Theft Detection Software Helps Find Kids Too

Yes, theft technology can be a dandy tool for ensuring that a stolen computer gets returned to its rightful owner. But Absolute Software has also found itself involved in tracking down kids as well, who need other kinds of help.

Absolute uses a proprietary technology it calls "Persistence" that is added to devices — computers, tablets and smartphones — at the factory. When Persistence is activated, it provides a two-way connection that enables school personnel to freeze the device and remotely recover or delete data from it. When the device is stolen or misplaced, the same program can also be used by Absolute's investigations team to determine the device's location; then the team works with law enforcement agencies to attempt to recover the machine.

This week the company released a shortlist of its "most compelling" theft investigations from 2015 for education customers. Sometimes it's not just the device that needs help. Among the investigations tackled last year, is the story of a troubled student who ran away from home while at school one day, taking her school laptop with her. Absolute investigators worked with the local police to "geolocate" the device, which the student still had. The police made contact with the girl to ensure her safety and put her in touch with her family.

In another situation, a student left a school laptop exposed in a car, and it was heisted by a thief. When the high school reported the theft, Absolute began its monitoring process and watched as the device was sold in a series of online sales and "moved from state to state," from Alabama to Arizona to Idaho. Eventually, the computer ended up with a 12-year-old, who was making references to suicide, self-harm and bullying in her online communications. Absolute notified local police of the girl's location; the police contacted her family. She was found to be unharmed, and the device was recovered.

In a more mundane  —  but still satisfying  —  recovery story, a Florida school theft resulted in the loss of three desktop computers and monitors and other equipment. An Absolute investigation was started. Over the next several days, each of the computers came online. The recovery team established the location and user identity, information that was handed over to the police. They searched the suspect's home and found all three computers along with other equipment.

According to Absolute, the company conducted "more than 5,700 investigations" in 2015.

Among its K-12 customers are Auburn-Washburn Unified School District 437 in Kansas, Baltimore City Public Schools and Val Verde Unified School District in California.

About the Author

Dian Schaffhauser is a former senior contributing editor for 1105 Media's education publications THE Journal, Campus Technology and Spaces4Learning.

Featured

  • teen studying with smartphone and laptop

    OpenAI Developing Teen Version of ChatGPT with Parental Controls

    OpenAI has announced it is developing a separate version of ChatGPT for teenagers and will use an age-prediction system to steer users under 18 away from the standard product, as U.S. lawmakers and regulators intensify scrutiny of chatbot risks to minors.

  • robot brain with various technology and business icons

    Google Cloud Study: Early Agentic AI Adopters See Better ROI

    Google Cloud has released its second annual ROI of AI study, finding that 52% of enterprise organizations now deploy AI agents in production environments. The comprehensive survey of 3,466 senior leaders across 24 countries highlights the emergence of a distinct group of "agentic AI early adopters" who are achieving measurably higher returns on their AI investments.

  • conceptual graph of rising AI adoption

    AI Adoption Rising, but Trust Gap Limits Impact

    A recent global study by IDC and SAS found that while the adoption of artificial intelligence continues to expand rapidly across industries, a misalignment between perceived trust in AI systems and their actual trustworthiness is limiting business returns.

  • laptop displaying a network map with connected blue nodes and red warning icons

    Report Identifies Surge in Credential͏͏ Theft͏͏ and͏͏ Data Breaches͏͏

    A recent report from cybersecurity company Flashpoint Cyber͏͏ detected an escalation of threat activity across͏͏ multiple͏͏ fronts͏͏ during͏͏ the͏͏ first͏͏ half͏͏ of͏͏ 2025.