Vehicle security

back to http://scratchpad.wikia.com/wiki/Sasecurity

Dome camera on the roof
Place a four dome cameras on the roof of a vehicle and manipulate it via Hamachi (P2P) TelevisionOverInternet and GpsAndGprs. Before opening the door the camera on the driver side will do a FacialRecognition scan, at the same time the other three cameras will send a snapshot to the base in India, make certain you aren't loaded into your boot etc.

Vehicle detection

 * https://www.youtube.com/watch?v=MQTHcKgDRto  vehicle detection with inductive coil from  http://www.chemelec.com
 * http://www.instructables.com/id/Vehicle-Immobilizer/?ALLSTEPS Immobilizer

Preventing Car theft
Vehicle security - * http://mybroadband.co.za/vb/showthread.php?p=1934726#post1934726 * http://mybroadband.co.za/vb/showthread.php?t=65516&page=5

If the bonnet can be opened then any vehicle's immobilizer electronics can be bypassed and the vehicle stolen. Install an alarm type keypad in the center of the dashboard interfaced with the Rs-232 port of an EmbeddedPc. The car won't start nor allow the bonnet to be opened unless the correct key combination has been typed in. This keypad enables a duress system to be implemented. If an intruder forces a person to open the bonnet or enable the cars ignition a GpsAndGprs signal is sent to the base station. Attach http://www.gsmcommander.com or any other GpsAndGprs modem to the fuel-cutout switch mounted close to the engine under the bonnet. If the vehicle is stolen give the gsm modem a missed call to cut-off the engine.

Truck theft
http://www.gizmag.com/volvo-trucks-tackle-roadside-pirates/13003/?utm_source=Gizmag+Subscribers&utm_campaign=3a99ce2838-UA-2235360-4&utm_medium=email

''“I’d stopped at a lay-by on the border with Belgium to have a nap. Both my mobile phone and alarm clock were set to wake me up at five, but I heard nothing,” he says. Not really so strange bearing in mind that the robbers had sprayed gas through the side window that Seufert had left open to let in fresh air. When the French police arrived, they explained that he’d been lucky – it was his open window that ensured his survival. If the gas had not been diluted by the fresh air, he could have died inside his cab.''

Install quad drone and fixed wing wing drone(disposable) inside an embedded container on top of the truck. This will reduce the loadable volume of the trailer slightly. The drones loiter over truck when pulled over by hijackers at truck jacking hotspots. Drone costs have come down to such an extent that a small disposable drone could be used for this purpose. Due to the close proximity to public road, such a small form factor will also reduce risk of injury to road users. Lock the truck doors from the inside using a http://sasecurity.wikia.com/wiki/Cnc_electronics#z-axis setup, which can only be activated with GpsAndGprs signal. Same concept as locking the bonnet of SUV from the inside with http://sasecurity.wikia.com/wiki/Cnc_electronics#z-axis. Sa truck jacking hotspots are between Benoni/ Delmas N12. N3 Alberton/ Heidelberg and R59 Vereeniging/Alberton. Wednesday and Friday's are peak times 9am - 12pm and after 20:00 pm.

Privacy invasive anti-theft measure
Employ Chinese and Indians with broadband internet connections. Install a SerialCameras - http://tinyurl.com/5bj5t5 - inside your car and a pan-tilt system on the roof. The pan-tilt will continually rotate 360 degrees taking pictures and storing it on the EmbeddedPc - http://tinyurl.com/6ow3sd. Every time the door opens or if the window is broken (detected with a vibration sensor) the camera inside takes a picture. The inside picture and outside picture are transmitted in real-time to China via a GpsAndGprs-http://tinyurl.com/5gsb2c - modem connection. This results in an extremely low bandwidth usage security measure.

The Chinese will manually inspects the picture and decides wether a hijacking or theft has taken place or not. On an alert it will FTP the pictures to http://www.netstar.co.za for further action. The cameras will only trigger if the door is opened or the window is broken, thus providing one with a reasonable compromise between privacy, bandwidth costs and not getting killed.

