5 Impressive Ways Criminals Use Wireless Signals to Steal Everything—Even Your Car (2023)

Imagine coming home after a long day of work, kicking off your shoes, setting your

key fob on the table, and heading to bed. Sounds pretty normal. Sounds pretty boring.

Now imagine waking up the next day, putting those shoes back on, grabbing your keys, and heading outside—only to find that your car is missing.

Unfortunately, this is becoming an all-too-frequent occurrence. Bad actors are using technology to steal from us in some of the most clever, infuriating ways. Luckily, there are some really simple precautions you can take to avoid auto theft, credit card fraud, and even having your Amazon Alexa device hacked into.

Here are some of the sneakiest ways these thieves are taking advantage of security flaws—and how you can take matters into your own hands to protect yourself.

More From Popular Mechanics

5 Impressive Ways Criminals Use Wireless Signals to Steal Everything—Even Your Car (1)

1) Transmitting Car Key Fob Signals

This content is imported from youTube. You may be able to find the same content in another format, or you may be able to find more information, at their web site.

It's convenient to open your car door without having to dig around in your bag or pocket for the key fob. Certainly it's one of the selling points for push-to-start cars, but it's also making life ridiculously easy for thieves. As with so many advances in technology, there have been unintended consequences for this standard in newer cars.

According to FBI statistics, auto theft hit an eight-year high in 2017, with 773,139 reported cases—up from an all-time low of 686,803 in 2014. That occurred in tandem with an increase in keyless ignition systems: In 2018, 62 percent of cars sold use keyless ignition as standard equipment, up from 11 percent in 2008, according to car-buying site Edmunds.

So why is it possible to pull off this kind of theft? Keyless ignition systems come with a fob that transmits a unique low-frequency signal to the car's computer system, which then validates that the correct signal has been sent and allows you to push a button on the dashboard or console to unlock the doors and start the engine.

Hackers can take advantage of this by using a cheap relay box to copy and transmit the signal from your key fob while it's still inside your home or on your person, making it easy to steal your vehicle. This is called a relay attack, and it's simple for thieves to pull off as long as they have a friend.

Here's how it works: Each person carries a relay box, which can be purchased for as little as $20 online. The boxes can pick up the radio frequency from a car key fob that's sitting on a table inside, hung up on a key rack, or even resting in a purse. The relay boxes allow one person to stand near the home to pick up and amplify the key fob signal and then transmit it to the second box, which the other person holds outside the door of a car. Once the key fob signal reaches the second box, it unlocks the door, as the car thinks you're holding your key fob nearby. Now the criminals just have to drive away without getting caught and then change the locks.

Virtually every car with an automatic-open key fob is susceptible to theft, even if it isn't push-to-start. The good news? It's pretty quick and cheap to prevent yourself from falling victim to a relay attack.

Stay safe: Shove your key fob in your refrigerator, freezer, microwave, or some other giant hunk of metal that can block the radio signal so that thieves can never pick it up. (Just don't cook your keys.) You can also try wrapping the keys tightly in tin foil to keep the signal from getting out or try storing your keys really, really far away from your car.

The best, most practical way to avoid auto theft: Store your keys in a Faraday cage, which is an enclosure that blocks all electromagnetic fields. Invented by scientist Michael Faraday in 1836, these "cages" have come a long way. In fact, you can purchase special Faraday pouches on Amazon that are shaped perfectly for your key fob to keep it protected at all times. Another option is to keep a Faraday box where you'd normally keep your keys and stash them in there. We even found one that's disguised as a book:

Key Fob Protectors

5 Impressive Ways Criminals Use Wireless Signals to Steal Everything—Even Your Car (3)

TICONN Faraday Bag for Key Fobs (2 Pack)

Now 37% Off

5 Impressive Ways Criminals Use Wireless Signals to Steal Everything—Even Your Car (4)

Silent Pocket Faraday Key Fob Case

$17 at Amazon

(Video) SAPD: Car thieves using technology to hack key fobs, steal vehicles

5 Impressive Ways Criminals Use Wireless Signals to Steal Everything—Even Your Car (5)

AriCoCo Faraday Key Fob Protector Box

5 Impressive Ways Criminals Use Wireless Signals to Steal Everything—Even Your Car (6)

MONOJOY Faraday RFID Book Box

2) Copying Your Passport

5 Impressive Ways Criminals Use Wireless Signals to Steal Everything—Even Your Car (7)

Remember getting your first passport? You had your fingerprints taken, signed a bunch of documents, cut down a picture of your face to the tiny square size required for the booklet and waited—and waited some more—for the damn thing to show up in the mail.

