{"id":1198,"date":"2016-11-03T12:55:38","date_gmt":"2016-11-03T19:55:38","guid":{"rendered":"http:\/\/www.emanualonline.com\/blog\/?p=1198"},"modified":"2023-11-11T05:22:45","modified_gmt":"2023-11-11T10:22:45","slug":"car-theft-the-next-generation","status":"publish","type":"post","link":"https:\/\/www.emanualonline.com\/blog\/car-theft-the-next-generation","title":{"rendered":"Car Theft: The Next Generation"},"content":{"rendered":"<p><img decoding=\"async\" class=\"alignnone wp-image-1200 lazyload\" data-src=\"http:\/\/www.emanualonline.com\/blog\/wp-content\/uploads\/2016\/11\/DDOS-Outage-300x182.png\" alt=\"ddos-outage\" width=\"658\" height=\"399\" data-srcset=\"https:\/\/www.emanualonline.com\/blog\/wp-content\/uploads\/2016\/11\/DDOS-Outage-300x182.png 300w, https:\/\/www.emanualonline.com\/blog\/wp-content\/uploads\/2016\/11\/DDOS-Outage-768x466.png 768w, https:\/\/www.emanualonline.com\/blog\/wp-content\/uploads\/2016\/11\/DDOS-Outage-1024x621.png 1024w, https:\/\/www.emanualonline.com\/blog\/wp-content\/uploads\/2016\/11\/DDOS-Outage.png 1180w\" data-sizes=\"(max-width: 658px) 100vw, 658px\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" style=\"--smush-placeholder-width: 658px; --smush-placeholder-aspect-ratio: 658\/399;\" \/><\/p>\n<p>Late last month, a huge Distributed Denial of Service (DDoS) attack disrupted US internet traffic and shut down many popular websites including Twitter, Spotify and Vox Media. This was of course a concern to me because I could no longer read tweets from Taylor Swift and Justin Bieber. I could also no longer stream my favourite Lady Gaga song from Spotify.<\/p>\n<p>With all the free time now on my hands, I noticed a significant portion of the attack came from infected Internet-of-Things (IoT) devices such as home routers, IP video cameras, and TVs. AT&amp;T reported that although 20 car makers had cars with wireless services running through their network, they were all protected by their VPN.<\/p>\n<p>Apparently, as cars become more connected and part of the IoT, the possibility that your car can be hacked will increase. At the same time, autonomous technology is also being added to cars at a rapid pace meaning that a hacker could potentially remotely control many of your cars critical functions and\/or steal your car.<\/p>\n<h2><span style=\"color: #ff9900;\">CONNECTED CARS<\/span><\/h2>\n<p>When I think about a \u201cconnected car\u201d, I visualize a car phone, an attractive option on luxury cars from the 80\u2019s when cellular phones were the size of suitcases.<\/p>\n<p><img decoding=\"async\" class=\"wp-image-1201 lazyload\" data-src=\"http:\/\/www.emanualonline.com\/blog\/wp-content\/uploads\/2016\/11\/carphone-300x225.jpg\" alt=\"SAMSUNG\" width=\"618\" height=\"464\" data-srcset=\"https:\/\/www.emanualonline.com\/blog\/wp-content\/uploads\/2016\/11\/carphone-300x225.jpg 300w, https:\/\/www.emanualonline.com\/blog\/wp-content\/uploads\/2016\/11\/carphone-768x576.jpg 768w, https:\/\/www.emanualonline.com\/blog\/wp-content\/uploads\/2016\/11\/carphone.jpg 800w\" data-sizes=\"(max-width: 618px) 100vw, 618px\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" style=\"--smush-placeholder-width: 618px; --smush-placeholder-aspect-ratio: 618\/464;\" \/><\/p>\n<p>Obviously this is no longer the case. Almost every single manufacturer offers some sort of connectivity even for their most entry level model. For example, every Fiat-Chrysler Automotive (FCA) product has an UConnect system that allows wireless connection through both Bluetooth and cellular pairings.<\/p>\n<p><a class=\"wpil_keyword_link\" href=\"https:\/\/www.emanualonline.com\/blog\/three-teslas-in-the-top-10-fastest-selling-vehicles-in-the-u-s\"   title=\"Three Teslas in the Top 10 Fastest-Selling Vehicles in the U.S.