Skip to content

CAR Thieves Going High Tech – Universal Remote Device Unlocks Your CAR βš οΈπŸš˜βš οΈπŸš–βš οΈπŸš”βš οΈπŸš§

July 9, 2014

πŸš”βš οΈπŸš§ All over America, criminals are using improvised electronic devices to electronically unlock vehicles and steal whatever they find inside. These β€œmystery gadgets” reportedly recreate the same signals that the key fobs that so many of us carry around send out.

πŸš”βš οΈπŸš§ NEWS Footage is popping up nationwide of thieves using these β€œmystery gadgets” to remotely unlock car doors and disable alarm systems. Once a car has been unlocked, it takes these thieves just a few moments to take what they want before leaving without a trace.

πŸš”βš οΈπŸš§ Remote Control Car Hacking is now happening all over the country, and authorities presently don’t know a reasonable way to prevent this hacking from happening. For now, the most common piece of advice that police are giving to people is: Do not leave Valuables inside your vehicle, in your glove boxes, center consoles, item on ear seats, anywhere in your Car’s interior.

πŸš”βš οΈπŸš§ When reports of this sort of crime first came out, even car manufacturers were totally stumped. Nobody could figure out how this was happening, and CNN startled a lot of people when they started reporting on this. The following is an excerpt from one of those reports…

πŸš”βš οΈπŸš§ Police across the country are stumped by a rash of car thefts. In surveillance video of the thefts, criminals appear to open locked cars with a mysterious handheld device. Apparently nobody, including the car manufacturers knows how this device works to decode all remote wireless, Keyless FOBs, or where the device was fabricated.

πŸš”βš οΈπŸš§ In Long Beach, Calif. A man walked up to a car, and used a small hand-held remote control device to open the car. Right next to him across the same street another man, also using a “remote control” device opens that second car. The problem is they’re thieves without keys. Now they’ve swiped all valuables from the cars, leaving no signs damage of a traditional break-in.

πŸš”βš οΈπŸš§ In Chicago, it was the exact same scenario. A man by a sedan unlocked it without a key. The alarm was disabled by some mystery device. CNN reports that there is a New hand-held remote-control device that is capable of opening up KEYLESS CAR DOOR LOCKS.

πŸš”βš οΈπŸš§ Therefore Do not leave valuables visible in your Car. Until the police and the Auto Manufacturers distribute a fix, do not keep valuables in your car. This News broadcast originally aired in June 2013, the thieves remain active Opening Cars and taking valuables visible or in glove-boxes. The video-clip is displayed immediately below:


πŸš”βš οΈπŸš§ New Wireless Automotive FOB technology has thieves gaining entry into cars nationwide in a mysterious way. It even has car manufactures and auto theft experts stumped.

πŸš”βš οΈπŸš§ Technology built into passenger cars and SUVs has made a lot of things easier for drivers: parking, climate control, picking the music you want to listen to. But there is a downside: Cars can now apparently be hacked. That reality is getting a lot of attention this week in Las Vegas, where hackers, hacktivists and security researchers have all gathered for two annual computer security conferences:

πŸš”βš οΈπŸš§ Defcon and Black Hat Conference. Here’s NPR’s Steve Henn’s interviewss.

πŸš”βš οΈπŸš§ STEVE HENN, BYLINE: Chris Valasek and Charlie Miller have been hacking into products for a long time. But they don’t steal stuff or mess with peoples property. Instead, their purpose is to expose product weaknesses and thereby “pressure” companies into making their products more secure. And this week, Valasek an Miller scored big time, when their research on hacking cars made it onto the “Today” show. The following is an excerpt from an interview NPR with Chris Valasek and Charlie Miller:

UNIDENTIFIED MAN #1: Well, good morning. We’re back now with something to think about before you hop behind the wheel this morning of your car.

HENN: Miller and Valasek are not the first guys to hack a car, but they perhaps like no one who’s come before it, they demonstrated just how dangerous these kinds of attacks could be.

CHRIS VALASEK: And that’s really where Charlie and I came in.

HENN: Chris Valasek.

VALASEK: We really wanted to see, once someone was inside your car network, to what extent could you control the automobile?

