Feeds

Web cam images undo MacBook thieves

You've been iFramed

The Power of One Infographic

A pair of clueless US crooks were brought to justice when they went online using an Apple employee's stolen laptop.

Edmon Shahikian, 23, of Katonah, and Ian Frias, 20, of the Bronx district of New York, were arrested and charged with burglary and possession of stolen property after their victim tracked them down. Kait Duplaga, who works in an Apple store, traced the duo thanks to software application installed on her stolen Mac, the New York Times reports.

Along with the Mac another laptop, flat-screen TVs and computer games, DVDs, MP3 players and a set of car wheel hubs were stolen in a burglary at the apartment Duplaga shared with two other people in White Plains last month. Almost all the stolen booty was recovered when police arrested Shahikian and Frias.

Duplaga used a feature called "Back to My Mac" to gain remote access to her laptop when the dynamic duo used it to surf the net. She saw that the pair of crooks were shopping for beds. Surreptitiously she activated a camera on her laptop which she used to take a picture of Frias, using an application called PhotoBooth. One of Duplaga's flatmates knew Frias, who attended a house party shortly before the break-in - a factor that led to his undoing when Duplaga turned over his picture to the police. ®

The Power of One Brief: Top reasons to choose HP BladeSystem

More from The Register

next story
Sit back down, Julian Assange™, you're not going anywhere just yet
Swedish court refuses to withdraw arrest warrant
UK Parliament rubber-stamps EMERGENCY data grab 'n' keep bill
Just 49 MPs oppose Drip's rushed timetable
MPs wave through Blighty's 'EMERGENCY' surveillance laws
Only 49 politcos voted against DRIP bill
EU's top data cops to meet Google, Microsoft et al over 'right to be forgotten'
Plan to hammer out 'coherent' guidelines. Good luck chaps!
Delaware pair nabbed for getting saucy atop Mexican eatery
Burrito meets soft taco in alleged rooftop romp outrage
British cops cuff 660 suspected paedophiles
Arrests people allegedly accessing child abuse images online
LightSquared backer sues FCC over spectrum shindy
Why, we might as well have been buying AIR
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.
Mobile application security vulnerability report
The alarming realities regarding the sheer number of applications vulnerable to attack, and the most common and easily addressable vulnerability errors.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.