Solved

Stolen Computer Recovery

Posted on 2014-03-17
5
152 Views
Last Modified: 2014-08-16
I'm attempting to help a client recover a stolen computer. It's a Macbook Pro running OSX 10.8

I've managed to get the IP address of the thief (gmail logged in when launching the browser.) This information has been given to the local police department for them to request information from the ISP.

70.63.49.177
*Please do not do anything that might alert the thief or cause legal issues*

I would like to gather as much information as possible to provide the police (i.e. physical address, name, phone number)

A ping shows that the computer is still online, but a scan for open ports shows none open. The user hasn't launched Chrome, otherwise I could track his browser activity.

What are some ways I can gather more information?
0
Comment
Question by:MrComputerIT
  • 3
  • 2
5 Comments
 
LVL 34

Expert Comment

by:Dan Craciun
ID: 39936086
The *nix way would be to just ssh into it, but I don't know if it's active and configured into that laptop.

HTH,
Dan
0
 

Author Comment

by:MrComputerIT
ID: 39936092
Port 22 shows closed. Though all ports show closed, so I imagine its a router firewall or something?
0
 
LVL 34

Expert Comment

by:Dan Craciun
ID: 39936096
Probably. If it's in a household somewhere, the router will block all ports by default.
0
 

Author Comment

by:MrComputerIT
ID: 39936124
Is there a way I can "listen" to any of the network activity? Might be able to gather something useful from Facebook URL or something.
0
 
LVL 34

Accepted Solution

by:
Dan Craciun earned 500 total points
ID: 39936154
The police can request from the ISP that owns that IP (Time Warner, from the ip location search) the address for the customer that had that IP at that particular time.

They can also request from Facebook (or Google, or Yahoo etc) the accounts that were accessed using that IP, but I don't know if those companies are forced to respond.
0

Featured Post

VMware Disaster Recovery and Data Protection

In this expert guide, you’ll learn about the components of a Modern Data Center. You will use cases for the value-added capabilities of Veeam®, including combining backup and replication for VMware disaster recovery and using replication for data center migration.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Pfsense & Black list. 2 108
Do I need additional protection from ransomware? 13 138
Azure network security group 2 52
Compromised PC? 17 175
In every aspect, security is essential for your business, and for that matter you need to always keep an eye on it. The same can be said about your computer network system too. Your computer network is prone to various malware and security threats t…
Envision that you are chipping away at another e-business site with a team of pundit developers and designers. Everything seems, by all accounts, to be going easily.
This Micro Tutorial will teach you how to censor certain areas of your screen. The example in this video will show a little boy's face being blurred. This will be demonstrated using Adobe Premiere Pro CS6.
Learn how to create flexible layouts using relative units in CSS.  New relative units added in CSS3 include vw(viewports width), vh(viewports height), vmin(minimum of viewports height and width), and vmax (maximum of viewports height and width).

867 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

16 Experts available now in Live!

Get 1:1 Help Now