"Back To My Mac" Catches a Thief 329
robipilot writes "Mac stolen, Mac comes online, owner connects using 'Back to My Mac,' owner takes picture of culprit, and voila, criminal caught. OK, it wasn't quite that simple, but here's an interesting story of using some built-in technology on the Mac to recover a stolen laptop."
Imagine (Score:4, Insightful)
Re:Imagine (Score:4, Insightful)
Re:Imagine (Score:4, Informative)
Re: (Score:2, Funny)
Re:Imagine (Score:5, Interesting)
Re:Imagine (Score:5, Informative)
now, you could have a an automatic program to upload to a web server, but in this case, the owner used a subscription service from apple to gain control of the camera remotely, and snap a picture, ironically, the laptop starts a timer , and he tried to raise his hand to obscure the camera, but apparently, the picture is taken too fast for a person to realize what's going on.
just the picture the cops said would have been useful in catching the crook (they would have given copies to the places that fence stolen stuff, and they'd call the cops while 'figuring out the value' of the goods before they knew what was happening... it's a crime to purchase stolen goods after all) but in this case, the person was an acquaintance of their roommate, so they went to the cops to tell then who had the stuff, before they had even fenced the goods.
so apparently, you should fence your stolen laptops without hooking them to the internet. (and with automatic wireless networking and people with open networks, that might be hard in some cities if you even turn it on)
Re:Imagine (Score:4, Informative)
Re:Imagine (Score:5, Interesting)
With this having been posted to Slashdot, Natalie Portman is going to wonder where all those Macs and cases of instant grits came from.
Re: (Score:2, Insightful)
Why do we... wtf is wrong with you? (Score:5, Funny)
You act like you haven't had your domain sqatted on by Jenny's Personal Co-Ed Webcam Sexperience after missing a payment that one time that it happened to me.
Re: (Score:2)
Re:Imagine (Score:5, Informative)
Taking iSight photos during invalid login attempts [macosxhints.com]
Take photos via cron every 5 minutes [blogspot.com]
Take a photo everytime the lid is opened [deography.com] (Includes all of his pictures.
Re: (Score:3, Funny)
Ohhh, Okay... The girls can look, too.
Re:Imagine (Score:5, Informative)
Like most computers with built-in webcams, the MacBooks feature a prominent green LED that lights up when the camera is in use. This LED cannot be disabled in software. If Apple were actually spying on people with their computers' built-in cameras, someone would have noticed, fast.
Re: (Score:2)
Re:Imagine (Score:5, Funny)
Re: (Score:2)
Even if you don't believe in conspiracy theories, your "hard fact" makes no sense at all. If it were an optical mouse, where the laser is needed for its functioning, I would agree, but the camera can work just fine without the LED on, so which power of nature or world-wide law forces it to be on every time the camera is on?
Re: (Score:2)
The thief actually saw that and tried to cover the lens, but was too late...
Re: (Score:2)
But its crappy articles like this one that mean that often there is much more content in the discussion than the actual article.
Re: (Score:2)
But, we can calmly thing through our steps, but this poor soul had a few seconds to react under pressure.
Re:Imagine (Score:5, Interesting)
Personally, I have Undercover installed on all my and my siblings laptops.
I wish the guy that wrote the command line tool (iSightCapture [macupdate.com]) to take photos would either release the source or make some updates. A video capture CLI tool would be awesome.
I'm thinking of writing my own poor man's Undercover using cron, bash scripts and curl. Attempt to curl a website which I have access to, all the website does is return a 1 or a 0. (Stolen, not stolen). If anything gets taken just update my website and next time my Mac connects to the net, it gets what it needs.
Re: (Score:3, Insightful)
So someone would have to break into my house. Take apart my laptop, solder some bits on, re assemble it so they could spy on me.
Re:Imagine (Score:5, Funny)
"WHEN I STEAL YOUR LAPTOP"
When i steal your laptop
i'm going to use it offline
so i can harvest your personal info
with a data miner i have on my usb keychain
then i'm going to wipe the os clean
and change the mac address on your network card
and sell the fucker on kijiji
i'll meet you in the arby's parking lot
to sell you back your own machine
that you no longer recognize
because I put hello kitty decals on it.
A viola? Really? (Score:5, Funny)
Re:A viola? Really? (Score:5, Funny)
Rome was burning (Score:2)
Re:Rome was burning (Score:4, Insightful)
The violin wasn't invented until many centuries after the burning of Rome. Nero did play an instrument, a cithra I believe it is called, and did consider himself to be quite a musician. (Oddly I don't recall any mention of his skill level in my studies, just that he was passionate and competed and organized competitions.)
Titicus (spelling?), the historian, was pretty clear in what Nero really did during the burning of Rome. He was much more effective than, say, FEMA. He rushed down, helped to fight the fires, gave shelter, and provided food at either a discounted or free rate. I'm not entirely sure if it was free or discounted and I lack the initiative to look this stuff up.
So, while the idea of a tyrant (which Nero certainly was) ignoring the plights of the people makes for great copy it just didn't happen that way. What did happen is that Nero used this fire to persecute the Christians but that was after the fire when the people were looking for someone to blame.
