How your cars are stolen Technology hijacking in pictures
1) The classic method of robbery is shown in the movie "How to Steal a Million". A person who was outside the protected premises, threw a boomerang, which crossed the infrared rays used for protection. The alarm system generated alarms that the guards considered false. After a series of such "false" alarms, the alarm system was turned off, which enabled a person to penetrate unnoticed into the guarded premises. Often, the same principle is used for car theft. Cause the alarm to be triggered until the owner disconnects it. After that, in the absence of reliable blockers to steal a car is easy.
2) The hijacker's partners are trying to neutralize the owner of the car. At night, he may be detained by blocking the door of the entrance in which he lives outside. If the owner is in the store, partners can inform the hijacker about the owner’s actions and, if necessary, delay him at the exit from the store, which will enable the hijacker to escape.
3) The hijackers monitor the car owner and use his missteps. Typical oversights leading to car theft:
- forgot to turn on the alarm;
- I forgot to turn on the pager (if available) or did not change the batteries in it in time;
- for a long time moved away from the car beyond the limits of hearing the signals of a siren and a pager;
- I forgot the keys in the ignition (oddly enough, this sometimes happens if the doors are closed remotely using a key fob, and the key fob is worn separately from the keys).
4) In extreme cases, the hijacker may use force against the owner. There is a case in which the owner, trying to prevent his car from being hijacked, received a blow to the eye from the hijacker. As a result, a year of treatment and disability.
5) When meeting with the police, the hijacker tries:
- imitate an alcoholic: "... got into the car to finish a bottle of beer ...";
- to deny the fact of the hijacking, citing, for example, the "compelling" reasons: "... it was urgent to bring the medicine to a sick person. And of course, I would put the car back in place ...";
- pay off;
- run away (leave).
6) Cold-blooded actions of the hijackers, similar to the actions of the owner of the car, do not attract the attention of outsiders. However, the hijacker prefers to act away from knowledgeable witnesses - neighbors, relatives.
7) The necessary documents can be prepared in advance for the car to be stolen: power of attorney, technical passport, ticket of those. inspection.
8) Hijackers usually operate in groups with a clear distribution of functions. In case of unsuccessful attempt of theft and to ensure the ability to quickly escape, close to the place of the theft leave your car with the engine running and the driver.
9) Experienced hijackers determine the type of security system and suggest a way to overcome it. The direct performers of theft are often teenagers. In accordance with the current legislation, adolescents are less responsible for the crime committed in comparison with adults.
10) When “working” directly with the car, the hijackers try to disable the siren first, or at least drown it out for a while, for example, with the sound of a car setting up next to a damaged muffler, the pager signal is muffled by a powerful source of radio interference. Usually the siren and pager are disabled for a few seconds. The type of pager and its presence is determined by observation of the owner of the car or on the antenna glued to the windshield.
11) Penetration into the car. How does a car thief get into a car? Unfortunately, extremely simple. Doors and hood can be easily opened with master keys, of which there is a great variety. In this case, as a rule, the larvae of the locks are not affected. The easiest way to get into the cabin is to remove the rear window by cutting off the sealing gum or simply breaking the side window and opening the door.
12) Actions after penetration into the car.
Anti-theft latch on the steering column breaks out by hand. A tool made from high-strength steel, resembling a large screwdriver with a lever, can be used to break open the larvae of the ignition lock. For domestic cars this, in fact, is not required. The hijacker can disconnect the connector from the ignition switch and, by connecting the necessary wires or inserting a lock into the connector, try to start the engine. Few people know that the locks on the pedals are not a serious anti-theft tool, since the hijacker can leave without pressing either the gas or the clutch or the brake (!), Though not very quickly; or remove the lock, biting off the feet of the pedals. Descriptions of specific actions by hijackers to overcome some mechanical blockers are often published in periodicals and are an incentive for developers of anti-theft devices to improve their characteristics, leading to the creation of fundamentally new blockers (see section 7.3).
13) For most common car brands, a professional hijacker harvests a so-called “spider”. "Spider" is a bundle of wires, on the one hand ending with an ignition lock with a switch (in the case of electronic ignition), on the other - with crocodiles and special mortise clamps for "instant" connection. After opening the hood, the standard wiring, which ensures the movement of the car, is completely cut and a new one is installed. Harness "spider" is laid directly outside the car from under the hood in the cabin. The process takes 0.5 - 2.0 minutes (!). It is obvious that in this way almost any electronic anti-theft system is neutralized on cars that do not have complex computer control of engine operation.
14) Instead of a “spider,” the hijacker can use a high-frequency pulse generator that “causes” candles to spark all the time. In this case, the car goes bad, but still goes.
15) To eliminate the effect of anti-theft gas valve, which can be installed on the car, the hijacker cuts the gas line near the carburetor and connects its small tank with gasoline.
16) Not all hijackers are so professional as to prepare and use a “spider” or RF generator. But all the hijackers know that if all connectors are disconnected from the alarm control unit, then her work ends there. This is true for most of the separated alarms (i.e. alarms in which the control unit is separated from the siren). If you disconnect the connector from the monoblock alarm system (which consists entirely of one unit), the car will not start, but in this case connect certain wires in a bundle suitable for the monoblock, thereby removing the engine blockage. The blocking of systems with “armored” blocks, from which monochrome wires go, is somewhat more complicated. Here you need to unscrew a few screws - to open the unit - it becomes further clear which wires to connect (of course, if this issue has been previously worked out). Finding a place to install the unit does not take long - such places in domestic cars are two or three maximum. The search time is one to two minutes. Monoblock usually do not need to look - it is installed under the hood in a prominent place.
17) The hijacker can be armed with a scanner or a grabber - electronic devices that pick up the alarm code or record it at the moment when the owner of the car uses the key fob to turn off the alarm. That is, if the alarm can be scanned or grabbed, the hijacker becomes the owner of an electronic master key to disable it. A modern scanner (“police key”) and a grabber (more precisely, a radio signal recorder) are no larger than a pack of cigarettes and a reasonable price: $ 200 and $ 5,000, respectively.
18) The actions of the hijackers are non-standard and unpredictable, not only for the car owner, but also for an experienced alarm installer.
20) Hijacking with fishing line and sticks, shown in one of the TV shows. A fishing line with a length of 10 meters is tied to the axis of the car, at the end - a rod. The owner starts the car in the morning, passes a few meters until the line is wound on the axle, and suddenly he hears a knock. It turns out, without turning off the engine, and climbs under the car. The hijacker jumps into the car and drives away.
21) The hijacker may collude with an alarm installer, and some time after installation, quickly and quietly hijack a car. The simplest option is when the installer transfers keychains and the third key fob to the hijacker (if the alarm can “remember” more than 2 keyfobs).
22) The hijacker can steal keys and a key-ring from the owner and calmly leave.
23) The hijacker can make the keys to the ignition lock, using the lock of the lock shot on the eve of the fuel tank flap (many cars have a single key for all locks).
24) After the hijacking, the car is either quickly dismantled or defended. This checks for the presence of radio transmitting devices and turns off the power.
25) In case of unsuccessful attempted hijacking, an experienced hijacker leaves the car, leaving no marks, so as not to arouse suspicion of the owner. There is a known case of stopping the attempted hijacking of the VAZ-2109 after detecting the “Fort” castle installed on it; they did not try to remove the lock; the owner of the attempted theft did not find out.