O'Reilly Author's Laptop Rescued By 'Twitter Posse' and Prey 123
An anonymous reader writes "Bad news: a Canadian who visited New York had his laptop stolen. Good news: it was outfitted with Prey, the open-source computer tracking application. Better news: a group in NYC made a 'geek squad intervention,' faced the culprit and retrieved the laptop safely. This case naturally raises the usual sorts of questions about the 'Twitter posse' culture." The victim-turned-victor is author and consultant Sean Power.
If you steal a laptop (Score:2)
If you steal a laptop for the hardware,why wouldnt the first thing you do be formatting it.
If you steal it for the data, why would you connect it to the internet at all?
Re:If you steal a laptop (Score:4, Insightful)
If you're smart enough to even pose these questions, you can probably do something better with your time than steal laptops.
Re: (Score:2)
some beings steal for 'fun' or to get arrested.. neither of the above would follow the 2 questions.
Re: (Score:3)
What the fuck has being able to multitask got to do with it? It's not like you can do a bit of burglary in the quiet moments where nobody's buying crack from you.
Re: (Score:2)
It's not like you can do a bit of burglary in the quiet moments where nobody's buying crack from you.
Sure you can. It's just that neither is very smart.
http://www.independent.com/news/2010/dec/13/suspected-drug-dealers-vehicle-burglars-arrested/ [independent.com]
Pffftt, amateur... (Score:1)
I can steal a laptop, sell crack, ride a unicycle, play the accordion, juggle a raw egg, a bowling ball, and a flaming torch, and sing "Never gonna give you up, Never gonna let you down, Never gonna run around and desert you, Never gonna make you cry, Never gonna say goodbye, Never gonna tell a lie and hurt you" all at the same time. The same time!
Re: (Score:2)
Re: (Score:2)
Re: (Score:1)
Most theives are pretty dumb. I thought that would be obvious.
On another note, this is the first time I've heard of Prey. It sounds like a pretty awesome utility to have on any laptop or phone. I work for the IT department at a university and we get reports of stolen laptops all the time. Advising users to preemptively install something like this might help. Does anyone know of any drawbacks to installing Prey?
Re: (Score:2)
I would have thought this would be theft 101
like changing the SIM after stealing a mobile phone
Re: (Score:2)
*gasp* no! thieves are not stupid at all! they're the smartest on the planet! [inquisitr.com]
(and I weep for the planet)....
Re: (Score:2)
"Does anyone know of any drawbacks to installing Prey?"
I haven't seen any except it's software-based. The way it works is whenever you boot the machine, it will report the IP it's running from. You can then log into your account and report it as stolen. If someone of course takes out the drive, formats it or boots from an external drive, it will be defeated. But then again, as you said, most thieves are not tech people.
Re: (Score:2)
Re: (Score:2)
Pretty much anything associated with the drawbacks of vigilantism would come to mind... I think the concern expressed here is with regards to advising end users that they should consider taking down criminals themselves simply by equipping them with the means to find those criminals.
Re: (Score:2)
Does anyone know of any drawbacks to installing Prey?
It looks like you have to pay for a subscription if you want access to the good features.
http://preyproject.com/plans#pro-account-features [preyproject.com]
Re: (Score:2)
Does anyone know of any drawbacks to installing Prey?
The possibility of a truly fubar'd situation, should you try to be a vigilante.
Everything from ending up dead to the criminal bleeding you dry in civil court.
Regards.
Re: (Score:2)
Re: (Score:2)
No, intelligent but evil people don't even need to operate outside the law. They find ways of making tons of money that aren't illegal at all, and if some law stands in their way, they just buy off some politicians to have the law changed. Why do you think CEOs are so rich?
Re: (Score:1)
The answer is simpler than that. The ones who manage to get away with stealing the laptop despite being stupid belong to the 99% of cases that aren't reported in the news.
It just works out for them that their counterparts are equally unintelligent and would never think to install something like Prey in the first place.
Re: (Score:2)
Re: (Score:2)
Then again, if your average
Re: (Score:2)
Re: (Score:2)
Depends, are we talking encrypted /home or just the standard password? The standard password won't protect you any more in *NIX than it will in Windows, if you're really concerned with your data there are better precautions to make.