Anyhow... To the point... Err... Wait, no... I didn't have a point.
Re: (Score:3, Interesting)
Nero did play an instrument, a cithra I believe it is called, and did consider himself to be quite a musician. (Oddly I don't recall any mention of his skill level in my studies,
That's because no one knows. No matter how good or how bad he was, he would still be awarded every prize there was.
Titicus (spelling?), the historian,
Tacitus, Annals 15.38-44. Accounts are also given by Cassius Dio book 62, and Suetonius' Life of Nero.
He rushed down, helped to fight the fires, gave shelter, and provided food at either a discounted or free rate. I'm not entirely sure if it was free or discounted and I lack the initiative to look this stuff up.
Not everyone is as lazy. Tacitus continues after the passage you refer to (15.39), "These acts, though popular, produced no effect, since a rumour had gone forth everywhere that, at the very time when the city was in flames, the emperor appeared on a private stage and sang the Sack of T
Re:A viola? Really? (Score:5, Funny)
No, you misunderstood. They were able to use the software with no strings attached.
Re: (Score:2, Funny)
Re:A viola? Really? (Score:5, Funny)
That's an awful pun. You should be ashamed of yourself, you've really lowered the tone in this thread.
Re:A viola? Really? (Score:5, Funny)
Re: (Score:3, Informative)
If it were funny, sure, but the joke just fell flat.
Re:A viola? Really? (Score:5, Funny)
Re: (Score:3, Funny)
Geez I know I'm highly strung, but this is the pits!
Re:A viola? Really? (Score:4, Funny)
Re:A viola? Really? (Score:4, Funny)
Re: (Score:3)
Re: (Score:3, Funny)
Re: (Score:3, Funny)
...and if those puns didn't blow ya away, would wind?
Re:A viola? Really? (Score:4, Funny)
Re:A viola? Really? (Score:5, Funny)
(I don't know why I bother. Most
Re: (Score:2)
their real occupation (Score:5, Insightful)
Why take a snapshot? (Score:5, Insightful)
Re: (Score:2, Interesting)
Re: (Score:2)
(Disclosure: I own a Mac.)
Re: (Score:2)
Re: (Score:2)
I'd think the length of the countdown could be used a measure of the thief's idiocy.
Re:Why take a snapshot? (Score:4, Informative)
Re: (Score:2)
Re: (Score:2)
Re:Why take a snapshot? (Score:5, Insightful)
Re: (Score:2)
Re: (Score:2)
Re:Why take a snapshot? (Score:5, Informative)
Re:Why take a snapshot? (Score:5, Funny)
Re: (Score:2, Informative)
That goes all the way back to the original 128K Mac, when you had a few special commands wedged in there. If I recall correctly, Apple-shift-1 (and 2) ejected the floppy, and 3 was the picture and 4 did something else (maybe actually print it.)
Re: (Score:2)
Re: (Score:2, Informative)
Also, Command+Shift[+Ctrl]+4 gives you a reticle to do a rectangular selection before copying to the desktop/clipboard.
Re: (Score:2)
Re:Why take a snapshot? (Score:5, Insightful)
Re: (Score:2)
Re: (Score:3, Informative)
PNG, PDF, TIFF, PICT, JPEG, JPEG 2000, BMP, GIF, PSD, CGI or TGA.
Re: (Score:3, Funny)
Re: (Score:3, Insightful)
Privacy concerns (Score:2, Insightful)
Re: (Score:2)
Re:Privacy concerns (Score:4, Insightful)
A short applescript could be make that would enable/disable the iSight with the click of a button. Hella easier than having to unplug a USB cable...less wasted motion and lord knows I hate having to do anything physical because I post on slashdot.
Step away from the tinfoil, man. Are you a little concerned that people can study your online habits because you broadcast that information over the World Wide Web? A webcam is a useful thing, and all useful things can be used or abused; that's a fact of life and there's no getting around it. So either put up with some security concerns or live your life in a padded room (though, admittedly, this will only mitigate security risks, not eliminate them...)
Re: (Score:2)
Yeah, I read your last paragraph too. Just saying
The Honeynet Project (Score:3, Funny)
See also P-p-p-Powerbook! [encycloped...matica.com] for a possible laugh.
Poetic Justice (Score:5, Insightful)
I know, this being Slashdot we have to worry about the privacy issues, compare the Mac to somebody's Vista laptop, disparage the cops, fret about security in general, and not fail to point out that a viola is indeed a stringed instrument.
But there's just something so damned satisfying about imagining these two thugs being caught red-handed with the loot. There's the impression of the victim realizing that she may be onto something. Her "Now I've got you, you son of a bitch!" as the fatal snap takes place. The "Oh, shit" realization of the thief, probably followed by frantic thoughts of how he might go about flushing two widescreen TV's and assorted recreational electronics. The genuine gratification of being able to walk into the police station and say, "Here are photographs of the guys who ripped off our stuff, actually using some of our stuff, and we know who they are..." Perhaps then the THUD THUD THUD at the malefactors' door.
