You are on page 1of 23

THEFT AWARE 2.

00
for Symbian

USER GUIDE
http://www.itagents.at
http://www.theftaware.com

by ITAgents interactive software solutions 2010. All rights reserved.


http://www.itagents.at; http://www.theftaware.com

Table of Contents
Theft Aware Executive Summary .................................................................................................................. 5
WHATS NEW IN VERSION 2.00.................................................................................................................. 5
THEFT AWARE BASICS ............................................................................................................................... 5
Unveil the Thiefs Identity ..................................................................................................................... 5
Send SMS Commands to the Phone ..................................................................................................... 5
Stealth Mode......................................................................................................................................... 6
Get Theft Aware 2.00 .................................................................................................................................... 7
DOWNLOAD AND/OR PURCHASE THEFT AWARE ..................................................................................... 7
Theft Aware Trial................................................................................................................................... 7
INSTALLATION PROCESS ........................................................................................................................... 7
Important Hint ...................................................................................................................................... 7
Use Theft Aware 2.00.................................................................................................................................... 8
NAVIGATE THE INTERFACES ...................................................................................................................... 8
SETTINGS INTERFACE ................................................................................................................................ 8
System ................................................................................................................................................... 8
Owner.................................................................................................................................................... 8
Access Code .......................................................................................................................................... 8
Notification 1 ........................................................................................................................................ 8
ADVANCED SETTINGS................................................................................................................................ 8
Notification 2 ........................................................................................................................................ 9
Allow SMS Commands .......................................................................................................................... 9
Phone Lock Behaviour........................................................................................................................... 9
Custom Lock Text .................................................................................................................................. 9
Siren When Locked ............................................................................................................................... 9
Siren Sound ........................................................................................................................................... 9
Send Contacts As................................................................................................................................... 9
SMS Map Type .................................................................................................................................... 10
Gps Query Timeout ............................................................................................................................. 10
SMS on Low Battery ............................................................................................................................ 10
HELP INTERFACE...................................................................................................................................... 11
by ITAgents interactive software solutions 2010. All rights reserved.
http://www.itagents.at; http://www.theftaware.com

SAVE THE SETTINGS ................................................................................................................................ 11


Stealth Mode....................................................................................................................................... 11
Visible Mode ....................................................................................................................................... 12
Access Configuration in Stealth Mode ................................................................................................ 12
Accept Another SIM Card.................................................................................................................... 13
LICENSING THEFT AWARE ....................................................................................................................... 13
Purchase License ................................................................................................................................. 14
Activate License .................................................................................................................................. 14
Consume Coupon ................................................................................................................................ 14
THEFT AWARE 2.00 SMS COMMANDS.................................................................................................... 15
Remote Command Authorization ....................................................................................................... 15
Lock the Mobile Phone ....................................................................................................................... 16
Unlock the Mobile Phone ................................................................................................................... 16
Turn Siren on Mobile Phone On.......................................................................................................... 16
Turn Siren on Mobile Phone Off ......................................................................................................... 16
Update Mobile Phone Information (One-Time) ................................................................................. 16
Initiate a Call ....................................................................................................................................... 17
Wipe the Phone .................................................................................................................................. 17
Back Up Important SMS ...................................................................................................................... 17
Back Up Contacts ................................................................................................................................ 18
Get Recent Log Entries ........................................................................................................................ 18
Change Theft Aware Configuration..................................................................................................... 19
Launch and Shut Down Configuration Interface ................................................................................. 20
Implement Own Remote Commands ................................................................................................. 21
USE THEFT AWARE ADVANCED OPTIONS ............................................................................................... 22
Disable and Enable Autostart.............................................................................................................. 22
Send Test SMS ..................................................................................................................................... 22
Simulate Theft Event ........................................................................................................................... 22
Simulate Lock ...................................................................................................................................... 22
Open or Delete Server Log File ........................................................................................................... 22
Open or Delete Client Log File ............................................................................................................ 22
Appendix A - Supported Phones ................................................................................................................. 23
by ITAgents interactive software solutions 2010. All rights reserved.
http://www.itagents.at; http://www.theftaware.com

Appendix B - Languages .............................................................................................................................. 23


Appendix C - Technical Support .................................................................................................................. 23
Appendix D Affiliate Program .................................................................................................................. 23

by ITAgents interactive software solutions 2010. All rights reserved.