HENN: They got a grant from DARPA, the Defense Advanced Projects Research Agency, and bought two modern, connected cars: a Toyota Prius and a Ford Escape. Then they physically plugged into the network of little computers built into these cars that run virtually everything.

VALASEK: Those are electronic control units.

HENN: The first of these little computers were used to replace carburetors, but soon, they were being used for lots of stuff: cruise control, antilock brakes.

VALASEK: And now we’re to the point where cars parallel park themselves. And that’s not just magic. There’s computers in the car that have censors and actuators.

HENN: And all these little devices talk to each other on an open network. They listen in to every message that’s sent. And they don’t verify where a specific command is coming from. Charlie Miller says all of this makes cars easy to attack.

CHARLIE MILLER: If I’m an attacker and I break into, say, your radio, I can send messages and say, hey, I’m the brakes, and I’m telling the engine to do this.

HENN: Any processor on the network is vulnerable, and that let Miller and Valasek create all kinds of havoc.

VALASEK: We were able to turn the wheel at high torque, jerky motions at high speeds. We were able to administer the brakes.

HENN: They could yank on the seatbelt, set off the horn, press the accelerator, turn off the engine.

MILLER: And I could make your brakes not work anymore.

HENN: That’s right: no brakes. And once, Charlie Miller forgot that that hack was running on his Ford Escape as he drove it into his garage.

VALASEK: Yeah, luckily, these weren’t our cars.

MILLER: My lawn mower, it was destroyed, utterly. So the lawn mower was, like, perhaps the first cyber-attack-in-a-car victim.

HENN: Miller and Valasek tried to share their findings with Toyota and Ford before they went public. Now, both companies say while they’re taking this research seriously, they’re still convinced their cars are safe. They say if someone has to physically wire a computer into your car to get this attack to work, you’re going to notice. But…

DON BAILEY: Well, I’ve actually been very disappointed with the reaction from these companies.

HENN: Don Bailey is a security researcher who’s hacked into cars remotely, using the cell phone network.

BAILEY: Once you are through that initial security barrier, you can and will be able to do almost anything you want to.

HENN: Now, before a hacker could really create havoc, he or she has to learn the specific code that each car uses to talk on its internal network. That’s tough. It takes time. But Chris Valasek says it’s not impossible.

VALASEK: Charlie and I hope by releasing all this information that more and more people will get interested.

HENN: And give car companies the little push they need to make some security improvements. Steve Henn, NPR News, Silicon Valley.

Pleased you’re reading, with over 56,500 readers world-wide, giving motivation as new topics are published every day. Spread the Word to your friends, family, and associates; Forward the link below, post it on Facebook, Twitter, LinkedIn, Social Networks for their review,, Anyone may subscribe, its secure and confidential; Every time I publish an article, WordPress will send you a reminder (no Ads of course) with a link to my new Story:

To learn more about what else we do, take a moment and visit these links, browse around. We are pleased with over 24,934,205 visits as of May 29, 2014:

Perspective: These articles are created to inform a diverse audience, whether it be photography, digital cameras, lenses, Image editing, Apps, Smartphones, iPads, iPhones, Laptops and related products, Health & Wellness, or any news-worthy topic. The purpose is to inform, from sources that are believed to be reliable, and stimulate Dialogue.

If digital Imaging is of interest, I teach a course named "Principles of Digital Imaging and Post Image Processing" as an Adjunct Prof at FAU:

When I do what I do… I usually do it here.

As a "Health Nut" for Health & Wellness;

As many of my friends, family and students know, I am an avid iPad adopter since its release April, 2010. With Apple’s release of the Retina-Display iPad Mini, (I sold my iPad 4 to applied the proceeds to purchase the "mini" with 128GB of Storage, AT&T connectivity, plus added Logitech’s UltraThin Keyboard Cover, and an ACME MADE San Francisco rubberized thin slip-over protective case. This thin package actually fits into my trousers pocket.

One Comment
  1. Remote Control Car Hacking is now happening all over the country, and authorities presently don’t know a reasonable way to prevent this …

Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

%d bloggers like this: