Solved

Stolen Computer Recovery

Posted on 2014-03-17
5
150 Views
Last Modified: 2014-08-16
I'm attempting to help a client recover a stolen computer. It's a Macbook Pro running OSX 10.8

I've managed to get the IP address of the thief (gmail logged in when launching the browser.) This information has been given to the local police department for them to request information from the ISP.

70.63.49.177
*Please do not do anything that might alert the thief or cause legal issues*

I would like to gather as much information as possible to provide the police (i.e. physical address, name, phone number)

A ping shows that the computer is still online, but a scan for open ports shows none open. The user hasn't launched Chrome, otherwise I could track his browser activity.

What are some ways I can gather more information?
0
Comment
Question by:MrComputerIT
  • 3
  • 2
5 Comments
 
LVL 34

Expert Comment

by:Dan Craciun
Comment Utility
The *nix way would be to just ssh into it, but I don't know if it's active and configured into that laptop.

HTH,
Dan
0
 

Author Comment

by:MrComputerIT
Comment Utility
Port 22 shows closed. Though all ports show closed, so I imagine its a router firewall or something?
0
 
LVL 34

Expert Comment

by:Dan Craciun
Comment Utility
Probably. If it's in a household somewhere, the router will block all ports by default.
0
 

Author Comment

by:MrComputerIT
Comment Utility
Is there a way I can "listen" to any of the network activity? Might be able to gather something useful from Facebook URL or something.
0
 
LVL 34

Accepted Solution

by:
Dan Craciun earned 500 total points
Comment Utility
The police can request from the ISP that owns that IP (Time Warner, from the ip location search) the address for the customer that had that IP at that particular time.

They can also request from Facebook (or Google, or Yahoo etc) the accounts that were accessed using that IP, but I don't know if those companies are forced to respond.
0

Featured Post

What Security Threats Are You Missing?

Enhance your security with threat intelligence from the web. Get trending threat insights on hackers, exploits, and suspicious IP addresses delivered to your inbox with our free Cyber Daily.

Join & Write a Comment

Most computer users do not realize how important their passwords are. Here’s the straight scoop on why you need a good password and how to create super strong passwords that are easy to remember and hard to crack. Thieves Are Trying to Steal Yo…
There are some basic methods for preventing attacks on, hacking of and unauthorized access to a network -- maybe not completely, but up to a certain level. Start with a well-reputed firewall and unified threat management (UTM) system -- a gateway…
Here's a very brief overview of the methods PRTG Network Monitor (https://www.paessler.com/prtg) offers for monitoring bandwidth, to help you decide which methods you´d like to investigate in more detail.  The methods are covered in more detail in o…
When you create an app prototype with Adobe XD, you can insert system screens -- sharing or Control Center, for example -- with just a few clicks. This video shows you how. You can take the full course on Experts Exchange at http://bit.ly/XDcourse.

762 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

9 Experts available now in Live!

Get 1:1 Help Now