The Khaki Bandit Strikes At IT - 130 Stolen Laptops 249
destinyland writes "'The khaki bandit' posed as an office worker at several corporations and successfully stole over 130 laptops which he later sold on eBay. The ease of theft from the corporate offices (including FedEx and Burger King) shows just how bad corporate security can be. In some cases, the career thief just walked into the office behind an employee with a security badge. Two million laptops were stolen just in 2004, and of those 97 percent were never recovered. Ultimately it was the corporate headquarters of Outback Steakhouse who caught the thief with a bugged laptop that notified them when he re-connected it to the internet."
Look at the way many people treat their laptops (Score:5, Insightful)
In fact, just a couple of weeks ago, one of our directors went on vacation and left his laptop and projector just sitting on the conference room where he had last used it (a large, wide-open conference room used by hundreds of outside people each week). They sat there for several days before anyone noticed.
Re:Look at the way many people treat their laptops (Score:5, Insightful)
It's the same at our company. You wouldn't believe the state some of our laptops are after just a couple of months. cracked screens, missing keyboard keys, full of spyware, coffee spilled all over it,
I don't think ppl would treat their laptops that poorly if they had to pay for it.
Re: (Score:2, Interesting)
Re: (Score:2)
I hope you got his supervisor to LART him well.
Re: (Score:2, Insightful)
He did fix the problem in a way that was suitable to him. And he's the guy who uses the laptop and must've been happy with his cheap fix. I'm sure that in whatever field he's a professor in, he probably doesn't make fun of you for not understanding something. He probably wouldn't even make fun of your poor choice of words with "Gods know".
Yours is a problem that many people
Re:Look at the way many people treat their laptops (Score:4, Informative)
He did fix the problem in a way that was suitable to him. And he's the guy who uses the laptop and must've been happy with his cheap fix.
In this scenario, it doesn't matter that his solution was "suitable to him", or that "he's the guy who uses the laptop"...the fact of the matter is that he doesn't OWN the laptop, the university does. So basically he borrowed the laptop and broke it to suit his whims. That's generally not acceptable.
If you lent your laptop to a friend, and he brought it back with buttons crudely torn out because they were getting in his way, would you commend him on his clever workaround? Likely not (unless you have very little regard for your valuable belongings).
I'm sure that in whatever field he's a professor in, he probably doesn't make fun of you for not understanding something.
It sounds like the GP understands quite clearly: this professor damaged university property. If I was a student in this professor's class, and decided one day to demolish his overhead projector because it was blocking my view of the whiteboard (assuming professors still use overhead projectors & whiteboards...if not, substitute your own analogy ;) ), would he be wrong to be upset with me? Or would his displeasure merely demonstrate his lack of understanding?
He probably wouldn't even make fun of your poor choice of words with "Gods know".
Ah, the ad hominem attack...I now feel that I might be feeding a troll. Oh well, I've typed too much to delete it all, so I soldier on....
Yours is a problem that many people have. Once you understand something, you can't understand how someone else doesn't understand that problem. Different strokes for different folks.
Once again, I fail to see the GP's "problem"...he's stating that this professor damaged university property. Are either one of us missing something? "Different strokes for different folks" is completely invalid in this situation; the professor's "strokes" violated the ownership rights (and probably the terms of use) of the "folks" who owned the laptop.
Re: (Score:2)
Re: (Score:3, Informative)
Re: (Score:2)
Re: (Score:3, Interesting)
Now while I wouldn't every check mine, due to concerns over damage/rough handling, and the fact that I like to 'play' with my laptop while flying....I'd not automatically think it would be quickly stolen as checked luggage.
I'm hoping stolen luggage is a fairly rare thing? I've had luggage lost, but, never had anything permanently taken from me.
This is a pretty sad
Re:Look at the way many people treat their laptops (Score:5, Funny)
However it seems that NOWHERE in corporate America does any company trust it's employees (at least the male ones) to not steal the paper towels out of the mens room. The dispenser is ALWAYS locked up !
Re: (Score:3, Funny)
It really comes down to the fact that paper towel technology has reached the point that the right balance of security and usability has been achieved. In IT we have to pick an extreme.
Re:Look at the way many people treat their laptops (Score:5, Interesting)
Seriously though, companies will take you to court over stealing a few hundred bucks worth of equipment but if you rob the company blind with sleazy accounting, incompetence, and outright robbery as an executive you get let go with millions in severance.
