Thieves, Armed With A Vacuum Cleaner, Still On The Run

Thieves in Paris have been stealing money with the clever use of a vacuum. Not just bits of change here and there, they’ve stolen over 500,000 euros. They noticed that Monoprix supermarkets use a pneumatic tube system to transport rolls of cash to and from the safe. Realizing this was the weakest point in the security, they simply drilled a big hole in the tube, hooked up a vacuum and sucked the cash out. Forget lock picking or safe cracking, this had to be ridiculously easy.

The thieves are still out there, sucking their way to riches. At this point, they’ve hit 15 locations. Their luck has to run out some time right?

[via Slashdot]

Now You See Me, Now You Don’t, Face Detection Scripts

Straight out of Ghost in the Shell, the Laughing Man makes his appearance in these security camera shots. [William Riggins] wrote us to let us know about his teams Famicam scripts. After taking a screen shot, faces are detected and counted, ‘anonymized’, and the final image is uploaded to Twitter.

The process is rather simple, and sure beats wearing a bunch of white reflective camouflage. All that’s left is detecting specific faces to make anonymous, and of course uploading the script to every camera in the world. Easy, right?

RFID Immobiliser

[andrew_h] has put together this slick anti theft device for his car. The RFID immobiliser is used to keep the car from starting unless you swipe an RFID tag. Depending on how well you hide it, and how well the person stealing the car knows you, they would have no reason to suspect that they have to swipe the tag. Even if someone steals the car while it is already running, they won’t be able to re start the engine if they shut it off. As usual, schematics and PCBs are available.

Time Delay Door Alarm

Ever accidentally left your front door ajar and had a pet escape? [BlackCow] came up with a simple solution to this problem. The circuit is fairly rudimentary but a great example of using the basics to get the job done. Now, instead of having an alarm that sounds as soon as the door is open, he has a 30 second delay. This helps avoid the “boy who cried wolf” effect also known as the “vista security warning” effect of being bothered too many times for a non issue.  We also have to say that we like his taste in blog layouts.

[via Hacked Gadgets]

Hackaday Links: February 14, 2010

$30,000?

Is it art or is it a puzzle? Well, it functions as a game but it’s certainly a work of art and priced accordingly. The Superplexus was featured in Make Mazine and Hammacher Schlemmer sells it for thirty grand (you can’t just click to add it to your cart though). Think of the work that went into developing this! [via The Awesomer]

Rollable Display Update

[SeBsZ] continues work on his rollable display matrix. He’s got twenty five controller boards now and has them working as a matrix. We originally covered this in January but now it’s much easier to see how this can be made portable by mounting it on fabric or canvas. Check out the demo video if your interested.

Security testing suite

BackTrack 4 final has been released. If you didn’t like it when it was rough around the edges, you should give it another try. This lean and mean Linux ditro is made for security testing and is approachable for noob and pro alike. [Thanks Steve]

Power on the go

[Csae] uses this portable power center to fire up some studio strobes outside. It consists of a case, an uninterruptible power supply, and a couple of extension cords all hacked together into one. At first you might think this is a bit ghetto but it’s portable and it does what is intended.

Happy Valentine’s Day

Giving this LED-heart adorned shirt as a gift is sure to make your Valentine head for the hills. This project’s a few year’s old, but gawdy T-shirts never go out of style, right?

Chip And Pin Broken And Other Security Threats

Another exploit has been found in the Chip and PIN system.  The exploit is a man-in-the middle attack that wouldn’t take too much know-how to pull off. You can watch the BBC report on the issue or check out the paper (PDF) published by the team that found the vulnerability. A stolen card resides in a reader that connects to a dummy card via a small cable. When the dummy card is inserted into a card reader, any PIN can be used to complete the transaction. The chip on the original card gets confirmation that the sale was completed via signature and the vendor’s card reader gets confirmation that the pin was correct. The UK based Chip and PIN system seems like a great idea, but it has had its share of security loopholes. This makes us wonder how hard it is to roll out security patches to the hardware readers in the system.  Obviously this needs to be patch but does it take a technician visiting each terminal to flash an upgrade?

Switching to the topic of wide-scale attacks, we caught the NPR interview with [James Lewis] on Wednesday when they discussed the growing threat of Cyberterroism. He feels an attack on the US electrical grid is currently the biggest threat and will happen in the next ten years. Obviously taking the grid down would endanger lives and bring things to a standstill; traffic lights, refrigeration, heat, etc. We’re just glad that when asked if he thinks there is already malicious code residing in the control system, he doesn’t think that’s the case.

[Thanks to Whatsisface and Mcinnes]

Foil Impressioning Defeats Security Locks

Apparently it’s been around for fifteen years but using foil impressions to pick locks is new to us. This is similar to using bump keys but it works on locks that are supposedly much more secure. This method uses a heavy gauge aluminum foil to grab and hold the pins in the correct place for the lock to be turned. The foil is folded over and slits are cut where each pin will fall. It is then inserted into a lock on a tool shaped like a key blank. Jiggle the tool for a bit and the cylinder will turn. This just reminds us that we’re much more dependent on the good will of our fellow citizens to not steal our stuff, rather than the deterrent that a lock provides.

We’ve embedded a detail and fascinating demonstration of this method after the break. The materials in the video are from a Chinese-made kit. We’re not sure where you find these types of locks, but we don’t feel any less secure since our keys could be obtained from a distance anyway.

Update: Video now embedded after the break. The link is down but you can try the Google Cache version.

Continue reading “Foil Impressioning Defeats Security Locks”