Suspects sought in computer theft

Police are soliciting for the general public’s assist in monitoring down two guys suspected of stealing a computer from a neighborhood electronics store.

The Colonial Heights Police Department said the 2 men entered the Best Buy within the seven-hundred block of Southpark Boulevard on Aug. 29. One man, dressed in a blue polo shirt and chino pants, picked up an Apple iMac computer. While a 2d guy, sporting a plaid blouse, mild-coloured pants and glasses, distracted a store employee, the primary guy carried the computer out of doors with out paying for it. The two men got into a dark SUV and left the region.

Anyone who can become aware of the suspects or has extra records is requested to call Chesterfield/Colonial Heights Crime Solvers at 804-748-0660 or send a tip thru the p3 app at p3tips.Com/699.

Image result for Suspects sought in computer theft

Now You See It, Now You Don’t: Preventing Laptop Computer Theft
When Irwin Jacobs, leader government and founder of Qualcomm Inc. Had his laptop stolen from a journalism convention in September 2000, it shed light on a growing hassle.

Other recent occasions have targeted countrywide interest at the computer protection problem, keep in mind the following:

o In July 2001 the Federal Bureau of Investigation stated that 184 laptops were stolen or misplaced. At least one and in all likelihood as many as four contained categorised statistics.

O In April 2001 the British Defense Ministry said 205 laptops lacking because 1997, maximum of which contained labeled materials.

O In February 2000 a laptop pc with “rather labeled” information disappeared from the U.S. State Department. Then, in May 2000 extra laptops had been said lacking from the U.S. State Department.

While generation has made laptops smaller, less difficult to keep and transport, it has also made them less complicated to conceal and thieve. It’s the convenience that has made the laptop laptop so famous and the information automobile of desire for enterprise human beings for the duration of the world.

.The pc itself is a treasured asset and one that need to be blanketed, but it may get replaced, but, the facts saved on it in many cases isn’t replaceable and of more value to competitors if compromised. A thief can get a few thousand greenbacks for a pinnacle of the road pc, but he can get an entire lot extra for a employer’s advertising and marketing plans.

High Risk Locations

A excessive percentage of laptops are stolen from the workplace. FBI officers estimate as a lot as 75 percentage of laptop thefts are committed through insiders, folks that are anticipated to be on the premises. For instance, employees, transport people and janitors all have access to the grounds and homes and have possibilities to thieve unprotected laptops.

Image result for Suspects sought in computer theft

In one case, Canadian authorities apprehended a man believed to have stolen 20 to 30 laptops from an workplace building over a span of a few weeks. The suspect could input the constructing dressed as a maintenance employee, load computer systems onto a dolly and exit the building. He done this ordinary so often, that constructing employees believed he was honestly a member of the renovation body of workers.

According to a USA Today article, heightened airport protection due to the September 11 terrorist attack has brought on an boom in the number of lost laptops at airport checkpoints. . The troubles stem from new procedures that require passengers to put off their laptops from their instances and positioned them thru x-ray machines. They both overlook to pick them up or snatch a stranger’s laptop by means of twist of fate. It turns into extra difficult for travelers who’re singled out for magnetic wand searches and may be separated from their valuables at the conveyor belt for extended durations of time.

Business travelers need to also pay near attention to their laptops when at the following places:


*Train Stations

*Bus terminals

*Car rental agencies

*Conference Centers




Always recall, computer theft can show up anywhere, at any time.

Laptop Theft Prevention Tips

Image result for Suspects sought in computer theft


o Disguise your laptop. By carrying your pc in a case designed for computer systems, you alert the thieves you’ve got a laptop. Carry your pc in an regular piece of luggage, satchel or another inconspicuous bag.

O Record the pc serial number, make and model information. Keep this statistics for your purse or pockets so if your laptop is stolen, the information might be without problems available whilst you document a police document.

O Never leave your computer unattended in a public vicinity.

O Use pc-locking cables to comfy the pc to a table or table

o Never region a laptop in checked baggage.

O If a computer needs to be left in the car, keep it within the trunk of the automobile previous to arriving on the final vacation spot.

O Identify your carrying case in a few uncommon ways to make it stand proud of all other bags. An uncommon color, colored tape or yarn or exceptionally massive or brightly colored tags attached to the bag will assist you right away discover the bag and give police probably motive to prevent and question the carrier.

O Also recollect taping colored paper or setting a huge tag at the front of your pc to keep away from unintentional blend-u.S. The x-ray device.

O Regularly again up facts and save it one by one in case your computer is stolen.


o All laptops need to be permanently marked or engraved with inventory or serial numbers if you want to the useful resource in recuperation if determined through the police. Check with the manufacturer regarding suitable marking locations and warranty criteria previous to marking.

O Conduct scheduled inventories of laptops periodically.

O Proper documentation ought to be maintained for all laptops. Records should encompass the form of system identifiers consisting of make, version, and inventory or serial numbers, a device project date, and the employee answerable for the computer.

O Some corporations make use of electronic asset monitoring technology. Employers can tag laptops with a small digital transponder. If an employee attempts to depart the building with the pc, the system facts the time, date and exit used. Some structures can also give security to the ID of the worker taking the gadget.

O Access to the region where laptops are stored while no longer assigned should be limited to a pick out few people.

O The confined access garage area needs to be located away from high visitors areas.

O Access ought to be managed to areas consisting of places of work in which employees utilize laptops. This can also be carried out via the use of ID card systems.

O Some groups have hooked up guidelines making employees chargeable for the loss of a computer if they do not observe company coverage for safeguarding it. Communicate the coverage in writing and get a signed statement of acknowledgment.

O Employers have additionally been acknowledged to require employees to purchase their laptops, reasoning that personnel will higher care for them.

O Provide employees with loss prevention and safety awareness training. E-mails, brown bag luncheons, new rent orientations safety focus literature/posters and video presentations are all exceptional automobiles for getting the word out.


Writer. Pop culture buff. Certified alcohol trailblazer. Tv nerd. Music fanatic. Professional problem solver. Explorer. Uniquely-equipped for working on Easter candy in Las Vegas, NV. Uniquely-equipped for analyzing toy monkeys for the government. Spent a year testing the market for action figures in Minneapolis, MN. Spent high school summers donating walnuts in Phoenix, AZ. Earned praised for my work researching human brains in Orlando, FL. Spent college summers writing about pubic lice in Washington, DC.