Skip to main content

Berkeley Professor threatens thief of his laptop

Professor Jasper Rine is a professor at UC Berkely and had his laptop stolen. After a class at the university he addressed the thief to hand back the laptop. (Transcript, video) He seems to be quite angry at the thief and threatens to track him down (with the help of Microsoft, the FBI, Federal Marshals, the SEC an the FTC). Apparently there was very important data on that laptop,although the thief was most probably only looking for exam data. The first thing we should ask here is why all of this so important and secret data was stored on a laptop unencrypted, why there is no backup and why anybody would let someone even come near such important data? To me this rant sounds very much like a rather pathetic attempt to cover up for his own goof-ups and scare. Secondly, let's analyse the claims a little bit more:

"he was not smart enough to immediately remove Windows. I installed the same version of Windows on another computer - within fifteen minutes the people in Redmond Washington were very interested to know why it was that the same version of Windows was being signalled to them from two different computers." Well, apparently our professor installed the same copy of Windows on two computers - now while this might be licensed today, it is not allowed to use both machines at the same time. To me the professor is in violation of the license agreement. Additionally, Windows does not "call home" and the people in Redmond have other things to do than track the laptops of professors.

"The thief also did not inactivate either the wireless card or the transponder that's in that computer. Within about an hour, there was a signal from various places on campus that's allowed us to track exactly where that computer went every time that it was turned on." I'm wondering what types of transponders are installed in this laptop - if it were any good, the professor should be able to just walk up to the thief and take the laptop back. Now Wifi could potentially be used to track location of certain client, this is not as easy as claimed (I sure hope not, that the university does this will all computers) and not very accurate (especially in a larger, open campus).

After all, it seems to me that the professor has no clue who stole his laptop, did not protect the confidential and important data stored on it and now tries to get that data back by threatening with his older brother. Be sure to check out the comic strip and especially the hilarious comments.

Via BoingBoing.

Comments

Popular posts from this blog

Sony is evil

I just so agree with Todd: Bad Company of the Year Award! : The company that I am putting at the top of my list is a 4 letter word so foul, that it has been banned from my home. I have asked my wife who is Japanese to refrain from buying any of their products for the next 5 years. The Bad company of the year is no other than SONY… Sony is just a big no-buy company. My girlfriend knows why Sony is evil and we both will rather buy a more expensive or less appealing product from a competitor. " Sony is evil " has only 726 hits on Google, but this will increase. Edit: More about the damage Sony does: Artists revolt against DRM Portable stereo's creator got his due, eventually

Why did Microsoft cripple Groove?

I'm currently trying to use Microsoft Groove 2007 as a collaboration tool to gather requirements. What I like about tools like Groove is: - You can open and edit an entry without having to start an additional application (like word, excel) - You can copy and paste pictures (screenshots) directly into an entry - You don't have to save and re-attach changed files - You can work offline - Groove works inside and outside of our network out-of-the-box - We have (as a Microsoft Gold Partner) 100 licenses available What I don't understand about the current offering is that a lot of tools available in the last version have been removed: The following tools and toolsets are no longer available for adding to new or existing workspaces : Contact Manager, Discussion, Document Review, Outliner , Task Manager, Text, Tic- Tac -Toe, Web Links, Welcome Page, Advanced Project Toolset , and Mobile Workspace for SharePoint . (Source: Microsoft Office Groove Help) There is also a large set

Two factor authentication outdated?

According to the article below from The Register (quoting Bruce Schneier), two-factor authentication seems already be outdated. I believe, we should take a careful approach here: Two-factor authentication is certainly better than just user-id and password. Especially online banking in the US has been using just user-id/password and now they are paying the prize for this lax security measure. Stepping up to use onetime passwords (such as RSA SecurID or Aladin tokens) is a first step against sniffing out passwords. However, there is no such thing as complete security. But two-factor authentication is a first step. As every Information Security Officer nows, user awareness is key to increase security. By giving user a device, this awareness increases dramatically. Link to original article. New threats need new response Banks are spending millions on two-factor authentication for their customers but the approach no longer provides adequate protection against fraud or identity theft, accord