High-technology devices are now used to hijack cars
The recently released crime stats in South Africa show how car hijacking has increased in recent years. ALSO READ: LIST: Vehicles that are mostly targeted in hijackings in South Africa THIEVES GETTING HIGH-TECH DEVICES FOR HIJACKINGS The number of reported hijacking cases since the start of 2023 has slowed compared to a bleak year in 2022, […]
The recently released crime stats in South Africa show how car hijacking has increased in recent years.
THIEVES GETTING HIGH-TECH DEVICES FOR HIJACKINGS
The number of reported hijacking cases since the start of 2023 has slowed compared to a bleak year in 2022, hijackings are still on a high in South Africa.
Surprisingly, thieves are increasingly using high-tech tools to target weaknesses in the same sensors and computerised systems that were designed to help make our journeys safer and more comfortable.
This means that the same sensors, computers and data aggregation systems are what criminals now use to hijack cars.
ALSO READ: Tips: How to protect yourself from cholera
The convenience offered by the keyless entry system (KES), is one such example.
KES enables drivers to passively lock, unlock, start and stop the engine by simply carrying the key fob along with its integrated signal transmitter.
The basic function of the system is for the car to detect the signal from the Free On Board (FOB) key system.
HERE IS HOW THIEVES GET SMART WITH THESE DEVICES
If the signal is strong enough, generally when the fob key is within one metre of the car, it will unlock and allow the engine to start, usually using a push-button system.
Hijackers on the KES typically use a method of amplifying and relaying the signal from the fob keys to the car. This “tricks” the car’s system into thinking that the fob is within one metre, and the system disarms.
Owners can attempt to prevent these attacks by storing their fob keys in “Faraday pouches” when not in use. These pouches have conductive fibres in their lining that disrupt radio signals.
It’s also worth noting that the computers in our cars’ multiple Electronic Control Modules (ECMs) manage everything in the car.
All of these ECMs are programmed with large volumes of computer code, which, unfortunately, can contain vulnerabilities.
This hijacks can appear to be an instance of pointless vandalism at first. However, when the car disappears, it becomes clear that the damage had actually been part of a sophisticated car theft operation.
In this instance, car thieves removed the front bumper of the car to access the headlight assembly. This was done to access the ECU, which controls the lights.
This in turn allowed access to the widely used Controller Area Network (CAN bus). The CAN bus is the main interface designed to allow ECUs to communicate with each other.