Sure, passports open up a whole world of travel, but they also open up a whole world of possible theft and fraud. That's because once your passport booklet is published, the U.S. Department of State personalizes the booklet with an RFID (radio-frequency identification) chip, which stores your personal information.

The chip contains pretty much all the same information you'll find on the photo page of a passport. That includes your full name, date of birth, social security number, address and more. It also stores your cryptographic signature, photo, and biometric data, which allows border officials to verify that the passport hasn't been tampered with or altered.

In theory, all a bad actor must do is hold an RFID scanner a few inches to a few feet from your passport to retrieve data from it. But that's pretty hard to do in practice, because the U.S. government has taken security measures to help prevent this sort of fraud.

That's according to Michael Holly, director of International Affairs Staff at the U.S. Department of State. He told travel magazine Afar that U.S. passports are secured with "basic access control", which is similar to what's seen in an ATM machine. It requires that the passport be open and inside a special machine-readable zone to be read. From that zone, a PIN number originates and the chip releases information to an RFID reader, but all the information is still encrypted.

He continues:

We also use random user identification (RUID) in order to prevent tracking. When a chip is queried by the reader, the first thing that is provided is the chip’s serial number. In our case, each and every time the chip is queried, a different identification number is provided.

Stay safe: Invest in an RFID-blocking case or sleeve for your passport. Most new passport cases come with RFID-blocking capabilities, but double check when you go to buy yours. Or, if you're feeling cheap, just keep your passport closed at all times—the data can't be ripped from your passport with an RFID reader unless the booklet is open.

Protect Your Passport

5 Impressive Ways Criminals Use Wireless Signals to Steal Everything—Even Your Car (8)

e-Jay's RFID Blocking Leather Passport Holder

5 Impressive Ways Criminals Use Wireless Signals to Steal Everything—Even Your Car (10)

defway RFID Blocking Family Passport Holder

5 Impressive Ways Criminals Use Wireless Signals to Steal Everything—Even Your Car (11)

Super Things Passport RFID Sleeves (4-Pack)

3) Stealing Electronics from Cars

5 Impressive Ways Criminals Use Wireless Signals to Steal Everything—Even Your Car (12)

Even when a laptop is sitting by idly, like in the backseat of a car or a trunk, it emits a wireless Bluetooth signal so that devices can find and connect to it. The problem? Thieves are now using Bluetooth scanners to walk around cars and locate devices, making targeted break-ins an art.

And finding a cheap Bluetooth scanner is easy; there are even Bluetooth-scanning apps that use a phone's Bluetooth sensors to find nearby signals. But worst part is these apps and scanners tell you exactly what kind of device nearby is putting out the Bluetooth signal.

5 Impressive Ways Criminals Use Wireless Signals to Steal Everything—Even Your Car (13)

Stay safe: You have three options: Put your device in Airplane Mode, power off the electronics completely, or simply remove all electronic devices from your vehicle when you exit.

If you can't take everything out of the car, double down and buy a Faraday cage or blanket large enough to fit your laptop that you can keep in the trunk of your car. It will prevent any wireless signals from escaping the enclosure.

Shield Your Laptop

5 Impressive Ways Criminals Use Wireless Signals to Steal Everything—Even Your Car (14)

Mission Darkness Faraday Signal Shielding Fabric

$23 at Amazon

(Video) Police Chase Leads To Dramatic #Carflip Caught On Camera

5 Impressive Ways Criminals Use Wireless Signals to Steal Everything—Even Your Car (15)

Faraday Defense Faraday Laptop Bag

5 Impressive Ways Criminals Use Wireless Signals to Steal Everything—Even Your Car (16)

Faraday Defense 10-Pack of Faraday Sleeves

5 Impressive Ways Criminals Use Wireless Signals to Steal Everything—Even Your Car (17)

Mission Darkness Faraday Duffel Bag

4) Cloning Building Access Badges

This content is imported from youTube. You may be able to find the same content in another format, or you may be able to find more information, at their web site.

