Unfortunately, many people do not change the default factory passwords on their cameras after installing them.

Stolen webcam-77Stolen webcam-87Stolen webcam-43

But any corroborating evidence available to help police get on the right track is useful (I know this from prior experience).

@stevewood I've seen Prey mentioned in other similar discussions (many times, in fact) and I fiddled with the free version, which doesn't let me take webcam pictures (at least, not as far as I could figure out).

You can use the free version which limits the number of machines to like 3 or 4, but it works.

@talkingmoose Duly noted - very ware of the fact that, in all likelihood, the user of the system is someone who unwittingly purchased it from the thief.

So I cobbled together the following script that, once you push imagesnap to the remote system's /usr/local/bin directory, can take a picture and upload it to a FTP server: #!

/bin/sh # This script will take a picture using the laptop's default camera device, save it to # the /tmp directory, upload the image to a FTP server and then delete the picture itself.

I was able to recover the machine because the guy who had it happened to have Google Maps open and getting directions to some place when Prey snapped the desktop.

That and the pic of the guy were enough evidence for the police.

# /usr/local/bin/imagesnap - The webcam's light comes on for 1-2 seconds as the pic is taken (unavoidable) but all you need is a few shots to get what you need.