SlideShare a Scribd company logo
1 of 2
Download to read offline
©2013 Absolute Software Corporation. All rights reserved.
Buying a Laptop from a Gas Station? It Just Might Be
Stolen
Airports are consistently one of the top 10 places where devices are
stolen. According to our own investigations, 25% of devices are stolen from luggage /
storage area, 24% are stolen on the airplane, 18% are stolen at check-in / security area,
and 15% are stolen in the terminal / boarding area. An Absolute LoJack customer
recently had a laptop stolen from an airport in New Orleans, though it's a case that had
a very happy ending.
The customer laptop was stolen early in October of 2013. As is very common in cases
of device theft, police leads quickly went cold - thankfully, we never stop our own
investigations! Our skilled Recovery Team was able to identify a user, but also a
complicating factor adding time pressure to our investigation! The investigation revealed
that the device was being used by a Turkish student who was due to leave the US on
December 30th, so the best chance of recovering the laptop was before it left the
country.
By now, it is Christmas and police are very busy. Despite that, local police took our
investigative summary and approached the user of the laptop, safely recovering it.
According to the user, the laptop had been purchased from his roommate; the
roommate shared a story of purchasing the laptop from someone at a gas station near
the airport around the date of the theft. Neither person was charged with any crime,
though perhaps they should read up on How to Avoid Buying Stolen Devices!
Thanks to local police for quickly recovering the laptop during the holidays!
Stay safe when you travel with your devices. Protect all of your devices
with Absolute LoJack and review our Top Security Tips for Airports.
About the Author
Arieanna Schweber has been a part of the Absolute Software writing team since 2007.
Arieanna was Canada's first female professional blogger and has been professionally
blogging since 2006, speaking at leading blogging conferences including BlogHer and
Northern Voice. Arieanna has a joint degree in Business and Communications from
Simon Fraser University and continues to build communities for Vancouver-based
clients.
©2013 Absolute Software Corporation. All rights reserved.
About the Company
Absolute Software(@Absolutecorp) helps businesses and consumers track, manage,
secure and recover mobile computers and devices using our patented persistence
technology. We license the name "LoJack" from the LoJack Corporation to highlight the
similarities between our consumer product, LoJack for Laptops (@LoJackforLaptop),
and their stolen vehicle recovery service. Currently Absolute Software has recovered
over 30,000 devices in over 100 countries around the world.

More Related Content

Viewers also liked

(2004) Effects of Illumination Changes on the Performance of Geometrix FaceVi...
(2004) Effects of Illumination Changes on the Performance of Geometrix FaceVi...(2004) Effects of Illumination Changes on the Performance of Geometrix FaceVi...
(2004) Effects of Illumination Changes on the Performance of Geometrix FaceVi...International Center for Biometric Research
 
NSA 2012 M.Gavery
NSA 2012 M.GaveryNSA 2012 M.Gavery
NSA 2012 M.Gaverymgavery
 
Principal components
Principal componentsPrincipal components
Principal componentsHutami Endang
 
Lost in Wakatobi [Game Design Document] by Tuan Muda
Lost in Wakatobi [Game Design Document] by Tuan MudaLost in Wakatobi [Game Design Document] by Tuan Muda
Lost in Wakatobi [Game Design Document] by Tuan MudaDesiree Jane
 
111 physicsdynamics research
111 physicsdynamics research111 physicsdynamics research
111 physicsdynamics researchRyan Worcester
 
Our Home Garden - Week 1 Update
Our Home Garden - Week 1 UpdateOur Home Garden - Week 1 Update
Our Home Garden - Week 1 Updatescrobins
 

Viewers also liked (7)

(2004) Effects of Illumination Changes on the Performance of Geometrix FaceVi...
(2004) Effects of Illumination Changes on the Performance of Geometrix FaceVi...(2004) Effects of Illumination Changes on the Performance of Geometrix FaceVi...
(2004) Effects of Illumination Changes on the Performance of Geometrix FaceVi...
 
