[Andrew Nohawk], has noticed a spike of car break-ins and thefts — even in broad daylight — in his native South Africa. The thieves have been using remote jammers. Commercial detectors are available but run into the hundreds of dollars. He decided to experiment with his own rig, whipping up a remote jamming ‘detector’ for less than the cost of a modest meal.
Operating on the principle that most remote locks work at 433MHz, [Nohawk] describes how criminals ‘jam’ the frequency by holding down the lock button on another device, hoping to distort or outright interrupt the car from receiving the signal to lock the doors. [Nohawk] picked up a cheap 433MHz receiver (bundled with a transceiver), tossed it on a breadboard with an LED connected to the data channel of the chip on a 5V circuit, and voila — whenever the chip detects activity on that frequency, the LED lights up. If you see sustained activity on the band, there’s a chance somebody nearby might be waiting for you to leave your vehicle unattended.
If you want to know more about how these jamming attacks work, check out [Samy Kamkar’s] talk from the Hackaday SuperConference.
Continue reading “Simple And Effective Car Lock Jammer Detector”
I heard a “Year in Review” program the other day on NPR with a BBC World Service panel discussion of what’s ahead for 2017. One prediction was that UAV delivery of packages would be commonplace this year, and as proof the commentator reported that Amazon had already had a successful test in the UK. But he expressed skepticism that it would ever be possible in the USA, where he said that “the first drone that goes over somebody’s property will be shot down and the goods will be taken.”
He seemed quite sincere about his comment, but we’ll give him the benefit of the doubt that he was only joking to make a point, not actually grotesquely ignorant about the limitations of firearms or being snarky about gun owners in the US. Either way, he brings up a good point: when autonomous parcel delivery is commonplace, who will make sure goods get to the intended recipient?
Continue reading “Autonomous Delivery: Your Impulse Buys Will Still Be Safe”
A new attack on automotive keyless entry systems is making headlines and we want to know how you think it’s being done. The Today Show reports that vehicles of different makes and models are being broken into using keyless entry on the passenger’s side of the car. It sounds like thieves steal items found inside rather than the vehicles themselves which makes these crimes distinctly different from the keyless ignition thefts of a year ago.
So how are they doing this? Here are the clues: The thieves have been filmed entering only the passenger side of the car. They hold a small device in their hand to unlock the doors and disable the alarm. And there is evidence that it doesn’t work on 100% of vehicles they try. Could it be some hidden manufacturer code reset? Has an encryption algorithm been hacked to sniff the keyfob identifier at a previous time? Or do you think we’re completely off track? Let us know your opinion by leaving a comment.
It’s very hard to tell from this photo because of the super bright blue LEDs, but this soda machine is being robbed by a robot.
We don’t condone theft, but neither does the creator of the project. [Ioduremetallique] is really just problem solving; doing something because he can. And we’d bet this type of thing will end up landing him a high-paying job some day (we’re assuming he’s currently in school).
The project is shown off in the video after the break. The gist of it is that a compact robot arm is put into the drop area of a vending machine. After the flap is closed the wired remote control is used to raise up the telescoping arm, and grip the soda can with the grippers. It’s brilliant and devious all at the same time. The entire video is in French, but the YouTube captions translator actually worked quite well with this video. To turn it one, use the ‘CC’ icon on the bottom of the video. We had to select the French captions before it would allow us to chose English from the translated captions list. About four minutes in we get a great look at the hardware itself… a super hack!
Continue reading “Robot Steals Soda From The Vending Machine”
Illegal, yet impressive
Want a soda? Just grab a robot, shove it in a vending machine, and grab yourself one. This video is incredibly French, but it looks like we’ve got a custom-built robot made out of old printers and other miscellaneous motors and gears here. It’s actually pretty impressive when you consider 16 ounce cans weigh a pound.
Okay, we got a lot of emails on our tip line for this one. It’s a group buy for a programmable oscillator over on Tindie. Why is this cool? Well, this chip (an SI570) is used in a lot of software defined radio designs. Also, it’s incredibly hard to come by if you’re not ordering thousands of these at a time. Here’s a datasheet, now show us some builds with this oscillator.
Chiptune/keygen music anywhere
[Huan] has a co-loco’d Raspi and wanted a media server that is available anywhere, on any device. What he came up with is a service that streams chiptune music from your favorite keygens. You can access it with Chrome (no, we’re not linking directly to a Raspberry Pi), and it’s extremely efficient – his RAM usage didn’t increase a bit.
Take it on an airplane. Or mail it.
[Alex]’s hackerspace just had a series of lightning talks, where people with 45-minute long presentations try to condense their talk into 10 minutes. Of course the hackerspace needed some way to keep everything on schedule. A simple countdown timer was too boring, so they went with a fake, Hollywood-style bomb. No, it doesn’t explode, but it still looks really, really fake. That’s a good thing.
Printers have speakers now?
[ddrboxman] thought his reprap needed a nice ‘print finished’ notification. After adding a piezo to his electronics board, he whipped up a firmware hack that plays those old Nokia ringtones. The ringtones play over Gcode, so it’s possible to have audible warnings and notifications. Now if it could only play Snake.
We’ve all heard the countless arguments about piracy in digital media. However, it appears that 3d printing or other rapid prototyping systems are bringing legal issues to a more physical world. The story goes like this: [Thomas] bought a 3d printer. He’s a big fan of warhammer figurines. He spends tons of time creating some custom warhammer figures, and uploads them to thingaverse. Games Workshop, the owners of Warhammer, unleashed the lawyers and had the items removed.
There are so many angles to this story, the mind boggles. If I were an artist, and someone else was uploading copies of my work, essentially stopping my revenue, it would suck. Then again, if I were lucky enough to have a fanatical fan base that spread the love for my product with excitement and zeal, I might want to encourage them. Neither of those thoughts however, cover the legal issue at the base here. We don’t have an answer for you. Sorry. You’ll probably be seeing this issue pop up more and more often in the future.
We encourage you to make our logo. Though we haven’t bothered to ask our lawyers.
Apparently some of the traffic lights in Johannesburg, South Africa have SIM cards in them to help maintain the network without a physical connection. Now that’s some and not all, but apparently thieves have learned that the SIMs can be used in cell phones to make anonymous and unlimited calls. Officials are convinced that the thieves have inside information because they only crack open the lights that DO contain a card.
We’re white hats here at Hackaday and certainly don’t want to give out information that aids criminals. But since this is already a huge problem we have an idea of how thieves might be identifying which lights to rob. Sure, they probably do have inside information, but wouldn’t it be fairly simple to track down which lights use cellular communication by using a home made spectrum analyzer? We guess it would depend on how often the lights send out communications bursts. Does anyone have insight on this? Leave you thoughts in the comments.