Remote Access Programs Are Good Security For Laptops

Don’t be [Gabriel Meija], the criminal pictured above. He stole [Jose Caceres]’ laptop, but didn’t realize that [Caceres] had installed a remote access program to track the activity on the laptop. Although the first few days were frustrating, as [Meija] didn’t seem to be using the laptop for anything but porn, [Caceres]’ luck turned when he noticed that an address was being typed in. [Caceres] turned the information over to police, who were able to find [Meija] and charge him with fourth-degree grand larceny. It’s not the first time that tech-savvy consumers have relied on remote access programs to capture the criminals who’ve stolen their computer equipment, and it certainly won’t be the last, as the technology becomes more readily available to consumers.

[via Obscure Store and Reading Room]

28 thoughts on “Remote Access Programs Are Good Security For Laptops

  1. All my systems have some form of dial home, remote ware so I can track and gain access to them once more. However, if the criminal in this case was smart; he would have reinstalled the operating system of that notebook before using it for anything personal. Also one should also check for other (hint hint) tracking methods on hardware such as pc’s and notebooks. Software installed to the system isn’t the only way to gain remote access to a stolen machine.

  2. Thank God for stupid criminals. I would had disconnected the internet but added it to the local LAN. Activate the remote sharing of the entire “C:” or other drives and copied away. Once done, return it to the company as found for possible reward or recognition. @jermsmit suggestion is even simpler but how many thieves have a pirate copy of Windows laying around.

  3. maybe the attacker clicked on terminal service or vnc to connect to the last known pc. When victim saw a request to allow access, went to the commandline to view all remote connections revealing the IP. This assuming the laptop was directly connected to the internet with victims saved profile. Maybe the attacker placed the laptop into his router’s demilitary zone thinking he was smart or doing something.

  4. This story’s all over teh internets, but nowhere does it say how he got hold of the IP address of the thief… all it says is that the owner used some sort of ‘remote access’, but for that to work he’d have to have an address to access to. Prob. had some sort of curl/wget script running on the machine?

  5. If u have some type of DDNS service such as, you can install their client and have it start up as a service. No matter where you are at it will report on your WAN IP address every x minutes, depending on how you set it up. If you ping it will return the current IP address.

  6. Pffft, boot it in a Faraday cage with external mouse/KB screen. No hardware tracking.

    The only real reason to steal a laptop if you are a petty criminal is to fence it or use it.

    PS real information thieves can pull the HDD and clone it, and replace it. Or just pull the HDD. With today’s “laptops” (hah, the average size of a laptop screen is 150% that of the average color TV in 1985) you really don’t want to be seen smuggling it, so pull the HDD and leave the laptop.

    Now what would be neat is hardware that runs on a separate processor and uploads a small log of IP addresses stripped from the network hardware.

  7. Now people that install rootkits or trojans can claim they were helping people with security by making their system remotely accessible, or even sell their trojans as security programs.

  8. Why no using google to pinpoint the location of machine. Iphone and itouch does this without need of gps tracking. Mechanism is related to location of found wireless networks in neigbourhood.

  9. Well, even with the IP address of the thief you would most likely be out of luck. This person is still likely behind a router, *without* ports forwarded, so it wouldn’t be as simple as connecting to their IP.

    The easiest way to implement this is with an automatic VPN connection back home, preferably in the background. In that case, from home, you can just connect to the IP showing up in your VPN connections. Alternatively you can use Hamachi VPN for even more simplification.

    If you weren’t planning on using a VPN, you would have to schedule outbound connections via SSH or VNC to a set IP or dynamic DNS service. Again, knowing the IP of the thief is very little help besides general location and/or getting info from an ISP.

    tl;dr Scheduled connections out, or auto VPN to access your computer when it is stolen.

  10. Even though you’d only get a router’s IP in most cases and the ports would obviously not be forwarded, the router will typically not be protected in any way. Easy enough to log in with defaults, forward ports, and be on your merry way.

    Assuming, of course, that the router can forward ports… though I’m not aware of many that can’t.

  11. If he had Teamviewer installed and set up on the pc to start with windows. All he would need is the ID that is assigned to the laptop and the password. I have used it for over a year and the ID number has never changed. It works through firewalls, proxy, and routers with no problem. Best of all, it is free to use in a non-commercial application.

  12. The tool used was probably something like go to my pc or something very similar.

    These programs call to the home server often to identify IP address and are also firewall friendly because they all run through port 80.

  13. i use to keep track of all my computers, it has a web based interface so you can login anywhere. The best part is that it will work through just about any firewall.

  14. Some of you are just stupid, a NAT router does not typically disallow “outgoing” connections.

    In this case, the user could have setup a daemon/service that connected back to his home system.

    Also, UPnP, people dumb enough to use a SOHO router typically leave it enabled.


Leave a Reply

Please be kind and respectful to help make the comments section excellent. (Comment Policy)

This site uses Akismet to reduce spam. Learn how your comment data is processed.