|
TuxMobil
|
site map · index a-z · search |
|
Theft & Loss Protection for Laptops, Notebooks, PDAs with Linux
Here are some links to databases listing stolen laptops, notebooks, PDAs, handhelds, mobile (cellular) phones and other mobile computers.
As well as tips and tricks for theft protection and data loss prevention of mobile Linux computers. See also
Debian Linux Laptop for Road Warriors Databases
Theft ProtectionPrerequisites
Theft BehaviourThe following travel alert is reprinted courtesy of the US Federal Aviation Authority (FAA). The FAA recently learned of a hustle that's being employed at airports all across the country to steal laptop computers. It involves two persons who look for a victim carrying a laptop and approaching a metal detector. They position themselves in front of the unsuspecting passenger. They stall until the mark puts the laptop computer on the conveyor belt. Then the first subject moves through the metal detector easily. The second subject sets off the detector and begins a slow process of emptying pockets, removing jewelry, etc. While this is happening, the first subject takes the laptop as soon as it appears on the conveyor belt and moves away quickly. When the passenger finally gets through the metal detector, the laptop is gone. The subject that picks it up heads into the gate area and disappears among the crowd. Sometimes a third subject will take a hand-off from the first subject and the computer is out of the restricted area before the mark even knows that it is gone. This is becoming a widely practiced problem and is happening at airports everywhere. When traveling with a laptop computer, try to avoid lines to enter a metal detector when possible. When you can't do that, delay putting your luggage and laptop on the conveyor belt until you are sure that you will be the next person through the metal detector. As you move through the metal detector, keep your eyes on the conveyor belt and watch for your luggage and laptop to come through as well as watching for what those in front of you are picking up. Hard Disk Encryption
This
Encrypted dual boot single hard drive system HOWTO Phoenix BIOS
TheftGuard Homing Pigeon
Homing Pigeon RC5DESFrom Jon Anderson <jon_at_locust.co.uk>:
"Use the power of the laptop! I read recently that several laptops were
recovered as they were running the RC5DES distributed computing client
Distributed.Net Perhaps a more targeted system would be if someone (maybe me if anyone is interested) could set up a host on the net and then you just add a ping to that host into your ppp-on script (dial on demand etc) with the -p option to pass data in the packet with a unique reference number. That way if the laptop is ever stolen you could enter in the unique number and get tracking information as to where the laptop was last registered as connecting to the net from etc?" iSpy"iSpy, from Lexent, is a product that's well suited to the mobile professional who may need to leave his luggage and laptop for a period of time, say while in the restroom or in line for a snack. iSpy uses "PC Radar," a hybrid of motion and proximity sensing with 2-way wireless notification system to protect a computer (and its data). You attach iSpy to your laptop computer or carrying case, arm it using the 2-way key chain remote, and you will be discretely alerted on your key chain when someone moves your computer and you are outside of its immediate proximity of about ten feet. You can then choose to remotely sound a 110 decibel alarm if the situation calls for it. While we found the key chain remote didn't always have enough
transmitting power to sound the alarm, when it did it was effective.
This product definitely deserves a look, especially if you have one
of the old "proximity alarms" that goes off automatically. Nothing
is more embarrassing than forgetting to turn off one of these things
and then having your luggage start blaring as it rounds the corner on
the conveyor belt at the ticket window, or when you get up from your
airplane seat to go to the restroom and the laptop bag in the
overhead starts squawking. iSpy is available direct from the
Lexent Transponders/RFID
Transponders are small devices, which don't need a battery. They can
be used for identification purposes:
Trovan Transponders vp-usb-lock
vp-usb-lock The CD/DVD TrickUsing your laptop in a public library you may rely on their theft protection mechanisms. Just put one of their CDs or DVDs with these litte magnetic tags into the drive. Mounting the media will prevent it from removal. Now imagine the thief leaving the library security gate! Nasty, isn't it? Note: make sure _you_ remove the media before passing the gate. LAN or WLANJust an idea and not yet worked out. But I suppose it is somehow possible to use WLAN and/or LAN capabilities of a Linux laptop either as a warning method if a machine is moved or as a method to trace it. WLAN and GPSJust another idea and not yet worked out. But I suppose it is somehow possible to use WLAN and GPS capabilities of a Linux laptop either as a warning method if a machine is moved or as a method to trace it. BIOS InscriptionFrom Lionel, trollhunter Bouchpan-Lerust-Juery: "With a friend we are installing OpenBSD on a friend's computer and there is an interesting feature in his BIOS: the BIOS was flashed and the computer shop's appears on the screen qt boot up with the BIOS #. I guess they took an hexadecimal editor and edited the BIOS image replacing ABIT by the vendor's references. Such an idea, I guess could improve the overall safety of laptops acting as a deterant on amateur thief while displaying the owner's name at boot up: harder to sell if you see what I mean."
How to change the BIOS bootsplash screen for IBM/Lenovo Thinkpad T4x series
Here
You may also consider to implement a nice
Linux BootSplash Distributed Clients
In a
SlashDot discussion Review: Track your stolen laptop for free with Prey (and other Open Source tools)
For the budget conscious, there are in fact a few
free, open-source options for tracking a stolen notebook Protection DevicesThere are many offers for locks, alarms, transponders and other means of computer security at:
Plates
STOP Security Tracking of Office Property Using External StorageFoiling laptop data thieves. Storing personal data on an external storage devices like USB sticks, memory sticks or portable hard disks will make it easier to take your data with you. Also it seems easier to encrypt these data. theft-alarm.sh
The
theft-alarm.sh InsurancesAs an alternative you may subscribe an insurance. Here are some insurance companies, which are specialised in this field. Also some laptop and PDA manufacturers offer insurance solutions.
Theft ReportsSecond British Spy Laptop Lost
From Cryptome British government reports 67 lost laptops
"LONDON (June 5, 2000 4:29 p.m. EDT NandoTimes Laptop Thief Caught via AOL Login
From SlashDot Timbuktu Used to Recover Stolen iMac
See this story
about using Timbuktu to recover a stolen Apple iMac Loss Statistics
Loss Statistics Charts ResourcesHere are the slides of my presentation Theft and Loss Protection for Linux Laptops and Notebooks. CreditsThanks to |
||
|
print · i-mode · WAP · PDA contact · imprint · privacy (P3P) · sponsors · RSS © Werner Heuser 1997-2015 · http://tuxmobil.org/stolen_laptops.html · last change Mon Nov 23 2009 |
|||