Re: (Score:2)
Re: (Score:2)
I've even seen 30K+ vehicles parked on the street for HOURS, where anyone could pick them up with some minimal effort!
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
The thief somehow either cut the lock or ripped the lock out of the case, and got away with the laptop within five minutes.
I'm pretty sure that lab doesn't leave laptops on desks in line of sight of the door anymore.
Re: (Score:3, Interesting)
Speaking of being "the IT guy", I am so very rarely stopp
Re: (Score:2)
When someone appearing to a PC guy grabs equipment people don't ask questions.
Re: (Score:2)
Sure enough, when I came back the next morning, the laptop was not on the desk. Visions of being fired after my first day on th
Re: (Score:2)
Wow!!
I am dumbfounded...just barely into reading this thread, and I see so many people that have to worry about having laptops and other items stolen from their offices/cubes?!?!
Where do ya'll work? What part of the country? I've never really experienced this before....except once, and they caught a cleaning lady stealing some CD's and spare money left in desks. But, other t
Re: (Score:2)
Also, you may be right that the laptop would be safer at the office then it would be at home, but I do work from home on occasion, so it makes sense for me to take it home even when I don't plan on working that night. Plus, even though we know it's not really safer, it feels safer to have these things in our possession or cl
$150 a laptop? (Score:2, Interesting)
No wonder eBay shoppers were happy with the deals they got.
Re:$150 a laptop? (Score:5, Funny)
His eBay profile (Score:2)
Can be seen here [ebay.com]
Ironic someone said they didn't trust him, he was a fraud. At least one bidder got the scoop.
Re:$150 a laptop? (Score:5, Funny)
Re: (Score:2, Funny)
Re: (Score:2)
Laptops are easy (Score:5, Insightful)
On the other hand, someone waltzed off with a 24" LCD monitor from the desk of a co-worker not long ago. His office was the furthest in from the door, so someone needed to be particularly bold to go all the way in, disconnect the monitor, and walk back out. No one saw him either, which is impressive considering the size of the load he was carrying. It's a lot harder to look and act natural about carrying a large monitor than a laptop.
Re: (Score:3, Insightful)
Re:Laptops are easy (Score:5, Funny)
Re: (Score:2)
Try airport mainframes (Score:4, Funny)
The brazen airport computer theft that has Australia's anti-terror fighters up in arms [smh.com.au]
--
Simon
Re: (Score:2)
Re: (Score:2)
Thieves aren't that smart... (Score:4, Interesting)
Net bugs are a good thing to have, I think (got one on here), particularly given the plentiful supply of open wireless points in most large cities now. Turn on machine, bug sends data burst, thief is cornered. Hell, he doesn't even need to physically connect to a network these days.
Re: (Score:2)
Re:Thieves aren't that smart... (Score:4, Interesting)
Re: (Score:2)
Re: (Score:3, Interesting)
It wasn't just smarts he had but a lack of shame and empathy for others.
There's a phrase that's rattled around in my (mostly empty) head. It was used in some piece of literature I read a mammal's age ago, describing the nature of such a person. In lieu of, or in addition to, what we've been calling "smarts".
That phrase seemed to perfectly capture the essence of such a person.
"Low animal cunning."
I like it.
Re: (Score:3, Insightful)
Re: (Score:3, Insightful)
It's probably safer to steal bigger volume for a small profit. People watch too much TV.
absolute crap (Score:2)
Re: (Score:2)
Re: (Score:2, Informative)
Re: (Score:3, Funny)
Re: (Score:2)
Re: (Score:2)
There is almost certainly an override password, and you can replace this chip. I think that's all you can do.
Re: (Score:2)
So it's just some software. Which shows how incredibly stupid a thief he was. He wasn't even willing (or able) to formate th
Re: (Score:2)
Seems he didn't make very much per laptop. How long does it take to reformat and reinstall the different types of laptops he steals AND be sure the snitchware is really gone?
AFAIK if you're trying to install a vanilla Windows XP on some of these laptops it's a pain - drivers etc. Heck installing XP from scratch is a bigger pain than installing Linux. Most people don't know that since Windows usually comes preinstalled.
Where are
Re: (Score:2)
Well, not that I want to help out any thieves, but it's not really THAT hard. Keep in mind that many of the large corporations (the kinds he was stealing from) use a standardized image whenever possible on their machines. Usually (if using XP) utilizing a corpor
LoJack for laptops (Score:3, Informative)
If the laptop has the proper version of TPM, it will even automatically re-install itself if the thief reinstalls Windows. Not sure if that's a good thing or a bad thing, having the BIOS infecting the machine... If it's stolen though, it's a good thing.
