GadgetTrak

Last updated
GadgetTrak
Developer(s) GadgetTrak Inc.
Initial releaseFebruary 24, 2007 (2007-02-24)
Written in Objective-C, C++, Java, .NET, Linux
Operating system Windows, OS X, Android, iOS
Type Laptop & mobile tracking software
License Commercial

Until 2019, GadgetTrak was a company based in Portland, Oregon, that developed theft recovery and data protection software. [1] [2] [3] The company was founded in February 2007 by Ken Westin [4] with the launch of the first theft recovery product for USB mass storage devices, tracking stolen devices including iPods, flash drives, digital cameras and other devices when connected to a computer. [5] [6] [7] The company was issued a patent for the technology on February 24, 2009. [8] GadgetTrak's technology was featured during a special segment by Dateline on iPod theft where they tracked stolen iPods and confronted the thieves. [9] A customized version of the technology was embedded in FLIR thermal imaging cameras as part of an exclusive licensing agreement under the name ThermaTrak [10] utilized for both theft recovery as well as export controls.

Contents

Patents

The company was issued two patents for its technologies:

Patent No. 9,083,624 applies to the process of tracking lost or stolen computing devices by the use of Wi-Fi and/or GPS and/or cellular triangulation.

Patent No. 7,496,201 applies to the process of tracking and recovering devices such as iPods, flash drives, and digital cameras.

Mobile software

In October 2008, [11] the company launched its GadgetTrak Mobile Security app for Blackberry and Windows mobile devices.

On November 4, 2008, the company launched its first mobile security software app for iOS devices.

At CES 2012, the company launched a version of GadgetTrak Mobile Security for Android devices. [12] Along with the Android release, other upgrades were added, including a web-based control panel to activate tracking, remotely wipe data from the device, encrypt and backup data as well as an enterprise group management console.

Just after launch, the application was put to test by a chain of Sprint stores that installed the software on their demo units. One store in Tigard, Oregon had several devices stolen. With the help of the [13] GadgetTrak Mobile Security app, they were able to recover the devices and apprehend the thieves. [14]

Laptop software

On November 12, 2008, the company launched the Mac laptop version of its software that utilizes the web camera to capture a photo of a thief, as well as the utilization of Wi-Fi positioning to provide location within 10–20 meters. [15] Shortly after the product launch, several stolen laptop recoveries were using the software, the first being in Brooklyn, New York where a stolen iMac was tracked to a tattoo parlor where police recovered the stolen computer along with other stolen property. [16]

In April 2009, the company launched a Windows version of their laptop software further expanding their product offering. [17]

Highlighted recoveries

GadgetTrak claimed many "firsts" about devices that have been recovered and methods used.

Related Research Articles

<span class="mw-page-title-main">Motor vehicle theft</span> Theft of vehicles

Motor vehicle theft or car theft is the criminal act of stealing or attempting to steal a motor vehicle.

<span class="mw-page-title-main">International Mobile Equipment Identity</span> Cellphone identification code

The International Mobile Equipment Identity (IMEI) is a numeric identifier, usually unique, for 3GPP and iDEN mobile phones, as well as some satellite phones. It is usually found printed inside the battery compartment of the phone but can also be displayed on-screen on most phones by entering the MMI Supplementary Service code *#06# on the dialpad, or alongside other system information in the settings menu on smartphone operating systems.

<span class="mw-page-title-main">Art theft</span> Stealing of paintings or sculptures from museums

Art theft, sometimes called artnapping, is the stealing of paintings, sculptures, or other forms of visual art from galleries, museums or other public and private locations. Stolen art is often resold or used by criminals as collateral to secure loans. Only a small percentage of stolen art is recovered—an estimated 10%. Many nations operate police squads to investigate art theft and illegal trade in stolen art and antiquities.

Laptop theft is a significant threat to users of laptop computers. Many methods to protect the data and to prevent theft have been developed, including alarms, laptop locks, and visual deterrents such as stickers or labels. Victims of laptop theft can lose hardware, software, and essential data that has not been backed up. Thieves also may have access to sensitive data and personal information. Some systems authorize access based on credentials stored on the laptop including MAC addresses, web cookies, cryptographic keys and stored passwords.

Anti-theft systems protect valuables such as vehicles and personal property like wallets, phones, and jewelry. They are also used in retail settings to protect merchandise in the form of security tags and labels. Anti-theft systems include devices such as locks and keys, RFID tags, and GPS locators.