http://www.itagents.at; http://www.theftaware.com

Theft Aware Executive Summary


Theft Aware provides data protection and theft recovery for smartphones. It enables you to control and
find your device in the event of loss or theft.
"A mobile phone gets stolen in the UK every 45 seconds. Thats nearly 800,000 handsets a
year." (uknetguide.co.uk)
"If your phone is stolen and a thief changes the SIM card, it usually is gone forever as the phone changes
its identity... Theft Aware enables you to stay in contact with your phone even after that event." (Reinhard
Holzner, CEO ITAgents)

WHATS NEW IN VERSION 2.00


Please find the news about Theft Aware 2.00 at http://www.theftaware.com/?step=whats_new.

THEFT AWARE BASICS


Unveil the Thiefs Identity
To enable communication to your phone you will register up to two notification numbers with Theft
Aware (i.e. friends of yours, or your second phone). Those friends will then receive all Theft Aware
messages for you. Now, if the thief changes the SIM card of the phone, Theft Aware will invisibly send
the phone number of the thief to those recipient numbers. By using the phone number of the thief you
can stay in contact with your phone.

The notification SMS contains:


-

Figure 1: Example of
Notification SMS

Phone number of the thief


Network specific information
GPS coordinates if available
Link to online map service

Contact the police to get your


phone back or remote control the
phone to protect your data.

Send SMS Commands to the Phone


Get the current location of your phone: If the phone has GPS built in and GPS data is available it will send
you its GPS coordinates. The updates also can be configured to be sent continuously.

by ITAgents interactive software solutions 2010. All rights reserved.


http://www.itagents.at; http://www.theftaware.com

Lock the phone: The device will not be usable by the thief anymore as the screen will be blocked by
Theft Aware. This option can also be set to be enabled automatically upon SIM card change.
Activate a loud siren sound: The phone will start to emit a loud siren sound that can only be turned off
again by an authorized user. You are even able to customize the siren sound by specifying own sound
files or by recording a customized siren sound.
Wipe the phone and erase all private data stored on it: Format the phone AND all memory cards to keep
your private data confidential.
Back up all your contacts: Before you wipe the phone you can backup your contacts, they will be
transmitted via SMS to the other device.
Back up SMS that are important to you: Just tell Theft Aware which SMS you want to rescue, they will be
forwarded to the other device.
Let the phone call you or other phone numbers: Your phone is able to phone independently upon SMS
command. The calls will be hidden as good as possible. This enables you to listen to what happens at the
other side of the line without anybody recognizing it.
Query Call or SMS protocol data: By sending a simple SMS command you can query call or SMS protocols
on the target phone.
Change Theft Aware settings: most of the settings of Theft Aware can be changed by SMS.
Remote command plugin interface: Implement your own SMS commands.
Stealth Mode
After theft, thiefs usually check the mobile phone for applications that could unveil their identity. Thiefs
will look for application icons, and will check the application manager as well as the application log. If
the thief is able to find suspicious traces it is very likely that the phone will be turned off and will be
subject to disposal. This usually results in the phone being lost forever.
All of the anti theft solution providers tried to solve this problem. But with their solutions it is either not
possible to change the tools configuration (e.g. uninstall is not possible) or the tool provides visible
traces to a thief causing all the consequences lined out above.
We cooperated with the device manufacturers and managed to create the perfect solution. Theft Aware
is also the only solution in the marketplace that will be completely invisible on the phone, in order to
give you the best chances to either catch the thief or get your device back.

by ITAgents interactive software solutions 2010. All rights reserved.


http://www.itagents.at; http://www.theftaware.com

Get Theft Aware 2.00


DOWNLOAD AND/OR PURCHASE THEFT AWARE
Theft Aware is available either via our website http://www.theftaware.com or via Nokias OVI store.
Theft Aware Trial
Note that at our website we also offer a trial version of Theft Aware that is not available at OVI store.

INSTALLATION PROCESS
After launching the installer process, it is straight forward to install Theft Aware. Please carefully read all
the texts provided during the installer process as they contain important information.
Important Hint
Once installed, Theft Aware will create two entries in the installed application list, one entry is called
Theft Aware and one is called Theft Aware Launcher.

Figure 2: Application List Entries

Always deinstall Theft Aware by deinstalling the Theft Aware package. This will automatically also
deinstall the Theft Aware Launcher package.