The same sort of concept can be extended to perimeter protection using ZoneMinder - http://tinyurl.com/5a4hmg - and InfraRedLeds- http://tinyurl.com/67orcu. On an alert the snapshot is first sent to 10 different Indians on different PC's in India and they don't have to know about each other. Each manually inspects the image and if for example it was a cow or monkey on a farm triggering the alert they will indicate is as such. If just one person fails to reply or corroborate what the other 9 are indicating triggered an alert then the farmer will receive an MMS on his phone plus a missed call to wake him up. How would anybody get past such a system ?

Watch every traffic light with camera
Lets extend the concept to every traffic robot in Gauteng. Install a 3G and GPRS camera system on each robot. A poor illiterate Indian in Punjab pushes buttons in real-time on a touch-sensitive screen: "Five men loitering", "condition red", "accident", "Car abandoned" etc. The GPS and GPRS system in your vehicle pulls these real-time alerts from this pc in India only when you are in the approximate vicinity of such a specific traffic robot or turn-off such as Rigel/N1 junction in Pretoria.

You could for example set your thresholds to only give you a warning if there are people loitering about the robot which would be condition red. If the Indian designates condition "green" then you wouldn't receive a real-time alert as you approach a possible hijacking junction. This would allow our society to return to normality as we hire thousands of Indians to be virtual security guards. The GPS and GPRS system in your vehicle pulls these real-time alerts from this pc in India only when you are in the approximate vicinity of such a specific traffic robot or turn-off such as Rigel/N1 junction in Pretoria.

Anti-Towing measures

 * A Propeller RateGyro2, Gimbal measures the incline a vehicle makes and alerts the GpsAndGprs system.
 * Speed sensor, RateGyro2 and digital compass detects movement when engine is not running.

Loss of GPS signal
GPS signals aren't always available such as in city centers.
 * Measure the distance and speed a vehicle travels from the gearbox sensor.
 * A Propeller RateGyro2 and digital compass determines the turns a vehicle makes
 * Allows an approximate GPS position to be established from the moment of GPS signal loss.
 * Implements same concept as under RobotPatrolling.

Ultra-sonics
It seems facial recognition of a driver behind a wheel is becoming a reality, we should see commercial systems soon.

http://www.springerlink.com/content/y4164k783008rg15/ "...Our experimental results indicated that the algorithm is robust for driver authentication inside the vehicle and is also reasonably fast for real-time processing....."

As an added measure place a dome camera on the roof which will send snapshots to the base via an embedded pc/GPRS combination. Install an IR and/or Ultrasonic distance measurement(UDM) device that is used in robotics on the roof/door junction. The UDM can accurately determine the distance of a close range object up to a centimeter. Thus as people walk past the car say 1meter away, no images will be sent, only if somebody is within 50cm of the door will a snapshot be sent.

Now imagine if you can prove to a would be hijacker with a logo on the door pointing to a website that you really, really do have such a face authentication system and that his face will be sent via GPRS to a PC, he won't hijack the car to begin with in the first place - just like no Eskom and Telkom bakkies are hijacked anymore since the crooks are convinced they won't get away.

Lets recap: commercial systems soon.
 * Camera dome on roof that automatically turns in the direction of UDM trigger and sends snapshot to base.
 * Bonnet lock device.
 * Ultrasonic(UDM) and IR distance measurement sensors on roof and inside car. See http://sasecurity.wikia.com/wiki/Comp_home_automation#Doppler_radar
 * GPRS/GPS system linked to embedded pc in car.
 * Embedded PC gets power from a DC-DC converter(http://tinyurl.com/6n3qa6)
 * GPS signals aren't always available such as in city centers. Measure the distance and speed a vehicle travels from the gearbox sensor. A Propeller RateGyro2 and digital compass determines the turns a vehicle makes. Allows an approximate GPS position to be established from the moment of GPS signal loss.
 * On spectrum jamming attempt using http://www.phonejammer.com the panic button is activated on the Netstar radio transponder back-up system. Netstar gets SMS from your PC saying that it has lost GPRS contact and provides last GPS coordinates. Netstar sends out the marines.
 * Place a GunShotDetection device in your car - http://tinyurl.com/6gpwn4.
 * A Propeller RateGyro2 - http://tinyurl.com/5aojhv - measures the incline a vehicle makes and alerts the Gprs system. If a car is being towed it will make an incline. The "propeller" IMU uses Kalman filtering.
 * When Netstar gets the radio panic alert they will FTP all the images triggered by the UDM the dome camera sent to your PC via GPRS to theirs to see what happened right before your door was opened.
 * Advertise all these measures - don't bluff, prove it - hijacker will go somewhere else. - It seems facial recognition of a driver behind a wheel is becoming a reality, we should see