Building access badges do eliminate the need to wiggle around a key inside a lock, but present new challenges, like criminals who want to clone them.

To understand how your work access badge or apartment building swipe card could be copied, let's first dissect the innards. While there are various sorts of access cards, the most common is called a proximity card (or "prox card" for short). These use an LC circuit, which is a simple electric circuit with an inductor connected to a capacitor.

5 Impressive Ways Criminals Use Wireless Signals to Steal Everything—Even Your Car (19)

When a card is presented to a reader, the reader's electrical field excites the metal coil inside the card. That charges the capacitor (a device that stores energy in an electric field), which, in turn, powers the integrated circuit. The circuit spits out the card number to the coil and then transmits it to the reader. Voilà, you're in.

All that's needed to copy your access card is a basic understanding of radio technology. Hackers need the card number to create a copy—and machines that can easily do that only cost about $10.

Stay safe: This technique is stupid easy, sure, but it only works on an old prox card standard that emits a 125 kHz signal. Most new access badges use a higher signal that's harder to crack. If you're concerned, double check your badge. If the numbers on the side are in a format with five numbers and then nine numbers (see image below), you may want to invest in RFID blocking cards for your wallet or a whole RFID-blocking wallet.

5 Impressive Ways Criminals Use Wireless Signals to Steal Everything—Even Your Car (20)

5) Swiping Credit Card Information

If you don't believe credit card skimming, or the act of copying an RFID signal from credit cards, actually happens, here's a nightmare scenario from a Redditor:

(Video) Thieves using USBs to steal vehicles

Today, I noticed that there were two large charges in my checking account at Fred Meyer - a place I OFTEN shop and spend a decent amount of money - one yesterday and one today. I checked with my spouse, and neither of us spent it. A little more digging and I realize that over $700 has been spent at Fred Meyer since the beginning of February. Normally, I would notice this kind of money missing - but I have been super busy this month and not really paying attention - plus my spouse and I share accounts, so it's pretty easy to brush off small charges. To complicate things, some of the charges WERE ours because it's where we shop! A fine-tooth comb through finances revealed that EVERY SINGLE ONE of our accounts and credit cards has at least a couple unexplainable charges at Fred Meyer since early January - as well as some random Safeway, Best Buy, and other places that I am pretty sure we didn't make. Most of them are small amounts - 8, 10, 25 dollars. Only recently, I think, have they become bolder and started charging larger amounts. But add it all up... it's a significant amount of money.
I called the bank and got everything turned off, but they mentioned that it is VERY likely my whole wallet came into contact with a RFID Skimmer at Fred Meyer because that's where they've mostly using it since. They know we shop there, so they knew I wouldn't really question a charge here or there from a store we already frequent. We suspected nothing, because my cards are still in my wallet.
I am hoping that most of my new cards come chip-and-pin, but I know our CU doesn't have them yet so I bought some RFID Blocking sleeves on Amazon to keep our cards in, to prevent this from happening again. Be warned: all it takes is a thief getting close to you in a line with your wallet in your back pocket and they have everything. If you have an Extended Driver's License, your Passport, all credit and debit cards on your person they can just steal all that information. There are people doing this in Spokane, it happened to us and it sucks. (Also there have been stories of skimmers installed in gas pumps, ATMS, etc.)

Stay safe: Wrap all of your cards in a thick layer of tin foil, invest in an RFID-blocking wallet, or buy RFID-blocking cards that you can throw in your current wallet. Just be careful: If you have a bifold wallet, you need to put an RFID-blocking card on both sides of the wallet.