It's got all the elements of the classic cautionary tale, and just reading it should bring at least a brief and sarcastic smile to the face of anybody who's ever been robbed.
Mug shots (Score:3, Funny)
So what's the big deal? (Score:2)
This just looks like a bunch of Apple marketing hype. Nothing new here folks.
Comment removed (Score:3, Interesting)
Re: (Score:3, Informative)
Re: (Score:3, Informative)
Unless the owner has disabled alternate booting through the EFI, you can change anyone's Mac OS user password by booting with a Mac OS installer DVD and using a standard password utility to change the root password or any user password.
A program called Undercover will transmit pictures using the built-in iSight camera (with t
openvpn = win (Score:2)
And yes, the endpoint is firewalled off...so thieves shall not be sneaking into my network over it.
In the early days of webcams ... (Score:2, Funny)
Undercover (Score:3, Informative)
Phoning home not just for "them." (Score:4, Interesting)
Did anyone see the movie, with Patrick Stewart, "Safe House?" To make a long story short, he has to enter a password every day to ensure an automated system does not activate. If he ever fails to enter that password, the system assumes he's dead and will let loose damaging blackmail that keeps him alive.
Anyway, a system like that would be very cool for home users. A small "safe house" program that gets run at startup that prompts for a password and gives you a number of tries. If the password is unsuccessful, the camera is activated, and web cam photos are sent to a known server when the network comes up, along with sound as well. Possibly key strokes and new documents web traffic and sites. All this happens quietly, in fact, there is no feedback as to the password being unsuccessful after the second try.
This information, along with the IP address, can be used to identify the thief and recover the property.
Home Version (Score:5, Interesting)
I run Ubuntu on my home PCs and changed the default login screen to list the users. I created a 'Guest' account and in it's description I put 'Password = 123qwe' (not the real password). The assumption is that a burglar , not knowing much about OS'es, will want to use the PC and will choose the easiest path to gain access. When they turn the PC on the login screen gives them a list of users and an option of choosing "Guest Account with the Password shown. All household users have been told to *never* use this account and why.
This 'Guest' account is CharRooted and has Firefox, IM and other Internet clients all on the desktop but that's about it. Under the hood it opens up SSH, VNC, Terminal Server and every other conceivable way of gaining access. It starts a script that every 30 minutes emails my Gmail account with IP address and connection information. Also, logging on to this account invokes a 'Nuke' scrip that will DBAN type wipe the system if I don't deactivate it within 7 days.
It's not a perfect solution but it has all the capabilities and features of the subscription tracking services that can cost hundreds a year and it's all pretty easy to setup. If any thief steals my PC and uses it to connect to the Internet I will know everything about their connection and have full access to the machine. If it's truly lost and I can't regain control after they login, it self destructs.
Now that I thinks about it, this should be a Ubuntu package or at least a HowTO.
-[d]-
No camera. Alternatives? (Score:3, Interesting)
But what other sensory information does my laptop have? One thought: Wifi. Even before it connects, it can give you the names of wireless networks nearby. If you could somehow upload that list to a server you control, there is a small chance you might be able to wardrive your way to victory. But command-line wifi utilities seem to be rare. Any ideas?
Not sure if this is already posted (Score:3, Informative)
Re: (Score:2, Informative)
Re: (Score:2)
Well, it's the verb to rape (violer) at the third person of the simple past [leconjugueur.com]. A bit far fetched, but technically right...
Re: (Score:2)
Re: (Score:2)
It's hardly "silly" or "little" at a minimum of 99 bucks a year! [apple.com]
Re: (Score:2)
I think the comment refers to Photo Booth, not .Mac.
Re: (Score:2)
Re: (Score:2)
WHITE PLAINS -- The thieves were voracious, filching flat-screen televisions and computer games, purloining iPods and DVDs, even making off with a box of liquor and a set of car rims in a burglary two weeks ago at an apartment three young people shared here. Luckily, they also took two laptop computers.
One of the laptops was a Macintosh belonging to Kait Duplaga, who works at the Apple store in the Westchester mall an
Off topic - example of poor journalism (Score:5, Insightful)
a) She lives on Ridgeview Avenue.
b) She's at the edge of the city's downtown.
c) Many of the homes in the area have been renovated recently.
d) She lives in a colonial-style house.
e) The house is diagonally opposite a church.
If that's not enough info:
The only info in this that's actually relevant is the fact that she works at an Apple store, and that's she did not wish to be interviewed. The rest is either a reporter padding an article with irrelevant information, or attempting to indirectly violate her right to privacy.
Either way, very poor journalism.
Re:Off topic - example of poor journalism (Score:4, Funny)
Re: (Score:3, Funny)
Re: (Score:2)
The same thing that stops said people from breaking into any VPN. The strength of your password, along with the need to know a valid account.
I also do not leave laptops open and pointing at me during "personal activities". It would take a mighty hacker indeed to break into a sleeping Macbook and raise the lid via remote connection. I guess if you turne
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
4500 UDP
Re: (Score:3, Funny)