Anywhere in the USA, the cops have the right to break down the door and shoot everyone if they FEEL provoked. No warrants, no reasonable suspicion, just a FEELING.
The FBI has arrested members of a motorcycle gang accused to have hacked and stolen over 150 Jeep Wranglers from Southern California, which they later crossed the border into Mexico to have stripped down for parts.
Authorities unsealed an indictment yesterday in a press conference held in San Diego. According to details included in the indictment and an attached search warrant, the gang — named Hooligans Motorcycle Club and based in Tijuana, Mexico — combined old school and modern hacking tactics to carry out the thefts undetected.
Gang members that allegedly participate in these thefts had a very precise role and were part of a Hooligans Motorcycle Gang sub-unit called Dirty 30. All thefts followed the same model.
According to court documents, gang members organized themselves into various theft crews, and in each crew, members had different roles such as leader, thief, transporter, scout, or key cutter.
All thefts started with a scouting phase where gang members with the role of scout drove around South California to identify motorcycles and Jeep Wrangler models they wanted to steal.
While the theft of motorcycles didn’t involve a key, with crooks bypassing the ignition switch, the theft of Jeep Wranglers was far more complex and involved quite a lot of high-tech gadgetry.
Gang accessed database of Jeep replacement key codes
US authorities say that after identifying a Jeep Wrangler, a scout would have to obtain the car’s Vehicle Identification Number (VIN), a code printed in the car’s dashboard, or another location on the car.
Scouts would pass the VIN to their leader, who would then pass the code to a key cutter via Facebook. According to court documents, the key cutters had found a way to access a proprietary database containing replacement key codes for Jeep Wrangler models.
Using the VIN, the key cutters would download two codes from this database. They would use the first code to as instructions to cut a physical replacement key.
They would then pass the newly cut replacement key and the second code back to the leaders, which would hand them over to members tasked with stealing the vehicle.
Court documents reveal that all the database queries for the stolen VIN codes came from a Jeep dealer in Cabo San Lucas, Mexico. Court documents don’t say if the dealer cooperated or gang members hacked its system.
But the thefts didn’t become easier once thieves had the replacement key, as the chip inside the key wasn’t able to communicate and authenticate with the car.
Whenever a thief would approach a Jeep, the Hooligans member would use external latches on the Jeep Wrangler to pop the hood and disable the alarm’s horn and front lights flashing system. The alarm would still go off, but only the Jeep’s back lights would trigger.
Thieves would then use the replacement key to open the driver’s door, enter the jeep, and insert the key in the car. Thieves would move quickly and connect a handheld vehicle program computer to the Jeep’s Onboard Diagnostics System port, and use the second code they received from the key cutter to program the replacement key, synchronizing it with the car.
Within minutes, thieves would create a valid replacement key, disable the alarm, and drive off with the car. A gang member tasked as a transporter would then take over the stolen car or motorcycle, drive it to Mexico where it would be sold as a whole or broken down into parts.
Debbie Wasserman Schultz Uses Voice Changer To Call Law Firm Suing DNC – Forgets To Disable Caller ID
[Thomas Drake] NSA Whistleblower Accuses Agency Of “Mass Electronic Surveillance”
Hackers have released the first series of leaked emails from the account of UAE’s ambassador to the United States Yousef al-Otaiba.
The Intercept reported on Saturday that the emails released by a group called “Global Leaks” show the relationship between al-Otaiba and a pro-Israel, neoconservative think tank – the Foundation for Defense of Democracies (FDD).
The hackers used a .ru email address, associated with Russia, and referred to themselves as GlobalLeaks, tying themselves to DCLeaks, a website that previously released Democratic emails.