Become a fan of Slashdot on Facebook

 



Forgot your password?
typodupeerror
×

Mac Theft Recovery Software Tracks Thieves 82

Dubpal writes "Apple Macintosh users can now fit their machines with theft protection software that reports back on what a thief is doing with their computer, should it ever be stolen. The software, named "Undercover" allows users to report their Macs as stolen, causing the software to report back with IPs, screenshots and even a picture of the thief and his surroundings. In addition to this, Undercover begins faking hardware faults, displaying messages and even reading them aloud, alerting anyone around that the Mac's been stolen."
This discussion has been archived. No new comments can be posted.

Mac Theft Recovery Software Tracks Thieves

Comments Filter:
  • Utter Bullshit. (Score:5, Interesting)

    by Whiney Mac Fanboy ( 963289 ) * <whineymacfanboy@gmail.com> on Monday May 22, 2006 @07:35AM (#15379156) Homepage Journal
    From the Undercover FAQ: [orbicule.com]
    Can I uninstall Undercover?

    Yes, you can. If you haven't registered Undercover yet, you can uninstall Undercover by clicking the Uninstall button in the setup assistant that's part of the installation process. If you are a registered Undercover user, please contact us and we will send you uninstall instructions. During uninstall you will need the Administrator password, to prevent thieves from uninstalling Undercover.

    Can Undercover be uninstalled by a thief?

    For a thief, uninstalling Undercover is impossible. You can only uninstall Undercover if you know the Administrator password for the given mac.
    Errrrr, impossible? What a stupid thing to say. Admin password recovery is trivial under os x. [intelliot.com] And a serious thief would reinstall os x before reselling.

    In other words, this piece of software is useful only to:
    1) Stupid people (who are reassured by a false sense of security)

    2) People who want to spy on someone.
    Oh, and anyone tempted to quote the following from the faq at me:
    What if someone does a clean install of OS X on my machine?

    You can prevent this by installing a firmware password. You can find the firmware password utility on your Mac OS X Tiger DVD (in /Applications/Utilities/ on the disc).
    1) Bypassing the firmware is also trivial on Apple machines - all you have to do is add some Ram, and boot :-/

    2) Noone has a firmware bios password.

    Oh, and last thing - again from the FAQ
    Is it possible for Undercover to work behind a firewall?

    Yes, Undercover has the ability to autodetect any proxy or firewall settings used to connect to the Internet. Undercover collects and autodetects the necessary settings to access the Internet even if your firewall requires a password.[emph mine]
    Bullshit. If they could do that, they would be selling that, not their little toy spyware app.
    • Re:Utter Bullshit. (Score:5, Insightful)

      by Detritus ( 11846 ) on Monday May 22, 2006 @07:53AM (#15379188) Homepage
      Thieves are not known for their intelligence, contrary to what Hollywood would have you believe.
      • Re:Utter Bullshit. (Score:5, Insightful)

        by Shisha ( 145964 ) on Monday May 22, 2006 @08:01AM (#15379216) Homepage
        I would expand on this. Theives who steal laptops are not known for their intelligence. Usually they're rather sorry sods who need some cash to get the next hit. Hence they take the laptop to a random pawn shop and get very little money (but enough to get their drugs) for it. It then gets re-sold to some middleman who reinstalls it (how else would you explain to the potential buyer that you don't know the password?) and sold on ebay. None of the people involved are particularly intelligent. But the whole process _still_ makes the afromentioned software pretty much useless.
        • Re:Utter Bullshit. (Score:3, Insightful)

          by countach ( 534280 )
          Follow the advice of the manufacturer and install a firmware password. Then it WON'T be useless.
          • Follow the advice of the manufacturer and install a firmware password. Then it WON'T be useless.

            Horsecrap. The firmware password is trivial to get around - you can just add Ram & remove it. Bam. Done.
            • Re:Utter Bullshit. (Score:5, Interesting)

              by Bastian ( 66383 ) on Monday May 22, 2006 @09:50AM (#15379850)
              Good loord, youre one heck of a pessimist.

              It's a $30 program that provides a far sight more chance of recovering a stolen laptop than nothing does. I, for one, think it's worth it, even if it would only have a chance of working work 1/10 of the time.

              Which I would be willing to wager is a pretty low guess, given the tech-savviness of your average opportunist thief - someone who knows enough about computers to know how to reset the firmware password on a Mac is more than likely going to be tech-savvy enough to be able to get a better job than stealing computers off of tables at coffee shops.
              • It's a $30 program that provides a far sight more chance of recovering a stolen laptop than nothing does.

