Top Education Theft Recoveries of 2015

Top Education Theft Recoveries of 2015

The education sector is filled with staff, faculty, students and their technology. Ever since there have been computers, laptops and tablets in classrooms, there have been companies providing safeguards for these devices.

We’ve seen many popular trends when it comes to the recovery of educational technology but perhaps at the forefront is the ability to locate the item regardless of its condition. Absolute Software Company has been embedding their Persistence technology into the core of these learning devices as a way to combat against the increasing incidents of theft and crime in educational institutions.

When the Persistence technology is activated, it can provide a two-way connection between an end user and their device. This often leads to the recovery of stolen items and, in some cases, the person and or student with it.

Below are Absolute’s most notable stories from their 2015 recovery investigations.

Runaway Student is Safe & Sound

A student who was having trouble at home and at school ran away, taking her school laptop with her. Her parents had no idea where the teenager was and were extremely worried. Working closely with local law enforcement, Absolute investigators were able to geolocate the school device which was still in the student’s possession. Police made contact with the girl to verify that she was safe and secure, and put her in touch with her parents.

Three Strikes & You’re Out

Three desktop computers and monitors – along with other electrical equipment – were stolen from a Florida school. The school reported the burglary to Absolute and an investigation began. Post-theft, and over the course of several days, each computer came on line via the same unauthorized user. After collecting enough information to determine the location and user identity, Absolute investigators handed over the evidence to the police. A search of the subject’s residence recovered all three devices along with other equipment for a fast and effective recovery.

A Greek Tragedy

A university laptop was stolen during a Greek Life event, a large fundraising initiative that supports homeless families. While everyone was working hard to raise money for the cause, one bad actor made off with a campus computer. The investigation took some time since the device only connected intermittently. But Absolute investigators were relentless and after close to a year, they were able to identify the unauthorized user, who turned out to be an employee at the venue where the event occurred. Local police used the evidence to charge the end user with felony theft, a fitting outcome for the thief and a positive result for the university.

Theft, Cross-State Recovery, Intervention

A student left a school laptop in their car much to the delight of a “lucky” thief who promptly broke into the vehicle and made off with the device. The high school reported the theft and Absolute investigators began monitoring the laptop on line. The computer moved from state to state, starting in Alabama where it was sold to an unsuspecting eBay buyer in Arizona who in turn sold it to an eBay buyer in Idaho. After much back and forth – and one refund – the computer ended up in the hands of a 12 year old girl. It was evident the young girl was in need of help given references she made to suicide, bullying, and self-harm. Local police contacted the family and the child was found to be unharmed. The device was recovered and the investigation into the original theft is ongoing.

About the Author

Sydny Shepard is the Executive Editor of Campus Security & Life Safety.

Featured

  • Report: 47 Percent of Security Service Providers Are Not Yet Using AI or Automation Tools

    Trackforce, a provider of security workforce management platforms, today announced the launch of its 2025 Physical Security Operations Benchmark Report, an industry-first study that benchmarks both private security service providers and corporate security teams side by side. Based on a survey of over 300 security professionals across the globe, the report provides a comprehensive look at the state of physical security operations. Read Now

    • Guard Services
  • Identity Governance at the Crossroads of Complexity and Scale

    Modern enterprises are grappling with an increasing number of identities, both human and machine, across an ever-growing number of systems. They must also deal with increased operational demands, including faster onboarding, more scalable models, and tighter security enforcement. Navigating these ever-growing challenges with speed and accuracy requires a new approach to identity governance that is built for the future enterprise. Read Now

  • Eagle Eye Networks Launches AI Camera Gun Detection

    Eagle Eye Networks, a provider of cloud video surveillance, recently introduced Eagle Eye Gun Detection, a new layer of protection for schools and businesses that works with existing security cameras and infrastructure. Eagle Eye Networks is the first to build gun detection into its platform. Read Now

  • Report: AI is Supercharging Old-School Cybercriminal Tactics

    AI isn’t just transforming how we work. It’s reshaping how cybercriminals attack, with threat actors exploiting AI to mass produce malicious code loaders, steal browser credentials and accelerate cloud attacks, according to a new report from Elastic. Read Now

  • Pragmatism, Productivity, and the Push for Accountability in 2025-2026

    Every year, the security industry debates whether artificial intelligence is a disruption, an enabler, or a distraction. By 2025, that conversation matured, where AI became a working dimension in physical identity and access management (PIAM) programs. Observations from 2025 highlight this turning point in AI’s role in access control and define how security leaders are being distinguished based on how they apply it. Read Now

New Products

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure.

  • FEP GameChanger

    FEP GameChanger

    Paige Datacom Solutions Introduces Important and Innovative Cabling Products GameChanger Cable, a proven and patented solution that significantly exceeds the reach of traditional category cable will now have a FEP/FEP construction.

  • Camden CM-221 Series Switches

    Camden CM-221 Series Switches

    Camden Door Controls is pleased to announce that, in response to soaring customer demand, it has expanded its range of ValueWave™ no-touch switches to include a narrow (slimline) version with manual override. This override button is designed to provide additional assurance that the request to exit switch will open a door, even if the no-touch sensor fails to operate. This new slimline switch also features a heavy gauge stainless steel faceplate, a red/green illuminated light ring, and is IP65 rated, making it ideal for indoor or outdoor use as part of an automatic door or access control system. ValueWave™ no-touch switches are designed for easy installation and trouble-free service in high traffic applications. In addition to this narrow version, the CM-221 & CM-222 Series switches are available in a range of other models with single and double gang heavy-gauge stainless steel faceplates and include illuminated light rings.