eXtensions Diary


Bangkok Diary Thursday 29 January 2009: Undercover 3 Released - Software for Recovery of Stolen Macs




advertisement



undercover icon Orbicule has announced the release of Version 3 of its computer-tracking software and I downloaded this to update my current installation.


I have been using Orbicule's Undercover in its earlier forms for a number of years. Version 2 was installed on my 12" PowerBook when my house was burgled about 2 years ago. Was? Actually, it still is and sometimes whoever has it connects to the internet and I get a couple of screenshots along with the IP number.

When this first occurred, with the help of the local police we managed to track down the location, but by the time we arrived (I was asked to go with them to help identification) it had gone and has only resurfaced once in the meantime, but the screen images I was sent did show that the hard disk, with my accounts was still intact and I keep my fingers crossed.

It was interesting to see that the latest iteration of the software now uses additional technology to help the law enforcement agencies track down a stolen computer, by way of the location service provided by Skyhook.


A slight detour is needed here and my initial point of reference is the 2008 Keynote presentation by Steve Jobs who explained how an iPhone could provide location data. One of the methods was with the Skyhook service, which maps the location of wifi antennas. This does not happen automatically and needs users to send data to Skyhook so that their database may grow: the more who do this, the more complete their location data will be.

This also works with the iPod touch and I added my data to the Skyhook service a year or so ago. What I did was detailed in my podcast number 131 and the text is online still. There were some follow ups in the next couple as well (132, 133).

To send the location of the wifi antenna to Skyhook (and it must be your wifi), you need the co-ordinates. In Google Maps, once you have the location centred, put the following script in the browser address bar.

javascript:void(prompt('',gApplication.getMap().getCenter()));


Google maps on iPod touch This will reveal the co-ordinates and these can be sent to Skyhook. When I did this it took a few days before an email acknowledging the location data, and a couple more before I could see my location with Google Maps on the iPod touch. That location should be available to anyone and it is this that Undercover is now taking advantage of.

The contact page of Skyhook has a link to a form for submission of location data which includes some useful information. The original article that I took information from by Dan Moren, is still available online.


When I first installed Undercover, the data available to help track a stolen computer was the IP number, screen shots and later if a webcam were used, shots of the person using it. As all portable Macs now have iSight as standard, Orbicule has been getting some interesting shots of thieves and these have helped law enforcement.

The IP number is a problem sometimes. From my own experience in Thailand, where the police were less conscious of computer crime when my PowerBook was stolen, it took far too long for the paperwork to be processed and a location produced. The location itself turned out to be a sensitive area that needed cooperation from another branch of the authorities here, so the computer was gone by the time we arrived.

Adding location data from Skyhook may be a way that the difficulty in getting information from an IP number as will happen in some countries, may be less of a problem and that this may ease the process.


There are certain preparations that need to be made and one of these is the creation of a Guest or open account. On my own stolen computer (and my current machine), the Admin account and the regular user account I work in on a day to day basis, are both locked with strong passwords. An extra account, with no password, is also created to act as a sort of honey-pot: a thief who cannot access the two main accounts will be drawn to the one with easy entry. rather than preventing use, this should be encouraged.

Undercover can only be removed by an Admin user, but with OS X disks (or the installation disks) it is possible to change the password of any account. To prevent startup with a disk, users need to make sure that the Firmware Password Utility is installed and working: this can only be done from the Admin account.

Should a Mac be stolen, an owner notifies Orbicule and sends a code that was produced at the time of installation: this sets the process going and the Orbicule database flags the specific machine as stolen and monitors for location data.

After a time, if the Mac is not recovered, there is a plan B in which the computer appears to be faulty. It is hoped that the machine is either sold or is sent to a repair shop. If this is the case, a message appears on the screen indicating it is stolen. Full details of how this operates are on the Orbicule pages and there are a number of recovery stories available there as well, unfortunately not mine, but I live in hope.

The cost of the software is $49 although there are student ($39) and family options ($59) available as well as site licences ($249) with a volume licence for educational establishments at $9.99 per Mac when ordering 100 copies or more.

Installation is fairly straightforward and does require a restart. Full information is available on the site. When the computer restarts, a panel appears and the licence information is entered at this time. It is also possible at this juncture to go to the online store and purchase a licence. Once done, the application appears to sleep, but is ready should the unfortunate event of a theft ever occur.




advertisement



Made on Mac

For further information, e-mail to

Back to eXtensions
To eXtensions: 2004-05
To eXtensions: Year Two
To eXtensions: Year One
To eXtensions: Book Reviews
Back to homepage


Google