skip navigation


Register for Latest Research

Stay Informed
Register with NCJRS to receive NCJRS's biweekly e-newsletter JUSTINFO and additional periodic emails from NCJRS and the NCJRS federal sponsors that highlight the latest research published or sponsored by the Office of Justice Programs.

NCJRS Abstract

The document referenced below is part of the NCJRS Virtual Library collection. To conduct further searches of the collection, visit the Virtual Library. See the Obtain Documents page for direction on how to access resources online, via mail, through interlibrary loans, or in a local library.


NCJ Number: 183852 Add to Shopping cart Find in a Library
Title: Restricting Computer Theft
Journal: Law and Order  Volume:48  Issue:5  Dated:May 2000  Pages:43-45
Author(s): Alan Harman
Editor(s): Bruce Cameron
Date Published: May 2000
Page Count: 3
Sponsoring Agency: NCJRS Photocopy Services
Rockville, MD 20849-6000
Sale Source: NCJRS Photocopy Services
Box 6000
Rockville, MD 20849-6000
United States of America
Type: Report (Technical)
Format: Article
Language: English
Country: United States of America
Annotation: Computer theft is on the rise, costing businesses more than $1 billion a year in hardware loss and another $15 billion in intellectual property loss.
Abstract: Research indicates that about 75 percent of computer theft is committed by employees or contractors, that about 53 percent of all corporate theft involves computer theft, and that about 57 percent of network break-ins are committed using stolen personal computers (PCs). Absolute Software has developed a recovery system is undetectable and tamper-proof. The software program embedded in computers, uses advanced technology to routinely call into the CompuTrace Monitoring Center in Vancouver, Canada. This center tracks the status and location of every CompuTrace-equipped PC, obtaining information through a unique electronic serial number. If a computer is reported lost or stolen, CompuTrace begins a specific monitoring program to look for a signal from the stolen item. Once a computer is linked to the Internet after being stolen, recovery service officers then trace the stolen computer to the telephone number from which it is calling. Simply knowing the location of a stolen computer, however, does not guarantee a recovery. A search warrant is required to allow police to search the location. Absolute Software has developed educational programs to help police officers understand its program. Company officials report a 90 percent recovery rate because the company's recovery team has professionals who know both recovery and police procedures. 1 photograph
Main Term(s): Police crime-prevention
Index Term(s): Business crime costs; Computer crime prevention measures; Computer privacy and security; Computer related crime; Computer software; Police computer training; Science and Technology; Theft offenses
To cite this abstract, use the following link:

*A link to the full-text document is provided whenever possible. For documents not available online, a link to the publisher's website is provided. Tell us how you use the NCJRS Library and Abstracts Database - send us your feedback.