Laptop Lojack? 107
daninja asks: "Yet another laptop with classified information seems to be missing. It looks to me like there must be a good sized market for highly secure laptops with a built in Lojack tracking device (or simply a laptop with an integral handcuff, kind of like that briefcase full o' blues secured to the wrist of Elwood Blues). Such a device (the Lojack version, not the handcuff one) could be designed so that the tracking transmitter couldn't be separated or disabled without rendering the disk unreadable (by a small explosive charge, mildly corrosive gas, or whatever). It seems so obvious, why isn't there such a product? (Hey, maybe I could patent this idea!)"
I have to admit, I too have had ideas along these lines. This shouldn't be too hard to build, however the laptop would have to be always-on (which would be hell on the batteries) and a GPS unit would need to be added in some way shape or form. This isn't all that unlikely, there are handheld GPS units on the market. How difficult would it be to meld one into a laptop?
Update: 04/28 02:15 by C : The link to the picture of the Blues Brothers has vanished. It was there when I posted this article days ago, but it's gone now. Sorry about that.
Sounds cool but don't wipe out the drive! (Score:1)
Re:What happened in the old days (Score:1)
We carried briefcases and diplomatic pouches.
Did they walk around the streets with briefcases (or carrier bags ?) full of confidential files ?
Yes, briefcase and attache cases. We normally drove if the distance was more than a few blocks.
Wouldn't carrying all these file make him stand out in public ?
Not any more so than anybody else with a briefcase. You were normally more concerned about petty theft instead of international espionage.
Weren't there rules about carrying this stuff in public ?
Yes. The rules still exist. Briefcases disappeared about as often as these laptops. Extremely sensitive information oftimes would require two people. One with a briefcase and a handgun, the other with a handgun.
I worked as a courier several years ago. I used to enjoy stepping through the metal detectors at the airport and just showing my credentials when the alarm rang. Most of the time it was just my keys setting it off.
The answer: Lotus Notes (Score:1)
What I have long felt is that something like Lotus Notes is the right answer to the "laptop theft" problem.
Lotus Notes offers three major facilities that are helpful:
It actually has parallels to NNTP news, the way Slashdot should operate... which leads to...
You are at the office, plug the laptop into the network, and select Replicate. It synchronizes the state of the database on the laptop with the state of the database on the LAN.
This means that if the laptop is stolen, all it takes to get the new one repopulated is to run Notes, connect to the appropriate databases, and select Replicate, and the laptop will get loaded up again. (Ready to be stolen again!)
The fact that it's a single database provides, as a natural direction...
If all the data sits in the Notes databases, and they are encrypted, on the laptop, then the nefarious Laptop Thief may have a slick new laptop, but will not have an easy time getting at the secret information on the laptop.
Linux offers things like CFS, the "Cryptographic Filesystem," which may allow filesystems to be kept secure. (I thus protect a partition or two on my laptop.) The thing that it misses is the "data synchronization" ability that Lotus Notes "replication" provides.
Re:The answer: Lotus Notes (Score:1)
--
W.A.S.T.E.
Re:This laptop will self-destruct..... (Score:1)
And what are the chances of being able to take this laptop onto an airliner?
Just imagine - you're on a long cross-country flight, hacking away on your latest and greatest code ever (or just dealing with some BS your manager wants done "pronto"). You get up to stretch your legs ('cause you're in economy), go to the bathroom. Your seatmate (who has been downing one martini after another) wakes up from his drunken stupor, sees your laptop, decides that he really wants to play a game of Solitaire...
Next thing you know, masks are dropping from the cabin ceiling, smoke is filling the cabin, the pilot starts looking for the nearest landing strip, and you're glad you were already sitting on the toilet when this all started, 'cause you lost control of your bodily functions when the smoke alarms went off...
________________________
Integrated with mainboard (Score:1)
First of all, I doubt there's enough of a market for laptops that carry secret information. With the budgets that most departments have to work with these days, they'd rather forego carrying laptops rather than pay a premium for them. Also, the laptop would have to look like any other - you don't want to whip it out on a plane (not necessary to work on classified information) and advertise, "Hey! I'm a spy! I've got a laptop with special shielding so that no one will be hurt when the hard drive explodes."