Safeguard Credit Cards and Access Badges

5 Impressive Ways Criminals Use Wireless Signals to Steal Everything—Even Your Car (21)

Fossil RFID Magnetic Card Case

5 Impressive Ways Criminals Use Wireless Signals to Steal Everything—Even Your Car (22)

Manyi 5-Piece RFID Blocking Cards

Now 10% Off

5 Impressive Ways Criminals Use Wireless Signals to Steal Everything—Even Your Car (23)

Buffway RFID Wallet

Now 20% Off

5 Impressive Ways Criminals Use Wireless Signals to Steal Everything—Even Your Car (24)

L.L. Bean RFID Fanny Pack

5 Impressive Ways Criminals Use Wireless Signals to Steal Everything—Even Your Car (25)

Courtney Linder

Deputy Editor

Before joining Pop Mech, Courtney was the technology reporter at her hometown newspaper, the Pittsburgh Post-Gazette. She is a graduate of the University of Pittsburgh, where she studied English and economics. Her favorite topics include, but are not limited to: the giant squid, punk rock, and robotics. She lives in the Philly suburbs with her partner, her black cat, and towers upon towers of books.

(Video) Watch thieves steal car by hacking keyless tech

FAQs

5 Impressive Ways Criminals Use Wireless Signals to Steal Everything—Even Your Car? ›

In the past, thieves found success using what's known as a relay attack. These hacks amplify the signal between the car and the keyless entry fob used to unlock and start it. Keyless fobs typically only communicate over distances of a few feet.

What device do thieves use to steal keyless cars? ›

In the past, thieves found success using what's known as a relay attack. These hacks amplify the signal between the car and the keyless entry fob used to unlock and start it. Keyless fobs typically only communicate over distances of a few feet.

How does wireless car theft work? ›

Keyless theft, also known as 'relay theft', occurs when device is used to fool the car into thinking the car's own remote key fob is close by; this unlocks the car and allows the ignition to be started.

How do thieves steal key fob signals? ›

Thieves can use signal relaying - also known as 'relay theft' - when wireless transmitters are held close to someone's pocket or handbag, or maybe their house, to capture the radio signal emitted by a key fob to unlock the vehicle.

What is a passive anti theft device in a car? ›

Passive devices automatically arm themselves when the vehicle is turned off, the ignition key removed, or a door is shut. No additional action is required. Examples of this type of system is the PASS Lock system, automatic locking doors when the key fob has move a predetermined distance from the vehicle.

What is a key fob jammer? ›

Key jamming works by positioning a jamming device near the targeted car, which then sends a signal that interferes with the communication between the key fob and the car's immobilizer system. When you press the button to lock your car, the jammer blocks the signal and the car's doors do not lock.

What is a ghost immobiliser? ›

The Ghost Immobiliser uses buttons in your vehicle such as the steering wheel, centre console or door panels to make a unique pin code which needs to be entered before you can drive the car. The engine will not start until the pin code is entered correctly.

How do I know if my car has a passive anti-theft device? ›

In insurance terms, this is any feature preinstalled in your car that makes it harder to steal, or easier to track or recover. We suggest you check your car's manual or the manufacturer's site to find out what security features might be installed.

How do I know if my car has a security device? ›

You can rest assured that your car has a factory-fitted immobiliser if it was manufactured after October 1998. However, if your car was made before that date and you want to check if it has an immobiliser, the easiest way to check is to contact your car's manufacturer or consult your owner's manual.

What is ghost device for car? ›

A ghost immobiliser includes systems that prevent key cloning, signal jamming and device spoofing – all methods that thieves use to unlock cars with standard immobilisers. This means that even if a thief is able to somehow get into your car, they won't be able to drive it away.

How do you scare car thieves? ›

Visible devices, such as a steering wheel lock, window etching or an alarm system's flashing light, may also be enough to deter a car thief, according to the NHTSA. If they are not sure they can get away with the car quietly or fear they may get caught, Firestone says they may just avoid your vehicle altogether.

What is RollJam device? ›

The RollJam, detecting a signal, jams the vehicle's frequency. The code is intercepted and stored. The user clicks the button again and the rollJam broadcasts the old code while simultaneously capturing the new one. The car unlocks. The RollJam device is retrieved, still holding the new unused code.

What blocks key fob signals? ›

Keeping your key fob safe

You can achieve this protection by securely wrapping your key fob in a small piece of aluminum foil. The foil will block the electromagnetic signals of the fob, making it impossible for a relay box to pick them up.