\" data-wpil-keyword-link=\"linked\"  data-wpil-monitor-id=\"79\">Tesla<\/a> has taken this to the next level with Over The Air (OTA) software updates for their cars. Instead of having to bring, for example, a <a class=\"wpil_keyword_link\" href=\"https:\/\/www.emanualonline.com\/blog\/tesla-set-to-improve-its-12v-battery-life-with-a-software-update\"   title=\"Tesla Set to Improve its 12V Battery Life with a Software Update\" data-wpil-keyword-link=\"linked\"  data-wpil-monitor-id=\"84\">Tesla<\/a> Model X into the dealership to resolve opening door issues, Tesla uses cellular radio to upload software updates directly to vehicles. From a security standpoint, this is a big potential risk as this also means that there is a potential risk to upload malicious software to the vehicle\u2019s software system.<\/p>\n<p>Theoretically, it would be possible to use a cellular device to unlock and start the car, disable the tracking GPS and steal the car. As more and more cars adopt cellular radios for updates, there will be a larger number of cars that can be stolen remotely.<\/p>\n<h2><span style=\"color: #ff9900;\">AUTONOMOUS CARS<\/span><\/h2>\n<p><img decoding=\"async\" class=\"alignnone wp-image-1203 lazyload\" data-src=\"http:\/\/www.emanualonline.com\/blog\/wp-content\/uploads\/2016\/11\/Google-Lexus-FX450h-autonomous-vehicle-1-300x188.jpg\" alt=\"google-lexus-fx450h-autonomous-vehicle-1\" width=\"651\" height=\"408\" data-srcset=\"https:\/\/www.emanualonline.com\/blog\/wp-content\/uploads\/2016\/11\/Google-Lexus-FX450h-autonomous-vehicle-1-300x188.jpg 300w, https:\/\/www.emanualonline.com\/blog\/wp-content\/uploads\/2016\/11\/Google-Lexus-FX450h-autonomous-vehicle-1-768x480.jpg 768w, https:\/\/www.emanualonline.com\/blog\/wp-content\/uploads\/2016\/11\/Google-Lexus-FX450h-autonomous-vehicle-1-1024x640.jpg 1024w, https:\/\/www.emanualonline.com\/blog\/wp-content\/uploads\/2016\/11\/Google-Lexus-FX450h-autonomous-vehicle-1.jpg 1500w\" data-sizes=\"(max-width: 651px) 100vw, 651px\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" style=\"--smush-placeholder-width: 651px; --smush-placeholder-aspect-ratio: 651\/408;\" \/><\/p>\n<p>Another related risk is that many cars today are sold with autonomous technology. Many people only remember news stories about autonomous cars crashing, such as the <a href=\"http:\/\/www.theverge.com\/2016\/7\/26\/12287118\/tesla-autopilot-crash-images-speed-limit-ntsb\">Tesla Model S fatality<\/a>, or the Google Lexus <a href=\"https:\/\/www.engadget.com\/2016\/02\/29\/google-self-driving-car-accident\/\">crashing into a bus<\/a>. However, the reality is that even entry-level cars have autonomous technology. For example, the Ford Focus has an option of a pre-brake system that can perform emergency braking when the car is on a collision course with an object. Luxury sedans, of course, have far more sophisticated systems including radar guided cruise control that can control throttle, braking, and steering functions.<\/p>\n<p>When both autonomous and wireless technology are combined, it is possible that hackers in the future would be able to both break into, start, and drive away a vehicle remotely from the comfort of their homes. The Wall Street Journal recently reported the case of <a href=\"http:\/\/www.wsj.com\/articles\/thieves-go-high-tech-to-steal-cars-1467744606\">several Jeep car thefts<\/a> where the perpetrators used a laptop to start the vehicles and steal them. Wired magazine also recently had an article where two security researchers, Charlie Miller and Chris Valasek were able to hack into a 2014 Jeep Cherokee and <a href=\"https:\/\/www.wired.com\/2016\/08\/jeep-hackers-return-high-speed-steering-acceleration-hacks\/\">take control<\/a> of the steering and throttle inputs.<\/p>\n<h2><span style=\"color: #ff9900;\">WHAT CAN YOU DO ABOUT IT?