LoJack is a stolen vehicle recovery and IoT connected car system that utilizes GPS and cellular technology to locate users' vehicles, view trip history, see battery levels, track speeding, and maintain vehicle health via a native app. Prior to selling a vehicle, LoJack dealers can use the system to manage and locate inventory, view and manage battery health, and recover stolen inventory.

Data erasure is a software-based method of data sanitization that aims to completely destroy all electronic data residing on a hard disk drive or other digital media by overwriting data onto all sectors of the device in an irreversible process. By overwriting the data on the storage device, the data is rendered irrecoverable.

Baby Jesus theft is the theft of figurines of the infant Jesus from outdoor public and private nativity displays during the Christmas season. It is an "enduring practice" according to New York Times journalist Katie Rogers, "believed to be part of a yearly tradition, often carried out by bored teenagers looking for an easy prank." Sometimes these are stolen for resale, other times the associated pranks are more involved and include dropping it off somewhere else.

HEAT LANrev is systems lifecycle management software used by system administrators to automate IT administration tasks. The product includes server and client ("agent") software that runs on Windows and macOS.

<span class="mw-page-title-main">Prey (software)</span>

Prey is a software and online platform for mobile device tracking, management, and protection available for laptops, tablets, and mobiles. The software and service is developed by the Chilean company Prey Inc., successor of the funding company Fork Ltd.

A vehicle tracking system combines the use of automatic vehicle location in individual vehicles with software that collects these fleet data for a comprehensive picture of vehicle locations. Modern vehicle tracking systems commonly use GPS or GLONASS technology for locating the vehicle, but other types of automatic vehicle location technology can also be used. Vehicle information can be viewed on electronic maps via the Internet or specialized software. Urban public transit authorities are an increasingly common user of vehicle tracking systems, particularly in large cities.

Book store shoplifting is a problem for book sellers and has sometimes led stores to keep certain volumes behind store counters.

<i>Robbins v. Lower Merion School District</i> Federal class action lawsuit

Robbins v. Lower Merion School District is a federal class action lawsuit, brought in February 2010 on behalf of students of two high schools in Lower Merion Township, a suburb of Philadelphia. In October 2010, the school district agreed to pay $610,000 to settle the Robbins and parallel Hasan lawsuits against it.

Find my Phone or similar is the name given by various manufacturers to software and a service for smartphones, whereby a registered user can find the approximate location of the phone if switched on, over the Internet, or by the phone sending e-mail or SMS text messages. This helps to locate lost or stolen phones.

A mobile application or app is a computer program or software application designed to run on a mobile device such as a phone, tablet, or watch. Mobile applications often stand in contrast to desktop applications which are designed to run on desktop computers, and web applications which run in mobile web browsers rather than directly on the mobile device.

<span class="mw-page-title-main">ThinkPad Tablet</span> Tablet computer made by Lenovo

The ThinkPad Tablet is a tablet computer made by Lenovo as part of its series of Android-based tablet devices and is targeted towards business users. Lenovo's tablet offerings are available in both ThinkPad and IdeaPad variants. While the ThinkPad Tablets are designed for business, the IdeaPad tablets, like the laptops of the same name, are meant for home and personal use. These tablets are different from Lenovo's X Series tablets, which are laptop/tablet hybrids and which use Microsoft Windows as their operating system.

Absolute Home & Office is a proprietary laptop theft recovery software. The persistent security features are built into the firmware of devices. Absolute Home & Office has services of an investigations and recovery team who partners with law enforcement agencies to return laptops to their owners. Absolute Software licensed the name LoJack from the vehicle recovery service LoJack in 2005.

The following outline is provided as an overview of and topical guide to computer security:

<span class="mw-page-title-main">BrickHouse Security</span> New York City-based security company

BrickHouse Security is a New York City-based security company that sells security systems, including video cameras and hidden cameras, and GPS trackers to law enforcement agencies, businesses and individuals. The company is the parent company of GPS tracking device companies Securus and Zoombak.

A security switch is a hardware device designed to protect computers, laptops, smartphones and similar devices from unauthorized access or operation, distinct from a virtual security switch which offers software protection. Security switches should be operated by an authorized user only; for this reason, it should be isolated from other devices, in order to prevent unauthorized access, and it should not be possible to bypass it, in order to prevent malicious manipulation.

