Solved

Stolen Computer Recovery

Posted on 2014-03-17
5
155 Views
Last Modified: 2014-08-16
I'm attempting to help a client recover a stolen computer. It's a Macbook Pro running OSX 10.8

I've managed to get the IP address of the thief (gmail logged in when launching the browser.) This information has been given to the local police department for them to request information from the ISP.

70.63.49.177
*Please do not do anything that might alert the thief or cause legal issues*

I would like to gather as much information as possible to provide the police (i.e. physical address, name, phone number)

A ping shows that the computer is still online, but a scan for open ports shows none open. The user hasn't launched Chrome, otherwise I could track his browser activity.

What are some ways I can gather more information?
0
Comment
Question by:MrComputerIT
  • 3
  • 2
5 Comments
 
LVL 34

Expert Comment

by:Dan Craciun
ID: 39936086
The *nix way would be to just ssh into it, but I don't know if it's active and configured into that laptop.

HTH,
Dan
0
 

Author Comment

by:MrComputerIT
ID: 39936092
Port 22 shows closed. Though all ports show closed, so I imagine its a router firewall or something?
0
 
LVL 34

Expert Comment

by:Dan Craciun
ID: 39936096
Probably. If it's in a household somewhere, the router will block all ports by default.
0
 

Author Comment

by:MrComputerIT
ID: 39936124
Is there a way I can "listen" to any of the network activity? Might be able to gather something useful from Facebook URL or something.
0
 
LVL 34

Accepted Solution

by:
Dan Craciun earned 500 total points
ID: 39936154
The police can request from the ISP that owns that IP (Time Warner, from the ip location search) the address for the customer that had that IP at that particular time.

They can also request from Facebook (or Google, or Yahoo etc) the accounts that were accessed using that IP, but I don't know if those companies are forced to respond.
0

Featured Post

Use Case: Protecting a Hybrid Cloud Infrastructure

Microsoft Azure is rapidly becoming the norm in dynamic IT environments. This document describes the challenges that organizations face when protecting data in a hybrid cloud IT environment and presents a use case to demonstrate how Acronis Backup protects all data.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

There are some basic methods for preventing attacks on, hacking of and unauthorized access to a network -- maybe not completely, but up to a certain level. Start with a well-reputed firewall and unified threat management (UTM) system -- a gateway…
In every aspect, security is essential for your business, and for that matter you need to always keep an eye on it. The same can be said about your computer network system too. Your computer network is prone to various malware and security threats t…
This video shows how to quickly and easily add an email signature for all users on Exchange 2016. The resulting signature is applied on a server level by Exchange Online. The email signature template has been downloaded from: www.mail-signatures…
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…

856 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question