<\/span><\/h2>\n<p>Clearly, it is only a matter of time before hackers are able to combine wireless technology to take advantage of autonomous car technologies. Fortunately, for the time being, only a limited number of cars are exposed to these vulnerabilities. Norton recommends the following <a href=\"https:\/\/ca.norton.com\/yoursecurityresource\/detail.jsp?aid=car_computer\">security measures<\/a> to prevent high-tech theft:<\/p>\n<ol>\n<li>Wireless systems. Make sure you are aware of wireless systems, such as cellular radio, or Bluetooth, installed on your car. Find out if the systems can be operated remotely. For example, sellers and security companies install engine shut-off devices.<\/li>\n<li>Car Computers. Make sure you are taking your vehicle to reputable dealers or garages, or are doing the work yourself.<\/li>\n<li>Passwords. Make sure the car computer password is changed from the default factory setting and that it is not stored in your car.<\/li>\n<\/ol>\n<p>Cars are no longer the closed system that they once were in the pre-digital age. Instead, vehicles are now open systems like the internet, and also bring with it all the associated vulnerabilities and threats.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Late last month, a huge Distributed Denial of Service (DDoS) attack disrupted US internet traffic and shut down many popular websites including Twitter, Spotify and Vox Media. This was of course a concern to me because I could no longer read tweets from Taylor Swift and Justin Bieber. I could also no longer stream my &hellip;<\/p>\n","protected":false},"author":17,"featured_media":1204,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"_uag_custom_page_level_css":"","footnotes":""},"categories":[5399],"tags":[3989],"class_list":["post-1198","post","type-post","status-publish","format-standard","has-post-thumbnail","","category-safety-news","tag-anti-theft-system"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.6 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Car Theft: The Next Generation - eManualOnline Blog<\/title>\n<meta name=\"description\" content=\"Explore the advanced tactics of modern car thieves and learn how to protect your vehicle from next-generation theft.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.emanualonline.com\/blog\/car-theft-the-next-generation\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Car Theft: The Next Generation\" \/>\n<meta property=\"og:description\" content=\"Late last month, a huge Distributed Denial of Service (DDoS) attack disrupted US internet traffic and shut down many popular websites including Twitter,\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.emanualonline.com\/blog\/car-theft-the-next-generation\" \/>\n<meta property=\"og:site_name\" content=\"eManualOnline Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/EmanualOnline\/\" \/>\n<meta property=\"article:published_time\" content=\"2016-11-03T19:55:38+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-11-11T10:22:45+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.emanualonline.com\/blog\/wp-content\/uploads\/2016\/11\/Car_theft_-_blocked_signal_2-large_transjvE9Rr87xStm87qEynN5NGtT0gK_6EfZT336f62EI5U.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"720\" \/>\n\t<meta property=\"og:image:height\" content=\"450\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Nishal Singh\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@eManualOnline\" \/>\n<meta name=\"twitter:site\" content=\"@eManualOnline\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Nishal Singh\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.emanualonline.com\\\/blog\\\/car-theft-the-next-generation#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.emanualonline.com\\\/blog\\\/car-theft-the-next-generation\"},\"author\":{\"name\":\"Nishal Singh\",\"@id\":\"https:\\\/\\\/www.emanualonline.com\\\/blog\\\/#\\\/schema\\\/person\\\/f6c46ed3516ee2a8e4398cfb78c7d382\"},\"headline\":\"Car Theft: The Next Generation\",\"datePublished\":\"2016-11-03T19:55:38+00:00\",\"dateModified\":\"2023-11-11T10:22:45+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.emanualonline.com\\\/blog\\\/car-theft-the-next-generation\"},\"wordCount\":746,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.emanualonline.