CANTON, Mass. and IRVINE, Calif. — LoJack, a wholly-owned subsidiary of CalAmp, is alerting consumers to some of the sophisticated techniques vehicle thieves are using to break into today’s connected vehicle. The information shared is part of a consumer campaign the firm rolled out as part of this month’s National Vehicle Theft Protection Month, but it could also be used by F&I managers to educate consumers about the need for vehicle-recovery systems.

With the emergence of sophisticated connected vehicles and Internet of Things technology, the nature of auto theft is changing, the company said. And according to the FBI's Preliminary Semiannual Uniform Crime Report, auto theft in the first half of 2015 topped what was recorded during the first half of 2014.

“Vehicle theft is starting to shift because of advanced techniques introduced by the ‘connected vehicle thief,’” said Patrick Clancy, vice president of LoJack Law Enforcement. "These criminals are smart, connected and more difficult to impede. They are targeting not only vehicles but also onboard data that, once obtained, can be damaging and difficult to recover. This campaign is designed to educate vehicle owners and businesses about the changing nature of auto theft, who the adversaries are, and what can be done to remain vigilant so that their lives are not negatively impacted by theft."

The following are some of the methods and tactics used by today’s connected vehicle thief:

  • Car Cloning: Savvy thieves create and install a fake vehicle identification number (VIN), allowing a stolen vehicle to go unnoticed. Hackers then use the stolen VINs to create new documents, hiding the fact that the underlying vehicle is stolen.
  • Vehicle Ransom: Cybercriminals could leverage “ransomware” to break into a vehicle, disable the engine and brakes, and demand payment to restore the car to its functional state.
  • Scanner Boxes: These are devices that can exploit an electronic system controlled by key fobs. Criminals can then unlock and even start a vehicle without even touching the key.
  • Identity Theft: Thieves are targeting the data available within the car, including credit card details, location information, Social Security numbers and driver’s license numbers.
  • Luxury Vehicle Theft Rings: Organized crime rings target higher value vehicles, which can then be cut up for parts, resold or shipped overseas. These theft rings utilize complex schemes, such as copying smart keys and using stolen credit reports to illegally finance vehicles.

LoJack also listed some safety tips F&I managers can share with their customers:

  • Be Selective With Sensitive Data: Be aware that personal data stored in your vehicle, such as credit card information or home address in an onboard GPS system, could be vulnerable to theft.
  • Update Manufacturer Software: Download the latest firmware and software upgrades from the vehicle manufacturer as they become available. Ask about updates when visiting the service department of your dealership.
  • Stay Informed of Recalls: Stay abreast of vehicle-enabled cyberattacks, and check with your vehicle manufacturer about any security recalls or alerts.
  • Use Theft Prevention Products: Immobilizers and visible, audible warning devices are good deterrents and can provide advanced protection.
  • Install a Tracking Device: Consider installing a tracking device operated by law enforcement so that stolen assets have a better chance of being recovered.
  • Keep Your Assets Close: Do not leave smart phones and tablets unattended, as they can be used to access more data. Additionally, use proper safety protocols on vehicles with keyless ignitions.
  • Practice Common Sense: Never leave keys in the vehicle with the engine running and don't hide a spare key in the car. Additionally, lock all doors when exiting the vehicle. It seems obvious, but car owners are still victimized by not taking these basic safety precautions.

For information and tips on how to protect your customers against the connected vehicle thief, visit LoJack’s Auto Theft Blog by clicking here.

0 Comments