LAUNCH THEFT AWARE


Congratulations! At this point in time you got Theft Aware 2.00 successfully installed on your mobile
phone. Now, launch the Theft Aware program from within the application menu of your phone.

Figure 3: Theft Aware Icon

by ITAgents interactive software solutions 2010. All rights reserved.


http://www.itagents.at; http://www.theftaware.com

Use Theft Aware 2.00


NAVIGATE THE INTERFACES
To switch to the different Theft Aware interfaces, use the left and right keys. On touch phones tap the
tab arrows visible in the upper part of the screen. You can also use the Options Go to menu to access
the different interfaces that Theft Aware offers.

SETTINGS INTERFACE
When starting Theft Aware, the Settings Interface will be the first thing youll see. In order to setup
Theft Aware for active use you will have to specify the Theft Aware settings.
System
By using this option you can enable or disable the Theft Aware protection system. Note that no SMS
commands nor any theft protection will work if the system is disabled. Once the Theft Aware
protection is enabled, Theft Aware will be put to Stealth Mode automatically. In Stealth Mode Theft
Aware is completely invisible to any thief. If you disable the system Theft Aware will be switched to
Visible Mode again. Then Theft Aware can also be removed from the phone as usual.

BASIC SETTINGS
To setup Theft Aware for active use you HAVE TO specify the Theft Aware basic settings:
Owner
Please enter your name here.
Access Code
Enter your access code here. This access code is used to authorize access to the Theft Aware
configuration interface. Please do NOT forget your access code. You will not be able to reconfigure
Theft Aware without the access code. The standard access code is 0000. You have to change the access
code before you are allowed to activate the Theft Aware system.
Notification 1
Please enter an international phone number here. This could be the mobile number of one of your
friends. Any Theft Aware SMS will be sent to that phone number.

ADVANCED SETTINGS
The advanced settings are already optimally preconfigured and MAY be changed on demand:

by ITAgents interactive software solutions 2010. All rights reserved.


http://www.itagents.at; http://www.theftaware.com

Notification 2
You may enter a second phone number here. Copies of all Theft Aware SMS will be sent to that phone
number for safety.
Allow SMS Commands
Theft Aware enables you to remotely control the phone by using SMS commands. You can disable the
feature here. If you set the value to From Notification Numbers, SMS commands will only be accepted if
they are sent from one of the notification numbers given above. The option From All Numbers lifts that
restriction.
Phone Lock Behaviour
If this option is set to SIM Change, SMS Command the phone will be locked automatically upon SIM card
change or by SMS command. If the option is set to Only upon SMS Command, the phone can only be
locked by SMS command. The phone can also be unlocked by entering a valid access code in the lock
screen. The phone can ALWAYS be unlocked by restarting the phone using the original SIM card again
and entering a valid PIN code. You can also unlock the phone by entering the valid access code when the
lock screen is active.
Custom Lock Text
You may enter a custom text here, that will be shown on the screen if the phone is locked. If you give no
text here, a standard text will be shown.
Siren When Locked
If this option is enabled, every time the phone is locked a loud siren alarm sound will be played. The
siren sound will only stop if the phone is unlocked again. There is also a SMS command to start/stop the
siren.
Siren Sound
Theft Aware enables you to customize your siren sound. The option Select Sound File lets you select a
sound file from your phone. Also you can record a new sound sample by using the option Record Siren
Sound. Use the Play Siren Sound option to listen to the currently active siren. Use the Reset To Default
option to reset the siren sound to the original one delivered with Theft Aware.
Send Contacts As
Theft Aware enables you to send contacts from your phone to another one. Theft Aware is able to send
those contacts as Business Card or as standard text SMS. However, not all phones are able to handle the
Business Card format, thus they will not be able to receive the message. If your notification partner's
phone is not able to receive Business Card messages, set this option to Text SMS.

by ITAgents interactive software solutions 2010. All rights reserved.


http://www.itagents.at; http://www.theftaware.com

SMS Map Type


The Theft Aware notification SMS contains a link to view the location of your phone by using online map
services. This option lets you choose which online map service you want to use (Theft Aware, Google
Maps, Yahoo! Maps, Microsoft Bing Maps). Theft Aware Maps is new in 2.0 those maps links will
forward you to our servers for advanced mapping functionality (e.g. the link will also work on mobile
phones and provide cell ID position tracking if no GPS data was available).
Gps Query Timeout
Here you can set the timeout in minutes after which GPS location requests will be cancelled
automatically. Be careful when giving an unlimited timeout as then Theft Aware would potentially try
to get GPS location data forever.
Tracking on SIM Change
Continuous GPS tracking can be activated automatically once an unauthorized SIM is used in the phone.
Set the time interval for the updates here.
SMS on Low Battery
Set this option to Always to always receive notification SMS once the battery state of the phone is low.
Use Upon SIM Card Change to get those SMS only if an unknown SIM is present in the phone. A
notification means that the phone probably will go offline soon.