Re: (Score:2)
Just the standard account passwords - a vanilla setup :p
The kind of person that would use encrypted /home on Linux would hopefully use BitLocker or TrueCrypt (or at least NTFS encryption) on a Windows box.
Re: (Score:2)
Re: (Score:2)
My point is simply that if you've got physical access to the machine, any of the major OSes today (with a standard configuration) can be broken into with ease. A traditional *u*x system is even a bit easier than windows, since if you're root you can read everything - if you're mounting somebody else's NTFS disk on a Windows system, you'll first have to reset/modify individual file permissions before you can access everything.
Resetting user passwords is as easy on Windows as it is on Linux - but keep in mind
Re: (Score:2)
p.s. This click anywhere to unfold the page thing is really annoying on
Re: (Score:2)
Re: (Score:2)
Good question, I honestly don't know how (or if) it's implemented.
But, basically, you've got a pub/privkey per user, protected by logon credentials; each file has a different symmetric cipher protected by the pubkey. So if you don't bruteforce the user credentials, you're not getting access to the files.
Re: (Score:2)
Considering I use my laptop mostly to access web services, the cost of the laptop itself is more important than anything in it. So Prey is better in my case than whole disk encryption.
Re: (Score:2, Interesting)
I don't care about the data on my laptop. However I do care about my laptop.
Solution? I don't put any password or encryption on it, and any thief can instantly use it. They think "allright won't have to format it", and then Prey kicks them in the nuts.
Re: (Score:2)
I would keep all important data encrypted and leave a separate account for thieves to use. Just name it 'Friends' or something similar.
Re: (Score:2)
For added security, tape a bit of paper to the keyboard saying something like "un : Default User ; pw : password" and have that account be the default one that pops up waiting to
Re: (Score:2)
I've had a laptop stolen from me before and recovered so I am speaking from experience here. Thieves will use whatever account they can simply click on to login. I made sure that my dummy account was limited so that they could not install or change anything on the system. Snatch and grab thieves hardly know anything about the stuff they steal. In fact it appeared that they were only using it to look at porn.
Re: (Score:2)
That's what I did when I had Adeona installed. The laptop automatically boots into a honeypot account, while my actual account is encrypted. Then Adeona went offline and I got a new laptop, where I didn't bother to replicate the setup.
Re: (Score:2)
Re: (Score:2)
If your drive encryption scheme doesn't have a boot password/PIN, your encryption can be bypassed.
http://www.ghacks.net/2008/07/20/software-to-defeat-disk-encryption-released/ [ghacks.net]
Re: (Score:2)
All of this tracking software is software based so if you use strong passwords and full drive encryption then the first thing the thieves will do is rip out the drive, thus disabling your tracking software, and you'll lose any chance of recovering it. On the other hand, if you put no password on it (or tape the password to the screen) then the thief isn't going to bother ripping out the hard drive and your tracking sof
Re: (Score:2)
If you steal a laptop for the hardware,why wouldnt the first thing you do be formatting it.
If you steal it for the data, why would you connect it to the internet at all?
It's still very useful for phones. I don't know what the situation is elsewhere, but here in Slovenia there's a long tradition of stealing mobile phones.
Re: (Score:2)
Encryption? (Score:2)
I would definitely prefer to use full-disk encryption on my laptop, and write off the hardware. Much better than having who-knows-who access to all my data.
Re: (Score:2)
Re: (Score:2)
and backed up to a dropbox account (encrypted before backed up of course).
Good call, considering how untrustworthy dropbox are - consider checking out SpiderOak instead, zero-knowledge crypto ftw.
Re: (Score:2)
You can have it both ways. Have a tiny partition with a dummy XP install with no password and Prey setup. Put the real stuff on an encrypted Linux or other Win install. Use Grub to manage everything and keep a second Windows install happy with the partitioning.
Re: (Score:2)
A Cultural Solution to a Bureaucratic Problem (Score:1)
"Power tweeted that he had called police but said they told him they wouldn't pursue the case unless he filled out an incident report."
