Retrotechtacular: Mobile Phones 1940s Style

We think of the mobile phone — well, what we would call a cell phone — as something fairly modern. Many of us can still remember when using a ham radio phone patch from your parked car would have people staring and murmuring. But it turns out in the late 1940s, Bell Telephone offered Mobile Telephone Service (MTS). It was expensive and didn’t work as well as what we have now, but it did let you make or receive calls from your automobile. After the break, you can see a promotional film about MTS.

The service rolled out in St. Louis in the middle of 1946. The 80-pound radios went in the trunk with a remote handset wired to the dashboard. At first, there were only 3 channels but later Bell added 29 more to keep up with demand. An operator connected incoming and outbound calls and if three other people were using their mobile phones, you were out of luck.

Continue reading “Retrotechtacular: Mobile Phones 1940s Style”

Ask Hackaday: Does Your Car Need An Internet Killswitch?

Back in the good old days of carburetors and distributors, the game was all about busting door locks and hotwiring the ignition to boost a car. Technology rose up to combat this, you may remember the immobilizer systems that added a chip to the ignition key without which the vehicle could not be started. But alongside antitheft security advances, modern vehicles gained an array of electronic controls covering everything from the entertainment system to steering and brakes. Combine this with Bluetooth, WiFi, and cellular connectivity — it’s unlikely you can purchase a vehicle today without at least one of these built in — and the attack surface has grown far beyond the physical bounds of bumpers and crumple zones surrounding the driver.

Cyberattackers can now compromise vehicles from the comfort of their own homes. This can range from the mundane, like reading location data from the navigation system to more nefarious exploits capable of putting motorists at risk. It raises the question — what can be done to protect these vehicles from unscrupulous types? How can we give the user ultimate control over who has access to the data network that snakes throughout their vehicle? One possible solution I’m looking at today is the addition of internet killswitches.

Continue reading “Ask Hackaday: Does Your Car Need An Internet Killswitch?”

A Virtual Tour Of The B-17

The Boeing B-17 “Flying Fortress” is arguably the most recognizable aircraft of the Second World War. Made infamous by the daring daylight strategic bombing runs they carried out over Germany, more than 12,000 of these four-engined bombers were produced between 1939 and 1945. Thanks to the plane’s renowned survivability in battle, approximately 60% of them made it through the war and returned home to the United States, only to be rounded up in so-called “boneyards” where they were ultimately cut up and sold as scrap. Today there are fewer than 50 intact Boeing B-17s left in the world, and of those, only 11 remain airworthy.

One of them is Nine-O-Nine, a B-17G built in April 7, 1945. This particular aircraft was built too late to see any combat, although in the 1950s she was fitted with various instruments and exposed to three separate nuclear blasts for research purposes. It’s actually not the real Nine-O-Nine either, the original was scrapped after it completed eighteen bombing runs over Berlin. Without a combat record of its own, this bomber was painted to look like the real Nine-O-Nine in honor of its incredible service record of never losing a crewman.

Since 1986, Nine-O-Nine has been owned by the Collings Foundation, who operate her as a living history exhibit. The bomber flies around the United States with an entourage of similarly iconic WWII aircraft as part of the Wings of Freedom Tour, stopping by various airports and giving the public a chance to climb aboard and see the pinnacle of mid-1940s strategic bombing technology. History buffs with suitably deep pockets can even book a seat on one of the scheduled 30-minute flights that take place at every stop on the Tour.

I was lucky enough to have the The Wings of Freedom Tour pass through my area recently, and couldn’t pass up the opportunity to experience this incredible aircraft first hand. The fact that I’m equal parts a coward and miser kept me from taking a ride aboard the 74 year old Nine-O-Nine, at least for now, but I made sure to take plenty of pictures from inside this lovingly restored B-17G while it was safely on the ground.

Continue reading “A Virtual Tour Of The B-17”

Vintage Car Radio Now Plays Games And Chiptunes

[MisterM] seems to specialize in squeezing new electronics into old but good-looking technology. His latest creation focuses on a space-age specimen: an interesting car radio from 1963 that could be pulled out from the dashboard and taken along wherever. The beat goes on, thanks to a shiny built-in speaker on the bottom.

He replaced the non-working radio guts with a Raspberry Pi 3 running RetroPie and a Picade controller board. A Pimoroni Blinkt LED strip behind the radio dial glows a different color for each emulated console, which we think is a nice touch. [MisterM] built this console to play in his workshop, and even made a dock for it. But in a lovely homage to the original radio, it’s self-contained and can be taken to the living room or to a friend’s house. There’s also a USB port for whenever player two is ready to enter. For [MisterM]’s next trick, he’ll be converting an 80s joystick.

We love that [MisterM] repurposed the dials as housings for start and select buttons. As he points out, this keeps them out of the way while he’s wildly working the controls. Just enter the Konami Code to unlock the build video below.

Do you dream of playing Donkey Kong absolutely everywhere? Check out the ultraportable mintyPi 2.0.

