Ever wonder, How can you Track your Stolen Smartphone, Laptop or any Smart Device?
...With IMEI Number?
...Or IP address?
...Or may be some special types of equipment?
...Or IP address?
...Or may be some special types of equipment?
Well, Not required, because now it is possible to track stolen devices just by scanning their MAC addresses.
Yes, Just MAC addresses, which is assigned to each device on a unique
basis by the IEEE, but crooks can modify it in an attempt to hide the
origin of the stolen device.
But given the people's practice to never notice the MAC address of their
mobile phone, tablet, laptop, desktop, smart TV, smart refrigerator, or
broadband router, MAC addresses can be used to track stolen
electronics.
This exactly is what an Iowa City cop wants to do.
How Police Can Track Stolen Devices?
According to Gazette, an Iowa police officer David Schwindt has Developed
a sniffing software that helps police find more stolen properties.
The software, Schwindt dubbed L8NT (short for Latent analysis of 802.11 Network Traffic),
is a specialized wireless dongle with a suitable antenna that scans for
and locates MAC addresses associated with the known stolen devices.
When L8NT is running, the software is channel hopping through the 2.4 GHz and/or 5 GHz bands and receiving packets.
The MAC addresses of the stolen devices can be stored in the L8NT
database. Depending on the situation, MAC addresses are easily
identifiable.
How does 'L8NT' Work?
When L8NT is running, the software is channel hopping through the 2.4 GHz and/or 5 GHz bands and receiving packets.
The source and destination MAC addresses are stripped out of the MAC
address header of each packet and compared to the known stolen MAC
addresses in the database.
Orginally posted by hackers News
If the particular MAC address is not in the L8NT database, it is ignored. But if there is a match, the L8NT user is notified.
By switching to a directional antenna, and using the signal strength
meter in L8NT, the user can follow the signal back to the physical
device.
However, the stolen devices should have wireless networking capability (Wi-Fi) turned on. If the device Wi-Fi is turned off or is powered down, the device is not going to be visible.
Intelligence Agencies Used Similiar Technology to Spy
Leaked NSA documents last year revealed that…
Under the "Passengers tracking operation", the Canadian spy agency was tracking
passengers
even days after they left the airport terminal just by capturing their
device MAC addresses from the free Wi-Fi service at a major Canadian
airport.
The documents also revealed that the federal intelligence agency was
collecting MAC addresses in the United States Airports as well, and
literally at other thousands of public places in the U.S.
Laws and L8NT
The traditional method used by law enforcement for recovering lost or
stolen devices is to physically examine the device to obtain the model
and serial number.
"However, physical examination of most devices is extremely difficult because of Constitutional search and seizure issues,"."In most cases, law enforcement is only able to create a report of the theft for insurance purposes."
Schwindt promises that L8NT does not record any personal or sensitive
information from the device, while it only scans for contraband MAC
addresses.
The officer has developed a proof-of-concept software, but hopes to patent L8NT and will apply for a full patent this fall.
Sign up here with your email
ConversionConversion EmoticonEmoticon