Which is another thing. Exploding hard drive? Let's face it, most of these laptops are being taken by petty thiefs who don't care about the data. This one at the state department I'm not so sure about as anybody who smuggled that laptop out of there knew that the consequences for getting caught would be dire (getting fired, never working a government contract again, prision). In any case, the thieft of laptops is becoming too commonplace. This is certainly something that business travelers have to worry about as well. So here's my idea:
Wire the Lojack style device and GPS receiver onto the mainboard. Not only will a surface mount make it a bitch to remove, but you could devise the BIOS so that it won't boot without it ("GPS Receiver not found. Move ten meters north to continue."). The Lojack device can run in passive mode most of the time, just listening for an RF signal. When it receives its RF signal (probably shortwave for distance coverage), it knows its been activated and it goes into active mode where it actively transmits its ID & position, again, probably on shortwave for maximum coverage.
The primary limitation in that plan is the RF bandwidth needed for the operation. However, all activation transmissions would logically be digital and could be packet based, just transmitting the activation requests round-robin. The reply from the machines would use a second frequency and stand a higher chance of collision so to avoid that, I think they should use a random interval between transmissions - just like Ethernet except rather than perform collision detection (which wouldn't be accurate if two computers are equaldistant but opposet directions from the recieving tower), they just presume there'll be collisions and hence transmit randomly. We presume not too many of these computers will be acivated simultaniously (as the machines should be recoved and disabled quickly) lest that RF band will just get saturated. In the event that does happen, new machines will need to be configured to use a different band (keep in mind that trying to get shortwave bandwidth allocated is not easy nor cheap).
There sort of is (Score:1)
BTW hardrive encryption works pretty well. My Thinkpad has an option to encrypt the hardrive and while they don't publish the algorithm we've never seen a case where someone has to managed to break it. This is not to say it's unbreakable but seemingly no one's succeeded or bothered to try.
The Navy... (Score:1)
LOJACK (Score:1)
This Desktop will self destruct... (Score:1)
Incidentally, he threw the switch one day while moving his monitor and proved that the system worked.
Re:agent smith reporting for duty (Score:1)
-David T. C.
No Explosives neccessary (Score:1)
Bat what about this: The harddisk will be encrypted anyway, if you store a part of the key in a battery backed-up SRAM you just need to make sure the power goes off when the tracking device is removed...
Time for encrypting HD Controllers? (Score:1)
What about my privacy? (Score:1)
I see you have been to the local brothel this week ... We have morality clauses for our employees, your fired!
With the Internet, databases, and computers galore, privacy of information is lost. Do we really need to take this a step furthur?
On the other hand, how do you track down a stolen laptop without invading the users privacy? Does the loss of privacy outweigh the benefits of keeping your data secure?
Economics (Score:1)
For laptops, it should be the case (and on some is) that the cost of deleting the hardware passwords (mother board and disk drive) is greater than the value of the laptop. If you want laptop returned, there should be an "anonymous return for reward message" displayed on the password splash screen (anonymous to encourage return and to disallow bargaining by the thief).
Why leave data on the laptop? (Score:1)
So why not save all the data on the net instead? Because no transfer will be 100% safe either..
Then do neither. Make an encryption system where half of the information is saved locally and half is saved on the laptop.. That will be 100% safe from decryption (without having both the server and the laptop), because no individual parts contains enough info.
The drawback is of cource that the laptop have to be online all the time, and you will still loose all info when the laptop is stolen...
They already have Lojack for laptops (Score:1)
I am not sure if they went into production, but the technology *is* out there, so it is probably already patented.
/*---------------------------*/
Man? What is man?
But a collection of chemicals with delusions of granduer.
there's already something like this... (Score:1)
can't remember where I saw this...
"Leave the gun, take the canoli."
Too Late! (Score:1)
Steal This Laptop (Score:1)
beep I'm carrying classified information and I am here.
beep I'm carrying classified information and I am here.
beep I'm carrying classified information and I am here.
Re:Maybe genuinely secure laptops make more sense. (Score:1)
If the data stored on the laptop is important enough to attempt to retrieve the laptop, I think it's quite a stupid mistake not to have backups!
