How police tracked down Steve Jobs' stolen iPads
Digital breadcrumbs left by the iMac and iPad computers were key in tracking them down
IDG News Service - The digital breadcrumbs left behind when people use Internet-connected gadgets are what led California investigators to recover iMacs, iPads and other items stolen from the home of the late Apple CEO Steve Jobs.
Based on the police report, obtained by the IDG News Service, here's how they did it.
The burglary took place while the Jobs family home, in a leafy and quiet area of Palo Alto, was being renovated and was unoccupied. Sometime between the construction crew leaving the site at 5:00 p.m. on Tuesday, July 17, and arriving just before 8:00 a.m. the next morning, someone entered the house and stole several personal effects and Apple gadgets.
Within several days, the Palo Alto Police Department had enlisted the help of the Rapid Enforcement Allied Computer Team, a San Jose-based organization formed by local, state and federal law enforcement agencies that specializes in computer-related crimes. Local police wanted assistance tracking down the Apple computers and iPads that were reported stolen from the house.
The REACT team reached out to Apple's own investigators, who had access to the company's computer systems, and supplied them with a list of serial numbers of stolen devices. Apple was quickly able to determine that one of the stolen iPads had connected with Apple's servers soon after the burglary.
The iPad was trying to reinstall its operating system and was recorded connecting from an AT&T U-verse Internet IP address from 7:22 a.m. to 7:31 a.m. on July 18, the morning after the house was broken into and minutes before the returning construction workers would discover the break-in.
Upon searching logs for the IP address, Apple investigators discovered a different iPad had connected from the same address at 8:10 a.m. on July 17, before the burglary took place, and again at 1:56 p.m. on July 20, after the break-in was reported to police. That iPad wasn't suspected stolen, but the iTunes account information gave investigators a lead.
Tied with information from AT&T U-verse about the Internet connection, investigators were led to an address in Alameda, on the east side of San Francisco Bay. At that address Kariem McFarlin, the suspect in the case, was paying for AT&T Internet service, according to investigators.
While police were building their case there was more activity on the stolen devices.
Over a five day period, Apple investigators recorded activity on McFarlin's iTunes account linked to the iPad that originally connected to restore its operating system, a second iPad stolen from the Jobs' home and an iMac computer that was also missing, according to police. One of the iPads later connected from a Comcast Internet connection in Alameda using a different iTunes account.
- 10 Hot Big Data Startups to Watch
- 11 Unique Uses for Google Glass, Demonstrated by Celebs
- How to Export Your Google Reader Account
- How to Better Engage Millennials (and Why They Aren't Really so Different)
- Telltale signs of ATM skimming
- 20 security and privacy apps for Androids and iPhones
- Big screen con artists: 7 great movies about social engineering
Today, many government agencies – civilian and defense – find themselves in a technology quandary: the volume of data that must be stored is growing rapidly, while shrinking budgets are limiting capital expenditures (i.e. – servers, storage devices, etc.) required to store all of this data.
- IT Certification Study Tips
- Register for this Computerworld Insider Study Tip guide and gain access to hundreds of premium content articles, cheat sheets, product reviews and more.
- Federal IT Innovation Caught in a Catch-22
- Fed resources shoring up old infrastructure, holding back new technologies.
- Top Three Reasons Why Customers Deploy EMC VNX with EMC VPLEX
- What if you could build a cost effective, continuously available storage infrastructure? Learn the top reasons users are deploying EMC VNX with EMC...
- Clearing the Clouds for Midmarket Businesses
- The 10-point checklist included in this expert brief has been developed to help small and midsize businesses select the cloud model and cloud...
- Perforce Case Study
- Learn how EMC cost-effectively transformed their infrastructure and improved storage performance by 60% by unifying storage, deploying virtualization and leveraging Flash to meet...
- Data Center Transformation: Balancing user demands with IT mandates
- There's a flood of user requirements, computing trends, and new technologies driving the need for you to look closely at your IT infrastructure. All Government IT White Papers
- Virtustream (Vayence) video taking a 3000-Seat SAP Environment to the Cloud
- How can public cloud services help your organization reduce costs and increase security for your mission
- Williams & Fudge on Transforming IT with EMC
- Watch Williams & Fudge Data Center Director Phillip Reynolds discuss why this accounts receivable management firm turned to EMC.
- The Success Network: Driving Business Forward
- The communications and connectivity infrastructure of your organization is the focus of this KnowledgeVault Exchange, sponsored by Comcast Business.
- Advanced Voice Solutions for Your Business
- How can hosted business class voice services help mid-sized business be more agile, competitive and ready for growth?
- Bring Mobile Innovation to your Enterprise.
- With the mobility revolution well underway, CIO's and Line of Business owners are faced with the struggle to develop a winning mobile strategy. All Government IT Webcasts