Re: (Score:2)
Seems pretty simple to me.
Re: (Score:2)
Re: (Score:2)
Actually
Re: (Score:2)
How (apart from physically separating the NIC from the rest of the system, i.e. rip the chip off the board or cut the relevant PCB traces) would you go about that ?
Re: (Score:2)
To quote discworld... (Score:3, Insightful)
check sunnyvale (Score:2, Funny)
Not limited to technology (Score:2)
We had a thief walk in one day and snatch a purse right off a desk 3 feet from me. I wasn't at my desk at the time. The thief walked right out the front door and even nodded to the receptionist, who noticed him as unusual and didn't recognize him but didn't see the purse. She did remember it was a man and that's about
Re: (Score:3, Interesting)
ID cards... (Score:3, Interesting)
Re: (Score:2)
...there's also the danger of the guy he doesn't recognize and challenges being an asshole that goes to the same golf club at the CEO. It only takes a few SIPs* to throw a hissy fit after being rightly denied entry and the security staff, unless adequately defended by the management, will stop bothering and/or just hassle anybody that doesn't look like a big shot.
(* Self-Important-Persons)
Re: (Score:2)
Re: (Score:2)
Not really news (Score:5, Insightful)
Or rather, where your key card has been.
You guess what happened? Exactly. One of those cards was stolen, one of the high level IT cards to boot, and the thief just waltzed in and went out with 2 servers. Nobody bothered to ask him what he's doing there. He has access to highly sensitive areas, so why bother asking why he's hauling around servers. That's his job, you know?
When nobody is supposed to do something, nobody expects anything's wrong when someone does what isn't supposed to be done. Especially in a high rotation hire and fire environment. Do you think anyone would question it when you put on a uniform and a trainee button and just go behind the counter of some fast food restaurant? Just tell everyone you're the new guy and avoid the manager.
It works.
Re: (Score:3, Insightful)
A couple of things:
1) add a photo.
2) add name, company affiliation and division.
2) add personal information on the flipside. My badge has my height / eye color / hair color.
(Back when I worked for the Army, it also had things like the contract
Re: (Score:2)
2) Only helps the thief knowing where to go and what security level he has.
2 (the other 2) See 1.
I agree with you that some physical inspection by a person is the ONLY way this can be avoided. But try to convince a suit that they should hire new people for something a machine can do. Well, the machine can't, but it's good enough for standard situations.
What suits don't seem to get is that security ONLY deals with non-standard situations. As lon
Re: (Score:3, Insightful)
Not really, in my case anyways, I'm a contractor so I work in a mixed facility with a bunch of other companies on several projects. It's easy for a guard to flip over the badge and interrogate you. Knowing the contract and company name will not help you find my desk
And here's how he was caught: (Score:4, Informative)
FTA:
Larry Brass, the Tampa Police detective who arrested Eric Almly this spring, says he's not permitted to endorse a particular product. But he says if Outback's laptops were not outfitted with software called Computrace LoJack for Laptops, made by Absolute Software, there is "no question" Almly would be walking free today.
Here is how it works: after a computer is stolen, the victim notifies Absolute's recovery team. When the thief accesses the Internet via that computer, the Computrace software on his computer silently broadcasts information that allows the team to determine his physical location.
With a street address in hand, police can make an arrest. The corporate version of the software gives subscribers the ability to remotely delete sensitive information from a computer.
Re:And here's how he was caught: (Score:5, Funny)
It was an Outback Steak-Out.
Re: (Score:3, Informative)
Re:And here's how he was caught: (Score:5, Funny)
Ahh... the power of money (Score:5, Interesting)
Which is funny as hell, because I've read several times on Slashdot (sorry, no time to search) about people who have their laptops set to do just that, but when they inform the police that their laptop is in use by a customer of this ISP with that IP address, they're told to go pound sand, that the police don't have time to go catch criminals that you can lead them to. It's trivial--especially with MacBooks--to have it send you not only the IP address but a picture of the theif if you want--but it seems to do no good.
Maybe the thing to do would be to get laptop insurance and then have the info emailed to the insurance company.