Introductorio
IntroductorioIntroductorio
Introductorio
 
NSA 2012 M.Gavery
NSA 2012 M.GaveryNSA 2012 M.Gavery
NSA 2012 M.Gavery
 
Principal components
Principal componentsPrincipal components
Principal components
 
Lost in Wakatobi [Game Design Document] by Tuan Muda
Lost in Wakatobi [Game Design Document] by Tuan MudaLost in Wakatobi [Game Design Document] by Tuan Muda
Lost in Wakatobi [Game Design Document] by Tuan Muda
 
111 physicsdynamics research
111 physicsdynamics research111 physicsdynamics research
111 physicsdynamics research
 
Our Home Garden - Week 1 Update
Our Home Garden - Week 1 UpdateOur Home Garden - Week 1 Update
Our Home Garden - Week 1 Update
 

More from Absolute LoJack

Laptop Theft Recovery Case from Absolute Software – Case Number 8E0D2
Laptop Theft Recovery Case from Absolute Software – Case Number 8E0D2Laptop Theft Recovery Case from Absolute Software – Case Number 8E0D2
Laptop Theft Recovery Case from Absolute Software – Case Number 8E0D2Absolute LoJack
 
Laptop Theft Recovery Cases from Absolute Software – Case Number 7I7D8
Laptop Theft Recovery Cases from Absolute Software – Case Number 7I7D8Laptop Theft Recovery Cases from Absolute Software – Case Number 7I7D8
Laptop Theft Recovery Cases from Absolute Software – Case Number 7I7D8Absolute LoJack
 
Dell XPS Laptop Theft Recovery Case from Absolute Software – Case Number 8B2H0
Dell XPS Laptop Theft Recovery Case from Absolute Software – Case Number 8B2H0Dell XPS Laptop Theft Recovery Case from Absolute Software – Case Number 8B2H0
Dell XPS Laptop Theft Recovery Case from Absolute Software – Case Number 8B2H0Absolute LoJack
 
Absolute Software & Lojack – 2014 Overview
Absolute Software & Lojack – 2014 OverviewAbsolute Software & Lojack – 2014 Overview
Absolute Software & Lojack – 2014 OverviewAbsolute LoJack
 
Smartphone Theft Recovery Cases from Absolute Software – Case Number 9E1Z5
Smartphone Theft Recovery Cases from Absolute Software – Case Number 9E1Z5Smartphone Theft Recovery Cases from Absolute Software – Case Number 9E1Z5
Smartphone Theft Recovery Cases from Absolute Software – Case Number 9E1Z5Absolute LoJack
 
Laptop Theft Recovery Cases from Absolute Software – Case Number 8G2Z9
 Laptop Theft Recovery Cases from Absolute Software – Case Number 8G2Z9 Laptop Theft Recovery Cases from Absolute Software – Case Number 8G2Z9
Laptop Theft Recovery Cases from Absolute Software – Case Number 8G2Z9Absolute LoJack
 
Laptop Theft Recovery Cases from Absolute Software – Case Number 8G1E6
Laptop Theft Recovery Cases from Absolute Software – Case Number 8G1E6Laptop Theft Recovery Cases from Absolute Software – Case Number 8G1E6
Laptop Theft Recovery Cases from Absolute Software – Case Number 8G1E6Absolute LoJack
 
Laptop Theft Recovery Cases from Absolute Software – Case Number 8F6Z9
Laptop Theft Recovery Cases from Absolute Software – Case Number 8F6Z9Laptop Theft Recovery Cases from Absolute Software – Case Number 8F6Z9
Laptop Theft Recovery Cases from Absolute Software – Case Number 8F6Z9Absolute LoJack
 
Laptop Theft Recovery Cases from Absolute Software – Case Number 8C5A7
Laptop Theft Recovery Cases from Absolute Software – Case Number 8C5A7Laptop Theft Recovery Cases from Absolute Software – Case Number 8C5A7
Laptop Theft Recovery Cases from Absolute Software – Case Number 8C5A7Absolute LoJack
 
Laptop Theft Recovery Cases from Absolute Software – Case Number 7I5B2
Laptop Theft Recovery Cases from Absolute Software – Case Number 7I5B2Laptop Theft Recovery Cases from Absolute Software – Case Number 7I5B2
Laptop Theft Recovery Cases from Absolute Software – Case Number 7I5B2Absolute LoJack
 

More from Absolute LoJack (10)

