One Man, One Stolen Laptop... And Twitter, Prey (And A Purple Sarong?) To The Rescue

from the and-a-purple-sarong dept

A whole bunch of folks have been sending in random versions of the story of how author Sean Power recovered his stolen laptop despite being in another country, thanks to the power of social media, some open source software and some good samaritans. The "short" version is that Sean had his laptop stolen a few days ago in New York City, just a day before he had to go to Canada for a few days. He had some open source anti-theft software on there, called Prey. I'd never heard of it, but it gets excellent reviews. Anyway, after not being alerted to anything for a few days, Sean suddenly was notified that someone was using his laptop -- and he mentioned it on Twitter. From there, it helps to follow the story on Twitter, and thankfully Ryan Ozawa used Storify to post the relevant tweets:
You really should read the story as it happens, but basically some girl got wind of the story (it's still not entirely clear how... since she's not on Twitter), and went to the bar where the guy with the laptop was. She befriended some of the bartenders and others at the bar and found out that the guy with the laptop had some sort of connection with the bar. Reading through the various tweets, there is some confusion over who's who in this story, but the nameless girl in the purple sarong was soon backed up by another guy, Nick Reese, who just saw the story unfolding on Twitter and (as a brand new NYC resident) decided to jump in. The girl in the purple sarong apparently flirted with one of the two guys (Max) with the laptop, and got his business card. Sean had called the police, but they refused to go, since Sean hadn't filed a police report (he claims he didn't have time before leaving for Canada). Eventually, Sean called the phone number on the card, leading Max to call the other guy at the bar (Paulo) just as Nick and Purple Sarong Girl (PSG?) were confronting him. After some back and forth, Nick pulled out his phone and showed Paulo the photo of Paulo on the laptop from the webcam that Sean had gotten from Prey and posted to Twitter. Not surprisingly, that quickly led to the laptop (and the laptop bag) being handed over...

Nick and the girl in the purple sarong then put up a video of what happened which is both mildly entertaining and mildly frustrating (and it's not hard to assume that the girl has consumed a fair bit of alcohol by this point -- and I think I have to agree with the Village Voice that she may be the most annoying woman in the world) Update: The video has been set to private. Reese is claiming it's to "protect the identity" of the girl -- which seems odd...
All in all it's quite a story. There have been a few people suggesting this is just a publicity stunt for Prey, but plenty of folks are insisting that's not the case. To be honest, even if it is a publicity stunt for Prey, I gotta say that it's fantastically well-done, and amazingly compelling. I wouldn't care if it were a publicity stunt, because then the story would be about how to make brilliantly compelling marketing... But, again, most people are insisting that this was all real, and then the story is just about the wonders of modern technology combined with good people. A story of our times...
Hide this

Thank you for reading this Techdirt post. With so many things competing for everyone’s attention these days, we really appreciate you giving us your time. We work hard every day to put quality content out there for our community.

Techdirt is one of the few remaining truly independent media outlets. We do not have a giant corporation behind us, and we rely heavily on our community to support us, in an age when advertisers are increasingly uninterested in sponsoring small, independent sites — especially a site like ours that is unwilling to pull punches in its reporting and analysis.

While other websites have resorted to paywalls, registration requirements, and increasingly annoying/intrusive advertising, we have always kept Techdirt open and available to anyone. But in order to continue doing so, we need your support. We offer a variety of ways for our readers to support us, from direct donations to special subscriptions and cool merchandise — and every little bit helps. Thank you.

–The Techdirt Team

Filed Under: community, laptops, social networks, stolen, tracking down


Reader Comments

Subscribe: RSS

View by: Time | Thread


  • icon
    Chronno S. Trigger (profile), 13 May 2011 @ 11:00am

    I hope this is real.

    If it is then it's good to know that the software works. I've been using it on my laptop and my phone for a while now. From my tests it looked pretty good, but I've never had to use it for real.

    And thanks for the reminder. I'm going to install it on my new tablet now.

    link to this | view in chronology ]

  • identicon
    chuck, 13 May 2011 @ 11:12am

    FAIL..."This Video is Private"

    link to this | view in chronology ]

  • identicon
    Anonymous Coward, 13 May 2011 @ 11:15am

    Retribution most definitely isn't lame, what a pussy. Should nail that fucker to the wall when such evidence is available. Also, fuck the police. Universally useless.

    link to this | view in chronology ]

  • identicon
    Anonymous Coward, 13 May 2011 @ 12:19pm

    private video on this site seems ironic

    link to this | view in chronology ]

    • identicon
      Anonymous Coward, 13 May 2011 @ 12:25pm

      Re:

      Techdirt rules say blocking content is only bad if record labels or Hollywood studios do it. Tech nerds can do whatever they like and get a free pass.

      Try to keep up.

      link to this | view in chronology ]

    • icon
      Mike Masnick (profile), 13 May 2011 @ 12:58pm

      Re:

      private video on this site seems ironic


      What's ironic about it? It was public when I wrote the story and the guy later changed it to private, supposedly to protect the privacy of the woman.

      link to this | view in chronology ]

  • identicon
    Rich, 13 May 2011 @ 12:33pm

    FAIL

    The software used to track your laptop is basically useless unless it is installed directly into the EFI or a ghost partition. Anyone with any sense would do a complete reformat of the HDD's of the machine the first time it is turned on.

    link to this | view in chronology ]

    • identicon
      Jeff, 13 May 2011 @ 12:39pm

      Re: FAIL

      demonstrably untrue... did you read the article??

      link to this | view in chronology ]

    • identicon
      Howard the Duck, 13 May 2011 @ 12:56pm

      Re: FAIL

      You said, "Anyone with any sense".

      link to this | view in chronology ]

    • identicon
      Grey Ferret, 13 May 2011 @ 9:48pm

      Re: FAIL

      Do you realize that you're trying to say that a laptop thief is the same as "anyone with any sense"? Hmm... I would think that "anyone with any sense" would not make that assumption.

      link to this | view in chronology ]

  • icon
    aldestrawk (profile), 13 May 2011 @ 12:59pm

    So, Prey, is basically the same system that was discussed in this recent Techdirt article.
    http://www.techdirt.com/articles/20110505/00424214164/laptop-rental-provider-sued-spying-r enters-via-surreptitious-webcam-software.shtml#c326

    The "agent" running on the computer contacts a server not controlled by the computer's owner. The owner then logs into their account to trigger collection of information about the current user (thief). In both cases a thief will be caught by using surreptitiously collected information while the computer is being used. The differences are;

    1) Is someone who defaults on payments the same as a thief?

    2) There was apparently no process in place to deactivate the agent when the rented computer was purchased.

    This brings up the following questions:
    -When someone stops subscribing to Prey, is the agent still active?
    -Is the user told how to completely deactivate the agent at that time?
    -What mechanism prevents an admin for the Prey server from changing settings for an account and doing some snooping?
    -What is to prevent someone lending out such a computer to an unsuspecting soul and doing a little snooping of their own?
    -If law enforcement is aware that such software is installed on someone's computer can they do some remote viewing with a wiretap order, search warrant, subpoena, NSL, or none of the above?

    link to this | view in chronology ]

    • icon
      David (profile), 13 May 2011 @ 1:36pm

      Re:

      The difference, as I see it is that the user of the laptop is not told that the software is running, when he had legally acquired it. They also used it to spy on him when his payments were up to date, even though their records were wrong...

      The 2 situations are not equivalent

      link to this | view in chronology ]

      • icon
        aldestrawk (profile), 13 May 2011 @ 5:05pm

        Re: Re:

        My understanding is that the computer was paid off, they bought it, but the records were screwed up. They, being the rental company, should have had a process in place to un-install the monitoring (agent) software when a rental was actually purchased. Apart from that whole incident I am pointing out the closeness of the situation where a renter defaults or steals the computer compared to an owner installing such theft recovery software himself.

        link to this | view in chronology ]

    • icon
      Nick Coghlan (profile), 13 May 2011 @ 11:39pm

      Re:

      While the lifehacker article Mike linked glosses over it, the advanced "Standalone" mode of Prey is designed precisely so that you don't *have* to trust their servers.

      Instead, you can review the open source code for the client (or pay someone you trust to do it for you) and set it up to email you directly with any reports. You just have to set up a URL that the client can check to decide whether or not to go into "I've been stolen" mode.

      Like any remote control software, it does create a new point of vulnerability for your system, but I expect many folks will consider the trade-off to be worth it.

      link to this | view in chronology ]

  • identicon
    cornishninja, 11 Aug 2012 @ 11:07am

    Why didn't you just threaten him, seeing that you had his financial info, his mugshot, his phone number, his… everything?

    I know the thief handed it all over in the end though so I guess that's the main thing.

    link to this | view in chronology ]

  • identicon
    LAPTOP, 6 Feb 2013 @ 9:02am

    agree or not,,,but thanks for your info

    link to this | view in chronology ]


Follow Techdirt
Essential Reading
Techdirt Deals
Report this ad  |  Hide Techdirt ads
Techdirt Insider Discord

The latest chatter on the Techdirt Insider Discord channel...

Loading...
Recent Stories

This site, like most other sites on the web, uses cookies. For more information, see our privacy policy. Got it
Close

Email This

This feature is only available to registered users. Register or sign in to use it.