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.emanualonline.com\\\/blog\\\/car-theft-the-next-generation#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.emanualonline.com\\\/blog\\\/wp-content\\\/uploads\\\/2016\\\/11\\\/Car_theft_-_blocked_signal_2-large_transjvE9Rr87xStm87qEynN5NGtT0gK_6EfZT336f62EI5U.jpg\",\"keywords\":[\"Anti-Theft System\"],\"articleSection\":[\"Safety\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.emanualonline.com\\\/blog\\\/car-theft-the-next-generation#respond\"]}],\"copyrightYear\":\"2016\",\"copyrightHolder\":{\"@id\":\"https:\\\/\\\/www.emanualonline.com\\\/blog\\\/#organization\"}},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.emanualonline.com\\\/blog\\\/car-theft-the-next-generation\",\"url\":\"https:\\\/\\\/www.emanualonline.com\\\/blog\\\/car-theft-the-next-generation\",\"name\":\"Car Theft: The Next Generation - eManualOnline Blog\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.emanualonline.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.emanualonline.com\\\/blog\\\/car-theft-the-next-generation#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.emanualonline.com\\\/blog\\\/car-theft-the-next-generation#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.emanualonline.com\\\/blog\\\/wp-content\\\/uploads\\\/2016\\\/11\\\/Car_theft_-_blocked_signal_2-large_transjvE9Rr87xStm87qEynN5NGtT0gK_6EfZT336f62EI5U.jpg\",\"datePublished\":\"2016-11-03T19:55:38+00:00\",\"dateModified\":\"2023-11-11T10:22:45+00:00\",\"description\":\"Explore the advanced tactics of modern car thieves and learn how to protect your vehicle from next-generation theft.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.emanualonline.com\\\/blog\\\/car-theft-the-next-generation#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.emanualonline.com\\\/blog\\\/car-theft-the-next-generation\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.emanualonline.com\\\/blog\\\/car-theft-the-next-generation#primaryimage\",\"url\":\"https:\\\/\\\/www.emanualonline.com\\\/blog\\\/wp-content\\\/uploads\\\/2016\\\/11\\\/Car_theft_-_blocked_signal_2-large_transjvE9Rr87xStm87qEynN5NGtT0gK_6EfZT336f62EI5U.jpg\",\"contentUrl\":\"https:\\\/\\\/www.emanualonline.com\\\/blog\\\/wp-content\\\/uploads\\\/2016\\\/11\\\/Car_theft_-_blocked_signal_2-large_transjvE9Rr87xStm87qEynN5NGtT0gK_6EfZT336f62EI5U.jpg\",\"width\":720,\"height\":450},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.emanualonline.com\\\/blog\\\/car-theft-the-next-generation#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.emanualonline.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Car Theft: The Next Generation\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.emanualonline.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.emanualonline.com\\\/blog\\\/\",\"name\":\"eManualOnline Blog\",\"description\":\"Free Tips on Car Service, Repair and General Stuff\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.emanualonline.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.emanualonline.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.emanualonline.com\\\/blog\\\/#organization\",\"name\":\"eManualOnline\",\"url\":\"https:\\\/\\\/www.emanualonline.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.emanualonline.