Laptop Theft Recovery Case from Absolute Software – Case Number 8E0D2
Laptop Theft Recovery Case from Absolute Software – Case Number 8E0D2Laptop Theft Recovery Case from Absolute Software – Case Number 8E0D2
Laptop Theft Recovery Case from Absolute Software – Case Number 8E0D2
 
Laptop Theft Recovery Cases from Absolute Software – Case Number 7I7D8
Laptop Theft Recovery Cases from Absolute Software – Case Number 7I7D8Laptop Theft Recovery Cases from Absolute Software – Case Number 7I7D8
Laptop Theft Recovery Cases from Absolute Software – Case Number 7I7D8
 
Dell XPS Laptop Theft Recovery Case from Absolute Software – Case Number 8B2H0
Dell XPS Laptop Theft Recovery Case from Absolute Software – Case Number 8B2H0Dell XPS Laptop Theft Recovery Case from Absolute Software – Case Number 8B2H0
Dell XPS Laptop Theft Recovery Case from Absolute Software – Case Number 8B2H0
 
Absolute Software & Lojack – 2014 Overview
Absolute Software & Lojack – 2014 OverviewAbsolute Software & Lojack – 2014 Overview
Absolute Software & Lojack – 2014 Overview
 
Smartphone Theft Recovery Cases from Absolute Software – Case Number 9E1Z5
Smartphone Theft Recovery Cases from Absolute Software – Case Number 9E1Z5Smartphone Theft Recovery Cases from Absolute Software – Case Number 9E1Z5
Smartphone Theft Recovery Cases from Absolute Software – Case Number 9E1Z5
 
Laptop Theft Recovery Cases from Absolute Software – Case Number 8G2Z9
 Laptop Theft Recovery Cases from Absolute Software – Case Number 8G2Z9 Laptop Theft Recovery Cases from Absolute Software – Case Number 8G2Z9
Laptop Theft Recovery Cases from Absolute Software – Case Number 8G2Z9
 
Laptop Theft Recovery Cases from Absolute Software – Case Number 8G1E6
Laptop Theft Recovery Cases from Absolute Software – Case Number 8G1E6Laptop Theft Recovery Cases from Absolute Software – Case Number 8G1E6
Laptop Theft Recovery Cases from Absolute Software – Case Number 8G1E6
 
Laptop Theft Recovery Cases from Absolute Software – Case Number 8F6Z9
Laptop Theft Recovery Cases from Absolute Software – Case Number 8F6Z9Laptop Theft Recovery Cases from Absolute Software – Case Number 8F6Z9
Laptop Theft Recovery Cases from Absolute Software – Case Number 8F6Z9
 
Laptop Theft Recovery Cases from Absolute Software – Case Number 8C5A7
Laptop Theft Recovery Cases from Absolute Software – Case Number 8C5A7Laptop Theft Recovery Cases from Absolute Software – Case Number 8C5A7
Laptop Theft Recovery Cases from Absolute Software – Case Number 8C5A7
 
Laptop Theft Recovery Cases from Absolute Software – Case Number 7I5B2
Laptop Theft Recovery Cases from Absolute Software – Case Number 7I5B2Laptop Theft Recovery Cases from Absolute Software – Case Number 7I5B2
Laptop Theft Recovery Cases from Absolute Software – Case Number 7I5B2
 

Recently uploaded

Understanding Flamingo - DeepMind's VLM Architecture
Understanding Flamingo - DeepMind's VLM ArchitectureUnderstanding Flamingo - DeepMind's VLM Architecture
Understanding Flamingo - DeepMind's VLM Architecturerahul_net
 
VictoriaMetrics Q1 Meet Up '24 - Community & News Update
VictoriaMetrics Q1 Meet Up '24 - Community & News UpdateVictoriaMetrics Q1 Meet Up '24 - Community & News Update
VictoriaMetrics Q1 Meet Up '24 - Community & News UpdateVictoriaMetrics
 
Zer0con 2024 final share short version.pdf
Zer0con 2024 final share short version.pdfZer0con 2024 final share short version.pdf
Zer0con 2024 final share short version.pdfmaor17
 
OpenChain Education Work Group Monthly Meeting - 2024-04-10 - Full Recording
OpenChain Education Work Group Monthly Meeting - 2024-04-10 - Full RecordingOpenChain Education Work Group Monthly Meeting - 2024-04-10 - Full Recording
OpenChain Education Work Group Monthly Meeting - 2024-04-10 - Full RecordingShane Coughlan
 