by ITAgents interactive software solutions 2010. All rights reserved.


http://www.itagents.at; http://www.theftaware.com

10

HELP INTERFACE
The help system also contains information about the system state:
Property
Net Available
Network
Cell ID
Country
Country Code
Area Code
IMSI
IMEI
Tracking
Internet
Remoting

Description
Indicates if a telephone network is available (Yes / No)
If a telephone network is available, gives the name of the telephone network
If a telephone network is available, gives the phone network cell identifier or the
network the phone is currently connected to
If a telephone network is available, this gives you the name of the country the phone
is currently located in
If a telephone network is available, this gives you a numeric representation of the
country the phone is currently located in
If a telephone network is available, gives the current area code
The IMSI (International Mobile Subscriber Identity) number is the world-wide unique
identifier of the SIM card inserted to your phone
The IMEI (International Mobile Equipment Identity) number (or serial number) is the
world-wide unique identifier of your mobile phone hardware
Indicates if location tracking data is available
Indicates if Internet Remote Control was configured correctly. For more details on
that check https://internet.theftaware.com

SAVE THE SETTINGS


Once you configured all the settings you need to save them. When quitting the program you will be
asked if you want to save the settings. You can also use the Options Save command to perform the
save action without quitting the application.
When saving the settings, Theft Aware will check if the Theft Aware protection system was disabled or
enabled. If it was enabled, Theft Aware will switch itself to Stealth Mode, if it was disabled, Theft Aware
will switch itself to Visible Mode. Note that the switch between the modes can take up to 30 seconds.
Stealth Mode
Stealth Mode is for sure the coolest feature in Theft Aware. No other company in the world is able to
provide this feature to you at this point in time.
Why is Stealth Mode Necessary?

After theft, thiefs usually check the mobile phone for applications that could unveil their identity. Thiefs
will look for application icons, and will check the application manager as well as the application log. If
the thief is able to find suspicious traces it is very likely that the phone will be turned off and will be
subject to disposal. This usually results in the phone being lost forever.

by ITAgents interactive software solutions 2010. All rights reserved.


http://www.itagents.at; http://www.theftaware.com

11

We cooperated with the device manufacturers and managed to create the perfect solution. Theft Aware
is also the only solution in the marketplace that will be completely invisible on the phone, in order to
give you the best chances to either catch the thief or get your device back.

Figure 4: Invisible In
Application Menu

Figure 5: Invisible In
Installed Applications List

Figure 6: Invisible In
Installation Protocol

Visible Mode
Why is Visible Mode Necessary?

We already described why Stealth Mode is necessary. But why the heck do we think you would need the
Visible Mode as well?
As you see above, there is no installed application entry visible on the phone in Stealth Mode. This
prevents you from uninstalling Theft Aware when you want to do that. This is the reason why Theft
Aware switches itself back to Visible Mode if you disable the theft protection. Then you can simply
uninstall the product again.

Figure 7: Visible In
Application Menu

Figure 8: Visible In
Installed Applications List

Access Configuration in Stealth Mode


In Stealth Mode it is not possible to start Theft Aware in the usual way because Theft Aware is invisible.
This brings up the next innovation that Theft Aware offer: the Theft Aware configuration interface can
by ITAgents interactive software solutions 2010. All rights reserved.
http://www.itagents.at; http://www.theftaware.com

12

be started by CALLING the ACCESS CODE. If your access code is set to 2222, just make a CALL to 2222.
The call will be cancelled immediately without any cost to you and the Theft Aware configuration
interface will start up within a few seconds.