Let this success story be a testimony that you can still rely on your neighbor when you're in need! Kudos to those who helped, when the police bureaucracy let it fall through the cracks.
Re: (Score:3)
Kudos to those who helped, when the police bureaucracy let it fall through the cracks.
The police bureaucracy didn't let it fall through the cracks, he did when he declined to file an incident report.
Re: (Score:2)
The police bureaucracy didn't let it fall through the cracks, he did when he declined to file an incident report.
Unless it's a huge loss or it happens to a talking head, the police really don't give a damn.
Re: (Score:2)
Frankly, that's how it's supposed to work. It is perfectly possible to have people deal with minor infractions of law & order between themselves without bringing in police (or resorting to violence). In many cases, merely pointing out that you have seen it and strongly disapprove can have a great effect if the majority of people around can be bothered to do it, and not just shrug it off as "not my problem, there's police for that" and walk away.
This also frees up police officers to deal with those issue
Who's watching the watchers? (Score:2)
Re: (Score:1)
Prey sounds all well and good, but who's watching them? How do I know they aren't using this to track where I am?
I haven't looked closely at it, but isn't their software open source, therefore you can look at/compile the code yourself and know exactly what it is that you're running on your own machine, i.e. you're "watching the watchers"? I'm curious to know the answer to this too!
Ouch (Score:2)
But when remembered about the software a couple days later, he set about to track his computer down.
Are there no editors left in Canada? Who writes this stuff?
It's a nice read (Score:1)
Re: (Score:2)
If you read the article you will see that he did in fact get the laptop back.
Re: (Score:1)
Good info! (Score:1)
Re: (Score:1)
Re: (Score:2)
Obviously he's not speaking in terms of reality, but rather what should ideally be the case.
Story or SEO Brainstorm? (Score:5, Interesting)
The author happens to be a Canadian SEO marketing person who published a few books on SEO techniques with O'Reilly
The author's completely random twitter contact,Nick Reese, who helped him turns out to be also an SEO marketing person. Interesting coincidence there.
The author claims to have lost his Canadian health card, his birth certificate and a significant sum of money along with the laptop that were all in his laptop bag yet he never reports this to the police at the time of the theft. Only several days afterwards in a twitter post does he claim to have contacted the police. Does this make sense?
A young woman that the author describes as "Purple Sarong Girl" was the one who actually recovered the laptop as twittered by Nick Reese. Yet both Power and Reese refuse to release Sarong Lady's name even though she was the one who actually recovered the laptop. Sarong Lady remains an unsolved mystery.
The author says he installed Prey but "completely forgot about it" untill several days after the "theft" after which he twitters about the Prey screen shots that re remembered to look at. If you installed Prey and your laptop was stolen do you think you would have forgotten about your primary recovery system for 3 days after the theft?
So a LOT of questions remain here as this story continues to be pushed out to all major tech sites around the world. Really good SEO technique wouldn't you say. In my mind the question remains whether Sean Power really had a theft here or is just demonstrating his use of marketing technique ("hey - look what we did for Prey in just a week !" ). It is probably very hard to determine one way or another but this story fails the "Does this make sense" test in so many ways that I have to question it's legitimacy.
and... the story poster here is *anonymous*... (Score:2)
... Maybe we'll find s/he wears a Purple Sarong?
No help :( (Score:1)
Relevant Tweets (Score:2)
I use Pray to protect my stuff. (Score:1)
I use a different program to protect my laptop. It's called Pray. It involves 5 cubic centemeters of C5 explosive. Nuff Said.
Re: (Score:2)
Oh? I heard of a different Pray that protects your stuff. The Christians use it, I think, and it is 100% effective at preventing the theft of objects that God does not want stolen.
Re: (Score:3, Informative)
The police are unlikely to do anything.
Re: (Score:2)
Totally different situation in the UK. They'd arrest the people trying to recover the laptop for being racially insensitive.
RTFA (Score:4, Informative)
I read this story like a week ago when it hit Fark. The owner went to the police and they told him to piss off they can't do anything. So thats when vigilante justice took over and got shit done. However if the laptop was part of a drug investigation then no knock warrants and GPS surveillance would be in use that same day.