                Buy $30 worth of insurance - a much better solution.

                enough about computers to know how to reset the firmware password on a Mac is more than likely going to be tech-savvy enough to be able to get a better job than stealing computers off of tables at coffee shops.

                If the firmware password is set (I doubt it), then the thief will simply sell it to someone who knows how to bypass the firmware password. The va
              • It's a $30 program that provides a far sight more chance of recovering a stolen laptop than nothing does. I, for one, think it's worth it, even if it would only have a chance of working work 1/10 of the time.

                I think you'd be better off investing in property insurance and a backup scheme. The insurance will replace the hardware, you backup will replace the lost content.

                You'll also be protected against physical damage to the computer; the theft protection program won't do that.
              • $30 for a one-tenth chance of detection leading to a miniscule chance of recovery, versus $12 (yearly) insurance premium for a ~100% chance of replacement of the insured value (either in your homeowner's/renters insurance or as a special rider to it -- or www.safeware.com if you want to get stabbed through the eyes on fees, really go with whomever gives you the rest of your insurance they'll be HAPPY to take your money). Gee, I wonder which one is the better deal...
        • Hah. Yeah. Know a lot of laptop thieves or do you just have an overactive stereotyping imagination?
    • Yeah ok, but the fact is most thieves are dumb. Maybe 1 in 20 thieves are even going to be capable of understanding these issues, let alone well informed enough to uninstall before they are busted.

    • 1) Stupid people (who are reassured by a false sense of security)

      What if I like my false sense of security?
    • 2) Noone has a firmware bios password.

      Just call me Captain Nemo, then. (And it's not "BIOS" on a Mac; for anything even remotely recent, it's either "Open Firmware" or "EFI", depending on model.) "Only the seriously paranoid have a firmware/BIOS password," I will certainly grant.

      I'll also note that a firmware bios password can also be bypassed by removing the hard drive and connecting to a new machine via any of the usual methods... at which point, removing Undercover becomes much simpler. And if there

      • at which point, removing Undercover becomes much simpler. And if there isn't a BIOS password to begin with, Undercover's also trivial to remove with target-mode booting and another Mac.

        We should also remember that said thief will need to -look for- this program... Not every laptop thief reads /., and I had never heard of this before, so I wouldn't know to look for it (until now) either. Not only that but to remove it you'd have to boot up, and (I know, I haven't read yet :() does this thing phone home ever
    • I'm not under the impression that the common thief is someone savvey enough to even understand the language in your post... let alone, have that knowledge at the forefront of their mind to put it in action! Look.... I worked for Apple and I didnt know half the stuff you just said. But giving you the benifit of the doubt, we'll say that 5% of people who steal computers would know that. 1 in 20... What if you got your 17" powerbook stolen and had a 19 in 20 chance to get it back by providing the police with
  • by Lave ( 958216 ) on Monday May 22, 2006 @07:37AM (#15379160)
    I assume this is with the macbook's built in webcam?

    I have issues with this, in that if the webcam is hardwired to the machine, and can be accessed remotely without the users knowledge - what stops a hacker spying on you for less legitimate reasons?

    Like the schokwave debacle? I would have preferred Apple to have included a physical shutter to close the webcam when not in use rather than chance the unsightly aspects of my private life being shown to the masses. It's a little too orwellian for me.

    • "what stops a hacker spying on you for less legitimate reasons?" Sounds like you're concerned about someone observing your behavior while you watch porn.
    • by nuggetman ( 242645 ) on Monday May 22, 2006 @08:25AM (#15379307) Homepage
      and can be accessed remotely without the users knowledge - what stops a hacker spying on you for less legitimate reasons?

      Don't let any shady characters in trenchcoats install apps on your Mac?

      The camera does have an indicator light for when it's on..
      • true it does have a indicator light, but from what I've read on the apple developer mailing list you can turn that on and off independently from the camera. I may have been mistaken, but that is my understanding.
        • From what I remember, the light is wired into the power for the camera so there's no way to disable the light from coming on if the camera is on. That's what I remember Steve Jobs saying when they released the first Mac with the built in iSight.
    • Calm down. This isn't a port of Back Orifice to OS X.

      It's a program that you install on your computer ahead of time. Like any other program, this one has access to the hardware in the machine, including the webcame. Like any program you install in your machine, it also has access to the Internet. It phones home at regular intervals, and if home responds that it's been stolen, it then starts collecting this information and saving it.
    • by Anonymous Coward
      I have issues with this, in that if the webcam is hardwired to the machine, and can be accessed remotely without the users knowledge?