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/cdm.emanualonline.com\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/04\\\/LOGO-NEW.png\",\"contentUrl\":\"https:\\\/\\\/cdm.emanualonline.com\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/04\\\/LOGO-NEW.png\",\"width\":512,\"height\":82,\"caption\":\"eManualOnline\"},\"image\":{\"@id\":\"https:\\\/\\\/www.emanualonline.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/EmanualOnline\\\/\",\"https:\\\/\\\/x.com\\\/eManualOnline\",\"https:\\\/\\\/www.instagram.com\\\/emanual.online\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/emanualonline\",\"https:\\\/\\\/www.pinterest.com\\\/emanualonline\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.emanualonline.com\\\/blog\\\/#\\\/schema\\\/person\\\/f6c46ed3516ee2a8e4398cfb78c7d382\",\"name\":\"Nishal Singh\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/7250fbaafd172ca36e4ca25e8d824a6dc460f1ce535d41fa874f6a100c2ae2ad?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/7250fbaafd172ca36e4ca25e8d824a6dc460f1ce535d41fa874f6a100c2ae2ad?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/7250fbaafd172ca36e4ca25e8d824a6dc460f1ce535d41fa874f6a100c2ae2ad?s=96&d=mm&r=g\",\"caption\":\"Nishal Singh\"},\"description\":\"Car enthusiast since before I could drive.\",\"sameAs\":[\"https:\\\/\\\/www.rhubix.com\"],\"url\":\"https:\\\/\\\/www.emanualonline.com\\\/blog\\\/author\\\/nishal\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Car Theft: The Next Generation - eManualOnline Blog","description":"Explore the advanced tactics of modern car thieves and learn how to protect your vehicle from next-generation theft.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.emanualonline.com\/blog\/car-theft-the-next-generation","og_locale":"en_US","og_type":"article","og_title":"Car Theft: The Next Generation","og_description":"Late last month, a huge Distributed Denial of Service (DDoS) attack disrupted US internet traffic and shut down many popular websites including Twitter,","og_url":"https:\/\/www.emanualonline.com\/blog\/car-theft-the-next-generation","og_site_name":"eManualOnline Blog","article_publisher":"https:\/\/www.facebook.com\/EmanualOnline\/","article_published_time":"2016-11-03T19:55:38+00:00","article_modified_time":"2023-11-11T10:22:45+00:00","og_image":[{"width":720,"height":450,"url":"https:\/\/www.emanualonline.com\/blog\/wp-content\/uploads\/2016\/11\/Car_theft_-_blocked_signal_2-large_transjvE9Rr87xStm87qEynN5NGtT0gK_6EfZT336f62EI5U.jpg","type":"image\/jpeg"}],"author":"Nishal Singh","twitter_card":"summary_large_image","twitter_creator":"@eManualOnline","twitter_site":"@eManualOnline","twitter_misc":{"Written by":"Nishal Singh","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.emanualonline.com\/blog\/car-theft-the-next-generation#article","isPartOf":{"@id":"https:\/\/www.emanualonline.com\/blog\/car-theft-the-next-generation"},"author":{"name":"Nishal Singh","@id":"https:\/\/www.emanualonline.com\/blog\/#\/schema\/person\/f6c46ed3516ee2a8e4398cfb78c7d382"},"headline":"Car Theft: The Next Generation","datePublished":"2016-11-03T19:55:38+00:00","dateModified":"2023-11-11T10:22:45+00:00","mainEntityOfPage":{"@id":"https:\/\/www.emanualonline.com\/blog\/car-theft-the-next-generation"},"wordCount":746,"commentCount":0,"publisher":{"@id":"https:\/\/www.emanualonline.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.emanualonline.com\/blog\/car-theft-the-next-generation#primaryimage"},"thumbnailUrl":"https:\/\/www.emanualonline.com\/blog\/wp-content\/uploads\/2016\/11\/Car_theft_-_blocked_signal_2-large_transjvE9Rr87xStm87qEynN5NGtT0gK_6EfZT336f62EI5U.jpg","keywords":["Anti-Theft System"],"articleSection":["Safety"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.emanualonline.com\/blog\/car-theft-the-next-generation#respond"]}],"copyrightYear":"2016","copyrightHolder":{"@id":"https:\/\/www.emanualonline.com\/blog\/#organization"}},{"@type":"WebPage","@id":"https:\/\/www.emanualonline.com\/blog\/car-theft-the-next-generation","url":"https:\/\/www.emanualonline.com\/blog\/car-theft-the-next-generation","name":"Car Theft: The Next Generation - eManualOnline Blog","isPartOf":{"@id":"https:\/\/www.emanualonline.