http://www.springerlink.com/content/y4164k783008rg15/ "...Our experimental results indicated that the algorithm is robust for driver authentication inside the vehicle and is also reasonably fast for real-time processing....."

As an added measure place a dome camera on the roof which will send snapshots to the base via an embedded pc/GPRS combination. Install an IR and/or Ultrasonic distance measurement(UDM) device that is used in robotics on the roof/door junction. The UDM can accurately determine the distance of a close range object up to a centimeter. Thus as people walk past the car say 1meter away, no images will be sent, only if somebody is within 50cm of the door will a snapshot be sent.

Now imagine if you can prove to a would be hijacker with a logo on the door pointing to a website that you really, really do have such a face authentication system and that his face will be sent via GPRS to a PC, he won't hijack the car to begin with in the first place - just like no Eskom and Telkom bakkies are hijacked anymore since the crooks are convinced they won't get away.

Lets recap: 1) Camera dome on roof that automatically turns in the direction of UDM trigger and sends snapshot to base. 2) Bonnet lock device. 3) Ultrasonic(UDM) and IR distance measurement sensors on roof and inside car. 4) GPRS/GPS system linked to embedded pc in car. 5) Embedded PC gets power from a DC-DC converter(http://tinyurl.com/6n3qa6) 6)GPS signals aren't always available such as in city centers. Measure the distance and speed a vehicle travels from the gearbox sensor. A Propeller RateGyro2 and digital compass determines the turns a vehicle makes. Allows an approximate GPS position to be established from the moment of GPS signal loss. 7) On spectrum jamming attempt using http://www.phonejammer.com the panic button is activated on the Netstar radio transponder back-up system. Netstar gets SMS from your PC saying that it has lost GPRS contact and provides last GPS coordinates. Netstar sends out the marines. 8) Place a GunShotDetector device in your car - http://tinyurl.com/6gpwn4. 9) A Propeller RateGyro2 - http://tinyurl.com/5aojhv - measures the incline a vehicle makes and alerts the Gprs system. If a car is being towed it will make an incline. The "propeller" IMU uses Kalman filtering. 10)When Netstar gets the radio panic alert they will FTP all the images triggered by the UDM the dome camera sent to your PC via GPRS to theirs to see what happened right before your door was opened. 11) Infrared module detects wether a white, colored or black person is behind the wheel. - http://citeseer.ist.psu.edu/676368.html 12) Each chair has a weight sensor. 13) Vibration and ambient light detection circuit inside dashboard and bonnet to detect forced entry - http://www.ewcop.com 14) Ultra-violet detector detects actual flames - http://www.bomarc.org/catalogs/Catal.../DETECTION.txt 13) Advertise all these measures - don't bluff, prove it - hijacker will go somewhere else.

Bomarc provides reverse engineered schematics of commercial electronic and security products. http://www.bomarc.org/catalogs/Catal.../DETECTION.txt
 * Infrared module detects wether a white, colored or black person is behind the wheel.
 * Each chair has a weight sensor.
 * Vibration and ambient light detection circuit inside dashboard and bonnet to detect forced entry - http://www.ewcop.com

UAV transponder relay
Place illegal 200Mhz transmitter in vehicle that triggers upon a GSM jamming attempt. It sends a signal to a Uav robotics drone circling Gauteng at a hight of 10km. To avoid usage of this illegal frequency, use the GSM gprs network which covers the whole South-Africa. The digital transmitter will use the Uav robotics IMU system in the vehicle instead of GPS to provide approximate position of vehicle.

