Ask Hackaday: How Are These Thieves Exploiting Automotive Keyless Entry?

A new attack on automotive keyless entry systems is making headlines and we want to know how you think it’s being done. The Today Show reports that vehicles of different makes and models are being broken into using keyless entry on the passenger’s side of the car. It sounds like thieves steal items found inside rather than the vehicles themselves which makes these crimes distinctly different from the keyless ignition thefts of a year ago.

So how are they doing this? Here are the clues: The thieves have been filmed entering only the passenger side of the car. They hold a small device in their hand to unlock the doors and disable the alarm. And there is evidence that it doesn’t work on 100% of vehicles they try. Could it be some hidden manufacturer code reset? Has an encryption algorithm been hacked to sniff the keyfob identifier at a previous time? Or do you think we’re completely off track? Let us know your opinion by leaving a comment.

[Thanks Mom]

Robot Steals Soda From The Vending Machine

robot-steals-soda

It’s very hard to tell from this photo because of the super bright blue LEDs, but this soda machine is being robbed by a robot.

We don’t condone theft, but neither does the creator of the project. [Ioduremetallique] is really just problem solving; doing something because he can. And we’d bet this type of thing will end up landing him a high-paying job some day (we’re assuming he’s currently in school).

The project is shown off in the video after the break. The gist of it is that a compact robot arm is put into the drop area of a vending machine. After the flap is closed the wired remote control is used to raise up the telescoping arm, and grip the soda can with the grippers. It’s brilliant and devious all at the same time. The entire video is in French, but the YouTube captions translator actually worked quite well with this video. To turn it one, use the ‘CC’ icon on the bottom of the video. We had to select the French captions before it would allow us to chose English from the translated captions list. About four minutes in we get a great look at the hardware itself… a super hack!

Continue reading “Robot Steals Soda From The Vending Machine”

Hackaday Links: March 25, 2013

Illegal, yet impressive

cans

Want a soda? Just grab a robot, shove it in a vending machine, and grab yourself one. This video is incredibly French, but it looks like we’ve got a custom-built robot made out of old printers and other miscellaneous motors and gears here. It’s actually pretty impressive when you consider 16 ounce cans weigh a pound.

UNOBTANIUM

chip

Okay, we got a lot of emails on our tip line for this one. It’s a group buy for a programmable oscillator over on Tindie. Why is this cool? Well, this chip (an SI570) is used in a lot of software defined radio designs. Also, it’s incredibly hard to come by if you’re not ordering thousands of these at a time. Here’s a datasheet, now show us some builds with this oscillator.

Chiptune/keygen music anywhere

keygen

[Huan] has a co-loco’d Raspi and wanted a media server that is available anywhere, on any device. What he came up with is a service that streams chiptune music from your favorite keygens. You can access it with Chrome (no, we’re not linking directly to a Raspberry Pi), and it’s extremely efficient – his RAM usage didn’t increase a bit.

Take it on an airplane. Or mail it.

bomb

[Alex]’s hackerspace just had a series of lightning talks, where people with 45-minute long presentations try to condense their talk into 10 minutes. Of course the hackerspace needed some way to keep everything on schedule. A simple countdown timer was too boring, so they went with a fake, Hollywood-style bomb. No, it doesn’t explode, but it still looks really, really fake. That’s a good thing.

Printers have speakers now?

nokia

[ddrboxman] thought his reprap needed a nice ‘print finished’ notification. After adding a piezo to his electronics board, he whipped up a firmware hack that plays those old Nokia ringtones. The ringtones play over Gcode, so it’s possible to have audible warnings and notifications. Now if it could only play Snake.

3d Printing, The New Frontier Of Piracy?

We’ve all heard the countless arguments about piracy in digital media. However, it appears that 3d printing or other rapid prototyping systems are bringing legal issues to a more physical world. The story goes like this: [Thomas]  bought a 3d printer. He’s a big fan of warhammer figurines. He spends tons of time creating some custom warhammer figures, and uploads them to thingaverse. Games Workshop, the owners of Warhammer, unleashed the lawyers and had the items removed.

There are so many angles to this story, the mind boggles. If I were an artist, and someone else was uploading copies of my work, essentially stopping my revenue, it would suck. Then again, if I were lucky enough to have a fanatical fan base that spread the love for my product with excitement and zeal, I might want to encourage them. Neither of those thoughts however, cover the legal issue at the base here. We don’t have an answer for you. Sorry. You’ll probably be seeing this issue pop up more and more often in the future.

We encourage you to make our logo. Though we haven’t bothered to ask our lawyers.

SIM Card Carrying Traffic Lights

Apparently some of the traffic lights in Johannesburg, South Africa have SIM cards in them to help maintain the network without a physical connection. Now that’s some and not all, but apparently thieves have learned that the SIMs can be used in cell phones to make anonymous and unlimited calls. Officials are convinced that the thieves have inside information because they only crack open the lights that DO contain a card.

We’re white hats here at Hackaday and certainly don’t want to give out information that aids criminals. But since this is already a huge problem we have an idea of how thieves might be identifying which lights to rob. Sure, they probably do have inside information, but wouldn’t it be fairly simple to track down which lights use cellular communication by using a home made spectrum analyzer? We guess it would depend on how often the lights send out communications bursts. Does anyone have insight on this? Leave you thoughts in the comments.

[Thanks Bob]

System Admin Steals 20,000 Items From Work

Over the course of 10 years, [Victor Papagno] stole 19,709 pieces of equipment from the Naval Research Laboratory. He began taking stuff home in 1997 and had so much that he had to store some in a neighbors house. The report says that no secret technological information was taken.  Some items listed were CDs, hard drives, floppy disks, adding up to an estimated value of 1.6 million dollars. He could face up to two years in prison for this. We shudder to think of the total cost of all the post its, CDs, and floppy disks we’ve taken home over the years.

[via NetworkWorld]
[photo: Blude]

Teenager Invents Vehicular Antitheft System

We are very inspired by the story of [Morris Mbetsa], an 18-year-old Kenyan who’s invented the “Block & Track”, an antitheft and tracking system for vehicles that’s phone-based. [Mbetsa] has no formal training, but he’s been a lifelong inventor and tinkerer. [Mbetsa] combined voice, DTMF, and SMS text messaging technologies with cellphone based services to allow the owner to control the vehicle’s electrical system remotely. The owner, using his cellphone, can take control of the ignition, and disable it at any time. Other features include the ability to lock the car remotely, and the capability of dialing into the car and listening in on any conversations taking place within the vehicle. [Mbetsa] is currently looking for funding to take his invention to the next level; we’re eager to see what he’ll come up with next.

[via Digg]