get your computer back, but you can pro-actively minimize the chances that your stolen data does not end up in the hands of an identity thief.
The list of programs available are many, but include LoJack for Laptops - http://www.lojackforlaptops.com Absolute Software’s Computrace - http://www.absolute.com MyLaptopGPS - http://www.mylaptopgps.com and even some free programs (that require you to do all of the interacting with law enforcement) like LocatePC - http://www.locatepc.com and the University of Washington’s open source system called Adeona - http://adeona.cs.washington.edu/
Need Help with this Issue?
We help people with technology! It's what we do.
Schedule an Appointment with a location for help!
Posted by Ken of Data Doctors on October 17, 2008