At this point, I was basically set. I had his real name, proof that he’d taken it, his phone number — and I even knew exactly how he’d gotten it. Fine example of social engineering (used for good) at work! What an adventure! How I Recovered My Stolen iPad →