After all, there could be hardware failures or the owner of the laptop could accidently drop it, then a bus could drive over it after which it could be flung into a nearby river!
You wouldn't believe the amount of damage a family of crabs could do to a submerged laptop!
Re:Better idea - encrypt the data (Score:1)
Re:Loose as a goose (-1 Offtopic, -5 Spelling flam (Score:1)
You and me three...
Re:Why always on? (Score:1)
Some company sold a software product that ran in the background. Periodically, when the laptop was logged onto the internet, this software would check in with a central server for some reason or another. It did this in the background without any formal notification.
Someone stole a laptop and was using it. This software was still running unobtrusively in the background. They were able to trace the laptop back to the ISP that the thief was using to log on and then find the theif and the laptop.
Now this only works if the disk of the laptop isn't wiped, the thief logs on, and no one notices and disables the software but it was still pretty cool.
Looking for the original story, I just found this link to a company [softwaresecurity.com] that sells a product that claims to do this sort of tracing.
Re:Always on? (Score:1)
As for the price argument: I think this isn't such a big issue if you are a big corporation or a kind of secret service that has *very* valuable secrets, which would cost you a lot more than a few hundret $$$ if they were stolen.
Be reasonable guys ... (Score:1)
Bob
CyberAngel (Score:1)
http://sentryinc.com/CAProductInfo.cfm
--
Donald Roeber
A few thoughts (Score:1)
Nextly, why not just have a hardware key system for such things? Years ago I bought a copy of the Encyclopedia Britanica on CD and to use it you needed a small plug inserted in your parallel port to use it, lest it not work at all and to prevent copying (it was expensive). So if you want to use it, you gotta have the key, or even maybe, give one to one agent and another to another agent, and they both have to be inserted to make the laptop work.
Re:What about my privacy? (Score:1)
Here's what they came up with: Nothing is transmitted until the system is activated. When a car is reported stolen, the police send out a signal (repeatedly) telling that car's Lojack to activate. Only when it receives that signal does it begin broadcasting its location.
Always on? (Score:1)
Actually, I'm not entirely sure about that. How much power does it take to broadcast your position, or whatever lojack does?
The big question I have is, would anyone really pay for this? When you pay $30k for a car, and expect to sell it for $15k in a few years, an extra $800 plus $100/year is no big deal. When you pay $3k for a laptop and expect to sell it for $300 in a few years, it doesn't make as much sense....
Re:Always on? (Score:1)
It's probably impossible to make something impossible to steal. But making it harder for people to steal it and get away with it is still sometimes a worth-while effort.
Re:Always on? (Score:1)
But there are still two advantages to the lojack-type system.
First, sometimes it's important to catch the guy who stole it--or at least to know who it is (e.g., so you know which of your competitors to enjoin).
Second, sometimes you want to protect the valuable asset itself, not just prevent anyone else from using it. This could be the actual hardware, thousands of dollars worth of licensed software, or data that hasn't yet been backed up that's extremely important. Obviously, in those cases, you don't want to destroy it.
One more thing: I think you want a better way to destroy the hard drive. Scratching the media may make it stop working, but data recovery experts could probably still get a lot out of it. Plus, it would probably be obvious that something odd is going on, and the thief might be able to turn it off before much damage was done. You probably want to do something much more drastic and unstoppable, and harder to detect (release acid into the cylinders?).
Hmmm...what about stability...? (Score:1)
Re:first post!! (Score:1)
Eruantalon
Lojack a good idea, but you can't combat stupidity (Score:1)
Lojack? You can't be serious (Score:1)
Think about it. These laptops are presumably the property of spies and other high-security/risk officials. How can they work covertly if you're broadcasting their location?!?
It was a good idea otherwise, and I think the civilian market might still be interested.
What about a key? (Score:1)
For added security, three wrong dongles in a row plugged into the USB port causes the CD drive to pop open and the laser to slice through your brain. :-)
Re:Why always on? (Score:1)
Such things exist! (Score:1)
I even took time to look up the URL:
http://www.go2mac.com/displaynews.cfm?newsid=58
Hope this helps all in need.