Salesforce Implementation Services PPT By ABSYZ
Salesforce Implementation Services PPT By ABSYZSalesforce Implementation Services PPT By ABSYZ
Salesforce Implementation Services PPT By ABSYZABSYZ Inc
 
Large Language Models for Test Case Evolution and Repair
Large Language Models for Test Case Evolution and RepairLarge Language Models for Test Case Evolution and Repair
Large Language Models for Test Case Evolution and RepairLionel Briand
 
Simplifying Microservices & Apps - The art of effortless development - Meetup...
Simplifying Microservices & Apps - The art of effortless development - Meetup...Simplifying Microservices & Apps - The art of effortless development - Meetup...
Simplifying Microservices & Apps - The art of effortless development - Meetup...Rob Geurden
 
SAM Training Session - How to use EXCEL ?
SAM Training Session - How to use EXCEL ?SAM Training Session - How to use EXCEL ?
SAM Training Session - How to use EXCEL ?Alexandre Beguel
 
Effectively Troubleshoot 9 Types of OutOfMemoryError
Effectively Troubleshoot 9 Types of OutOfMemoryErrorEffectively Troubleshoot 9 Types of OutOfMemoryError
Effectively Troubleshoot 9 Types of OutOfMemoryErrorTier1 app
 
Tech Tuesday Slides - Introduction to Project Management with OnePlan's Work ...
Tech Tuesday Slides - Introduction to Project Management with OnePlan's Work ...Tech Tuesday Slides - Introduction to Project Management with OnePlan's Work ...
Tech Tuesday Slides - Introduction to Project Management with OnePlan's Work ...OnePlan Solutions
 
Ronisha Informatics Private Limited Catalogue
Ronisha Informatics Private Limited CatalogueRonisha Informatics Private Limited Catalogue
Ronisha Informatics Private Limited Catalogueitservices996
 
OpenChain AI Study Group - Europe and Asia Recap - 2024-04-11 - Full Recording
OpenChain AI Study Group - Europe and Asia Recap - 2024-04-11 - Full RecordingOpenChain AI Study Group - Europe and Asia Recap - 2024-04-11 - Full Recording
OpenChain AI Study Group - Europe and Asia Recap - 2024-04-11 - Full RecordingShane Coughlan
 
SensoDat: Simulation-based Sensor Dataset of Self-driving Cars
SensoDat: Simulation-based Sensor Dataset of Self-driving CarsSensoDat: Simulation-based Sensor Dataset of Self-driving Cars
SensoDat: Simulation-based Sensor Dataset of Self-driving CarsChristian Birchler
 
UI5ers live - Custom Controls wrapping 3rd-party libs.pptx
UI5ers live - Custom Controls wrapping 3rd-party libs.pptxUI5ers live - Custom Controls wrapping 3rd-party libs.pptx
UI5ers live - Custom Controls wrapping 3rd-party libs.pptxAndreas Kunz
 
Best Angular 17 Classroom & Online training - Naresh IT
Best Angular 17 Classroom & Online training - Naresh ITBest Angular 17 Classroom & Online training - Naresh IT
Best Angular 17 Classroom & Online training - Naresh ITmanoharjgpsolutions
 
Strategies for using alternative queries to mitigate zero results
Strategies for using alternative queries to mitigate zero resultsStrategies for using alternative queries to mitigate zero results
Strategies for using alternative queries to mitigate zero resultsJean Silva
 
Post Quantum Cryptography – The Impact on Identity
Post Quantum Cryptography – The Impact on IdentityPost Quantum Cryptography – The Impact on Identity
Post Quantum Cryptography – The Impact on Identityteam-WIBU
 
2024-04-09 - From Complexity to Clarity - AWS Summit AMS.pdf
2024-04-09 - From Complexity to Clarity - AWS Summit AMS.pdf2024-04-09 - From Complexity to Clarity - AWS Summit AMS.pdf
2024-04-09 - From Complexity to Clarity - AWS Summit AMS.pdfAndrey Devyatkin
 
Leveraging AI for Mobile App Testing on Real Devices | Applitools + Kobiton
Leveraging AI for Mobile App Testing on Real Devices | Applitools + KobitonLeveraging AI for Mobile App Testing on Real Devices | Applitools + Kobiton
Leveraging AI for Mobile App Testing on Real Devices | Applitools + KobitonApplitools
 
GraphSummit Madrid - Product Vision and Roadmap - Luis Salvador Neo4j
GraphSummit Madrid - Product Vision and Roadmap - Luis Salvador Neo4jGraphSummit Madrid - Product Vision and Roadmap - Luis Salvador Neo4j
GraphSummit Madrid - Product Vision and Roadmap - Luis Salvador Neo4jNeo4j
 

Recently uploaded (20)

Understanding Flamingo - DeepMind's VLM Architecture
Understanding Flamingo - DeepMind's VLM ArchitectureUnderstanding Flamingo - DeepMind's VLM Architecture
Understanding Flamingo - DeepMind's VLM Architecture
 
VictoriaMetrics Q1 Meet Up '24 - Community & News Update
VictoriaMetrics Q1 Meet Up '24 - Community & News UpdateVictoriaMetrics Q1 Meet Up '24 - Community & News Update
VictoriaMetrics Q1 Meet Up '24 - Community & News Update
 
Zer0con 2024 final share short version.pdf
Zer0con 2024 final share short version.pdfZer0con 2024 final share short version.pdf
Zer0con 2024 final share short version.pdf
 
OpenChain Education Work Group Monthly Meeting - 2024-04-10 - Full Recording
OpenChain Education Work Group Monthly Meeting - 2024-04-10 - Full RecordingOpenChain Education Work Group Monthly Meeting - 2024-04-10 - Full Recording
OpenChain Education Work Group Monthly Meeting - 2024-04-10 - Full Recording
 
Salesforce Implementation Services PPT By ABSYZ
Salesforce Implementation Services PPT By ABSYZSalesforce Implementation Services PPT By ABSYZ
Salesforce Implementation Services PPT By ABSYZ
 
Large Language Models for Test Case Evolution and Repair
Large Language Models for Test Case Evolution and RepairLarge Language Models for Test Case Evolution and Repair
Large Language Models for Test Case Evolution and Repair
 
Simplifying Microservices & Apps - The art of effortless development - Meetup...
Simplifying Microservices & Apps - The art of effortless development - Meetup...Simplifying Microservices & Apps - The art of effortless development - Meetup...
Simplifying Microservices & Apps - The art of effortless development - Meetup...
 
SAM Training Session - How to use EXCEL ?
SAM Training Session - How to use EXCEL ?SAM Training Session - How to use EXCEL ?
SAM Training Session - How to use EXCEL ?
 
Effectively Troubleshoot 9 Types of OutOfMemoryError
Effectively Troubleshoot 9 Types of OutOfMemoryErrorEffectively Troubleshoot 9 Types of OutOfMemoryError
Effectively Troubleshoot 9 Types of OutOfMemoryError
 
Tech Tuesday Slides - Introduction to Project Management with OnePlan's Work ...
Tech Tuesday Slides - Introduction to Project Management with OnePlan's Work ...Tech Tuesday Slides - Introduction to Project Management with OnePlan's Work ...
Tech Tuesday Slides - Introduction to Project Management with OnePlan's Work ...
 
Ronisha Informatics Private Limited Catalogue
Ronisha Informatics Private Limited CatalogueRonisha Informatics Private Limited Catalogue
Ronisha Informatics Private Limited Catalogue
 
OpenChain AI Study Group - Europe and Asia Recap - 2024-04-11 - Full Recording
OpenChain AI Study Group - Europe and Asia Recap - 2024-04-11 - Full RecordingOpenChain AI Study Group - Europe and Asia Recap - 2024-04-11 - Full Recording
OpenChain AI Study Group - Europe and Asia Recap - 2024-04-11 - Full Recording
 
SensoDat: Simulation-based Sensor Dataset of Self-driving Cars
SensoDat: Simulation-based Sensor Dataset of Self-driving CarsSensoDat: Simulation-based Sensor Dataset of Self-driving Cars
SensoDat: Simulation-based Sensor Dataset of Self-driving Cars
 
