World Library  
Flag as Inappropriate
Email this Article

Laptop theft

Article Id: WHEBN0000602014
Reproduction Date:

Title: Laptop theft  
Author: World Heritage Encyclopedia
Language: English
Subject: Theft, Bob Arno, Kensington Security Slot, MacKeeper, Laptops
Collection: Computer Security Exploits, Laptops, Theft
Publisher: World Heritage Encyclopedia

Laptop theft

Laptop theft is a significant threat to users of laptop and netbook computers. Many methods to protect the data and to prevent theft have been developed, including alarms, laptop locks, and visual deterrents such as stickers or labels. Victims of laptop theft can lose hardware, software, and essential data that has not been backed up. Thieves also may have access to sensitive data and personal information. Some systems authorize access based on credentials stored on the laptop including MAC addresses, web cookies, cryptographic keys and stored passwords.

According to the

  • Tracking, Prevention and Recovery at DMOZ
  • The spy who lost me - laptop thefts from the British Ministry of Defence
  • 2005 CSI/FBI Computer Crime and Security Survey - statistics and information about computer crime

External links

  1. ^ 2005 FBI Computer Crime & Security Survey
  2. ^ "The Billion Dollar Lost Laptop Problem." Page 2. Intel. Ponemon Institute, 2009. Web. 13 Feb. 2013.
  3. ^ "The Billion Dollar Lost Laptop Problem." Page 11. Intel. Ponemon Institute, 2009. Web. 13 Feb. 2013.
  4. ^ "Security Breaches Are On The Rise But Preventable." Druva, 2012. Web. 15 August 2012.
  5. ^  
  6. ^ Business Risk of a Lost Laptop
  7. ^  
  8. ^ "TrueCrypt". TrueCrypt. Retrieved 28 February 2014. 
  9. ^ Data on millions of vets stolen from VA employee's home
  10. ^ Electronic Privacy Information Center Veterans Affairs Data Theft
  11. ^ CNN article about a class action settlement for a Veteran Affair stolen laptop
  12. ^ "Final Notice" (Press release).  
  13. ^ Absolute Software, Computer Theft Report, 2011
  14. ^ Ponemon Institute, Airport Insecurity: The Case of Lost Laptops, June 2008


See also

To provide some context, the Ponemon Institute released a study that indicates over 600,000 laptops will be lost or stolen at US airports every year, with 65-69% of them remaining unclaimed.[14]

  1. Public Schools (K-12)
  2. Residential Properties
  3. Automobiles (excluding taxis)
  4. Businesses/Offices
  5. Universities and Colleges
  6. Restaurants and Cafes
  7. Hotels and Motels
  8. Dormitory
  9. Airports
  10. Public Transit (taxi, bus, train)

LoJack for Laptops has compiled a list of the top ten places from which laptops are stolen:[13]

Common locations

After learning about the unencrypted laptop, VA investigated how many VA contractors might not be complying with the encryption requirement and learned that 578 vendors had refused to sign new contract clauses that required them to encrypt veteran data on their computers, an apparent violation of rules.

In 2010 VA reported the theft of the laptop from an unidentified contractor; the computer contained personally identifiable information on 644 veterans, including data from some VA medical centers' records.

In 2007 the Financial Services Authority (FSA) fined the UK’s largest building society, Nationwide, £980,000 for inadequate procedures when an employees’ laptop was stolen during a domestic burglary. The laptop had details of 11 million customers’ names and account numbers and, whilst the device was password protected, the information was unencrypted. The FSA noted that the systems and controls fell short, given that it took the Nationwide three weeks to take any steps to investigate the content on the missing laptop. The substantial fine was invoked to reinforce the FSA’s commitment to reducing financial crime.[12]

In 2006 a laptop in custody of a data analyst was stolen that contained personal and health data of about 26.5 million active duty troops and veterans.[9] The agency has estimated that it will cost between $100 million to $500 million to prevent and cover possible losses from the data theft.[10] In 2007, the United States Department of Veterans Affairs agreed to pay $20 million to current and former military personnel to settle a class action lawsuit. [11]

Major laptop thefts

This approach can be coupled with strong authentication as such single sign-on (SSO).

Another possible approach to limiting the consequences of laptop theft is to issue thin client devices to field employees instead of conventional laptops, so that all data will reside on the server and therefore may be less liable to loss or compromise. If a thin client is lost or stolen, it can easily and inexpensively be replaced. However, a thin client depends on network access to the server, which is not available aboard airliners or any other location without network access.