Has anyone thought about the fact . . . (Score:1)
Re:Maybe genuinely secure laptops make more sense. (Score:1)
> me - the certificates pass phrase might be
> cracked, at least by the guys really interested
> in such data. Or simply get the person who knows
> the phrase and make him tell it
Well that depends on the crackability of the
passphrase. If its a good passphrase, it should
be a very hard problem to attack it. Of course,
they need a copy of the certificate itself to
attack....it could easily be stored in a smart
card or som,e similar device.
As for "get him to tell you", thats a problem with
ANY system for keeping secure data, all you need
to do is compromise a person with legitimate
access. (like if I wanted someones medical
records...couldn't I just get a job in the
hospital records filing room, and steal them?)
> A keyboard which is able to check the users
> finger prints makes much more sense to me
Such a system doesn't sound like it would be very
reliable. Most of the time it would only be able
to get partial finger prints, it would have to get
them VERY quickly, as people type, and it would
require the hardware to do the scanning in EVERY
key...which means 100+ individual finger print
scanners, in 1 keyboard.
This STILL does nothing to the idea of a
comprtomised person with legitimate access.
Why recover the laptop? (Score:1)
And I seriously hope that the laptop had some strong harddisk encryption installed (without stupid NSA backdoors, that is) so that the theif doesn't really win anything.
Re:It's the data, sir (Score:1)
agent smith reporting for duty (Score:1)
1. Put an innocent looking AC adapter port with a label for volatge, amperage and polarity, then, hook that to blow a soldered on fuse (that is hooked into the battery power or hard drive circuitboard) when connected to external power. Hide the real AC port.
Here is another:
2. Make the HD pop out when the 'puter is turned off and make the agents bring the HD with them...
and another:
3. Charge a big capacitor and rig it to discharge and fry the HD circuitry when the power or IDE connector is disconected or when multiple authentication attemps fail.
AND
4. make the agents boot from a diskette. configure a program into boot sector of the harddrive to perform a low-level format when booted from the hard-drive instead of the diskette which contains the real bootloader.
although this is really security through obscurity, coupled with some strong encryption techniques and agents who don't leave their laptops lying around it would work, i think.
Re:Loose as a goose (-1 Offtopic, -5 Spelling flam (Score:1)
That's when "loose" is an adjective. When used as a transitive verb, as it is in "Never loose it again," it can mean to detach or release.
Since the article mentioned handcuffing the laptop to your wrist, it could mean "attach yourself to your laptop and never unfasten it again" either physically with a chain, or metaphorically with a LoJack transmitter.
The tracking wouldn't have to be on... (Score:1)
Another idea would be to put one of those stamps on it that once removed still says information, like, "This Laptop should not leave the ".
That along with the only-send-out-becons-when-one idea might help curb this problem.
--
Re:Maybe genuinely secure laptops make more sense. (Score:1)
--Fesh
Re: (Score:1)
Re:Some aluminum foil will foil this scheme (Score:1)
* mild mannered physics grad student by day *
Shielded Briefcases (Score:1)
Yes (s)he can, in the US (Score:1)
Windoze Product (Score:1)
Why even bother with GPS? (Score:1)
You can't patent it anymore... (Score:1)
Here's the URL (Score:1)
IBM also manufactures similar products, one of which will automatically encrypt the data on a laptop if it's removed from a building without prior authorization:
http://www.ibm.com/security/news/pr_notebook.html
Save The Laptop (Score:1)
savethelaptop.zzweb.com [zzweb.com]
Enjoy!
who needs lojack? (Score:1)
when you can have kojak?
(ducks)
What happened in the old days (Score:1)
What did spooks do before lap-tops ?
Did they walk around the streets with briefcases (or carrier bags ?) full of confidential files ?
Wouldn't carrying all these file make him stand out in public ?
Weren't there rules about carrying this stuff in public ?
......), it is time for someone in authority to ask serious questions related to their competence, remit and funding.
The problem is not a technology problem. It is not to do with lap tops. Nice portable high value things will always get stolen. This is almost axiomatic !. The problem is a 'spook business process' problem. The advent of laptops has made them get sloppy over security. Since we pay these reptiles to look after our security (allegedly
Re:Reliability issues galore! (Score:1)
I suggest that a different approach is needed.
Laptop Lojack = distributed.net's RC5 client (Score:1)
The client flushes keys to a keyserver and gives the IP address of where the keys are being sent from. Those keys are also flushed with the user's e-mail ID.
