View Full Version : A World of Pain (stolen laptop computer)

04-23-2005, 12:52 PM
Professor Jasper Rine lectures at UC Berkeley. Recently his laptop was stolen by a thief who was after exam data. Unfortunately for the thief, Professor Rine had some important stuff on that laptop.

The webcast of last Friday's Biology 1A lecture gets very interesting at timecode 48:50. I've transcribed Prof Rine's comments here, so you can see what a world of sh!t the thief is in:

"Thanks Gary. I have a message for one person in this audience - I'm sorry the rest of you have to sit through this. As you know, my computer was stolen in my last lecture. The thief apparently wanted to betray everybody's trust, and was after the exam.

The thief was smart not to plug the computer into the campus network, but the thief was not smart enough to do three things: he was not smart enough to immediately remove Windows. I installed the same version of Windows on another computer - within fifteen minutes the people in Redmond Washington were very interested to know why it was that the same version of Windows was being signalled to them from two different computers.

The thief also did not inactivate either the wireless card or the transponder that's in that computer. Within about an hour, there was a signal from various places on campus that's allowed us to track exactly where that computer went every time that it was turned on.

I'm not particularly concerned about the computer. But the thief, who thought he was only stealing an exam, is presently - we think - is probably still in possession of three kinds of data, any one of which can send this man, this young boy, actually, to federal prison. Not a good place for a young boy to be.

You are in possession of data from a hundred million dollar trial, sponsored by the NIH, for which I'm a consultant. This involves some of the largest companies on the planet, the NIH investigates these things through the FBI, they have been notified about this problem.

You are in possession of trade secrets from a Fortune 1000 biotech company, the largest one in the country, which I consult for. The Federal Trade Communication is very interested in this. Federal Marshals are the people who handle that.

You are in possession of proprietary data from a pre-public company planning an IPO. The Securities and Exchange Commission is very interested in this and I don't even know what branch of law enforcement they use.

Your academic career is about to come to an end. You are facing very serious charges, with a probability of very serious time. At this point, there's very little that anybody can do for you. One thing that you can do for yourself is to somehow prove that the integrity of the data which you possess has not been corrupted or copied.

Ironically, I am the only person on the planet that can come to your aid, because I am the only person that can tell whether the data that was on that computer are still on that computer. You will have to find a way of hoping that if you've copied anything that you can prove you only have one copy of whatever was made.

I am tied up all this afternoon; I am out of town all of next week. You have until 11:55 to return the computer, and whatever copies you've made, to my office, because I'm the only hope you've got of staying out of deeper trouble than you or any student I've ever known has ever been in.

I apologise to the rest of you for having to bring up this distasteful matter, but I will point out that we have a partial image of this person, we have two eyewitnesses, with the transponder data we're going to get this person."

link (http://blastradius.blogspot.com/2005/04/world-of-pain.html)

04-23-2005, 01:28 PM
Lol, that professor is full of it. If I was the thief I would be laughing my ass off. /ccboard/images/graemlins/grin.gif

1. The thief didn't "plug into" the campus network, but the NIC is wireless. Plus, campus networks use DHCP, so there is no way know if the laptop is connected via the NIC unless they get the MAC address from the NIC manufacturer. Highly unlikely that anyone would go to all the trouble to trace a single NIC just for one stolen laptop. And the thief could just eject the card and drop in in a trash can.

2. If there really was a transponder (think lojack) in the laptop, why didn't they just go arrest the thief? I know of no transponders that are made to install in computers for theft protection/recovery. Not that it couldn't be done, but it would (at least) double the price of the system.

3. If he had all this critical data, why wasn't it encrypted? Sounds like negligence to me...

4. Microsoft doesn't track Operating Sytems. Think of the millions of computers running windows, and the resources this would require. All Microsoft cares about is that your copy XP is activated. If you reinstall it, you have to call them for a new activation key. They have no way of knowing when a computer with Windows is booted.

The prof is just making an idiot out of himself.

04-23-2005, 03:13 PM
I don't know nuthing 'bout no computers, but thought it odd that the transponder told them where he had been, not where he was...............
and having all that data....unprotected......I didn't think of that...and he's a prof at UC-in the people's republic of Berkeley?

04-25-2005, 08:33 AM
Jasper is bluffing big-time. If the computer really has all that sensitive information on it, his ass is in a sling for not keeping it safe. He's desperate.


04-25-2005, 12:49 PM
Sounds like an urban myth in the making to me.