      This is the one and only reason I let the hot blonde chick down the hall borrow my macbook.

    • The Soviet Russia joke about the screen watching you would be too easy.. (I believe it was the "orginal" soviet russia joke by Yakov Smirnov). How about a 1984 reference?

      [O'Brian] - do we have the incriminating pictures of Smith yet? [Faceless Functionary] - umm.. no sir, there seems to be something blocking the camera. Our systems seems to have been defeated. [O'Brian]- What? We've spent millions developing this technology! There is nothing wrong with our system.
    • One carefully crafted piece of black electrical ought to do the trick. That's pretty much the first thing I'd do after showing off my brand-new MacBook to friends.

      C'mon, who the hell would really use a built-in camera for anything serious after the first week of playing with the machine? Okay, besides the "video podcast" crowd or those chronic Internet expeditionists who get kicks out of waving their wangs around at complete strangers online. (Not that there's a whole lot of difference between these two gro
  • by Anonymous Coward on Monday May 22, 2006 @07:42AM (#15379166)
    "This computer has been stolen...and is looking at horse porn..."

    -tgpo
    http://www.tgpo.info/ [tgpo.info]
  • Not foolproof! (Score:2, Insightful)

    by melonqueen ( 963023 )
    If te thief decides to not use the net with the laptop, youre chances of getting it back are zero. So there goes the money you spent on both the laptop and the software. I wonder if the money back guarantee takes that into account?
    • If te thief decides to not use the net with the laptop, youre chances of getting it back are zero. So there goes the money you spent on both the laptop and the software. I wonder if the money back guarantee takes that into account?

      Yeah maybe he just wants it for gaming HAHAHA!!

      The only system I ever use regularly is my powerbook ;P
  • by suv4x4 ( 956391 ) on Monday May 22, 2006 @08:10AM (#15379248)
    What happens if a would-be thief reports your PC as stolen so he can find out when to steal your car :)?
  • In other news new obvious headline generator software spits out headlines stating the obvious.
  • If we can not recover your stolen Mac, we will fully refund Undercover

    Sweet! So if my laptop gets stolen and they can't find it, I get 30 bucks back! How can you possibly go wrong?
  • Just put a daily event in iCal with an alarm that sends an e-mail to yourself. Unless the thieves reinstall the OS (doubtful as I'd bet that most theives just want quick cash for their swag), the machine will send out an email to you everyday from its new location.
  • Terrible idea.. (Score:4, Interesting)

    by ivan256 ( 17499 ) * on Monday May 22, 2006 @09:51AM (#15379859)
    reading them aloud, alerting anyone around that the Mac's been stolen

    Sounds like a guaranteed way to get your stolen mac smashed into unuseable pieces.
  • by Anonymous Coward
    Thanks to reading slashdot and digg regularly, I now know how to steal a laptop and get away with it.
    1. Remove Kensington Laptop Lock. [digg.com]

    2. Add / Remove Ram if firmware pw is set. [slashdot.org]

    3. Boot from removable install media. [intelliot.com]

    4. Format Hard Drive (after you go through it and keep the good bits, music pron etc) [slashdot.org]

    5. Reinstall OS
  • I rememmber about a year back I had a sales rep trying to sell me the same thing for a pc, I asked him if people could get around it by just reformating the drive, His answer was the the program would be still be installed. So i then asked him what would happen if someone just replaced the harddrive and he said it would still report back to its server. Then I asked him how does a program that only work on 2000/xp connect to a remote server on the internet somewhere if there is no internet connection and no
  • This sure is a nice program and I'm tempted to buy it, but only because it can help the police track down the criminal who stole my computer. But I would not want my computer back. Who knows where it's been, and how roughly it has been treated? I can't imagine that thieves treat computers with the care they need.
    My iBook was stolen recently, and although that is a PITA, I have backups so no data was lost. And with the money I got from the insurance company I can buy a new MacBook now!
    • Just like if my car is stolen, I don't want it back. Same reasons, plus it just wouldn't feel right. It is a violation of your "space," to have something stolen. I had my wallet stolen when I was a teen. I learned a lot of lessons from that event. The number one lesson is to be aware of your surroundings and don't be a victim.
  • Television station buys a dozen laptops. Leaves them unprotected in various spots with clearly marked names and addresses. Nabs would-be thieves and shames them on TV.
  • by TwitchCHNO ( 469542 ) on Monday May 22, 2006 @10:42AM (#15380263) Homepage
    Sending you screenshots of the laptop being used is very useful, most security software "phones home" but only gives limited information, like the IP address of the machine (public IP if it is NATed).

