About Us | Contact Us
View Cart

New Method of Automobile Break-In

By Vigilize | Wednesday, March 31, 2010 - Leave a Comment

I drove myself and two co-workers to lunch Monday. I chose a parking spot in the rear of the lot and backed into a space (there were no pull-throughs available at the location). This positioned my Chevy Avalanche with the passenger side doors facing away from the rest of the lot and to the end of the lot. I had a Sony digital camera lying on the console of my truck. Upon returning from lunch and entering the vehicle we noticed nothing wrong or missing from the vehicle.

Tuesday, around lunch time, I needed the camera and could not locate it. My first thoughts were that I moved it, or it fell to the floor mat or I removed it from my truck. After searching feverishly for two days, questioning anyone who had been close to my truck, and exhausting every possible location I could have put it, I began to have that sinking feeling I lost it or someone stole it. My new Garmin GPS had been in the truck the whole time, so I felt as if someone had entered my vehicle they would have taken it also.

Hole Under Lock

Fast forward to Wednesday, I approached my truck from the passenger side to place my computer bag (aka my man purse) in the front passenger seat. As I reached to open the door I noticed there was a hole right under my door handle. My first thought was that someone had shot my truck! I began to think about it and inspect it a little closer and the “light” slowly began to come on. I phoned my friend who owns a body shop and asked if he had any vehicles with damage to the doors that looked like a bullet hole. His response was that he sees it all the time. Thieves have a punch and place it right under the door handle, knock a hole through, reach in and unlock it, just as if they have a key. No alarms, broken glass or anything.

I then placed a call to my insurance agent, who is also a friend, and explained it to him. I proceeded to tell him the situation and how I was puzzled that they left my GPS and all other belongings. Here is where it gets scary! His reply was that they want the break-in to be so subtle that the victims don’t even realize it. They look at your GPS to see where “home” is. Now they know what you drive, go to your home, and if your vehicle isn’t there they assume you aren’t and break in your home. He said that they will even leave a purse or wallet and only take one or two credit cards. If the thieves find a check book, they only take checks from the middle section so they wouldn’t be noticed. They even give you the courtesy of re-locking your doors for you. (I guess they don’t want it to be broken into by other thieves!) By the time the victims realize there has been a theft, they may have already had a couple days or more to use them. This is another reason they want the break-in to go unnoticed. I didn’t realize my situation for two full days!

Here are a few things you should do:

  • Do NOT leave valuables in sight inside the car. Either take them with you are lock them in your trunk.
  • Remove your home address as “home” from your GPS unit ASAP! Put in your local Wal-Mart address or somewhere else!
  • Park your vehicle in a highly visible place. I positioned mine perfectly for them and didn’t realize it until it was too late.
  • Periodically walk around your car, especially if you are in a shopping center or other parking area.
  • Report thefts immediately. Call the police and your insurance company, your bank with missing check numbers, your credit card agencies, etc.

I hope this is beneficial to you and helps you keep your valuables in your possession and your vehicle from damage. Most importantly, it may keep the thieves from showing up at your home!


NOTE: The following information was provided to me by Don Smith, Chief Information Security Officer of STAR Financial Bank and has been confirmed by John Lefever, President of STAR Insurance. John has spoke with local body shops who have verified that this is very true and that they have seen several just like this. Sometimes the damage can be repaired and on others, it requires a whole new exterior door skin.


 

Latest News
    The joint cybersecurity advisory includes the 15 most exploited vulnerabilities reported in 2021… An article review.  While a lot of attention is focused on previously undisclosed or “zero day” attacks, some of the most likely attack vectors are vulnerabilities that have been widely known for weeks or even months.  That’s according to a new joint […]
    Threats are changing, EDR can help us adapt . . . Today’s advanced persistent threat (APT) understands that the IT landscape has changed. In the post-COVID age, more and more organizations have adopted some form of work from home.  While WFH offers many conveniences, it also imparts increased risks. BitSight conducted a 2021 study of […]
    The Five Precepts of IT Vendor Management Webinar-Movie We’re going back to basics on Vendor Management. This webinar will give you a training tool to help out that new person that is starting to take on the gargantuan task that is Vendor Management.
    A new way of helping people “read” new guidance… Look for more in the future! To save you time, we are proud to present “Adam Reads” . . . recorded versions of our Guidance Summaries! Below you can find an embedded player for the audio file. If you are having issues with that working, you […]
    You think you’ve finally found stability in your to-do list. Your goals are set, and you’re even making great progress on them all. Audit findings: all addressed. Management requests: Under control. Heck, you might even be able to leave the office five minutes early at least once this year. Then BAM! A press release from […]
    Software Bill of Materials (SBOMs) are becoming more and more important. . . We are all very familiar with one aspect of the software supply chain – updates.  New features, bug fixes, and performance upgrades are a regular occurrence to any device’s lifecycle, however what if these kinds of updates also include deliberately malicious code? […]
    Another awareness poster for YOUR customers (and users).  Now that we have our own employees aware, maybe it’s time to start posting content for our customers! Check out posters.infotex.com for the whole collection! Download the large versions here: Awareness Poster (Portrait) Awareness Poster (Landscape)   You are welcome to print out and distribute this around […]
    According to a new survey, more organizations than ever are reporting problems with cybersecurity staffing… An article review. While pandemic related mandates and restrictions are gradually being lifted across the country, many organizations are still feeling the effects in one important area: staffing.  That’s according to ISACA’s annual State of Cybersecurity survey, which asked over […]
    Understanding Banking Trojans… Another Technical Article by Tanvee Dhir! What are Banking Trojans? A trojan is a malicious program that masquerades as a genuine one. They are often designed to steal sensitive information from users (login passwords, account numbers, financial information, credit card information, etc.). A banking trojan is a malicious computer program designed to […]
    Top Seven Risks . . . that small bank Information Security Officers face in 2022! Once again, we compile this list in preparation for updating our normal board of directors awareness training presentation and movies and such.  This list is meant for community-based banks but could apply to small businesses.  How this works can be illustrated […]