Figure 9:
Typing 2222

Figure 10: The Phone


Is Calling

Theft Aware also takes care that no trace of the dialed access code is left in the phones call logs by
removing that call log entries immediately after the dialing process.
Accept Another SIM Card
By default, Theft Aware sends theft notification SMS as soon as your trusted SIM card is removed from
the phone and another one is inserted instead. However, from version 2.0 on you can trust more than
one SIM card. The currently inserted SIM card will be accepted every time you access and quit your
Theft Aware configuration interface.
To adjust Theft Aware to trust new SIM cards perform the following:
-

turn off the Theft Aware auto-lock feature if it is activated


turn off the phone
remove the old SIM card
insert the new SIM card
turn the phone on again
start the Theft Aware user interface
quit the Theft Aware user interface

At this point in time on Theft Aware will add the currently inserted SIM card to the trusted SIM card list.

LICENSING THEFT AWARE


If you install Theft Aware in the first place youll install the trial version. This trial version offers full
functionality but will disable itself after a certain time period. To continue using Theft Aware after your
trial period is over youll have to purchase a full license.

by ITAgents interactive software solutions 2010. All rights reserved.


http://www.itagents.at; http://www.theftaware.com

13

You can do that by surfing our website http://www.theftaware.com or by using the menu Licenses /
Coupons on the Theft Aware main settings menu. It offers you three options:
Purchase License
This option will forward you to our website for license purchase. Youll need this if you did not yet
purchase a license. You will be able to pay for your license by using PayPal or bank transfer.
Once you completed the license purchase, you will continue using the option Activate License from the
same menu (see below).
Activate License
This option will check our servers for your purchased license and will convert your trial version into the
unlimited version of Theft Aware. You can also use this option if you had to re-setup your phone and you
want to activate another copy of Theft Aware using a license purchased before.
Note that this process needs internet access on the phone. If you have NO internet access, please
contact support@theftaware.com and well help you activating the license without internet access.
Consume Coupon
If you purchased or received a coupon code granting you a free license for Theft Aware, youll not have
to purchase and activate the license as described above. Just select this option and enter your coupon
code and your email address. After consuming the coupon youre all set and Theft Aware will be
converted to a full version automatically.

by ITAgents interactive software solutions 2010. All rights reserved.


http://www.itagents.at; http://www.theftaware.com

14

THEFT AWARE 2.00 SMS COMMANDS


Theft Aware can be remotely controlled by using simple SMS commands. For this, the System and Allow
SMS Commands properties in the Settings Interface need to be enabled. Please refer to chapter Settings
Interface for details on that.
If the option Allow SMS Commands is set to From Notification Numbers, SMS commands are only
accepted if their sender phone number that matches one of the notification numbers configured. All
SMS commands sent from other numbers are ignored. Please refer to chapter Settings Interface for
details on that.
An properly authorized remote SMS command will not cause any ring tone, signal, ambient light
activation or other indication of SMS arrival on the target phone. Also the SMS will not be visible in the
SMS inbox of the target phone. SMS replies sent back to you by Theft Aware also will not cause any
attention when being sent and are not stored in the SMS outbox of the target phone.
Remote Command Authorization
All SMS commands must begin with your Theft Aware access code. For example, if the access code is set
to 2222, a lock command should look like this:

Figure 11: All SMS Start


With The Access Code

If the access code does not match, the command is ignored and the SMS will be forwarded to the
normal SMS inbox on the phone, triggering all SMS arrival notifications.

by ITAgents interactive software solutions 2010. All rights reserved.


http://www.itagents.at; http://www.theftaware.com

15

Lock the Mobile Phone


This command will lock the mobile phone. It then will not be possible to perform any actions on the
phone anymore. Note that this will drag attention of the thief upon Theft Aware. The phone can be
unlocked by
a) sending the UNLOCK SMS command,
b) entering the valid access code while the lock screen is active or
c) restarting the phone using the TRUSTED SIM card and entering a valid PIN code.
While the lock screen is active, it is possible to dial emergency calls to the numbers 112, 991 and 999.
SMS command: LOCK
Sample: 2222 LOCK
Unlock the Mobile Phone
This command will unlock the mobile phone again.
SMS command: UNLOCK
Sample: 2222 UNLOCK
Turn Siren on Mobile Phone On
This command will activate the phone siren. Note that this will drag attention of the thief upon Theft
Aware.
SMS command: SIREN ON
Sample: 2222 SIREN ON
You can stop the siren by sending the SIREN OFF command. The siren can also ALWAYS be stopped by
disabling the Theft Aware system or by restarting the phone using the original SIM card again and
entering a valid PIN code.
Turn Siren on Mobile Phone Off
This command will deactivate the phone siren.
SMS command: SIREN OFF
Sample: 2222 SIREN OFF
Update Mobile Phone Information (One-Time)
This command will cause Theft Aware to send a theft notification SMS to the sender number of the
remote command SMS, containing up-to-date data about your mobile phone.
SMS command: UPDATE
Sample: 2222 UPDATE
by ITAgents interactive software solutions 2010. All rights reserved.
http://www.itagents.at; http://www.theftaware.com