How do criminals clone key fobs? ›

What is key signal cloning? Keyless cars unlock automatically when their key is physically close to the car. Smart criminals are using relay devices to make car systems believe a key is nearby by cloning its signal. They intercept and then relay the signal from the car key using two receiver/transmitters.

How far can a car key be cloned? ›

In general, keyless entry fobs have a range of five to six metres, so one of the scanner units has to be no farther than this from the fob.

What are examples of passive restraint devices? ›

The most common passive restraint systems in vehicles today are airbags and seat belts, or safety belts.

What is an example of a passive restraint device? ›

There are only two major passive restraint systems: air bags (or cushions) and automatic belts.

What are three examples of a passive safety device? ›

Passive safety features are things like airbags, seatbelts, and crumple zones. If you do get into an automobile accident, passive safety features are precautions put in place to keep you as secure as possible.

What is a car proximity key? ›

A proximity key is a small fob that allows for a keyless entry and ignition system. First introduced by Mercedes-Benz in 1998, keyless entry vehicles are taking a larger market share every year and showing no signs of slowing down.

How far is a key fob signal? ›

The vehicle and fob communicate using low-power radio signals that are only effective when the fob is within approximately 36 inches of the car door or ignition start/stop button.

What is a car key guard? ›

FJM Security's durable KeyGuard® is the perfect solution for anyone needing to store keys for their vehicle. Its large full metal body makes it very strong and secure while providing room for keys, key fobs, or other small items.

What is Autowatch? ›

The Autowatch Ghost immobiliser can help prevent your vehicle from being stolen through key cloning or theft. Immobilisation by communicating with the ECU. Disarm sequence via buttons on steering wheel/dash.

What is the difference between Autowatch ghost and ghost 2? ›

What is the difference between the Ghost 1 & 2? Nothing that you would notice really. The 1 is now obsolete and no longer available. The 2 has the ability to pair 2 phones should you wish, these can be android or ios.

How does Autowatch work? ›

Autowatch Ghost immobilises the vehicle with a silent engine lock & prevents the vehicle from being driven away -The sequence to starting your vehicle can be practically transparent to any passenger or occupant, making our Autowatch Ghost a discreet immobiliser not affected by car criminals who clone your vehicle keys.

What does anti-theft mode look like? ›

The icon for the anti-theft system looks like a car and a lock combination. When this light is on and flashing (it will be either or blue), it will indicate that your car's anti-theft system is activated.

What is etching on a car? ›

VIN etching is the permanent engraving of a vehicle's federally registered vehicle identification number (VIN) onto its windshield and windows.

What is a stolen vehicle recovery system? ›

A stolen vehicle recovery device is an anti-theft tool that allows you to track down your vehicle if it gets stolen. The device itself doesn't actually prevent your car from being stolen. However, it can ensure that you have a better chance of recovering it safely when it gets into the wrong hands.

How do you tell if your car is bugged or tracked? ›

How to Tell if Your Car is Bugged?
  1. WHATS THE BEST WAY TO KNOW IF YOUR CAR IS BEING TRACKED? ...
  2. CHECKING FOR BUGS AND TRACKERS. ...
  3. STRANGE NOISES AND BUZZING SOUNDS. ...
  4. INSPECT THE INTERIOR AND EXTERIOR OF YOUR CAR. ...
  5. LOOK FOR WIRES. ...
  6. LOOK FOR OUT OF PLACE EVERYDAY ITEMS. ...
  7. CHECK UNDER THE HOOD AND BEHIND YOUR RADIO. ...
  8. CHECK THE DATA PORT.
Jan 6, 2023

What is an electronic homing device in a car? ›

(ˈhəʊmɪŋ dɪˈvaɪs ) noun. electronics. a device that provides direction to a target or destination. All the royal cars are fitted with electronic homing devices.

Does my car have a tracking device? ›

You should grab a flashlight so you can see into the dark crevices of your wheel wells and undercarriage–both common places for a GPS tracker to be hidden. After looking around outside the vehicle, check the interior. Pay special attention to: The data port underneath the dashboard and steering wheel.

What is an autowatch ghost? ›

The Ghost uses the buttons in your vehicle such as those on the steering wheel, door panels or centre console, to allow you to make a unique, changeable, disarm sequence (like a PIN code) that must first be entered before you can drive your car.