    The stolen laptops that law enforcement have contacted me about, have been largely pointless (as I work for an ISP and have access to the customer records). The perpetraitor or possesor of stolen goods is almost always at a hotel (wifi hotspot - what have you). Under US law - John Doe search warrant of a hotel isn't good enough.

    You can't wake everyone in a hotel up and search thier rooms, the police need a specific name and room number, they can only search one room.

    So thus screen shots, and knowing the identity of the person who's using their stolen laptop, improves your chances of recovery immensely.
    • "Under US law - John Doe search warrant of a hotel isn't good enough."

      Say he's using the laptop to coordinate a terrorist attack, that should get you a search warrent. You probably won't get the laptop back, but said theif will likely dissapear and never be heard from again.
    • About the hotel thingy. If the software gives the private IPs and mac-addresses then that's good enough in many places to figure out which room/area that laptop is in.

      Of course if it's WiFi the area could be a bit big.
  • by AEther141 ( 585834 ) on Monday May 22, 2006 @10:55AM (#15380406)
    have obviously never met the kind of person who steals laptops. Almost without exception they are heroin or crack addicts stealing for drugs. They will get perhaps fifty dollars from the pawnshop owner or dodgy friend and be very happy with it. For very obvious reasons the laptop will be sold on as quickly as possible, usually at far below market value. Given that 95%+ of laptops are unprotected, anything that doesn't boot straight into an OS will be refused by the middleman - for the same reason that there are very few mac and linux viruses, these guys never bother to learn much more than how to reinstall windows. The level of skill people are talking about when they say "the mac firmware password is easy to bypass" is more than enough skill to get a higher paying, lower risk job in IT rather than spending your day looking over your shoulder and dealing with jumped-up crackheads.

    This is really a bit convoluted as an anti-theft measure, although it does look interesting. By far the best way to avoid having your laptop stolen is not to leave it unattended, not to use it anywhere you wouldn't wave $1000 in cash above your head and not to keep it in anything that resembles a laptop bag - use a ratty old satchel or a diaper bag. Muggers are just about the bottom of the criminal food chain, it doesn't take a lot to outsmart them. Just like net security, you just need to be a slightly more difficult target than the next guy and that next guy is talking on his cellphone while walking through a car park at 11pm with a swanky leather 'dell' bag on his shoulder.

  • Another Option (Score:2, Interesting)

    by Wolfout ( 976406 )
    I administer a network of over 8000 computers, half of which are Apple computers. We use a program from http://www.absolute.com/ [absolute.com] called Computrace (Win/Mac) and it writes a piece to the BIOS that calls home REGARDLESS of OS reinstall. If removed, it will reinstall the software to call back home. Can it be stopped? Yes, but only with packet captures and other assorted goodies. Works really slick and it has been tested.
  • Could you go to the authorities and say "OK, my Mac was stolen by this person", explain to them the situation, and would they actually be able to go after the person? And another thing. If I were to steal a MacBook (which however temping with my itty bitty iBook may be I wouldn't), the first thing I'd do if it started announcing to the world I'm a thief would be smash it into bitty bitty pieces and then let those pieces swim with the fish.......
  • a software solution to track stolen computers is, IMHO, a very unreliable method. software can easily be broken, in today's scenario. a better method would be to sprinkle micro-scopic uniquely identifiable "dots" (with RFID) in/on the computer spares/parts. a central agency can keep track of lost/stolen hardware ID's and flag them whenever they're detected.
    • a better method would be to sprinkle micro-scopic uniquely identifiable "dots" (with RFID) in/on the computer spares/parts. a central agency can keep track of lost/stolen hardware ID's and flag them whenever they're detected

      yeah goooood Idea, the next step would be either to add those chips in kids brain, just in case they get lost, or to add remote control on these chips (or even both)
      I am always sad to see people willing to give-up privacy for security, I'd rather pay for the insurance. My laptop i

      • you have a point there, pep11. it sure wouldn't be a nice idea to implant chips in kids brain and add remote control on these chips. what i meant by this idea was the same as the technology that is used in cars.
        the idea is to have small micrometer sized dots sprayed all over the car. it is *impossible* to clean-up the car of all the dots from a stolen car. investigators / spare part shops can detect stolen car parts this way. this prevents cars from being stolen and sold in parts as well. see here for more [montreal.ctv.ca]
  • This kind of software has been around for awhile. Have a look at https://www.pcphonehome.com/ [pcphonehome.com] It also relies on the firmware password Michael

The ideal voice for radio may be defined as showing no substance, no sex, no owner, and a message of importance for every housewife. -- Harry V. Wade

Working...