References

  1. "Business Entity Data". Oregon Secretary of State Corporate Division. Retrieved 5 April 2023.
  2. "About Company". GadgetTrak. Archived from the original on 6 August 2013. Retrieved 2 September 2013.
  3. David, Becker. "Anti-Theft Widget for iPods". Wired. Retrieved 2 September 2013.
  4. Bertoni, Steven. "Most Stolen Electronics". Forbes. Retrieved 2 September 2013.
  5. Sullivan, Bob. "iPod crime wave? Yes, and more". NBC News.
  6. Adam, Pash (2007-02-26). "Recover stolen gadgets with GadgetTheft". Life Hacker. Retrieved 2 September 2013.
  7. Darren, Murph. "GadgetTrak hunts down stolen gadgetry for free". Engadget. Retrieved 2 September 2013.
  8. USpatent 7496201,Ken Westin,"Portable host-pluggable appliance tracking system",published 2009-02-24,issued 2009-02-24, assigned to WestinTech DBA GadgetTrak
  9. Hansen, Chris. "Dateline Takes On iPod Thieves". Dateline NBC. Retrieved 2 September 2013.
  10. "FLIR Systems Launches ThermaTrak(TM) 'Find' Service to Recover Lost, Stolen or Missing Infrared Cameras". Thomas Net. Retrieved 2 September 2013.
  11. "GadgetTrak Inc. Launches GadgetTrak® Mobile Security - The Most Advanced Anti-Theft and Data Protection for Smart Phones". PR Web. Retrieved 2 September 2013.
  12. France, Jasmine. "CES: GadgetTrak offers mobile theft protection". CNET. Retrieved 2 September 2013.
  13. Johnson, Emma. "CES: Gadget". Trendinggadgetz. Retrieved 2 September 2013.
  14. Teachout, Ed. "Tigard police used tracker on stolen cellphones". KGW News. Archived from the original on 2 September 2013. Retrieved 2 September 2013.
  15. Steven, Sande. "TUAW Review: MacTrak Theft Recovery Software". TUAW. Retrieved 2 September 2013.
  16. Charlie, Sorrel. "Tracking Software Rescues Stolen iMac after Two Weeks". Wired. Retrieved 2 September 2013.
  17. Rick, Turoczy. "Windows laptop and netbook owners can rest easier: GadgetTrak launches PC-Trak". Silicon Florist. Retrieved 2 September 2013.
  18. Westin, Ken. "iPod Theft Recovery – Newmarket Ontario". GadgetTrak. Archived from the original on 6 October 2013. Retrieved 2 September 2013.
  19. "Another GadgetTrak Recovery – Stolen 32GB Flash Drive Recovered". GadgetTrak. Archived from the original on 21 October 2013. Retrieved 2 September 2013.
  20. "GadgetTrak Mobile Security Catches Phone Thief". GadgetTrak. Archived from the original on 2013-10-21. Retrieved 2013-09-02.
  21. "GadgetTrak Recovers Stolen AT&T Tilt for Customer – Edmond Oklahoma". GadgetTrak. Archived from the original on 20 October 2013. Retrieved 2 September 2013.
  22. Nosowitz, Dan (7 August 2009). "GadgetTrak Security System Catches iMac Thief With Startling Precision". Gizmodo. Retrieved 2 September 2013.
  23. Deleon, Nicholas (6 August 2009). "Look, GadgetTrak caught an evil iMac thief in Brooklyn!". Techcrunch. Retrieved 2 September 2013.
  24. "GadgetTrak Cracks Theft Ring – Oakland, California". GadgetTrak. Archived from the original on 2013-10-06. Retrieved 2013-09-02.
  25. Goldman, Jeff. "ActiveTrak Targets the Enterprise". eSecurity Planet.
  26. "GadgetTrak Tracks & Recovers Stolen Macbook from Portland to Missouri". GadgetTrak. Archived from the original on 2013-10-07. Retrieved 2013-09-02.
  27. "Stealthy Laptop Software Catches Photos of Thieves". KEZI News. Archived from the original on 2013-10-20. Retrieved 2013-09-02.
  28. "GadgetTrak Unveils Theft Ring Targeting Portland Schools". GadgetTrak. Archived from the original on 2013-10-21. Retrieved 2013-09-02.
  29. "Gadget snaps photo of school laptop theft suspect". KGW News. Archived from the original on 2016-02-21.
  30. Bertolucci, Jeff. "Laptop Thieves Punk'd! Six Amazing Recovery Stories". PC World. Archived from the original on 2014-12-02. Retrieved 2013-09-02.
  31. Pool, Bob (15 August 2011). "Wireless technology may lead police to stolen camera". LA Times.
  32. "GadgetTrak Laptop Recovery – Richmond, CA". CBS 5 San Francisco. Archived from the original on 2017-05-11. Retrieved 2013-09-02.
  33. "GadgetTrak Laptop Recovery – Portland, Oregon". GadgetTrak. Archived from the original on 2017-05-11. Retrieved 2013-09-02.