How iCloud Helped To Identify An iPhone Thief - InformationWeek

InformationWeek is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

IoT
IoT
Mobile // Mobile Devices
News
5/22/2012
08:12 PM
Connect Directly
Twitter
RSS
E-Mail
50%
50%

How iCloud Helped To Identify An iPhone Thief

Via iCloud's automatic back-up feature, an iPhone user discovers that her phone's thief works for Disney

Do you ever wonder what happens to stolen iPhones? A month after having her iPhone stolen, Katy McCaffrey's photos started appearing in her iCloud account. She then uploaded an album called Stolen iPhone Adventures to Facebook.

"It was stolen on board the Disney Wonder cruiseline back in April," McCaffrey wrote in one comment. "His [the thief's] photos are just making it into my photo stream."

McCaffrey also wrote: "I have alerted the officials of the Disney Cruise Line and forwarded them the photos. Hopefully I'll get my phone back and maybe some free passes to Disneyland."

Free passes to Disneyland? Ha, at least McCaffrey has a sense of humor about this whole ordeal.

McCaffrey introduced the alleged Disney iPhone thief as Nelson, after zooming in on his name tag:

A source close to McCaffrey said that she had iCloud automatic backup set up on her phone, so she was able to get the photos that had been taken with her iPhone.

McCaffrey was lucky she had photo evidence that happened to show up in her photostream. If she had an app that could remotely wipe a phone, it would have been more secure. And, wait a minute, didn't she have that phone password protected?

This serves as a great reminder to IT pros chartered with allowing BYOD, but that protecting corporate assets is important given that iPhones are great targets for thieves. And that it's also smart to use MDM solutions that allow those IT pros to remotely manage any IT assets that might be on smartphones.

I recently did a story on five apps that you should have download on your phone in case it is lost or stolen.

Imagine if the personal device that you bring to work (or a work phone) is stolen. If you have work email or other confidential information on your phone, it could compromise corporate strategy.

Better to be safe than sorry, right?

We welcome your comments on this topic on our social media channels, or [contact us directly] with questions about the site.
Comment  | 
Print  | 
More Insights
Slideshows
Reflections on Tech in 2019
James M. Connolly, Editorial Director, InformationWeek and Network Computing,  12/9/2019
Slideshows
What Digital Transformation Is (And Isn't)
Cynthia Harvey, Freelance Journalist, InformationWeek,  12/4/2019
Commentary
Watch Out for New Barriers to Faster Software Development
Lisa Morgan, Freelance Writer,  12/3/2019
White Papers
Register for InformationWeek Newsletters
Video
Current Issue
The Cloud Gets Ready for the 20's
This IT Trend Report explores how cloud computing is being shaped for the next phase in its maturation. It will help enterprise IT decision makers and business leaders understand some of the key trends reflected emerging cloud concepts and technologies, and in enterprise cloud usage patterns. Get it today!
Slideshows
Flash Poll