In a recent theft of a laptop … from one’s home … the burglar was caught because of an embedded anti-theft software program.
The homeowners were puzzled and could not figure out how someone was able to get into their home, steal their property, and get away, since there was no sign of forced entry into the house. The owners reported the thefts to the Sheriff’s department.
What the thief didn’t know was that one of the stolen laptop computers was embedded with a “LoJack for Laptops” theft recovery software. The company’s monitoring center was notified of the theft by the owners and the monitoring company kept in close contact with the sheriff’s investigator.
The monitored laptop was also equipped with photo recognition software. When the suspect in possession of the stolen laptop realized he could not log onto the computer, he had a completely new operating system installed and the photo recognition software removed. He incorrectly thought the embedded monitoring software had been removed, but it is very difficult to remove it.
The suspect used the laptop to log on to Facebook. This enabled the monitoring company to gather the suspect’s personal information, including a photo of him, his name, and more. This was given to the Sheriff’s investigator who showed the photo of the suspect to the victims. They immediately recognized him as an unlicensed contractor who had done work at their home two months prior. The victim didn’t know him by name, but their information was sufficient to find and arrest the suspect.
Do you have access to such software?