Where is a ghost immobiliser? ›

Ghost immobilisers are small and easy to install, as they are fitted inside your vehicle, often near the Engine Control Unit (ECU) in your engine bay.

How is ghost immobiliser installed? ›

The Ghost immobiliser is installed at your home or workplace by a specialist technician. Connected to your vehicle's Can-Bus system, the device immobilises the engine by communicating with the ECU and can only be deactivated by entering a unique PIN code.

Where do thieves look in a car? ›

The issue lies in the fact that glove compartments more often simply conceal your belongings, rather than protecting them. If a thief is already rooting around inside your vehicle, the first area they choose to check will more often than not be the glove box.

How do you catch car vandals? ›

To catch and identify someone who vandalizes, breaks into, damages or steals your car or belongings, you could go for the color night vision security cameras that capture important visual details, like the clothes color of the perpetrators, makes of the cars, or other details.

How do you scare away thieves at night? ›

10 Burglar Deterrents That Work
  1. Install a Burglar Alarm System. ...
  2. Motion-Activated Outdoor Lighting. ...
  3. Get a Guard Dog. ...
  4. Maintain Surrounding Landscape. ...
  5. Multiple Door Locks. ...
  6. Install a CCTV Surveillance System. ...
  7. Internal Timer-Operated Lighting. ...
  8. Double Glazing Security Glass.
Jul 28, 2020

Which key fobs can be hacked? ›

Is My Key Fob Vulnerable To Hacking? First of all, not all cars can be hacked by the method described above. Science research shows that a range of vehicles manufactured during 2009-2017 can be hacked by key cloning. For example, many professionals agree that the most vulnerable are Toyota, Hyundai, Kia, and Tesla.

How do you use a CarLock? ›

Meet The CarLock Mobile App

Learn how easy it is to use the CarLock app: The location of your car is shown on the map with a green circle around it that indicates the vehicle is not armed. After tapping the lock button, the circle turns to orange. Vehicle is now armed and you will receive the notifications.

What is a switchblade car key? ›

A switchblade key is simply a key that folds into a key handle, and pops open when a button is pressed, much like a switchblade knife. An auto locksmith can replace either the key or the handle should a switchblade key break, but this type of key replacement costs a bit more than basic car keys.

Why should you wrap your keys in foil at night? ›

Does Foil Deter Thieves? So why wrap your car key fob in foil? Your car waits for a signal from the fob and thieves can grab fob signals. Wrapping the fob in tinfoil decreases the strength of the signal and the range of the fob.

Why wrap your keys in aluminum foil? ›

In light of this, cybersecurity experts recommend wrapping your key fob in tin foil so potential thieves won't be able to intercept your signal.

How do I stop my car keys from being cloned? ›

By storing your car keys, fob or card in an aluminium tin (even grandma's old biscuit tins), or a special signal blocking box, the signal between the car and key is blocked. This means thieves can't intercept it and clone a new one. If you're out and about, then a Faraday pouch is your best friend.

Can all key fobs be cloned? ›

Although you won't be able to have it copied at a hardware store like a traditional key, you can have a key fob copied online or at a kiosk. Copying key fobs has become a major security risk for organizations that use these devices as part of their access control system.

How do thieves steal cars without keys? ›

An increasingly prevalent method employed by thieves involves the use of relay devices. In this approach, one thief aims the relay device at the front door of a residence, where proximity keys are often left. The device then transmits the key's signal to an accomplice near the driver's door of the vehicle.

How are thieves unlocking cars? ›

Some popular methods used by car thieves include signal amplification and relaying, code grabbing, and radio-frequency jamming. Signal amplification involves intercepting the key fob's signal and amplifying it, allowing the thief to access the car from a distance.

What device is used in relay car theft? ›

Relay car theft, or 'relay attack' is when criminals use the keyless entry system of a car against itself by tricking the car into thinking the wireless remote is next to it. It works on cars where you can enter and start the car without using a key.

What do car burglars look for? ›

Thieves will steal anything valuable, but the most common items stolen from cars tend to be electronics, personal information, and accessories.