Centralization of laptop data

A number of computer security measures have emerged that aim at protecting data. The Kensington Security Slot along with a locking cable provides physical security against thefts of opportunity. This is a cord that is attached to something heavy that cannot be moved, and is then locked into the case of the laptop, but this is not 100% secure.

Physical protection

Passwords provide a basic security measure for files stored on a laptop, though combined with disk encryption software they can reliably protect data against unauthorized access. Remote Laptop Security (RLS) is available to confidently secure data even when the laptop is not in the owner's possession. With Remote Laptop Security, the owner of a laptop can deny access rights to the stolen laptop from any computer with Internet access.

There are a number of tools available, both commercial and open source that enable a user to circumvent passwords for Windows, Mac OS X, and Linux. One example is TrueCrypt which allows users to create a virtual encrypted disk on their computer.[8]

Passwords are no longer adequate to protect laptops. There are many solutions that can improve the strength of a laptop's protection. Full disk encryption (FDE) is an increasingly popular and cost-effective approach. Full disk encryption can be taken on from a software-based approach, a hardware-based approach, or both - end-based approach. FDE provides protection before the operating system starts up with pre-boot authentication, however precautions still need to be taken against cold boot attacks.

Inside protection


  • Inside protection 1
  • Physical protection 2
  • Centralization of laptop data 3
  • Major laptop thefts 4
    • Common locations 4.1
  • See also 5
  • References 6
  • External links 7

Behling and Wood examined the issue of laptop security and theft. Their survey of employees in southern New England highlighted that not only were security measures fundamentally basic but that training employees in security measures was limited and inadequate. 100% of the surveyed employees had access to company information via a laptop from remote sites that included their own homes. 78% were authorised to store company data on their laptop. 36% of businesses did not provide security training. They concluded that trends in laptop thefts needed to be monitored to assess what intervention measures were required.[7]

Businesses have much to lose if an unencrypted or poorly secured laptop is misappropriated, yet many do not adequately assess this risk and take appropriate action. Loss of sensitive company information is of significant risk to all businesses and measures should be taken to adequately protect this data. A survey conducted in multiple countries suggested that employees are often careless or deliberately circumvent security procedures, which leads to the loss of the laptop. According to the survey, employees were most likely to lose a laptop while travelling at hotels, airports, rental cars, and conference events.[6]

In the 2011 Bureau Brief prepared by the NSW Bureau of Crime Statistics and Research it was reported that thefts of laptops have been on the increase over the last 10 years, attributed in part by an increase in ownership but also because they are an attractive proposition for thieves and opportunists. In 2001 2,907 laptops were stolen from New South Wales dwellings, but by 2010 this had risen to 6,492, second only to cash of items taken by thieves. The Bureau reports that one in four break-ins in 2010 resulted in a laptop being stolen. This startling trend in burglaries lends itself to an increase in identity theft and fraud due to the personal and financial information commonly found on laptops. These statistics do not take into account unreported losses so the figures could arguably be much higher.[5]

[4], 28% resulted from stolen laptops or other portable breaches Of the $48B lost from the U.S. economy as a result of [3]

This article was sourced from Creative Commons Attribution-ShareAlike License; additional terms may apply. World Heritage Encyclopedia content is assembled from numerous content providers, Open Access Publishing, and in compliance with The Fair Access to Science and Technology Research Act (FASTR), Wikimedia Foundation, Inc., Public Library of Science, The Encyclopedia of Life, Open Book Publishers (OBP), PubMed, U.S. National Library of Medicine, National Center for Biotechnology Information, U.S. National Library of Medicine, National Institutes of Health (NIH), U.S. Department of Health & Human Services, and, which sources content from all federal, state, local, tribal, and territorial government publication portals (.gov, .mil, .edu). Funding for and content contributors is made possible from the U.S. Congress, E-Government Act of 2002.
Crowd sourced content that is contributed to World Heritage Encyclopedia is peer reviewed and edited by our editorial staff to ensure quality scholarly research articles.
By using this site, you agree to the Terms of Use and Privacy Policy. World Heritage Encyclopedia™ is a registered trademark of the World Public Library Association, a non-profit organization.

Copyright © World Library Foundation. All rights reserved. eBooks from Project Gutenberg are sponsored by the World Library Foundation,
a 501c(4) Member's Support Non-Profit Organization, and is NOT affiliated with any governmental agency or department.