When keys w/ a certain e-mail ID come in, the distributed.net people could go through the keyserver logs and trace the flushed/fetched keys to an IP address. Traceroute/nslookup - then contact ISP - THe jackass using the stolen notebook is probably using it from his home.
I don't remember if they were running the CLI or the GUI, and whether it was running in "hidden" mode or not.
But we've already got Laptop lojack! Thanks to Nugget and the distributed.net people!
http://www.distributed.net
Godddddd! (Score:1)
self-destruct mechanism (Score:1)
Re:Maybe genuinely secure laptops make more sense. (Score:1)
You don't even have to go as far as encrypting the file system. You can just encrypt the files themselves. Although, that migth still leave plaintext copies laying around in various caches when the user decrypts them to do work. Never mind, encrypted files systems are the way to go on this. What all these incidents leave me wondering is where did the "Orange Book" go? I think carrying info in plaintext outside of the office violates information security guidelines outlined in that document. I think rather than idiot proofing things, hte better counter measure in intel agencies and any organization which deals in senstitive material is to get rid of the idiots. The only way to do that is establish clear information security rules, train, and enforce rigoursly. Lets face it, the value of a laptop is minimal--especially if its insured--compared to the value of the data on it.
Sorry, you can't patent... (Score:1)
"Code-word information" (Score:1)
Yet another idea (Score:1)
Actually, that idea wouldn't be too difficult to do. All one has to do is to integrate a low power transmitter on an odd frequency that's integrated into the hardware - perhaps the drive itself or the mobo - that cannot be dissected - and under conditions (like multiple fail attempts at passkeys) it would trigger it. The antenna can be integrated into the case itself, kinda like those window antennas in cars that's covered across the rear window of cars - except in this case, it would be laced all over the panel and the case itself.
As a backup plan - have little polymeric cells that contain cyanide based acids (This is the stuff we use to dissolve gold with) hidden throughout the entire unit looking like capacitors and other elements of the system. Again, with the multiple passcode failures - a secondary power system is triggered that is not normally functioning - kinda sorta like in T2 when the terminator finds an alternate power route - and activates these plastic units. Which in turn dissolve and eat everything in sight *AND* kills the person in the process via chemical reaction.
-victem
Re:Godddddd! (Score:1)
It's the data, sir (Score:1)
-L
How to circumvent "laptop lojack" in 2 easy steps (Score:1)
a) Laptop itself
or
b) Data on laptop
In the case of a), if there's a self-destruct device on the hard disk, the thief likely won't care. That's not one of the most expensive pieces in it anyhow. Yank it and replace it.
For b), use RF sheilding. All ya' need is a big ass metal box around the thing to prevent tracking. Getting the data wouldn't take that long. Then you just chuck the laptop in a lake.
This thing actually has a market for cars because there are so many cars and the probability of having a lojack in a car is so small that the risk is worth it for a thief. It's hard to find this thing in a car. Plus, it's kinda hard to find something RF shielded to stash a car in.
For laptops, it would probably be easy to find this thing inside, at least for anyone who cared. Once the word got out that they were common, ways would be found do work around it.
The simple solution: Don't fucking put classified information on laptops. Maybe that's not very practical. Just the first thing that comes to mind.
Sorry. Don't think this would work.
Re:I found it!! (Score:1)
The actual secret message is:
17
Automatic Startup Messages (Score:1)
This is not necessarily an issue. The machine could transmit automatically only when is on. This would cut the strain on the battery, but still utilize tracking. Assuming you make the laptop such that it can't be physically broken into without damaging any of the machinery, the thief will need to turn on the computer to retrieve any data from it.
Re:Why recover the laptop? (Score:1)
Remember, this is the same federal government that used to spend $600 for toilet seats.
Sure, those laptops cost $3000, but they're 25Mhz 386s with monochrome screens and 4mb of RAM.
Re:Why always on? (Score:2)
--
Re:Loose as a goose (-1 Offtopic, -5 Spelling flam (Score:2)
And, of course, it implies willfilly letting go, not just accidentally leaving on the bus.
Just being even more pedantic for the sake of doing it; I'm with you, confusing lose/loose really annoying.