Continue reading “Vintage Car Radio Now Plays Games And Chiptunes”

Developing An Automatic Tool For CAN Bus Hacking

In the old days, a physical button or switch on the dashboard of your car would have been wired to whatever device it was controlling. There was potentially a relay in the mix, but still, it wasn’t too hard to follow wires through the harness and figure out where they were going. But today, that concept is increasingly becoming a quaint memory.

Assuming your modern car even has physical buttons, pushing one of them likely sends a message over the CAN bus that the recipient device will (hopefully) respond to. Knowing how intimidating this can be to work with, [TJ Bruno] has been working on some software that promises to make working with CAN bus user interfaces faster and easier. Ultimately, he hopes that his tool will allow users to rapidly integrate custom hardware into their vehicle without having to drill a hole in the dashboard for a physical control.

But if you’re the kind of person who doesn’t like to have things done for them (a safe bet, since you’re reading Hackaday), don’t worry. [TJ] starts off his write-up with an overview of how you can read and parse CAN messages on the Arduino with the MCP2515 chip. He breaks his sample Sketch down line by line explaining how it all works so that even if you’ve never touched an Arduino before, you should be able to get the gist of what’s going on.

As it turns out, reading messages on the CAN bus and acting on them is fairly straightforward. The tricky part is figuring out what you’re looking for. That’s where the code [TJ] is working on comes in. Rather than having to manually examine all the messages passing through the network and trying to ascertain what they correspond to, his program listens while the user repeatedly presses the button they want to identify. With enough samples, the code can home in on the proper CAN ID automatically.

The upside to all this is that you can activate aftermarket functions or hardware with your vehicle’s existing controls. Need an example? Check out the forward-looking camera that [TJ] added to his his 2017 Chevy Cruze using the same techniques.

Continue reading “Developing An Automatic Tool For CAN Bus Hacking”

A Baseball Cap That Films The Past

The vast majority of cameras will start recording at the press of a button. This is perfectly acceptable behaviour if you wish to film something that hasn’t happened yet. If you want to film something that’s already over, you’re out of luck. [Johan Link] has built a camera designed to do just that, however, and put it on a cap.

The project consists of a Raspberry Pi 3B, combined with a 1080p USB webcam and a 5000 mAh power bank. These are attached to a baseball cap in order to shoot footage from the point of view of the wearer. The camera records continuously, saving the last 7 seconds of recorded video when the button is pressed — perfect for capturing things just after they’ve happened.

It’s a rolling record feature similar to that included with many dashcams and action cameras. Software is available on Github for those interested. While [Johan] has chosen a New York Yankees hat as the basis for the build, we’re confident it should work similarly well with your Seattle Seahawks cap. Raiders fans should contact the garment manufacturer.

Sniffing CAN To Add New Features To A Modern Car

It used to be that there wasn’t a problem on the average car that couldn’t be solved with a nice set of wrenches, a case of beer, and a long weekend. But the modern automobile has more in common with a spaceship than those vintage rides of yesteryear. Bristling with sensors and electronics, we’re at the point that some high-end cars need to go back to the dealer for even minor repairs. It’s a dark time for the neighborhood grease monkey.

But for those of us who are more likely to spend their free time working with a compiler than a carburetor, a modern car can be an absolute wonderland. That’s what [TJ Bruno] found when he recently started experimenting with the CAN bus on his 2017 Chevy Cruze. Not only was he able to decode how the different switches and buttons on the dashboard communicated with the vehicle’s onboard systems, he was able to hack in a forward-looking camera that’s so well integrated you’d swear it was a factory option.

The idea started simple enough: using some relays, [TJ] planned on physically switching the video feed going to the Chevy’s dashboard between the stock rear camera and his aftermarket front camera. That’s all well and good, but the car would still only bring up the video feed when the gear selector was put in reverse; not exactly helpful when he’s trying to inch his way into a tight spot. He needed to find a way to bring up the video display when the car was moving forward.

With a PCAN-USB adapter connected to the car’s OBD-II port, he shifted into and out of reverse a few times and noted which messages got transmitted on the network. It wasn’t long before he isolated the proper message, and when he injected it with his laptop, the dashboard display switched over to the backup camera regardless of what gear the car was in. Building on this success, he eventually figured out how to read the status of all the buttons on the car’s dashboard, and programmed an Arduino to listen for the appropriate signals.

The final piece of the puzzle was combing bringing both of these capabilities, so that went the appropriate button was pressed on the dashboard the Arduino would not only send the signal to turn on the video display, but kick the relays over to switch the camera source. Now [TJ] has a front-facing camera that can be called up without having to kludge together some button or switch that would never match the modern styling of the vehicle’s interior.

A couple years back we saw a similar project to add a backup camera to a Peugeot 207 that was too old to have one from the factory, and more recently we saw how CAN hacking can allow you to fight back when your car’s touch screen interface robs you of simple pleasures like pushing buttons and turning knobs.

Continue reading “Sniffing CAN To Add New Features To A Modern Car”