back to article Web cam images undo MacBook thieves

A pair of clueless US crooks were brought to justice when they went online using an Apple employee's stolen laptop. Edmon Shahikian, 23, of Katonah, and Ian Frias, 20, of the Bronx district of New York, were arrested and charged with burglary and possession of stolen property after their victim tracked them down. Kait Duplaga …

COMMENTS

This topic is closed for new posts.
  1. Anonymous Coward
    Paris Hilton

    Hmm,

    Odd that an Apple employee would be daft enough to have auto login enabled?

  2. Julian Cook
    Thumb Up

    OMG

    For the first time ever I have to say that I might just buy a mac

  3. Dave
    Paris Hilton

    Could not make it up.

    As a result of hearing this story a few days ago on one of the Mac forums, I am now in the process of ordering a site licence of this software to install on all the macs in the company - easily targeted by thieves, this is a superb way of keeping things safe.

    Paris, cos she know a thing or two about the "dirty mac brigade"

    Mine is the coat with the white apple sticker on the back

  4. Anonymous Coward
    Happy

    LOL

    Made me chuckle, glad the theifs got busted! haha a useful mac :P

  5. Anonymous Coward
    Thumb Down

    If you read the article....

    ...it's not such an amazing feat of Mac-technology-sleuthing. All that happened was she took the picture before the dumb thief managed to cover the webcam, and by a huge turn of fortune, the thief was somebody known to a friend of hers.

    So the software only works if your Mac is stolen by somebody who you'd already recognise.

  6. Anonymous Coward
    Boffin

    Software to do this has been around for years

    Undercover from Orbicule can do this automatically. http://www.orbicule.com/undercover/

    Saw this a few years ago and though is was neat. When the Mac is stolen and then gets a network connection, it'll silently send screenshots and iSight pictures to a nominated account, along with IP addresses etc. It that doesn't work, it'll then simulate hardware failures until it gets sold on or sent to a repair place, at which point it'll then announce to the next user that it's been stolen and disabled.

    They'll also nicely refund the $49 (single user), or $59 (household license) if you Mac gets stolen and not recovered.

  7. heystoopid
    Flame

    Essentially

    Essentially , as this story unfolds it shows that Mac's have some very serious ill conceived security flaws with this software as installed and is just what the botnet boys need to take all these Mac's down and own them literally from a through z !

    Little wonder MacBook Air was history at that recent Canadian security Conference and the first to go down in less then two minutes flat !

    Flames are what is needed when these self wanking fans of the one in twenty five have such weak and non existent intertube security , what a very flawed OS indeed as it is insecure by nature , what a hoot !

    Question now becomes , can the wankers at the Cupertino Campus be sued for false and misleading advertising thus ?

  8. Anonymous Coward
    Anonymous Coward

    keeping things safe?

    It's no way to "keep things safe" at all. Disk encryption and key management would be a way to keep things safe. Restricting physical access to the Macs would be another, different way. But not this software.

  9. Matthew
    Thumb Up

    go to my pc

    If you use go to my pc perhaps you could do this on a PC =)

    Very funny story

  10. Thom White
    Happy

    Software flaw?

    The 'Back To my Mac' feature mentioned within the article isn't turned on by default. And, apparently....

    "Back to My Mac uses advanced authentication and data encryption technologies to help prevent unauthorized access to your data and protect it during transit over the Internet. So you can rest easy knowing your data is secure."

  11. David Cornes

    Not so fast

    Yeah, snagging the webcam pic was a stroke of luck, but I'm sure failing that having remote access to the box could've been used one way or another to try and track it down, if only from finding out the IP address and ISP.

    I used LogMeIn on my home PCs, and whilst not designed for stealth access I'm sure I could utilise it to some extent to do something similar. Either way good work by the Mac Girl!

  12. Anonymous Coward
    Boffin

    @ heystoopid

    Most operating systems have a facility to set up remote access and administration it would be hard to host network services without this facility, ask someone who works in IT.

    Not really sure I understand your point?

  13. Steve
    Thumb Down

    DNS?

    Presumably this means that the MAC is registering it's IP address at log on with some external DNS provider, otherwise there'd be no way to make the connection.

    Some service like Dyn-dns, or no-ip, in which case the actual connection and photo wasn't necessary as the IP address should be sufficient for the police to trace through the ISP to a specific address.

    @heystoopid - it appears that you have not understood the initial article, you're either stupid yourself or a mac troll.

  14. Webster Phreaky
    Gates Halo

    @heystoopid

    > Essentially , as this story unfolds it shows that Mac's have some very serious ill

    > conceived security flaws with this software as installed

    Tw@t! Perhaps you should research what "Back to my Mac" is before posting such drivel. http://www.apple.com/dotmac/backtomymac.html

    The WHOLE POINT of this software is to allow secure remote logins so you can access your Mac whilst not being sat in front of it.

    It's not enabled by default and requires a .Mac account, so doesn't allow all Macs to be owned by "botnet boys".

    Not that the facts mean anything to thick shits like you. "heystoopid" is a very apt user name for you.

  15. Gary
    Coat

    @heystoopid/Webster Phreaky

    I'd not worry too much about the comment Phreaky - I would suggest that heystoopid was attempting to spark a Mac/PC flame war. Every time I see an article like this posted on lesser sites it's always just a matter of time. Reg readers tend to be a cut above.

    I would never subscribe to such debaucherous endeavours.

    MACS RULE!

  16. Stephen

    ialertU

    I use IalertU (http://sourceforge.net/projects/ialertu/), simply leave your laptop facing the door, open, and when an intruder comes in, they'd generally pick the laptop up, bang the webcam goes off and sends the pics over the internet...

  17. Anonymous Coward
    Paris Hilton

    ok. Now I'm confused.

    Have Webster and Heystoopid switches personalities?

  18. Madeye
    Paris Hilton

    @Steve

    According to the docs, you need a valid .Mac account to use Back to My Mac. I surmise that when you fire up the network interface, Back to My Mac will register it's IP with the .Mac service, so the machine can then be accessed from elsewhere.

    So your point about the IP being logged and traceable is essentially correct. The webcam part was not necessary. If I was using Back to My Mac, I'd be really careful not to plug my Mac in at my illicit lover or crack dealers house, however

    A Linux equivalent would be pretty straight forward to concoct using a few boot scripts and tunneling X over SSH

    Paris, because she'd probably leave her laptop on with the webcam running

  19. jubtastic1
    Happy

    I'm Amazed...

    She managed to take a shot with PhotoBooth without the crims realising something was up, PhotoBooth is well in your face.

    You can do all this yourself using free stuff, I set up my old mans Macbook to covertly snap a pic and email me whenever it connects to an unknown network, as such I've a ton of pics of him stealing his neighbours wifi heh.

    The 'undercover' service mentioned in the comments above is a nice solution to the less geeky, although if you can't roll it yourself you're reading the wrong site friend.

  20. Steve Mann
    Pirate

    @Stephen

    Or, you could use a cheap cctv setup with oodles better low light capability than a webcam, a burgular alarm with an earsplitting klaxon mounted inside the room and keep your expensive laptoy in a safe place where the criminals won't hang around to look for it.

    That way, the computer is available for use the next day instead of in the hands of a burry individual that could be anyone.

    Of course, that's old-school, pre web 2.5 thinking.

    If you want to go totally over the top you could add a strobe light or two in the room too. Nothing says "hands off" like an epileptic fit.

  21. Anonymous Coward
    Happy

    @ heystood

    What can I say?

    heystood by name, heystupid by nature!

  22. Elrond Hubbard
    Coat

    Nothing says "hands off"...

    ...like chopping their hands off.

  23. Anonymous Coward
    Stop

    @Hmm, by Anon

    No auto login would have been required. No PC, Mac or otherwise, is safe if the person has physical access to it. Requiring a password at login is little more than a deterent. Hiding login names is even better (which is what I do on my MacBook Pro).

    Sure, auto login makes things easy, and the typical non-pc(mac)-literate user won't be able to bypass a login window, but if someone can get physical access to your PC, you can pretty much bet a determined hacker will be able to get into it.

    For a Mac, you can use the install disc to boot up and reset the admin password. I think you can also do it with single user login.

  24. Anonymous Coward
    Happy

    @jubtastic1

    "I'm Amazed... She managed to take a shot with PhotoBooth without the crims realising something was up, PhotoBooth is well in your face."

    If you follow the link to the NY Times article, it explains that he realised what was happening but failed to cover the camera with his hand in time.

  25. Daniel B.
    Boffin

    LogMeInGoingToMyPC

    I just have to wonder why are there people stupid enough to buy stuff that does things that your OS *already does*. If you've got Windows XP or any win200X Server version, you've already got Remote Desktop / RDP. No need for Log Me In or Go To My WC. If you don't want to do the OS way, VNC has been doing this, *for free*. Really, what is the "big advantage" on these programs?

    That said, looks like these thieves were very stupid. Anyone intelligent enough would assume the laptop's got a tracker on it, just waiting for you to go online. Software doing this goes back to 1998, maybe even before that.

  26. Steven Raith
    Thumb Up

    @DanB

    I think the best answer to this is to have a remote session with full hardware access running in the background [IE not affecting their session] so you can access the hardware resources [such as a webcam for mugshots, and possibly the speakers so you can shout "I SEE YOU MOFO MUHAHAHA" etc down the wire to them] without giving them too much of a clue on their login session.

    I don't suppose this would be terrifically hard to do with a *nix based system, but then, I'm not a software/OS dev and I rarely dabble in terminal services full stop, so I won't say any more ;-)

    Steven "I SEE YOU MOFO" Raith.

  27. heystoopid
    Flame

    Nice to see

    Nice to see the Mac fans are still living in denial of the Mac Book Air fiasco in Canada or the recent Leopard 10.5.2 update debacle or the Ilooney Adobe fiasco too name but a few of the all to numerous scams originating from the Cupertino Campus and still do not understand one letter in the word denial by choice !

    First the software is very buggy , needs a lot more work and refining as it is more alpha then beta software , extremely difficult to set up and securing it , is more of a nightmare then most users care to admit (good to see a minority of users tend to overlook the obvious faults )!

    Ah yes the one in twenty five are truly classic in more ways then one , but as the real market says you are in the minority with pretensions for being the majority that will never happen in any century !

    Choices can be seen to be evil , especially for those who choose to not look beyond their nose from behind those rose coloured glasses !

    Flame on boys it be so funny it is more fun then using nitrous oxide with helium at a party !

  28. Anonymous Coward
    Thumb Down

    Still not enough to

    make me buy a Mc

  29. storng.bare.durid
    Stop

    Big brother is watching you...

    See that tiny black lens on top of your monitor?

  30. W Meulensteen
    Coat

    Who would care...

    If their windows laptop got stolen, it would be good riddance.

    Mine's the black unmarked one with the deeeeeeeeeeeeeeeeeeeeep pockets.

  31. Scott Mckenzie

    heystoopid

    You really are...

    If you find a Mac difficult to set up then you're more stoopid than your name says... as for securing it, well, errr.... again pretty straightforward if you ask me.

    There is no denial of the Macbook Air hacking either.... just because a Mac got hacked does that undo all of the past insecurities of Windows, Linux etc?

    I am somewhat concerned about Webster though....

  32. Gareth Hughes

    @ Daniel B

    The advantage of using Goto MyPC / LogmeIn type programs is that they don't require you to A/ Know the IP of the machine and B/ Have any port forwarding set up on the NAT router.

  33. Anonymous Coward
    Gates Horns

    COTDC

    I was doing this years ago with backorrifice. That was an amazing program, easily unleashed on the unsuspecting.

    "Heres the NAV updates you wanted. chuckle chuckle"

  34. Phil Koenig
    Pirate

    Correction and why this is not so special

    @Daniel B: RemoteDesktop terminates the current user session when it connects, so that is not going to help you much if you want to monitor someone else's session without them knowing.

    The technology to accomplish this in a much more effective and automatic way than the way demonstrated with the Mac is not complex, it's just not commonly installed.

    This will probably change pretty soon, for example what Lenovo is bundling with a lot of their new models:

    http://static.tigerdirect.com/html/veriface.html

    http://www.brightcove.tv/title.jsp?title=1445017879&channel=537061027

  35. Anonymous Coward
    Anonymous Coward

    @Steve Mann

    Keeping your laptop secure and garded by a "traditional system" is great but many laptop users only actually got a portable computer because it's, erm, portable! But otherwise yeah, my desktop pc weighs a tonne and is secured in a cupboard. It wouldnt be worth the burglar's time to free it (2nd hand value of an out of date cheap supermarket PC isnt all that...!).

This topic is closed for new posts.

Biting the hand that feeds IT © 1998–2020