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.emanualonline.com\/blog\/car-theft-the-next-generation#primaryimage"},"image":{"@id":"https:\/\/www.emanualonline.com\/blog\/car-theft-the-next-generation#primaryimage"},"thumbnailUrl":"https:\/\/www.emanualonline.com\/blog\/wp-content\/uploads\/2016\/11\/Car_theft_-_blocked_signal_2-large_transjvE9Rr87xStm87qEynN5NGtT0gK_6EfZT336f62EI5U.jpg","datePublished":"2016-11-03T19:55:38+00:00","dateModified":"2023-11-11T10:22:45+00:00","description":"Explore the advanced tactics of modern car thieves and learn how to protect your vehicle from next-generation theft.","breadcrumb":{"@id":"https:\/\/www.emanualonline.com\/blog\/car-theft-the-next-generation#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.emanualonline.com\/blog\/car-theft-the-next-generation"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.emanualonline.com\/blog\/car-theft-the-next-generation#primaryimage","url":"https:\/\/www.emanualonline.com\/blog\/wp-content\/uploads\/2016\/11\/Car_theft_-_blocked_signal_2-large_transjvE9Rr87xStm87qEynN5NGtT0gK_6EfZT336f62EI5U.jpg","contentUrl":"https:\/\/www.emanualonline.com\/blog\/wp-content\/uploads\/2016\/11\/Car_theft_-_blocked_signal_2-large_transjvE9Rr87xStm87qEynN5NGtT0gK_6EfZT336f62EI5U.jpg","width":720,"height":450},{"@type":"BreadcrumbList","@id":"https:\/\/www.emanualonline.com\/blog\/car-theft-the-next-generation#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.emanualonline.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Car Theft: The Next Generation"}]},{"@type":"WebSite","@id":"https:\/\/www.emanualonline.com\/blog\/#website","url":"https:\/\/www.emanualonline.com\/blog\/","name":"eManualOnline Blog","description":"Free Tips on Car Service, Repair and General Stuff","publisher":{"@id":"https:\/\/www.emanualonline.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.emanualonline.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.emanualonline.com\/blog\/#organization","name":"eManualOnline","url":"https:\/\/www.emanualonline.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.emanualonline.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/cdm.emanualonline.com\/blog\/wp-content\/uploads\/2021\/04\/LOGO-NEW.png","contentUrl":"https:\/\/cdm.emanualonline.com\/blog\/wp-content\/uploads\/2021\/04\/LOGO-NEW.png","width":512,"height":82,"caption":"eManualOnline"},"image":{"@id":"https:\/\/www.emanualonline.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/EmanualOnline\/","https:\/\/x.com\/eManualOnline","https:\/\/www.instagram.com\/emanual.online\/","https:\/\/www.linkedin.com\/company\/emanualonline","https:\/\/www.pinterest.com\/emanualonline\/"]},{"@type":"Person","@id":"https:\/\/www.emanualonline.com\/blog\/#\/schema\/person\/f6c46ed3516ee2a8e4398cfb78c7d382","name":"Nishal Singh","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/7250fbaafd172ca36e4ca25e8d824a6dc460f1ce535d41fa874f6a100c2ae2ad?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/7250fbaafd172ca36e4ca25e8d824a6dc460f1ce535d41fa874f6a100c2ae2ad?