Skip to main content

Airline traveler uses Craigslist to track down laptop thief

Baggage_Claim
Image used with permission by copyright holder

When Ambre Boroughs checked her laptop bag before getting on a Southwest flight at the Chicago Midway International Airport, she was likely unaware that many airlines strongly recommend taking the laptop was a carry-on during the flight. Unfortunately, she was missing her brand new HP 9000 laptop after searching an empty laptop bag that came off the conveyor belt in Charleston, South Carolina according to NBC Chicago. After asking a Southwest representative for help, Boroughs was informed that the company wasn’t responsible for the loss of checked computers. A further TSA investigation showed video footage of the laptop still in the case when traveling through the security checkpoint.

hp_9000While somewhat demoralized, Boroughs was determined to track down the laptop thief. After waking up the following morning, Boroughs started searching the Chicago section of Craigslist for the term “HP 9000” and continued to refresh the search every 30 minutes. After approximately 12 hours, she located a post for a HP 9000 laptop that displayed evidence of her ownership. Boroughs recognized a logo sticker on the laptop for a small punk rock group that’s based out of South Carolina which also happened to be tattooed on her wrist. She texted and called the person that created the post to find out if the laptop was still available and stumbled on the fact that this person had multiple models for sale.

Recommended Videos

Boroughs immediately alerted the Chicago police about the laptop post. The police went to the location described in the post and arrested three people that had eleven additional stolen laptops in their possession as well as a variety of portable electronics. While the alleged thieves didn’t work for Southwest, at least one of them had access to luggage moving from the Southwest terminal to the airplane. After the police returned the HP 9000 laptop to Boroughs, she discovered that the thief had completely wiped all her personal data from the computer including documents and photos.

Mike Flacy
By day, I'm the content and social media manager for High-Def Digest, Steve's Digicams and The CheckOut on Ben's Bargains…
This gorgeous Mac mini hub exacerbates the power button placement problem
M4 Mac mini with Satechi hub on a desk.

Satechi, known for its high-quality tech accessories, is updating its Mac mini hub for the new M4 model. Like previous hubs, it allows Mac mini owners to expand their storage and ports while preserving airflow, wireless signal, and performance. It looks awesome, but this time, the design highlights the problematic nature of the new Mac mini's placement of its power button.

With previous Mac mini models, the power button was at the back, making it easily accessible even when it was in a Satechi hub. The new button placement on the bottom of the PC, however, may prove even more annoying for anyone who wants to buy this accessory.

Read more
Proton VPN vs. Mullvad: Which is the best open-source VPN?
Proton VPN Plus and Mullvad websites appear in a split-screen on a PC monitor.

Open-source software is exploding in popularity and even virtual private networks (VPNs) share code for transparency. With over 100 million open-source developers contributing to the community, there’s an improved chance to find bugs and patch vulnerabilities.

Proton VPN and Mullvad are among the best VPNs available, and both are open-source solutions. You can browse the code used in Proton VPN and Mullvad on GitHub to check that there isn’t any secret logging or undisclosed data collection.

Read more
Some older D-Link routers are vulnerable to attack
D-Link Omna 180 Cam HD

A few legacy D-Link routers can be vulnerable to Remote Code Execution (RCE) attacks since the company refuses to send any updates to patch them up, claiming they have reached end-of-life, as recently posted on its announcement page.

The vulnerability is a serious issue since it allows hackers to take control from anywhere in the world and use a stack buffer overflow. This attack sends more data than the buffer size can handle, potentially corrupting critical information like the return address. Thus, hackers can take control of your PC. However, the company did not detail how the threat works, possibly not informing the hackers too much about the issue.

Read more