Re: (Score:2)
They "told him to piss off" because he left for Canada before filing a police report and came back to town a few days later. For stuff like theft, if you don't file a police report you're shit out of luck. How do the cops know when someone claims that they were robbed or had stuff stolen from him that the guy's telling the truth? They don't, so they make you file a report. That way if it's fake they can get you on filing a false report.
I don't know if I missed why he was in such a hurry to go to Canada, but
Re: (Score:2)
I mean, he *was* in NY!
Re: (Score:2)
No, they told him he would have to file a report if he wanted them to do anything. He probably figured it was not worth the time and money to fly back out there just to file a police report, that the police would likely do nothing about. There have been cases like this in NYC before where the police didn't do anything until the media got involved. The police really do not care much about theft, it is low on their todo list.
Re: (Score:3)
Power tweeted that he had called police but said they told him they wouldn't pursue the case unless he filled out an incident report.
Maybe they wouldn't have done much even if he had filled out an incident report, but if you don't fill it out, you can't really complain (and Power doesn't complain).
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
Re:RTFA (Score:4, Informative)
It was only 3 days after the theft , while Power was in the middle of his Twitter/Prey drama online did he claim to have contacted the New Your Police from his Canadian home 800 km away. Not surprisingly the police said there was little they could do aside from take a report. All this is from Power's own reports.
He lost all that and never "had time" to make a police report. Does that sound a bit strange to you? It does to me.
The "justice" that you described took place three days after the theft when Power "suddenly remembered" that he had installed Prey. Does it make sense to you that he would forget that for three days? The woman who recovered the laptop ("Purple Sarong Girl") remains a mystery as all reference to her was abruptly removed by Power and Reese a couple hours after this drama unfolded.
So no police report. No person who actually recovered the laptop. The only two people who verify this story remain Sean Power and Nick Reese, two SEO marketing men.
Never used bargain air-fares? (Score:2)
He lost all that and never "had time" to make a police report. Does that sound a bit strange to you? It does to me.
I take it you've never used a bargain air fare that was non-refundable and non-reschedulable?
Re: (Score:2)
I read this story like a week ago when it hit Fark. The owner went to the police and they told him to piss off they can't do anything. So thats when vigilante justice took over and got shit done.
1) This country and the states within it were founded by their own citizens, who delegated certain of their own powers to the government. Accordingly, the laws, police, and courts are just a formalization of "vigilante justice", with mechanisms to reduce errors that lead to erroneous punishment of the innocent, un
Re: (Score:1, Insightful)
...a possibly armed criminal face to face...
...inevitable armed criminal....
...following bloodbath.
Christ, you're a coward. Enjoy your long, safe, life hiding away from any potentially dangerous situations. It's almost sad to know you're not capable of standing up for yourself or others.
Re: (Score:1)
Re:Let me get this straight... (Score:5, Insightful)
You have to turn off the television and get out more. Half the time the 'hardened criminal' is just a teenage kid being opportunist. Even a retired American lady I know here tried fighting off a mugger here last week, and the worst she got was a bruise backside when she was pushed over. I've stopped robberies, and had a number of people arrested. I'm still here, no bloodbath.
However you can be 99% certain that the person with the laptop the next day is not the thief. As soon as they steal it they sell it immediately no matter what the price. The last time I was robbed it was hell getting back my stuff as they'd sold it all within 10 minutes. My 250e shades they sold for 20e. The watch, phone, etc went for similar ridiculous prices. Just ask for the laptop back and the person in possession will give it straight away (as they did in this story). There might be a little initial bluster, to simulate indignation hence innocence, but they know perfectly well they bought a stolen laptop which is a criminal offence.
Just how little do these folks think their lives are worth?
With an attitude like that, you are one sad member of your society and I'm glad you don't live near me.
Phillip.
Re: (Score:1)
Years ago, I made a long trip to the other side of town to sell my old Programmable Calculator. I had gotten a new one and put an ad to sell the old one in the campus newspaper. I got a call from some guy who said he was interested in it, so we met at a McDonalds.