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/7250fbaafd172ca36e4ca25e8d824a6dc460f1ce535d41fa874f6a100c2ae2ad?s=96&d=mm&r=g","caption":"Nishal Singh"},"description":"Car enthusiast since before I could drive.","sameAs":["https:\/\/www.rhubix.com"],"url":"https:\/\/www.emanualonline.com\/blog\/author\/nishal"}]}},"uagb_featured_image_src":{"full":["https:\/\/www.emanualonline.com\/blog\/wp-content\/uploads\/2016\/11\/Car_theft_-_blocked_signal_2-large_transjvE9Rr87xStm87qEynN5NGtT0gK_6EfZT336f62EI5U.jpg",720,450,false],"thumbnail":["https:\/\/www.emanualonline.com\/blog\/wp-content\/uploads\/2016\/11\/Car_theft_-_blocked_signal_2-large_transjvE9Rr87xStm87qEynN5NGtT0gK_6EfZT336f62EI5U-150x150.jpg",150,150,true],"medium":["https:\/\/www.emanualonline.com\/blog\/wp-content\/uploads\/2016\/11\/Car_theft_-_blocked_signal_2-large_transjvE9Rr87xStm87qEynN5NGtT0gK_6EfZT336f62EI5U-300x188.jpg",300,188,true],"medium_large":["https:\/\/www.emanualonline.com\/blog\/wp-content\/uploads\/2016\/11\/Car_theft_-_blocked_signal_2-large_transjvE9Rr87xStm87qEynN5NGtT0gK_6EfZT336f62EI5U.jpg",618,386,false],"large":["https:\/\/www.emanualonline.com\/blog\/wp-content\/uploads\/2016\/11\/Car_theft_-_blocked_signal_2-large_transjvE9Rr87xStm87qEynN5NGtT0gK_6EfZT336f62EI5U.jpg",618,386,false],"1536x1536":["https:\/\/www.emanualonline.com\/blog\/wp-content\/uploads\/2016\/11\/Car_theft_-_blocked_signal_2-large_transjvE9Rr87xStm87qEynN5NGtT0gK_6EfZT336f62EI5U.jpg",720,450,false],"2048x2048":["https:\/\/www.emanualonline.com\/blog\/wp-content\/uploads\/2016\/11\/Car_theft_-_blocked_signal_2-large_transjvE9Rr87xStm87qEynN5NGtT0gK_6EfZT336f62EI5U.jpg",720,450,false],"tie-small":["https:\/\/www.emanualonline.com\/blog\/wp-content\/uploads\/2016\/11\/Car_theft_-_blocked_signal_2-large_transjvE9Rr87xStm87qEynN5NGtT0gK_6EfZT336f62EI5U-110x75.jpg",110,75,true],"tie-medium":["https:\/\/www.emanualonline.com\/blog\/wp-content\/uploads\/2016\/11\/Car_theft_-_blocked_signal_2-large_transjvE9Rr87xStm87qEynN5NGtT0gK_6EfZT336f62EI5U-310x165.jpg",310,165,true],"tie-large":["https:\/\/www.emanualonline.com\/blog\/wp-content\/uploads\/2016\/11\/Car_theft_-_blocked_signal_2-large_transjvE9Rr87xStm87qEynN5NGtT0gK_6EfZT336f62EI5U-310x205.jpg",310,205,true],"slider":["https:\/\/www.emanualonline.com\/blog\/wp-content\/uploads\/2016\/11\/Car_theft_-_blocked_signal_2-large_transjvE9Rr87xStm87qEynN5NGtT0gK_6EfZT336f62EI5U-660x330.jpg",660,330,true],"big-slider":["https:\/\/www.emanualonline.com\/blog\/wp-content\/uploads\/2016\/11\/Car_theft_-_blocked_signal_2-large_transjvE9Rr87xStm87qEynN5NGtT0gK_6EfZT336f62EI5U.jpg",720,450,false]},"uagb_author_info":{"display_name":"Nishal Singh","author_link":"https:\/\/www.emanualonline.com\/blog\/author\/nishal"},"uagb_comment_info":0,"uagb_excerpt":"Late last month, a huge Distributed Denial of Service (DDoS) attack disrupted US internet traffic and shut down many popular websites including Twitter, Spotify and Vox Media. This was of course a concern to me because I could no longer read tweets from Taylor Swift and Justin Bieber. I could also no longer stream my&hellip;","_links":{"self":[{"href":"https:\/\/www.emanualonline.com\/blog\/wp-json\/wp\/v2\/posts\/1198","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.emanualonline.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.emanualonline.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.emanualonline.com\/blog\/wp-json\/wp\/v2\/users\/17"}],"replies":[{"embeddable":true,"href":"https:\/\/www.emanualonline.com\/blog\/wp-json\/wp\/v2\/comments?post=1198"}],"version-history":[{"count":9,"href":"https:\/\/www.emanualonline.com\/blog\/wp-json\/wp\/v2\/posts\/1198\/revisions"}],"predecessor-version":[{"id":92635,"href":"https:\/\/www.emanualonline.com\/blog\/wp-json\/wp\/v2\/posts\/1198\/revisions\/92635"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.emanualonline.com\/blog\/wp-json\/wp\/v2\/media\/1204"}],"wp:attachment":[{"href":"https:\/\/www.emanualonline.com\/blog\/wp-json\/wp\/v2\/media?parent=1198"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.emanualonline.com\/blog\/wp-json\/wp\/v2\/categories?post=1198"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.emanualonline.com\/blog\/wp-json\/wp\/v2\/tags?post=1198"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}