Lets presume Icasa want's to confiscate such a device: How do we destroy the transmitter without damaging the vehicle. Thus we can't use a flame-able Gel. An illegal wimax transmitter is sealed with a Gel that burns out the box should the Icasa A-team arrives to confiscate.

Since the cost of the electronics is plummeting, destroying the device outright is viable. In fact even the UAV itself could be disposed off in the see. Petrol driven scan eagle achieves 2000km distance.

There must be some scheme whereby we fund can somebody to launch UAV's to patrol the roads. Best way at present is to setup our own security company, the security company when paid by a client to fly a UAV is still responsible. If a person flies a UAV on your instruction and funding, you are legally liable. If anything goes wrong and a UAV takes down a boeing, our intelligence services would be able to track down the people that funded UAV the operations. From the UAV computer, they are able to trace the person that purchased the gyro's etc.

Thus how do we fund UAV operations in such a way that you could claim something analogous to Plausible deniability. The FBI intercepted encrypted hard drives and got the court to order the owner to provide the passwords. Thus encryption software devised a scheme whereby an hdd owner could claim plausible deniability in stating that he doesn't have any encrypted information.

Build 400Mhz Wimax base stations, running off battery packs. Use a quadro copter to place these in gardens scattered over a geographic area, forming a mesh network. When Icasa eventually tracks down the transmitter, the property owner would be genuinely speaking the truth in stating that he didn't place it there, nor had any knowledge. This of course creates a Plausible Deniability situation. By demonstrating that illegal Wimax transmitters can be sneaked into gardens an owner could plausibly deny that he placed it there. Because he obviously could have placed it there himself.

Serial cameras to RS485 on a truck
Loop a RS485 circuit through the truck. Each slave point connect IR, ultrasonics and SerialCameras and interface with the EmbeddedPc

How a vehicle is stolen
An intruder connects 12v to the actuating solenoid on the diesel pump enabling the diesel to flow through the diesel pump. The two contacts on the starter motor are bridged with a spanner, starting the engine. The cars electronics are usually unaware of this as the the thief drives of with the pick-up without power-steering. Any vehicle can be stolen if the bonnet can be opened enabling access to the diesel pump. All security systems that don't lock the bonnet is a waste of money.

Gearlocks
A gear lock is an effective stalling mechanism to prevent car theft. It takes about 5min to disable the gear lock. The rubber around the gear leaver is removed and the metal plate on the gearbox is smashed to pieces via hammer and pin. This enables the gear leaver to slide out upwards from the gear lock clamp. The gear leaver is placed back and the thief drives off with the car. A gear lock will stall a theft but not prevent it.

Steering wheel lock
A steering wheel lock is circumvented by removing the nut that holds the steering wheel to the dashboard and removing the entire steering wheel. Or the steering wheel lock is removed by cutting through the steering wheel itself. * http://www.saia-approved.co.za/SAIA-Approved.htm * http://www.anti-theft.co.za

Securing the doors of a truck
Lock the doors from the inside via a bevel gear driven by a motor. The doors can only be opened with a radio signal such as GpsAndGprs and RS485 / ["RS485"].

Commercial Immobilizers are a scam
Any vehicle can be stolen if access to engine is obtained. The bonnet must be locked from the inside. A fuel cut-off device will not work. The thief opens the bonnet and attaches a 5liter petrol/diesel can via a short length pipe directly to the pump or fuel intake port of the engine. The commercial fuel cut-out devices are installed under the dashboard and is bypassed by the thief in the manner described. The fuel cut-out device must be installed as close as possible to the engine itself, which is why the bonnet must be closed be locked from the inside by a mechanical electronic actuated device.

Facial recognition
Use FacialRecognition on a central computer to authenticate hundreds of drivers every time their door opens or closes. Their face is sent via GprsAndGps to the base. Or GPRS the all movement inside the vehicle whenever the door opens/closes. The degree of privacy vs. security is something each vehicle owner must decide for himself. In my view advertising on http://www.antihijack.co.za that anybodies face inside the vehicle will be sent in real-time to a central PC will dissuade a would be hijacker. Automated computer based facial recognition for vehicles is probably three years away(well three years since this post and Opencv, makes it possible). When contracting somebody to implement the algorithms it will be helpful if you can demonstrate some python, c knowledge. If you make it clear you know nothing, then the engineer implementing it will bill you proportional to your lack of knowledge.