Re: (Score:3, Interesting)
The tracking companies hire ex-police detectives to speak "cop" when asking for an investigation to be opened with a police force. They are experienced in providing testimony before a court, filing paperwork, and saying the right thing to the right person to start a case. You, and all of slashdot, really, REALLY, want to maintain the current sit
Security at my company is good! (Score:4, Funny)
If a thief made it into the building and walked out with all the computers here, he might make $150 on ebay if lucky.
But he'd be more likely to just get a hernia.
Two million in one year? (Score:3, Interesting)
Re: (Score:3, Funny)
I can tell you this works (Score:2, Interesting)
Re: (Score:2)
Re: (Score:2)
Illegal wiretap (Score:5, Funny)
MAC address registration (Score:2, Interesting)
Re:if he was so smart (Score:4, Insightful)
Re:if he was so smart (Score:5, Informative)
Re: (Score:3, Insightful)
I doubt it. Most likely they got lazy and just cleaned XP without reinstalling leaving the rooted snitchkit to do it's thing. I guess if large access provider like T-Mobile's Hotspot had the MAC Address of a taken machine and a process to report to the right person it's presence on the network it could be traced. I also don't think MS is checking MAC addresses gather
Re: (Score:2)
1) Have BIOS boot using NIC every X boots.
2) Have NIC grab IP using DHCP (something that can be done on almost any network) and call home over HTTP (something almost never filtered).
3) If NIC calls home, and laptop is marked as stolen by HQ, wipe the hard disk and generate a support ticket for the IT department to pass along network info gathered to law enforcement.
All of this could be done in the background as well, masqueraded as an NTFS disk check. As Homer Simpson
Re: (Score:2, Informative)
Re:if he was so smart (Score:5, Interesting)
I believe most tracking software creates a separate partition that would survive a standard reinstall, but not a complete reformatting of the disk.
What I think would be very effective would be a laptop, created explicitly for businesses, that would implement the tracking system in hardware. If you added it to the integrated wireless networking, you wouldn't be able to shut it off, and you could track it whenever you needed to. If you are concerned about battery life, you could allow someone to shut it off, but have it wake-up every few hours just to check in. When it checks in, if it's labeled as stolen, the networking stays on, allowing for constant tracking.
There are some privacy concerns with a tracking device that can't be turned off, but that's why I said it would be explicitly for businesses, (or people who want that feature explicitly). For many businesses, the loss of privacy is less important that the ability to track their assets.
Re: (Score:2)
Anyway, they needed a way of determining where a seized laptop had travelled in the past. Many esoteric technical tracking methods were discussed, most involving network log analysis.
My friend's father suggested scraping the pollen off of the case fan.
Re: (Score:2)
When I got my Dell laptop in 2005, it was loaded with a little thing called Computrace. In the BIOS, it can be set either "permenantly" disabled or enabled (the default is a disable value in between); no software required. AFAIK, I needed to actually subscribe
Re: (Score:2, Informative)
We use Computrace here at work. We have x amount of licenses. The company gives us a custom build executable that latches itself into the BIOS along with setting up shop in the OS applications/programs. The only way to remove it is by using the custom executable to contact the local webserver that starts up on the machine. I guess you could reflash the BIOS as well. I haven't bothered trying to break it.
Supposedly all you have to do is "hit a button" and Computrace will take care of everything.(C
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
Do you have any links to this about Dell and HP computers? Is this an option or do they install it without you knowing or wanting this?!?!
Re:It's in the BIOS (Score:4, Informative)
VANCOUVER, Dec. 13 /PRNewswire-FirstCall/ -- Absolute(R) Software ("Absolute") (TSX: ABT), the leading provider of computer theft protection and secure asset tracking solutions, today announced a milestone in the company's efforts to drive the standard for PC theft recovery and Secure Asset Tracking(TM) - the availability of Computrace support in the BIOS across all four of the top tier PC manufacturers' commercial notebook lines.
Absolute first announced BIOS support for its theft protection technology with IBM/Lenovo on February 1, 2005; followed by announcements with Gateway on August 9th and HP on October 4th. Today, Dell announced a set of customer solutions that leverages Dell's embedded BIOS support for Computrace allowing customers to address issues of regulatory compliance, data protection and PC theft recovery.
We don't use it here, but I believe once you enable it in the BIOS, it can't be disabled. Obviously, there's always a way to disable everything, but it's not a matter of formatting a drive or changing a BIOS setting. It comes down to hex-editing the BIOS data or replacing the BIOS chip or something.
Wrong P (Score:2)