16

Update Mobile Phone Information (Continuous)


A special version of the UPDATE command lets you get continuous notification updates.
SMS command: UPDATE <interval duration in minutes>
Sample: 2222 UPDATE 60
Description: Will send you phone notification data every <interval> minutes
You can stop the updates by sending the UPDATE STOP command. Updates can also ALWAYS be
stopped by disabling the Theft Aware system.
Initiate a Call
This command will cause the mobile phone to initiate a a phone call. By using this command you can
listen to what happens on the other side of the line. The call will be hidden as much as possible.
SMS command: CALL [phone number]
Sample: 2222 CALL, 2222 CALL +4355003938833
If [phone number] is not specified, the target phone will call back the sender number of the remote
control SMS. If [phone number] is specified, the target phone will call the given phone number.
Wipe the Phone
This command will cause removal of all data on the target phone. It will also erase all data from memory
cards1. Consequently, also the Theft Aware application will be removed by this command and will not be
available anymore after the wipe process. The data can NOT be restored!
SMS command: WIPE
Sample: 2222 WIPE
Back Up Important SMS
This command will cause Theft Aware to forward SMS messages stored on the target phone to you. By
using this command you can rescue SMS that are important to you, even when the phone is lost or
stolen.
SMS command: GET <query limit> SMS
Sample: 2222 GET 5 SMS
Description: Will forward the newest SMS stored in the Inbox and Sent Folders. The query limit is
mandatory. A maximum of <query-limit> messages will be transmitted.
SMS command: GET <query limit> INBOX SMS
Sample: 2222 GET 5 INBOX SMS
Description: Will forward the newest SMS stored in the Inbox Folder. The query limit is mandatory. A
maximum of <query-limit> messages will be transmitted.
1

Memory card formatting is not supported on Nokia N-Series devices due to hardware restrictions

by ITAgents interactive software solutions 2010. All rights reserved.


http://www.itagents.at; http://www.theftaware.com

17

SMS command: GET <query limit> SENT SMS


Sample: 2222 GET 5 SENT SMS
Description: Will forward the newest SMS stored in the Sent Folder. The query limit is mandatory. A
maximum of <query-limit> messages will be transmitted.
SMS command: GET <query limit> SMS FOR xxxxxxxxxxx
Sample: 2222 GET 5 SMS FOR 436502111555
Description: Will forward the newest SMS stored in the Inbox and Sent Folders which are related to the
given phone number. The query limit is mandatory. A maximum of <query-limit> messages will be
transmitted.
SMS command: GET <query limit> INBOX SMS FOR xxxxxxxxxxx
Sample: 2222 GET 5 INBOX SMS FOR 436502111555,
Description: Will forward the newest SMS stored in the Inbox Folder which are related to the given
phone number. The query limit is mandatory. A maximum of <query-limit> messages will be
transmitted.
SMS command: GET <query limit> SENT SMS FOR xxxxxxxxxxx
Sample: 2222 GET 5 SENT SMS FOR 436502111555
Description: Will forward the newest SMS stored in the Sent Folder which are related to the given phone
number. The query limit is mandatory. A maximum of <query-limit> messages will be transmitted.
Back Up Contacts
This command will cause Theft Aware to forward all phone book contacts stored on the target phone to
you. The contacts are forwarded as SMS one by one. Depending on the Send Contacts As setting the
contacts will be forwarded in Business Card format or standard text format. Please refer to chapter
Settings Interface for details on that setting.
Please note that a Business Card-message contains more information than the standard text message.
The text message only contains the name, the phone number and optionally the email address of the
contact.
SMS command: GET CONTACTS
Samples: 2222 GET CONTACTS, 2222 get contacts
Description: Will forward all contacts stored on the phone to you
Get Recent Log Entries
This command will allow you to query the call and SMS events that happened on your phone.
SMS command: GET LOG <query limit>
Sample: 2222 GET LOG 10
Description: Will forward the last <query limit> call and SMS log entries. The query limit is mandatory.
Each call or SMS event will be forwarded as one SMS. Call events will be forwarded containing the
related phone number and the call duration in seconds. SMS events will be forwarded containing the
related phone number and a short version of the message text.
by ITAgents interactive software solutions 2010. All rights reserved.
http://www.itagents.at; http://www.theftaware.com