How do people steal push start cars? ›

Relay devices can be used to steal push-to-start cars by amplifying your key fob signal. Many newer cars just need your key to be inside the car – not inside the ignition – to start. Relay devices trick the car into thinking the key is inside, allowing a thief to drive away.

Do keyless cars use RFID? ›

Keyless entry is considered an active RFID system, because pushing the button sends out the code, instead of receiving it. The immobilizer chips in the ignition keys that lock out car thieves are also active. Keyless ignition is defined as a passive RFID system.

Can a car with a transponder key be stolen? ›

Yes, in many circumstances keyless cars are easier to steal. That said, it also depends on the particular model, as well as the situation. Some models have keyless entry that unlocks the doors when the key is close-by but still have a conventional key that is physically put in the ignition to start the car.

Does aluminum foil block car key fob signal? ›

Tip 3: Wrap your keyfob in foil

Because metal can block your key fob's signal, you can wrap it in aluminum foil. While that's the easiest solution, aluminum foil can leak the signal if you don't wrap it tightly.

How do thieves start cars without keys? ›

An increasingly prevalent method employed by thieves involves the use of relay devices. In this approach, one thief aims the relay device at the front door of a residence, where proximity keys are often left. The device then transmits the key's signal to an accomplice near the driver's door of the vehicle.

Can someone steal my car without the key fob? ›

It's possible to steal a car without the keys, and it's much easier to steal older vehicles that don't have ignition protections and newer vehicles with keyless fobs. Most car thieves can't hotwire a car like in the movies, but many vehicle owners can be careless, unwittingly opening themselves up to car theft.

What can block key fob signal? ›

Keeping your key fob safe

All you need is a little metal. You can achieve this protection by securely wrapping your key fob in a small piece of aluminum foil. The foil will block the electromagnetic signals of the fob, making it impossible for a relay box to pick them up.

How do I stop my car key from cloning? ›

By storing your car keys, fob or card in an aluminium tin (even grandma's old biscuit tins), or a special signal blocking box, the signal between the car and key is blocked. This means thieves can't intercept it and clone a new one. If you're out and about, then a Faraday pouch is your best friend.

What device opens keyless cars? ›

A “keyless car” does not have a traditional metal key to open the doors (at least, not as the primary way to gain entry) or start the motor — instead, a digital fob, card or smartphone app is used to gain entry, and as long as the digital key is detected inside the car, a push button on the inside allows the car to be ...

How do I know if my car has a transponder? ›

Another option is to contact your trusted locksmith service or dealership. Based on the year, make, and model of your vehicle a dealership or auto locksmith can tell if your car takes a chip key or not. If you currently operate your vehicle with a metal key then it's not transponder equipped.

Where should I keep my car keys at night? ›

To prevent keyless car theft if you have a keyless entry car, we recommend storing your car key fob at night in a signal blocking pouch ( also known as a faraday pouch ) to stop your car key fob signal being received, also place your car keys far away from any doors and windows.

Videos

1. Apps making it easier for car thieves to hack your ride
(WREG News Channel 3)
2. High-tech car theft: How to hack a car (CBC Marketplace)
(CBC News)
3. Seconds to steal a catalytic converter
(WOOD TV8)
4. Keyless entry car theft NO MORE how to totally protect your car from keyless theft
(MAD MODS)
5. Top 3 Ways Thieves Steal Cars
(Ratchets And Wrenches)
6. How criminals are using mobile banking to steal from your bank account
(WTHR)
Top Articles
Latest Posts
Article information

Author: Kimberely Baumbach CPA

Last Updated: 04/21/2023

Views: 6412

Rating: 4 / 5 (41 voted)

Reviews: 88% of readers found this page helpful

Author information

Name: Kimberely Baumbach CPA

Birthday: 1996-01-14

Address: 8381 Boyce Course, Imeldachester, ND 74681

Phone: +3571286597580

Job: Product Banking Analyst

Hobby: Cosplaying, Inline skating, Amateur radio, Baton twirling, Mountaineering, Flying, Archery

Introduction: My name is Kimberely Baumbach CPA, I am a gorgeous, bright, charming, encouraging, zealous, lively, good person who loves writing and wants to share my knowledge and understanding with you.