--
Re:Better idea - encrypt the data (Score:2)
--
A "freaking free-loading Canadian" stealing jobs from good honest hard working Americans since 1997.
Better idea - encrypt the data (Score:2)
--
A "freaking free-loading Canadian" stealing jobs from good honest hard working Americans since 1997.
Re:Maybe genuinely secure laptops make more sense. (Score:2)
If the laptop is supposed to be at places A, B or C, then use the GPS co-ords for those places as part of your key.
The motherboard would contain a second part of the key (make some use of the P3's ID!)
Thirdly, have a revokable certificate. Have the decryption code supplied require a connection to a certificate validation server to be unlocked. If it has been revoked, it gets deleted. Otherwise, it's decrypted and becomes usable.
Lastly, require a pass phrase from the operator.
Combine these in such a way that there is one unique decryption key generated BUT that no one person or component knows that key.
If the laptop is stolen, sure you may discover the P3 ID. If you bribe/persuade the person responsible, you might even find the pass phrase. But the GPS is a bit tougher to crack, as you won't know the location of the room(s), and you're not going to get much further with the certificate validation system.
Maybe the simplest solutions of all (Score:2)
Alternatively, cut the James Bond stuff and stop having to worry so much about data theft.
Last, but not least, install a command-line OS. Your average Government Agency is so lacking in brain-power that anything without icons is going to be too obscure and arcane for them to extract anything useful from it.
May happen in time (Score:2)
OTOH most of the elements of a lojack system make sense for other reasons. An embedded cell-phone allows the laptop to get online virtually anywhere. Add some sort of location capacity to that (a separate GPS or just something that uses feedback about where the cellphone is connecting) and you get useful mapping capabilities.
Now a theft-prevention device becomes a no-brainer. You don't even need to make it an explosive, just integrate the above parts with the laptop enough that to pull them out means breaking the laptop!
Cheers,
Ben
Maybe genuinely secure laptops make more sense. (Score:2)
Far more sensible for a laptop with classified information would be to use a filesystem that stores all data on the drivce with strong encryption, and requiring a revocable digital certificate to decrypt it.
I find it worrisome that any country's intelligence services would allow sensitive information to be carried around in cleartext. I don't know whatencrypted filesystem options there are for NT/Win2K.. maybe there is one. But I do know that there are readily available solutions for Linux and other Unix-style OSes.
CyberAngel already does this (Score:2)
CyberAngel already does this. It doesn't use radio that I know of (but that might be an interesting idea). It does use the modem (if the thief is dumb enough to hook it up, ANI will rat out his phone number). It can also be configured to wipe the hard drive if the unprompted password isn't entered within a certain time. And encrypted versions are also available.
More info right here [sentryinc.com] and details over here [sentryinc.com].
Unfortunately, no BSD or Linux version. It's just for Windows. But I'm sure someone can put something like this together for BSD and Linux.
Laptop Lojack? (Score:2)
While you wait for that, try something a little more practical. Like keeping your car locked, and never letting your laptop out of your sight. Dont advertise the fact you have one, either. Its like carrying a camera bag with a big logo on the side--you're helping a theif do his shopping. But, if you want to go truly geek, have your laptop ping a known address you have access to, like your home box.
For me, I have a very discrete black shoulderbag for my Thinkpad. Then again, i'm 6'5" 250, so, if anyone tried to yank it off my arm and run with it, I would rip their spine and beat them to death with it. Us Thinkpad owners are a bit protective of our notebooks.
Bowie J. Poag
I know who has them... (Score:2)
But two (publicly disclosed!) laptops full of classified information vanishing within a year, from different countries? Only one group in the world has the power and influence to pull that kind of stunt.
C.H.A.O.S.!!!
You know who to send for.
Use the other kind of 'munitions'... (Score:2)
Some utilities:
Scramdisk [clara.net] (my personal favorite)
BestCrypt [jetico.sci.fi]
PGP Disk [pgpi.org]
E4M [e4m.net]
And to ease day-to-day operation: SecureTray [fortunecity.com] (Windows tray utility to manage encrypted partitions).
engineers never lie; we just approximate the truth.
