IT security consultant Greg Martin recovered his MacBook Pro after his apartment had been trashed When Greg Martin [cq] returned home last Wednesday morning after a night of intense rioting in London, his West End apartment had been ransacked.Martin, 29, an IT security consultant with the HP-owned security company ArcSight, had spent the previous evening with his girlfriend in southwest London after the two had encountered riot-related trouble and decided to hunker down for the night.But when he arrived at his apartment in West Kensington in the morning, he found the bars on a window had been pried open with a scaffolding pole. Inside, it was a mess: drawers had been rifled through, money and small electronics had been taken and gone was his MacBook Pro laptop.“They just totally turned the place upside down,” said Martin, who has lived in London for two months. Martin was concerned since he used the laptop for work. The laptop was password protected and the hard disk was encrypted, but it contained sensitive work-related information and personal material.Martin remembered he’d installed Prey, an open-source application that can track the location of a device once it has connected to the Internet. The application, from a company called Fork with offices in Santiago and Hong Kong, is one of many tracking applications on the market. Fork offers a free version of Prey that allows users to track up to three devices. Prey’s tracking feature is activated through a web-based portal by users when they’ve noticed their device is missing. Prey will send periodic reports plotting the location of the device on a Google map using Google’s index of Wi-fi hotspots collected through its Street View imagery cars. Google assigns a GPS geolocation marker to a wireless access point. The frequency with reports are sent can be adjusted and the webcam be turned on as well with Prey.Although the laptop had a password, Martin suspects that the intruder used Mac OSX installation software to create a new account on the computer, which eventually allowed him to connect to the Internet but also activating Prey.Martin was having dinner in Luxembourg on a business trip when the first report came in. “It was a really incredible feeling,” he said. “I nearly fell out of my chair. I see this guy staring back at me, and I have his address.”He ran back to his hotel and upgraded his Prey account to receive more frequent reports, an advanced feature of the paid version. He watched for two hours as the 18-year-old cruised the Internet on his computer, visiting Muslim religious sites, shopping for a car on AutoTrader and even trying to apply for a Tesco gas card using someone else’s identity.Prey also takes a screenshot when it compiles its reports. It was only a matter of time before the young man logged into Facebook.Martin quickly had his name, where he graduated from high school and his address. The man was just two blocks away, and Martin actually recognized a building that appeared in the background of a photograph taken by the webcam. He was even able to give police an estimate of what floor the suspect lives on. The police had trouble getting a search warrant immediately, but when Martin returned from his trip, they sent him an e-mail asking the location of the suspect.“I almost gave them [the police] an entire dossier on the guy,” said Martin, whose laptop was returned to him by police. “They had no problems picking him up.”The teenager has been charged with handling stolen goods and is expected to appear in court on Friday, Martin said.Send news tips and comments to jeremy_kirk@idg.com Related content news Google Chrome zero-day jumps onto CISA's known vulnerability list A serious security flaw in Google Chrome, which was discovered under active exploitation in the wild, is a new addition to the Cybersecurity and Infrastructure Agency’s Known Exploited vulnerabilities catalog. By Jon Gold Oct 03, 2023 3 mins Zero-day vulnerability brandpost The advantages and risks of large language models in the cloud Understanding the pros and cons of LLMs in the cloud is a step closer to optimized efficiency—but be mindful of security concerns along the way. By Daniel Prizmant, Senior Principal Researcher at Palo Alto Networks Oct 03, 2023 5 mins Cloud Security news Arm patches bugs in Mali GPUs that affect Android phones and Chromebooks The vulnerability with active exploitations allows local non-privileged users to access freed-up memory for staging new attacks. By Shweta Sharma Oct 03, 2023 3 mins Android Security Vulnerabilities news UK businesses face tightening cybersecurity budgets as incidents spike More than a quarter of UK organisations think their cybersecurity budget is inadequate to protect them from growing threats. By Michael Hill Oct 03, 2023 3 mins CSO and CISO Risk Management Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe