recovering stolen computers and laptops omari grant danlil perelshteyn advisor : dr. s. masoud...
TRANSCRIPT
![Page 1: Recovering Stolen Computers and Laptops Omari Grant Danlil Perelshteyn Advisor : Dr. S. Masoud Sadjadi School of Computing and Information Sciences Florida](https://reader035.vdocument.in/reader035/viewer/2022062421/56649db65503460f94aa7f95/html5/thumbnails/1.jpg)
Recovering Stolen Computers and Laptops
Omari Grant
Danlil Perelshteyn
Advisor : Dr. S. Masoud SadjadiSchool of Computing and Information Sciences
Florida International University
Your [email protected]
http://www.cs.fiu.edu/~sadjadi/
![Page 2: Recovering Stolen Computers and Laptops Omari Grant Danlil Perelshteyn Advisor : Dr. S. Masoud Sadjadi School of Computing and Information Sciences Florida](https://reader035.vdocument.in/reader035/viewer/2022062421/56649db65503460f94aa7f95/html5/thumbnails/2.jpg)
Agenda
Problem and Motivation
Solution
Behind the Scene
Customizing the Solution
Disclaimer
Progress Report
![Page 3: Recovering Stolen Computers and Laptops Omari Grant Danlil Perelshteyn Advisor : Dr. S. Masoud Sadjadi School of Computing and Information Sciences Florida](https://reader035.vdocument.in/reader035/viewer/2022062421/56649db65503460f94aa7f95/html5/thumbnails/3.jpg)
Problem and Motivation:
Laptop theft is a very common problem. Specifically we will focus on the FIU environment where the school has experienced a rash of laptop thefts particularly Mac.
![Page 4: Recovering Stolen Computers and Laptops Omari Grant Danlil Perelshteyn Advisor : Dr. S. Masoud Sadjadi School of Computing and Information Sciences Florida](https://reader035.vdocument.in/reader035/viewer/2022062421/56649db65503460f94aa7f95/html5/thumbnails/4.jpg)
Fig 1.1
![Page 5: Recovering Stolen Computers and Laptops Omari Grant Danlil Perelshteyn Advisor : Dr. S. Masoud Sadjadi School of Computing and Information Sciences Florida](https://reader035.vdocument.in/reader035/viewer/2022062421/56649db65503460f94aa7f95/html5/thumbnails/5.jpg)
Solution
We will use the following agent procedures Camera Picture Capture and a few additional procedures to aid in an effort to recover stolen laptops.
![Page 6: Recovering Stolen Computers and Laptops Omari Grant Danlil Perelshteyn Advisor : Dr. S. Masoud Sadjadi School of Computing and Information Sciences Florida](https://reader035.vdocument.in/reader035/viewer/2022062421/56649db65503460f94aa7f95/html5/thumbnails/6.jpg)
Fig 2.1
![Page 7: Recovering Stolen Computers and Laptops Omari Grant Danlil Perelshteyn Advisor : Dr. S. Masoud Sadjadi School of Computing and Information Sciences Florida](https://reader035.vdocument.in/reader035/viewer/2022062421/56649db65503460f94aa7f95/html5/thumbnails/7.jpg)
Behind the Scene
Capture camera uses the port “isightcapture” to turn the web camera on silently behind the scenes and take pictures of the user and stores the pictures in the Kserver.
![Page 8: Recovering Stolen Computers and Laptops Omari Grant Danlil Perelshteyn Advisor : Dr. S. Masoud Sadjadi School of Computing and Information Sciences Florida](https://reader035.vdocument.in/reader035/viewer/2022062421/56649db65503460f94aa7f95/html5/thumbnails/8.jpg)
Fig 3.1
http://www.theage.com.au/digital-life/computers/sprung-by-facebook-geek-justice-for-pornsurfing-laptop-thief-20090812-ehpa.html
![Page 9: Recovering Stolen Computers and Laptops Omari Grant Danlil Perelshteyn Advisor : Dr. S. Masoud Sadjadi School of Computing and Information Sciences Florida](https://reader035.vdocument.in/reader035/viewer/2022062421/56649db65503460f94aa7f95/html5/thumbnails/9.jpg)
Customizing the Solution
There is a lot of room for customization with this project and ideas such as expanding our range….
Include PCs in recovery
Running a script to check to see what platform the computer is before implementing any script.
Running a script to check if the computer has a webcam.
![Page 10: Recovering Stolen Computers and Laptops Omari Grant Danlil Perelshteyn Advisor : Dr. S. Masoud Sadjadi School of Computing and Information Sciences Florida](https://reader035.vdocument.in/reader035/viewer/2022062421/56649db65503460f94aa7f95/html5/thumbnails/10.jpg)
Disclaimer
The agents procedures are attended to work with Mac and requires the computer already have Kaseya already installed
If the computer does not have OS X or a webcamera some of the procedure will not work.
![Page 11: Recovering Stolen Computers and Laptops Omari Grant Danlil Perelshteyn Advisor : Dr. S. Masoud Sadjadi School of Computing and Information Sciences Florida](https://reader035.vdocument.in/reader035/viewer/2022062421/56649db65503460f94aa7f95/html5/thumbnails/11.jpg)
Progress Report
We understand how the solution works in the environment but we are still researching and brain storming the best way to implement these procedures into the current environment.
We have tested a few of the procedures but not all of the procedures have been tested so not all of them can be guaranteed to work.