Another reason for automated crypto filesystems (Score:2)
I'm still waiting for the day when I can just say that a filesystem is encrypted, enter my password once, *until the next boot, or whatever*, then have access to it.. the problem with encryption is that it's a pain to use - I GPG some stuff, but when it comes down to it, it's too much of a pain to do on a file-by-file basis.
I was looking at cryptofs, but it'd be nice to have support for this in the kernel - yeah yeah I know - but all you people out there with terabytes of mp3's and downloaded pr0n and war3z might be interested. :)
The point of my arguement is that it's a lot easier to guarantee the data will be secure rather than the notebook, which anyone with a pair of paws can swipe and run off with. (Maybe pass a law to allow shooting such people in the back? *humor* :) Some companies that I've worked for (Intel) already have internal policies for encrypting sensitive information on laptops. Of course, since it's a pain.....
Kudos
Why powered on all the time ? (Score:2)
Gentlemen, we have a dongle. A fixed one on the actual motherboard maybe, but still a self powered dongle.
Loose as a goose (-1 Offtopic, -5 Spelling flame) (Score:2)
>from the never-loose-it-again dept.
ARRRRGH!
From the pet peeve department:
"Loose" rhymes with "goose" and "noose" and means the opposite of "tight".
What we want here is "lose", which rhymes with "booze", "news" and "schmooze" and means the opposite of "find" or "win".
Sorry, but I see this accursed mistake all over the Internet and I ABSOLUTELY CAN'T STAND IT!
Lojak and GPS (Score:2)
First, Lojak does not use GPS. The Lojak device remains passive once its installed. The device has to be activated by a signal (transmitted via satellite) from Lojak's control center, and they won't do that without a police report being generated. Once the device is active, it emits a tracking signal which the police can use to find the car.
Second, GPS. GPS is a system by which you receive signals from a number of satellites with a timing signal. By knowing the locations of the satellites and the offsets of the timing signals, you can figure out where you are. The requires LINE OF SIGHT to the satellites. Too many buildings or too much heavy foliage, and GPS is useless.
So GPS would be useless in a laptop like this. One, you'd have to have an antenna on the outside of the case. Sure, you could blend that in the with case, but that's the least of your problems. Keep the laptop under cover, or in a box, and the GPS unit can't determine where it is at all. Plus, GPS has a built in error (for civillian purposes) of anywhere from 50 to a thousand feet (IIRC), depending on what mood the military is in that day.
OK, so Lojak. Lojak relies on the receipt of a signal from the satellites. Keep the Lojak device in a suitably shielded area, and it will never receive that signal, and even if it did, the transmitted signal would never breach your shielded perimeter. Now it's not a trivial matter to get a car shielded like that. However, a lead-lined laptop bag should work nicely.
Not that I don't agree that a tracking system for laptops would be a great idea. Actually, something that could be used in any sort of small electronic device would be good to have.
-Todd
---
Re:Always on? (Score:2)
http://www.lojack.com [lojack.com]
The idea behind lojack is this: You have this device in your car. It just sits there listening on a certain frequency. If you report your car stolen, the police signal it on that frequency, and it starts broadcasting its location. They can then find your car pretty easily.
The reason that it works is that they got the cops in most major American cities (they claim 65% coverage) to go for it (and do all the work).
By the way, I was wrong about the pricing. They no longer charge a yearly fee; it's just a $500-$1000 flat one-time expense.
And yes, I think it's nice that I was able to get a real post in reasonably close to the top. Gosh, wouldn't it be terrible if you could actually read slashdot and find useful information?
Re:Reliability issues galore! (Score:2)
So if the thief brings the laptop to his secret underground lead-shielded lab and keeps it there, a Lojack-style system would never work. But if he brings it out into the streets, it'll be found.
Some numbers: Lojack claims that their 65% coverage is enough to recover 90% of all Lojack-equipped cars as long as the theft is reported within 48 hours. (As opposed to somewhere under 25% of non-Lojack-equipped cars).
So this isn't 100% effective. It's still better than what we have now (i.e., nothing).
For laptops with really important data, you probably want to lojack the drive(s), encrypt the data (and use gigantic keys that would take even the NSA years to crack), booby-trap the device, and do everything else that's been suggested here. If the data is really worth millions of times the cost of protecting it, then as long as there's a one in a million chance of it being stolen, protect it. Simple cost/benefit.
