GadgetTrak

Last updated
GadgetTrak
Developer(s) GadgetTrak Inc.
Initial releaseFebruary 24, 2007 (2007-02-24)
Written in Objective-C, C++, Java, .NET, Linux
Operating system Windows, OS X, Android, iOS
Type Laptop & mobile tracking software
License Commercial

Until 2019, GadgetTrak was a company based in Portland, Oregon, that developed theft recovery and data protection software. [1] [2] [3] The company was founded in February 2007 by Ken Westin [4] with the launch of the first theft recovery product for USB mass storage devices, tracking stolen devices including iPods, flash drives, digital cameras and other devices when connected to a computer. [5] [6] [7] The company was issued a patent for the technology on February 24, 2009. [8] GadgetTrak's technology was featured during a special segment by Dateline on iPod theft where they tracked stolen iPods and confronted the thieves. [9] A customized version of the technology was embedded in FLIR thermal imaging cameras as part of an exclusive licensing agreement under the name ThermaTrak [10] utilized for both theft recovery as well as export controls.

Contents

Mobile software

In October 2008, [11] the company launched its GadgetTrak Mobile Security app for Blackberry and Windows mobile devices.

On November 4, 2008, the company launched its first mobile security software app for iOS devices.

At CES 2012, the company launched a version of GadgetTrak Mobile Security for Android devices. [12] Along with the Android release, other upgrades were added, including a web-based control panel to activate tracking, remotely wipe data from the device, encrypt and backup data as well as an enterprise group management console.

Just after launch, the application was put to test by a chain of Sprint stores that installed the software on their demo units. One store in Tigard, Oregon had several devices stolen. Fortunately, they were able to recover the devices and apprehend the thieves using their Mobile Security app. [13]

Laptop software

On November 12, 2008, the company launched the Mac laptop version of its software that utilizes the web camera to capture a photo of a thief, as well as the utilization of Wi-Fi positioning to provide location within 10–20 meters. [14] Shortly after the product launch, several stolen laptop recoveries were using the software, the first being in Brooklyn, New York where a stolen iMac was tracked to a tattoo parlor where police recovered the stolen computer along with other stolen property. [15]

In April 2009, the company launched a Windows version of their laptop software further expanding their product offering. [16]

Related Research Articles

<span class="mw-page-title-main">Laptop</span> Personal computer for mobile use

A laptop computer or notebook computer, also known as a laptop or notebook, is a small, portable personal computer (PC). Laptops typically have a clamshell form factor with a flat-panel screen on the inside of the upper lid and an alphanumeric keyboard and pointing device on the inside of the lower lid. Most of the computer's internal hardware is fitted inside the lower lid enclosure under the keyboard, although many modern laptops have a built-in webcam at the top of the screen, and some even feature a touchscreen display. In most cases, unlike tablet computers which run on mobile operating systems, laptops tend to run on desktop operating systems, which were originally developed for desktop computers.

<span class="mw-page-title-main">Motor vehicle theft</span> Theft of vehicles

Motor vehicle theft or car theft is the criminal act of stealing or attempting to steal a motor vehicle.

<span class="mw-page-title-main">International Mobile Equipment Identity</span> Cellphone identification code

The International Mobile Equipment Identity (IMEI) is a numeric identifier, usually unique, for 3GPP and iDEN mobile phones, as well as some satellite phones. It is usually found printed inside the battery compartment of the phone but can also be displayed on-screen on most phones by entering the MMI Supplementary Service code *#06# on the dialpad, or alongside other system information in the settings menu on smartphone operating systems.

Laptop theft is a significant threat to users of laptop computers. Many methods to protect the data and to prevent theft have been developed, including alarms, laptop locks, and visual deterrents such as stickers or labels. Victims of laptop theft can lose hardware, software, and essential data that has not been backed up. Thieves also may have access to sensitive data and personal information. Some systems authorize access based on credentials stored on the laptop including MAC addresses, web cookies, cryptographic keys and stored passwords.

The Apple community is the users, media, and third party companies interested in Apple Inc. and its products. They discuss rumors, future products, news stories, and support of Apple's products. Apple has a cult-like following, especially for the Apple II, Macintosh, iPod, iPhone, and luminary staff members. The personal computer revolution, mixed with Apple's vertical integration of its products and services, has increased popularity. Apple's corporate policy of extreme secrecy about future products intensify interest in the company's activities.

Anti-theft systems protect valuables such as vehicles and personal property like wallets, phones, and jewelry. They are also used in retail settings to protect merchandise in the form of security tags and labels. Anti-theft systems include devices such as locks and keys, RFID tags, and GPS locators.

Mobile malware is malicious software that targets mobile phones or wireless-enabled Personal digital assistants (PDA), by causing the collapse of the system and loss or leakage of confidential information. As wireless phones and PDA networks have become more and more common and have grown in complexity, it has become increasingly difficult to ensure their safety and security against electronic attacks in the form of viruses or other malware.

LoJack is a stolen vehicle recovery and IoT connected car system that utilizes GPS and cellular technology to locate users' vehicles, view trip history, see battery levels, track speeding, and maintain vehicle health via a native app. Prior to selling a vehicle, LoJack dealers can use the system to manage and locate inventory, view and manage battery health, and recover stolen inventory.

Data erasure is a software-based method of data sanitization that aims to completely destroy all electronic data residing on a hard disk drive or other digital media by overwriting data onto all sectors of the device in an irreversible process. By overwriting the data on the storage device, the data is rendered irrecoverable.

HEAT LANrev is systems lifecycle management software used by system administrators to automate IT administration tasks. The product includes server and client ("agent") software that runs on Windows and macOS.