Lo and behold, he brought along a few of his fratboy thug buddies, because what he was REALLY trying to do was get back his Programmable Calculator which someone had recently stolen. He assumed he and his thug buddies would be 'recovering' it.
Re: (Score:2)
So what happened?
Re: (Score:1)
Just how little do these folks think their lives are worth?
If you have so little self-respect that you won't help defend the innocent given an opportunity, your life is worth nothing to society.
"These folks" have demonstrated said self-respect, and thus are welcome in my society anytime.
Re: (Score:1)
Re: (Score:2)
bring a homemade flamethrower, point it in THEIR direction. Problem solved.
You have to be specific; there's no telling what kind of crowd reads this stuff.
Re: (Score:1)
bring a homemade flamethrower, point it in THEIR direction. Problem solved.
You have to be specific; there's no telling what kind of crowd reads this stuff.
Why? I don't put myself between undesirable underpersons and Darwin's Mighty Hammer of Evolution.
Re: (Score:2)
Re: (Score:2)
Most opportunistic thieves are not armed, and I doubt they would pull a weapon on a group of people in a bar. It would be far more likely that the thief would leave the laptop and run if they were scared. Armed criminals tend to commit armed robbery.
Re: (Score:2)
While I agree with you about the relative value of the laptop and a life, I don't think the ethical calculation is necessarily as simple as weighing those two factors. I'd be quite willing to exonerate the people who retrieved the laptop of any *duty* to risk their lives for a hunk of plastic, but I'm not quite ready to condemn them for choosing to do so.
The world is full of so many huge injustices that it hardly seems worth bothering with petty ones like this. Even the guy who lost the laptop wasn't going
Re: (Score:2)
Exactly. I don't understand all the fuss in TFA about it being "just a piece of plastic", either. It's property. The institution of personal and private property is the core pillar of our society. If we don't have respect for even our own property, enough so to confront a thief (not a robber, where there's is at least a strong likelihood of a forceful confrontation - but a petty thief!) out of cowardice, then how much does it say about the state of society as a whole?
And, seriously, is the risk that great?
Re: (Score:1)
Re: (Score:2)
It's open source, the summary didn't claim the software to be FLOSS, they claimed it to be open source, and the client is open source. Yes, it would be great for the whole thing to be open source, but having the client open sourced is sufficient to claim that the application is open source.
Re: (Score:2)
I might as well publish a closed-source application and claim it as open-source because I used the printf() function, which is free and open. Part of my application is open therefore the entire thing is open.
Re: (Score:2)
The server may be open source as well. But if they don't release the binary, they don't have to release the code.
Re: (Score:2)
I can't see the server side code. Is it possible to install your own server? Why do people still claim a software to be FLOSS if it requires proprietary server implementation to do something useful ?
Read the prey website. It doesn't "require" a proprietary server to be useful. You can set the client to periodically connect to the URL of your choosing, and the client triggers an alert when that URL returns 404. No alert is sent if it gets a 200 or 500 response, so if the page is up, or if the server is down, nothing happens. All open source, doesn't need an account, doesn't need to talk to the prey servers at all.
If you use their servers, they can provide you with a history of tracking info, set some
Re: (Score:2)
It's deeply wrong of the victim to say "it's just a piece of plastic." It's that plus an unpunished crime.
What did you expect, he is Canadian after all. Not to mention the fact that our society is constantly pussifying our youth. One example is the hugely popular Diary of a Wimpy Kid franchise that is teaching kids that it is cool to be a pussy. Political correctness has been being pushed in this country for far too long, it is part of the reason much of the world laughs at us.
Re: (Score:2)
I forgot to add, god forbid we actually teach kids to have self respect and to stand up for themselves. If we did so they wouldn't be complacent, mindless, sheep when they grow up.
Re: (Score:2)
Haven't you seen 'Canadian Bacon'?
Re: (Score:2)
Blame the English language for not having gender-free pronouns. This is standard usage of the language, because it's just too cumbersome to say "you know what he or she looks like and where he or she is hiding...." Some writing styles push that the author should use his or her own gender's pronoun for a generic person, but this is just equal opportunity wrongness, rather than being any more right.