Skip to main content

Thief forced to pay nearly $10K for stolen laptop data

stolen-laptop
Image used with permission by copyright holder

During April 2008, Michael J. Birkeland decided it would be a brilliant idea to steal a laptop computer from a Utah Valley University classroom. The laptop belonged to Perry Stewart, an art professor at UVU. Stewart primarily used the laptop for lectures, thus his coursework and presentations were stored on the computer. Two days later, the computer was recovered from Birkeland, but all of Stewart’s files had been erased. Birkeland admitted to the crime and pleaded no contest to theft, a class A misdemeanor.

Hard disk-drive recoveryStewart attempted to recover the deleted data and was able to regain access to over 27,000 files by using a recovery service. The recovered files were usable, but required approximately 350 hours to organize and rename the files. In addition, Stewart was forced to recreate over 100 PowerPoint presentations for lectures that were unable to be recovered. The state estimated that each presentation required six hours to create and totaled out Stewart’s entire recovery time at 950 hours.

Recommended Videos

Based on Stewart’s recovery time, the state argued that Birkeland should provide financial restitution in the amount of $47,500 ($50 an hour for time spent recovering files). Birkeland opposed the ruling on the grounds that the misdemeanor charge had a limit of $1,000 in damages and Stewart would be getting paid anyway due to the salary structure of the position. After listening to both arguments, the district court ruled against Birkeland’s misdemeanor claim, but adjusted financial restitution to the amount of time spent beyond the salaried position at the university. Birkeland was ordered to pay for 25 percent of the 950 hours at a rate of $41 an hour, a total of $9,758.

Birkeland appealed the ruling, but judges Carolyn McHugh and Stephen Roth found Birkeland’s admission of guilt more than enough justification to uphold the financial award. They also believed that deletion of the files was intended to allow Birkeland to sell the laptop quickly on a third party service like Craigslist or eBay.

Mike Flacy
By day, I'm the content and social media manager for High-Def Digest, Steve's Digicams and The CheckOut on Ben's Bargains…
This gorgeous Mac mini hub exacerbates the power button placement problem
M4 Mac mini with Satechi hub on a desk.

Satechi, known for its high-quality tech accessories, is updating its Mac mini hub for the new M4 model. Like previous hubs, it allows Mac mini owners to expand their storage and ports while preserving airflow, wireless signal, and performance. It looks awesome, but this time, the design highlights the problematic nature of the new Mac mini's placement of its power button.

With previous Mac mini models, the power button was at the back, making it easily accessible even when it was in a Satechi hub. The new button placement on the bottom of the PC, however, may prove even more annoying for anyone who wants to buy this accessory.

Read more
Proton VPN vs. Mullvad: Which is the best open-source VPN?
Proton VPN Plus and Mullvad websites appear in a split-screen on a PC monitor.

Open-source software is exploding in popularity and even virtual private networks (VPNs) share code for transparency. With over 100 million open-source developers contributing to the community, there’s an improved chance to find bugs and patch vulnerabilities.

Proton VPN and Mullvad are among the best VPNs available, and both are open-source solutions. You can browse the code used in Proton VPN and Mullvad on GitHub to check that there isn’t any secret logging or undisclosed data collection.

Read more
Some older D-Link routers are vulnerable to attack
D-Link Omna 180 Cam HD

A few legacy D-Link routers can be vulnerable to Remote Code Execution (RCE) attacks since the company refuses to send any updates to patch them up, claiming they have reached end-of-life, as recently posted on its announcement page.

The vulnerability is a serious issue since it allows hackers to take control from anywhere in the world and use a stack buffer overflow. This attack sends more data than the buffer size can handle, potentially corrupting critical information like the return address. Thus, hackers can take control of your PC. However, the company did not detail how the threat works, possibly not informing the hackers too much about the issue.

Read more