Select your localized edition:

Close ×

More Ways to Connect

Discover one of our 28 local entrepreneurial communities »

Be the first to know as we launch in new countries and markets around the globe.

Interested in bringing MIT Technology Review to your local market?

MIT Technology ReviewMIT Technology Review - logo


Unsupported browser: Your browser does not meet modern web standards. See how it scores »

{ action.text }

The Des Moines Register had an interesting story yesterday about how a stolen Compaq Presario led police to an apartment containing $20,000 worth of crystal meth.

Apparently the laptop was equipped with an “anti-theft feature that lets it phone home when plugged in,” the paper reported.

Although there are several of these services on the market, probably the best known is Computrace, also known as Lojack for Laptops. (Absolute Software, makers of Computrace, licensed the Lojack name several years ago.) The software hooks into the computer at a very low level and is designed to make a phone call on a modem or send out a beacon on the computer’s Ethernet at least once per day.

Absolute keeps track of each beacon that’s received. If a computer is reported stolen, it can look at the caller ID from the phone call or at the IP address from the network communiqué. In this case, it seems, the laptop’s thieves had participated in other criminal activities as well.

When the police showed up at the apartment to apprehend the stolen property, they found the drugs too.

It’s great to hear that the laptop-recovery system worked for the victim in Iowa. But I’ve always suspected that the software wouldn’t be too hard for a sophisticated thief to remove. Last week I found out that it’s pretty darn easy, in fact–provided that you have a Mac.

You see, I bought Lojack for Laptops for my Mac back in August 2006.

Once I installed it, the software dutifully called back to Absolute every day. I could monitor these calls on the company’s website. Then earlier this month I decided to do a clean reinstall of the operating system on my MacBook.

Reinstalling software on a MacBook is much, much easier than on a PC: you just boot from the CD-ROM, tell the computer you want to do a “clean install,” and off you go. You can decide whether to do a clean install or an upgrade. You can even do a clean install while preserving your user accounts and applications. That’s just what I did.

Well, apparently the clean install was a little too clean: the hidden software that Absolute had embedded in my operating system was wiped away with my old operating system!

I don’t think that this is a real problem with the product today, as most crooks who steal a laptop probably aren’t sophisticated enough to reinstall the operating system the very first thing–human nature being what it is, they’re sure to turn on the laptop to see what’s there. They might even be looking for information that they can use for identity theft.

Still, I do wish that the folks at Absolute wouldn’t be so bold in their marketing claims. I can’t speak about their PC product, but their Mac product is pretty darn easy to remove.

(As a side note, I should say that I both called and sent e-mail to the folks at Computrace, telling them that I was a journalist and asking them for a comment about the failure of their software. The nice person I spoke with in tech support promised that somebody would get back to me, but nobody did.)

6 comments. Share your thoughts »

Tagged: security software

Reprints and Permissions | Send feedback to the editor

From the Archives


Introducing MIT Technology Review Insider.

Already a Magazine subscriber?

You're automatically an Insider. It's easy to activate or upgrade your account.

Activate Your Account

Become an Insider

It's the new way to subscribe. Get even more of the tech news, research, and discoveries you crave.

Sign Up

Learn More

Find out why MIT Technology Review Insider is for you and explore your options.

Show Me

A Place of Inspiration

Innovations and Ideas Fueling
Our Connected World

June 1-2, 2015
Register »