Better yet... (Score:2)
Aren't they supposed to handcuff the briefcases with the top secret data to themselves. And have them padlocked with exploding cyanide gas or something if someone tries to force them open? What kind of security-impared morons do they have working in the state department these days? Maybe they should give me a job. For a suitably exhorbitant fee, I'd be willing to outline some security policies for them. Feh.
Re:Always on? (Score:2)
simply destroys the hardware? For example....
Have a device that can be armed or disarmed with
a secret RF transmitted code. If you open the
case, without disarming...or a destruct code is
sent (via RF) then.,...say... a small canister of
thermite, mounted over the hard drive, suddenly
ignites.
Should easily destroy the hard drive, and most of
the rest of the laptop, pretty quickly.....
Hell...a version of this for home computers could
be made for probably under $100
The only real problem is deciding how much
thermite to use...Afterall...its good to destroy
the hard drive....burning a hole through the floor
and the next floor down is usually considered to
be fairly inconsiderate, at the least. (unless you
own your own house)
I posted this two weeks ago! (Score:2)
pft! I posted this same story two weeks ago. Oh well.
It's probably just Bill Gates. The State Department didn't have a license for their copy of Win95 (someone probably brought it in from home, and they all shared the disc) and so Microsoft took it.
what they really need.... (Score:2)
Reliability issues galore! (Score:2)
(a) whenever the device was in a tunnel, out of signal, or whatever, you'd lose all your data!
(b) if you allow it to lose signal without a problem, then the person who steals it merely has to block it from the signal and they can run off with it.
How easy is it to block the signal from a GPS satellite? I heard the new units are more reliable (smaller wavelength) but I bet it still wouldn't work in the Tube :-) BY THE WAY, abusing style sheets can be fun...
Re:Reliability issues galore! (Score:2)
I work with this stuff a lot, especially vechile tracking.
we do it with SMS, we have a gps unit installed in the vechile, connected to a cellphone based device, which sends a SMS every 2 minutes to a central location.
As for tunnels and stuff, this would be subject to the same limitations as normal cellphone operation.
Best idea is the one sugested to disable the device if tampered with. Eg, if the case is opened or X amount of wrong passwords, harddrive gets wiped (properly!) or in someway disabled.
BETTER SOLUTION... Do not allow sensitive data on laptops, keep it all on a network inside the organisation, with NOTHING being allowed to be removed on any medium.
This is what currently happens with a well known mobile phone operator in germany. Even the floppy drive is disabled in their laptops.
In a connected world, especially with technology such as IPsec, there is no reason why data should ever have to leave a secure server. Alan
Why always on? (Score:3)
Here's a neat idea (yes, I'm bored - and no, I did not sleep last night). Make a GPS receiver/position broadcaster only activate when a 'daughter' unit was not within a predifined range. That way, the LoJack system would be merely sipping at its own battery on standby, but would start transmitting its location as soon as the daughter hardware was out of range. How does that sound? Sure it requires its own battery, but it's entirely internal (Don't ask how you change the battery. I don't know. Lift up the keyboard? okay - LOCKED under the keyboard?)
[first meaningful post?]
Re:Maybe genuinely secure laptops make more sense. (Score:3)
Of course, if you had a system which blew up the data if it got out of tracking range, you'd still lose the data.... so maybe this is all a dumb idea on my part :-)
Re:What about my privacy? (Score:4)
just a "tiny bit" different. See...the police in
MA REFUSED to use lojack, unless certain changes
were made to the system.
What did they want? The police wanted the ability
to activate any lojack at any time, for any
reason. Guess what? they got it. If you have
lojack in MA, the police could turn it on at any
time, without you knowing a thing about it.
(I am assuming by this that there are protections
in place in other states, like its not the policebut the lojack people who transmit the code
and need some password or mothers maiden name
or some such to do it)
This laptop will self-destruct..... (Score:4)
As an added bonus, it would probably start someone's car or suitcase or something on fire when it triggered, which would certainly draw some attention. On that idea, booby trap them to mark anyone who tampers with them somehow maybe? Kind of like the red dye used in banks, but less obvious.