Alternatively, you can declare your laptop stolen, which provokes a more dramatic response. LoJack begins capturing screen grabs and logging keystrokes and sends them back to Computrace, where a member of the team begins collating them and sending them to the police. Geolocation data is also gathered and reported. All this is hidden from the owner’s view in the name of giving the relevant police force a single point of contact, and preventing the kind of vigilante action that saw a New Jersey man arrested after assaulting someone he wrongly suspected of stealing his iPhone, after tracking it to the wrong location in May. The result isn’t only location data, but an exceptionally detailed dossier of evidence about the person in control of the laptop.
For those giving their devices up as lost, the final stroke is remotely destroying your data. This won’t put your laptop beyond use, but it will at least mean your documents and internet history are removed. The days of remote data removal being the domain of high-end business-class devices are long gone – Apple’s mobile devices come with data removal built in, and it’s easily added to Android phones. On Windows laptops, LoJack can again be applied, and you can opt to remove your personal data – either folder by folder or wholesale – through another machine’s web browser. LoJack’s deletion doesn’t only move the contents of your My Documents to the Recycle Bin, either: it performs a seven-pass deletion designed to render data utterly unsalvageable.
On some laptops, LoJack is resistant to tampering: absolute.com
lists a huge number of machines that have Computrace included in their BIOS. Downloading Computrace’s software, such as LoJack, activates the BIOS module, and if it detects that Computrace is missing or disabled, it reinstalls it. On a machine set to be locked or wiped, for instance, even reformatting the hard disk won’t be enough to permanently restore it; the BIOS will perform a quiet reinstallation when the computer is reconnected to a network.
The drawback is that it takes a while for commands issued through LoJack to take effect; we waited almost 12 hours for a lock command to come good, and several hours passed between us issuing a remote wipe command and the erasure of documents beginning. It’s an acceptable delay as long as the person with your laptop doesn’t immediately begin trawling your Documents folder for data. The company also claims that commands issued happen faster once the software has been running for a few days – we treated our test machine as lost immediately.
For those more keen on recovering their hardware than deleting the data on it and giving it up as lost, there are numerous ways to track and trace your kit. Again, iOS devices lead the way, with Find My iPhone (or iPad) included by default. Give the necessary command through www.icloud.com, and your phone or iPad – assuming it has a connection to the net – shares its location with you. It’s fast, free and accurate. Android devices (covered next page) require a third-party app, but the effect is the same.
WHERE IN THE WORLD?
Devices with GPS are arguably at an advantage when it comes to geolocation, but it’s possible to get an accurate location fix on any device with a Wi-Fi chip, thanks to Google’s location API, which means you can also locate laptops and non-GPS equipped devices, such as Wi-Fi-only iPads. Google’s geolocation works by mining the data gathered by its Street View cars, which includes the geographical location of wireless basestations.
By comparing the base stations your device can see with Google’s data, you can arrive at a spookily accurate – to a few metres, in some cases – estimate of a location. When used somewhere with fewer wireless networks, reliability decreases somewhat. The other option is to use your device’s IP address. This is the least accurate method: an IP address might be located anywhere in an area up to several miles across. It’s a starting point, but unlikely to help you to recover your kit.
TRACKING YOUR COMPUTER FOR FREE
LoJack isn’t the only option for tracking and recovering your kit. It’s possible to get useful tracking information for free, albeit without Computrace’s impressive team of investigators handling the resulting data and staying on top of the investigation.
In October 2011, Kamil Konzinski from the UK pleaded guilty to receiving stolen goods, after being caught using a laptop that was quietly phoning home every time it was connected to the internet. The laptop’s owner had installed a sliver of software called Prey (www.preyproject.com), which, when activated, creates a hugely detailed report about the state of your laptop.
By default, you get geolocation in longitude and latitude, which can pinpoint your laptop’s location to a few streets, as well as a pair of images. The first is a screen capture of whatever is going on at the time; over time this gives you a decent chance of finding your laptop’s new owner logging into a social networking site, or giving away their email address. The second is a shot quietly captured using your laptop’s webcam. Again, you stand a decent chance of getting a head-on shot of the thief, which you can supply to the police.
When activated, Prey creates a hugely detailed report about the state of your laptop
The most fully featured way to use Prey is via its control panel, which requires you to register. From the control panel you can mark your device as missing, sound an alarm or lock it remotely, the latter command requiring a password to clear. Alternatively, you can display a customisable message, either warning whoever has your machine that it’s being tracked, or possibly – if you’re in a forgiving mood – offering a reward. The only missing feature is the ability to remotely wipe your documents, although Prey offers the next best thing by supplying a secure mode, which disables access to your email and removes your machine’s saved passwords and browser cookies, preventing access to websites containing personal data.
Prey’s free account allows you to track three machines at once. Each machine will file ten reports containing a location and two images; once ten reports have been generated, the oldest report is deleted to make way for new entries. For those who want to cover more devices or save more reports, Pro accounts are available starting at US$5, covering ten devices.
For users who prefer not to have their laptop report its location to a third-party website, Prey can also be run in standalone mode. You lose features such as the ability to lock your computer or display a distress message, but you still get screen capture, webcam stills and geolocation data, all to your inbox. See “How to set up Prey to track your stolen laptop”, left.
NEXT PAGE: How to protect your Android and iOS devices