Skip to Content
Uncategorized

Stolen Laptop Tattles, but Mine Doesn’t

Not all laptop-recovery services work the same.

The Des Moines Register had an interesting story yesterday about how a stolen Compaq Presario led police to an apartment containing $20,000 worth of crystal meth.

Apparently the laptop was equipped with an “anti-theft feature that lets it phone home when plugged in,” the paper reported.

Although there are several of these services on the market, probably the best known is Computrace, also known as Lojack for Laptops. (Absolute Software, makers of Computrace, licensed the Lojack name several years ago.) The software hooks into the computer at a very low level and is designed to make a phone call on a modem or send out a beacon on the computer’s Ethernet at least once per day.

Absolute keeps track of each beacon that’s received. If a computer is reported stolen, it can look at the caller ID from the phone call or at the IP address from the network communiqué. In this case, it seems, the laptop’s thieves had participated in other criminal activities as well.

When the police showed up at the apartment to apprehend the stolen property, they found the drugs too.

It’s great to hear that the laptop-recovery system worked for the victim in Iowa. But I’ve always suspected that the software wouldn’t be too hard for a sophisticated thief to remove. Last week I found out that it’s pretty darn easy, in fact–provided that you have a Mac.

You see, I bought Lojack for Laptops for my Mac back in August 2006.

Once I installed it, the software dutifully called back to Absolute every day. I could monitor these calls on the company’s website. Then earlier this month I decided to do a clean reinstall of the operating system on my MacBook.

Reinstalling software on a MacBook is much, much easier than on a PC: you just boot from the CD-ROM, tell the computer you want to do a “clean install,” and off you go. You can decide whether to do a clean install or an upgrade. You can even do a clean install while preserving your user accounts and applications. That’s just what I did.

Well, apparently the clean install was a little too clean: the hidden software that Absolute had embedded in my operating system was wiped away with my old operating system!

I don’t think that this is a real problem with the product today, as most crooks who steal a laptop probably aren’t sophisticated enough to reinstall the operating system the very first thing–human nature being what it is, they’re sure to turn on the laptop to see what’s there. They might even be looking for information that they can use for identity theft.

Still, I do wish that the folks at Absolute wouldn’t be so bold in their marketing claims. I can’t speak about their PC product, but their Mac product is pretty darn easy to remove.

(As a side note, I should say that I both called and sent e-mail to the folks at Computrace, telling them that I was a journalist and asking them for a comment about the failure of their software. The nice person I spoke with in tech support promised that somebody would get back to me, but nobody did.)

Keep Reading

Most Popular

Large language models can do jaw-dropping things. But nobody knows exactly why.

And that's a problem. Figuring it out is one of the biggest scientific puzzles of our time and a crucial step towards controlling more powerful future models.

How scientists traced a mysterious covid case back to six toilets

When wastewater surveillance turns into a hunt for a single infected individual, the ethics get tricky.

The problem with plug-in hybrids? Their drivers.

Plug-in hybrids are often sold as a transition to EVs, but new data from Europe shows we’re still underestimating the emissions they produce.

It’s time to retire the term “user”

The proliferation of AI means we need a new word.

Stay connected

Illustration by Rose Wong

Get the latest updates from
MIT Technology Review

Discover special offers, top stories, upcoming events, and more.

Thank you for submitting your email!

Explore more newsletters

It looks like something went wrong.

We’re having trouble saving your preferences. Try refreshing this page and updating them one more time. If you continue to get this message, reach out to us at customer-service@technologyreview.com with a list of newsletters you’d like to receive.