<span class="mw-page-title-main">Prey (software)</span>

Prey is a software and online platform for mobile device tracking, management, and protection available for laptops, tablets, and mobiles. The software and service is developed by the Chilean company Prey Inc., successor of the funding company Fork Ltd.

A mobile application or app is a computer program or software application designed to run on a mobile device such as a phone, tablet, or watch. Mobile applications often stand in contrast to desktop applications which are designed to run on desktop computers, and web applications which run in mobile web browsers rather than directly on the mobile device.

<span class="mw-page-title-main">ThinkPad Tablet</span> Tablet computer made by Lenovo

The ThinkPad Tablet is a tablet computer made by Lenovo as part of its series of Android-based tablet devices and is targeted towards business users. Lenovo's tablet offerings are available in both ThinkPad and IdeaPad variants. While the ThinkPad Tablets are designed for business, the IdeaPad tablets, like the laptops of the same name, are meant for home and personal use. These tablets are different from Lenovo's X Series tablets, which are laptop/tablet hybrids and which use Microsoft Windows as their operating system.

<span class="mw-page-title-main">MFi Program</span> Licensing program for peripherals for iPod, iPad and iPhone

Apple Inc.'s MFi Program, referring to "Made for iPhone/iPod/iPad", is a licensing program for developers of hardware and software peripherals that work with Apple's iPod, iPad and iPhone. The name is a shortened version of the long-form Made for iPod, the original program that ultimately became MFi.

Absolute Home & Office is a proprietary laptop theft recovery software. The persistent security features are built into the firmware of devices. Absolute Home & Office has services of an investigations and recovery team who partners with law enforcement agencies to return laptops to their owners. Absolute Software licensed the name LoJack from the vehicle recovery service LoJack in 2005.

<span class="mw-page-title-main">Samsung Galaxy Gear</span> Smartwatch by Samsung

The Samsung Galaxy Gear is a smartwatch produced by Samsung Electronics in the Samsung Gear family of devices. Unveiled during a Samsung Unpacked event in Berlin, Germany on September 4, 2013, the device serves as a companion for all Samsung Galaxy smartphones and tablets which runs on Android 4.3 "Jelly Bean" or newer. It was released on September 25, 2013. Originally released as an Android-based device, Samsung replaced the operating system with Tizen through the May 2014 software update.

Lemon Wallet was a cloud-based digital wallet that allowed users to store digital copies of credit cards, debit cards, reward cards, as well as identification, and other card information. The service was released in July 2011 and the company is based in Palo Alto, California, United States. Wences Casares was the company's CEO.

iPhone OS 3 2009 mobile operating system

iPhone OS 3 is the third major release of the iOS mobile operating system developed by Apple Inc., succeeding iPhone OS 2. It was announced on March 17, 2009, and was released on June 17, 2009. It was succeeded by iOS 4 on June 21, 2010, dropping the "iPhone OS" naming convention.

The following outline is provided as an overview of and topical guide to computer security:

A security switch is a hardware device designed to protect computers, laptops, smartphones and similar devices from unauthorized access or operation, distinct from a virtual security switch which offers software protection. Security switches should be operated by an authorized user only; for this reason, it should be isolated from other devices, in order to prevent unauthorized access, and it should not be possible to bypass it, in order to prevent malicious manipulation.

References

  1. "Business Entity Data". Oregon Secretary of State Corporate Division. Retrieved 5 April 2023.
  2. "About Company". GadgetTrak. Archived from the original on 6 August 2013. Retrieved 2 September 2013.
  3. David, Becker. "Anti-Theft Widget for iPods". Wired. Retrieved 2 September 2013.
  4. Bertoni, Steven. "Most Stolen Electronics". Forbes. Retrieved 2 September 2013.
  5. Sullivan, Bob. "iPod crime wave? Yes, and more". NBC News.
  6. Adam, Pash (2007-02-26). "Recover stolen gadgets with GadgetTheft". Life Hacker. Retrieved 2 September 2013.
  7. Darren, Murph. "GadgetTrak hunts down stolen gadgetry for free". Engadget. Retrieved 2 September 2013.
  8. USpatent 7496201,Ken Westin,"Portable host-pluggable appliance tracking system",published 2009-02-24,issued 2009-02-24, assigned to WestinTech DBA GadgetTrak
  9. Hansen, Chris. "Dateline Takes On iPod Thieves". Dateline NBC. Archived from the original on March 10, 2015. Retrieved 2 September 2013.
  10. "FLIR Systems Launches ThermaTrak(TM) 'Find' Service to Recover Lost, Stolen or Missing Infrared Cameras". Thomas Net. Retrieved 2 September 2013.
  11. "GadgetTrak Inc. Launches GadgetTrak® Mobile Security - The Most Advanced Anti-Theft and Data Protection for Smart Phones". PR Web. Retrieved 2 September 2013.
  12. France, Jasmine. "CES: GadgetTrak offers mobile theft protection". CNET. Retrieved 2 September 2013.
  13. Teachout, Ed. "Tigard police used tracker on stolen cellphones". KGW News. Archived from the original on 2 September 2013. Retrieved 2 September 2013.
  14. Steven, Sande. "TUAW Review: MacTrak Theft Recovery Software". TUAW. Retrieved 2 September 2013.
  15. Charlie, Sorrel. "Tracking Software Rescues Stolen iMac after Two Weeks". Wired. Retrieved 2 September 2013.
  16. Rick, Turoczy. "Windows laptop and netbook owners can rest easier: GadgetTrak launches PC-Trak". Silicon Florist. Retrieved 2 September 2013.