How Easy Is It to Steal a Hidden Laptop From a Car?

The answer? Super duper easy—at least until this security glitch can be worked out.

One aspect of hacking is to point out security flaws, so companies will take the time to improve their security features. In this case, the hacking involves smashing a car window when someone detects a laptop might be hidden under a seat.
One aspect of hacking is to point out security flaws, so companies will take the time to improve their security features. In this case, the hacking involves smashing a car window when someone detects a laptop might be hidden under a seat. Sean Gallup/Getty Images

It takes tech savvy burglars to rob tech savvy people. Right? Well… not exactly. A lot of the tech that car burglars use isn’t that savvy; it can be downloaded directly onto any smartphone.

Sign Up For Our Daily Newsletter

By clicking submit, you agree to our <a rel="nofollow noreferer" href="http://observermedia.com/terms">terms of service</a> and acknowledge we may use your information to send you emails, product samples, and promotions on this website and other properties. You can opt out anytime.

See all of our newsletters

Here’s a simple formula: laptops emit a wireless signal; a Bluetooth scanner can detect devices that emit wireless signals. As Wired recently noted, in the tech-epicenter of San Francisco, there’s been a rise of laptops and gadgets being stolen from cars.

SEE ALSO: How a Hacked Light Bulb Can Lead to a Drained Bank Account

Smash-and-grabs, if you will.

In numerous cases, smash-and-grabbers are only stealing electronics from cars—when the vehicles also contain other valuables—so, hiding a laptop under a car seat won’t do the trick.

Let’s play Sherlock and deconstruct. Many laptops and gadgets have a default mode, in which, if the Bluetooth is turned on, it allows other Bluetooth devices to find them for the purpose of pairing—even if, say, the laptop is closed or in sleep mode. Thus, thieves are using Bluetooth scanners to target cars that are emitting wireless signals from the devices inside.

Case solved, Sherlock.

Using Bluetooth scanners for wireless device detection is a method also used by security professionals to detect prohibited devices at a workplace. Bluetooth scanners on Amazon cost somewhere in the $40 to $150 range. You can even install a Bluetooth scanner app from the Google Play store, which uses a smartphone’s internal Bluetooth sensors to find a list of nearby wireless signals—again, for potential pairing, or in this case, thievery. Basically, the Bluetooth scanner app makes detecting potential stolen goods easier than swiping right on Tinder.

Better not get this app into the hands of evildoers who like to smash-and-grab for fun.

Sure, you could argue that maybe these “burglars” are simply staking out parking lots to see if people are stashing their laptops after parking their cars. But the thing is: Monica Rueda, a San Jose Police Department crime prevention specialist, told Wired that often times only the electronics are stolen from vehicles, while other valuables remained un-stolen and intact. Not to give criminals any pointers, but why take the risk of breaking into a car if you can’t be sure if something of value is inside?

Even more car tech woes, Wired also reported how hackers are using an $11 radio gadget to spoof the signal from wireless car key fobs to open vehicles’ doors. How it works: one thief holds a radio gadget a few feet from the victim’s key, while his compadre holds the other gadget near the target car. The attack tricks both the car and real key into thinking they’re in close proximity.

Let’s watch the fun.

In the case of laptop thievery, as Edward Snowden pointed out, our smartphones provide a direct digital footprint and record of your location. Meanwhile, if your device is emitting a wireless signal, it too can be detected. Thus, in our brave new world, there’s always easy surveillance of both humans and devices.

So, it’s advised, if you are going to leave a device in a car, put laptops and gadgets in airplane mode or fully power them down if left unattended, rather than in sleep or standby mode. Further, even if you think a device’s battery is dead, it might not actually be dead and could still be emitting a signal.

Much like burner phones, the need for burner laptops, which allow you to remove the battery, has arisen.

One aspect of hacking is to point out security flaws, so companies will take the time to improve their security features. In this case, the hacking involves smashing a car window when someone detects a laptop might be hidden under a seat.

So, I guess a big lesson to learn is never, ever leave your laptop in a car—until this small, and easily detectable, security glitch can be worked out.

How Easy Is It to Steal a Hidden Laptop From a Car?