UI5ers live - Custom Controls wrapping 3rd-party libs.pptx
UI5ers live - Custom Controls wrapping 3rd-party libs.pptxUI5ers live - Custom Controls wrapping 3rd-party libs.pptx
UI5ers live - Custom Controls wrapping 3rd-party libs.pptx
 
Best Angular 17 Classroom & Online training - Naresh IT
Best Angular 17 Classroom & Online training - Naresh ITBest Angular 17 Classroom & Online training - Naresh IT
Best Angular 17 Classroom & Online training - Naresh IT
 
Strategies for using alternative queries to mitigate zero results
Strategies for using alternative queries to mitigate zero resultsStrategies for using alternative queries to mitigate zero results
Strategies for using alternative queries to mitigate zero results
 
Post Quantum Cryptography – The Impact on Identity
Post Quantum Cryptography – The Impact on IdentityPost Quantum Cryptography – The Impact on Identity
Post Quantum Cryptography – The Impact on Identity
 
2024-04-09 - From Complexity to Clarity - AWS Summit AMS.pdf
2024-04-09 - From Complexity to Clarity - AWS Summit AMS.pdf2024-04-09 - From Complexity to Clarity - AWS Summit AMS.pdf
2024-04-09 - From Complexity to Clarity - AWS Summit AMS.pdf
 
Leveraging AI for Mobile App Testing on Real Devices | Applitools + Kobiton
Leveraging AI for Mobile App Testing on Real Devices | Applitools + KobitonLeveraging AI for Mobile App Testing on Real Devices | Applitools + Kobiton
Leveraging AI for Mobile App Testing on Real Devices | Applitools + Kobiton
 
GraphSummit Madrid - Product Vision and Roadmap - Luis Salvador Neo4j
GraphSummit Madrid - Product Vision and Roadmap - Luis Salvador Neo4jGraphSummit Madrid - Product Vision and Roadmap - Luis Salvador Neo4j
GraphSummit Madrid - Product Vision and Roadmap - Luis Salvador Neo4j
 

Buying a Laptop from a Gas Station? It Just Might Be Stolen

  • 1. ©2013 Absolute Software Corporation. All rights reserved. Buying a Laptop from a Gas Station? It Just Might Be Stolen Airports are consistently one of the top 10 places where devices are stolen. According to our own investigations, 25% of devices are stolen from luggage / storage area, 24% are stolen on the airplane, 18% are stolen at check-in / security area, and 15% are stolen in the terminal / boarding area. An Absolute LoJack customer recently had a laptop stolen from an airport in New Orleans, though it's a case that had a very happy ending. The customer laptop was stolen early in October of 2013. As is very common in cases of device theft, police leads quickly went cold - thankfully, we never stop our own investigations! Our skilled Recovery Team was able to identify a user, but also a complicating factor adding time pressure to our investigation! The investigation revealed that the device was being used by a Turkish student who was due to leave the US on December 30th, so the best chance of recovering the laptop was before it left the country. By now, it is Christmas and police are very busy. Despite that, local police took our investigative summary and approached the user of the laptop, safely recovering it. According to the user, the laptop had been purchased from his roommate; the roommate shared a story of purchasing the laptop from someone at a gas station near the airport around the date of the theft. Neither person was charged with any crime, though perhaps they should read up on How to Avoid Buying Stolen Devices! Thanks to local police for quickly recovering the laptop during the holidays! Stay safe when you travel with your devices. Protect all of your devices with Absolute LoJack and review our Top Security Tips for Airports. About the Author Arieanna Schweber has been a part of the Absolute Software writing team since 2007. Arieanna was Canada's first female professional blogger and has been professionally blogging since 2006, speaking at leading blogging conferences including BlogHer and Northern Voice. Arieanna has a joint degree in Business and Communications from Simon Fraser University and continues to build communities for Vancouver-based clients.
  • 2. ©2013 Absolute Software Corporation. All rights reserved. About the Company Absolute Software(@Absolutecorp) helps businesses and consumers track, manage, secure and recover mobile computers and devices using our patented persistence technology. We license the name "LoJack" from the LoJack Corporation to highlight the similarities between our consumer product, LoJack for Laptops (@LoJackforLaptop), and their stolen vehicle recovery service. Currently Absolute Software has recovered over 30,000 devices in over 100 countries around the world.