Solved

Stolen Computer Recovery

Posted on 2014-03-17
5
156 Views
Last Modified: 2014-08-16
I'm attempting to help a client recover a stolen computer. It's a Macbook Pro running OSX 10.8

I've managed to get the IP address of the thief (gmail logged in when launching the browser.) This information has been given to the local police department for them to request information from the ISP.

70.63.49.177
*Please do not do anything that might alert the thief or cause legal issues*

I would like to gather as much information as possible to provide the police (i.e. physical address, name, phone number)

A ping shows that the computer is still online, but a scan for open ports shows none open. The user hasn't launched Chrome, otherwise I could track his browser activity.

What are some ways I can gather more information?
0
Comment
Question by:MrComputerIT
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 3
  • 2
5 Comments
 
LVL 35

Expert Comment

by:Dan Craciun
ID: 39936086
The *nix way would be to just ssh into it, but I don't know if it's active and configured into that laptop.

HTH,
Dan
0
 

Author Comment

by:MrComputerIT
ID: 39936092
Port 22 shows closed. Though all ports show closed, so I imagine its a router firewall or something?
0
 
LVL 35

Expert Comment

by:Dan Craciun
ID: 39936096
Probably. If it's in a household somewhere, the router will block all ports by default.
0
 

Author Comment

by:MrComputerIT
ID: 39936124
Is there a way I can "listen" to any of the network activity? Might be able to gather something useful from Facebook URL or something.
0
 
LVL 35

Accepted Solution

by:
Dan Craciun earned 500 total points
ID: 39936154
The police can request from the ISP that owns that IP (Time Warner, from the ip location search) the address for the customer that had that IP at that particular time.

They can also request from Facebook (or Google, or Yahoo etc) the accounts that were accessed using that IP, but I don't know if those companies are forced to respond.
0

Featured Post

Easy, flexible multimedia distribution & control

Coming soon!  Ideal for large-scale A/V applications, ATEN's VM3200 Modular Matrix Switch is an all-in-one solution that simplifies video wall integration. Easily customize display layouts to see what you want, how you want it in 4k.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Most computer users do not realize how important their passwords are. Here’s the straight scoop on why you need a good password and how to create super strong passwords that are easy to remember and hard to crack. Thieves Are Trying to Steal Yo…
This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
Finds all prime numbers in a range requested and places them in a public primes() array. I've demostrated a template size of 30 (2 * 3 * 5) but larger templates can be built such 210  (2 * 3 * 5 * 7) or 2310  (2 * 3 * 5 * 7 * 11). The larger templa…

733 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question