18

Change Theft Aware Configuration


This group of commands lets you change the Theft Aware configuration parameters.
SMS command: SET OWNER <name of owner>
Sample: 2222 SET OWNER Charles Chaplin
Description: Will set the owner entry of Theft Aware to <name of owner>
SMS command: SET CODE <access code>
Sample: 2222 SET CODE 3333
Description: Will set the access code of Theft Aware to <access code>. You will need to provide a code of
4-6 digits.
SMS command: SET NOTIFICATION 1 <notification 1>
Sample: 2222 SET NOTIFICATION 1 +43660122220192
Description: Will set the first notification number of Theft Aware to <notification 1>. You will need to
provide a valid mobile phone number. Both notification numbers are not allowed to be empty at the
same time.
SMS command: SET NOTIFICATION 2 <notification 2>
Sample: 2222 SET NOTIFICATION 2 +43660122220192
Description: Will set the second notification number of Theft Aware to <notification 2>. You will need to
provide a valid mobile phone number. Both notification numbers are not allowed to be empty at the
same time.
SMS command: SET LOCK <lock mode>
Sample: 2222 SET LOCK 1
Description: Will set Theft Awares autolock mode. If <lock mode> is 0, the phone will only be locked
upon SMS command. If <lock mode> is 1, the phone will be locked automatically upon SIM card change
or by SMS command.
SMS command: SET TEXT <lock text>
Sample: 2222 SET TEXT Please call me back at +4313283483
Description: Will set the Theft Aware custom lock text.
SMS command: SET SMS <SMS mode>
Sample: 2222 SET SMS 1
Caution: By using this command you could disable SMS remote control completely and this will render
the Theft Aware SMS remote control feature useless.
Description: Will set Theft Awares SMS configuration. If <SMS mode> is 0, no SMS commands will be
accepted by the phone anymore. If <SMS mode> is 1, only SMS commands coming from notification
numbers will be processed. Set <SMS mode> to 2 to accept SMS commands from all phones.
SMS command: SET SIREN <siren mode>
Sample: 2222 SET SIREN 1
Description: Will set Theft Awares siren mode. If <siren mode> is 0, no siren will be started upon phone
lock. If <siren mode> is 1, a siren will automatically be started if the phone gets locked.
by ITAgents interactive software solutions 2010. All rights reserved.
http://www.itagents.at; http://www.theftaware.com

19

SMS command: SET VCARD <vcard mode>


Sample: 2222 SET VCARD 1
Description: Will set Theft Awares VCard mode. If <vcard mode> is 0, Theft Aware will send contact SMS
as standard text SMS. If <vcard mode> is 1, Theft Aware will use the proprietary VCard format to send
contact SMS.
SMS command: SET MAPTYPE <map type>
Sample: 2222 SET MAPTYPE 2
Description: Will set Theft Awares map type setting. If <map type> is 0, map links will be sent working
with the new advanced Theft Aware Maps. If <map type> is 1, map links will be sent working with
Google Maps. If <map type> is 2, map links will be sent working with Yahoo! Maps. If <map type> is 3,
map links will be sent working with Microsoft Bing Maps.
SMS command: SET BATTERY <battery SMS mode>
Sample: 2222 SET BATTERY 1
Description: Will set Theft Awares battery mode setting. If <battery SMS mode> is 0, no SMS will be
sent on low battery state. If <battery SMS mode> is 1, Theft Aware will send notification SMS upon low
battery state ALWAYS. If <battery SMS mode> is 2, the notification is only sent if an unknown SIM is
present in the phone.
SMS command: SET GPS TIMEOUT <GPS timeout>
Sample: 2222 SET GPS TIMEOUT 1
Description: Will set Theft Awares GPS timeout setting. If <GPS timeout> is 0, no GPS timeout will be
set. If <GPS timeout> is 1, a timeout of 1 minute will be set for GPS queries. If <GPS timeout> is 2, a
timeout of 2 minutes will be set for GPS queries. If <GPS timeout> is 3, a timeout of 5 minutes will be set
for GPS queries. If <GPS timeout> is 4, a timeout of 10 minutes will be set for GPS queries.
SMS command: SET TRACKING <time interval>
Sample: 2222 SET TRACKING 1
Description: Here you can set if you want to automatically receive continuous GPS updates whenever an
untrusted SIM is inserted into the phone. Set <time interval> to 0 to disable the functionality. Set <time
interval> to 1 to get an update every hour. Set <time interval> to 2 to get an update every 2 hours. Set
<time interval> to 3 to get an update every 5 hours. Set <time interval> to 4 to get an update every 24
hours.
SMS command: SET SYSTEM <System mode>
Sample: 2222 SET SYSTEM 0
Caution: By using this command you will completely disable the Theft Aware system thus rendering
the Theft Aware protection useless.
Description: Will set Theft Awares system enabled setting. Set <System mode> to 0 to disable Theft
Aware and make it visible again.
Launch and Shut Down Configuration Interface
SMS command: LAUNCH or SHUTDOWN
Sample: 2222 LAUNCH
Description: Will launch or shut down the Theft Aware configuration interface via SMS.
by ITAgents interactive software solutions 2010. All rights reserved.
http://www.itagents.at; http://www.theftaware.com

20

Implement Own Remote Commands


Theft Aware is able to launch any programs on the phone and pass arguments to the launched program
via command line. The program file has to be located in the directory C:\sys\bin.
SMS command: <NAME OF EXE FILE WITHOUT EXE EXTENSION> <ARGUMENTS>
Sample: 2222 MY_FILE Test will start C:\sys\bin\MY_FILE.exe and pass the phone number of the
caller plus Test as command line (eg. +436601222222 Test).
There is also an SDK package available that enables you to use several data and service interfaces of
Theft Aware. Apply for the SDK package by contacting reinhard@itagents.at.
Have fun publishing apps based on this. Tell us and we will promote it for you! Suggestions for
enhancing the interface go to reinhard@itagents.at.

by ITAgents interactive software solutions 2010. All rights reserved.


http://www.itagents.at; http://www.theftaware.com

21

USE THEFT AWARE ADVANCED OPTIONS


The Theft Aware advanced options offer some special options to enable/disable the Theft Aware
autostart feature and to do some diagnostic tests.
You can access the Theft Aware advanced options menu at Options Advanced.
Disable and Enable Autostart
Only available in Visible Mode. Disabling the Theft Aware autostart feature is NOT RECOMMENDED.
To disable or enable the Theft Aware autostart feature, use the Disable Autostart or Enable Autostart
menu entry. If autostart is disabled, no theft protection is available at all.
Send Test SMS
This will test if the SMS sending facility on the phone is working correctly. It will send invisible test SMS
to all given notification numbers.
Simulate Theft Event
This will simulate a theft event. This means that if everything works correctly, Theft Aware will send
theft notifications to all given notification numbers. This can take some time as during that operation
Theft Aware will also query GPS location data.
Simulate Lock
This will simulate the LOCK SMS command. Note: On success this will lock the phone for 10 seconds.
Open or Delete Server Log File
This option is used for support diagnostics. Here you can show or delete the current log messages of the
Theft Aware server component.
Open or Delete Client Log File
This option is used for support diagnostics. Here you can show or delete the current log messages of the
Theft Aware client component.

by ITAgents interactive software solutions 2010. All rights reserved.


http://www.itagents.at; http://www.theftaware.com

22

Appendix A - Supported Phones


The Symbian version of Theft Aware currently supports all Nokia devices running on:
-

S60 3rd Edition FP1


S60 3rd Edition FP2
S60 5th Edition
Symbian^3

Theft Aware is also available for Android phones. Please visit http://www.theftaware.com for further
details on this.

Appendix B - Languages
The Symbian version of Theft Aware is available in the following languages:
-

English
German
Simplified Chinese

Appendix C - Technical Support


You can reach our technical support by sending an email to support@theftaware.com. We handle
customer emails between 09:00 - 18:00 CET (GMT +1). We will try to take care of your problem and
respond to you within one business day.

Appendix D Affiliate Program


Do you want to earn money by becoming an affiliate of ITAgents interactive software solutions? Then
please visit http://partners.itagents.at or http://partners.theftaware.com and register yourself.

by ITAgents interactive software solutions 2010. All rights reserved.


http://www.itagents.at; http://www.theftaware.com

23

You might also like