Zoneminder inside vehicle
Install an EmbeddedPc and ZoneMinder inside the vehicle. The moment there is motion anywhere the camera points to, a picture is sent to the base station via GpsAndGprs. In a hijacking situation the tracking company can get a picture of the person behind the steering wheel. See FacialRecognition

Transponder in car
Place radio transponder in vehicle that picks up if vehicle is moving from its parked position. This allows monitoring if GPS reception is not available.

In radius of vehicle
In 99% of cases a person in distress is within a 100m radius of his vehicle. Carry a PanicButton that will send a signal on the 433mhz band to the EmbeddedPc connected through GpsAndGprs. The EmbeddedPc sends the GPS coordinates to the security company.

Spectrum jamming of 900mHz
The GpsAndGprs modem pulls in a relay on detecting a spectrum jamming attempt which can be connected to the panic button of the tracking company - alerting them of a jamming attempt. GSM uses spread-spectrum frequency hopping which can be easily jammed with a jamming device. This is why only http://www.netstar.co.za an Altech company should be used to track vehicles. Their radio towers provides backup if the GSM signal is jammed. The GpsAndGprs modem pulls in a relay on detecting a jamming attempt. This activates the panic button in the vehicle sending Netstar a panic. Netstar looks up the last GPS coordinates send to a central base by the EmbeddedPc every 5minutes. The last position of the vehicle will enable radio triangulation to work better. See GpsAndGprs on details for building our own GSM modem to bypass spectrum jamming.

Times that hijackers strike
www.hijacking.co.za details the modus-operandi of hijackers and the times that they strike. According to their site most hijackings take place at 6pm when people return from work. A script that will send out an alert to the basestation should the person arrive at home and immediately leave(thus deviating from normal activity indicating a possible hijacking). The flex ability that an EmbeddedPc provides, allows for such customised surveillance of a vehicle and driving patterns. The operator will be in voice contact with the driver via VOIP over GPRS or MeshNetworking. Install a small omni AnteNna on the vehicle that only activates on certain GPS coordinates so as not to cause 2.4ghz spectrum pollution. Hijackings take place with such speed that all you will be able to do is to inform the operator that six goons have just surrounded your car. The operator then remotely GPRS the dome camera's images on the vehicle roof.

http://www.news24.com/Beeld/My_Storie/0,,3-2053_1953954,00.html - AntiHijacking. The TelephoneNetworkRollout enables enough bandwidth to be created for each resident to place a camera on their driveway to watch over them as they arrive.

Replace the dashboard with bulletproof glass
Replace the dashboard with Lexar bulletproof glass that has been cut to fit. The only place a tracking device can be embedded is in the dashboard of the bakkie. Connected to the bulletproofed glass is a vibration sensor that detects an attempt at smashing through the glass. The vibration sensor interfaces with the AtmelMicro connected to the parallel port of the EmbeddedPc.

GPS in South Africa
The SA street map software all seems to be Windows based. Veza and other has an option to take a GPS coordinate and provide the closest street. WindowsAutomation software takes the GPS coordinates from GpsAndGprs and returns the closest street. See http://www.tracks4africa.co.za and  http://veza.co.za

Route plotting
With an EmbeddedPc route plotting can be done to such a high precision that a driver just slowing down at the wrong coordinates will trigger an alarm.

Camera dome on the roof
The GPS automatically activates and sends back snapshots of the residential driveway or danger zone via GPRS. In the http://www.lowvelder.co.za there was an article about a farmer in the lowveld who drove into an ambush. The assailants laid rocks unto the road forcing him to a stop. With the EmbeddedPc he would have had enough time to activate a panic button. The GpsAndGprs streams JPEG snapshots of the dome camera on the roof to the base station for real-time verification and false alarm elimination and provides added urgency and incentive to come to a distressed person's assistance.

A speed sensor attached to the EmbeddedPc provides precise speed information and slowing or stopping at the wrong GPS coordinates will send an image via GpsAndGprs to the base. Via GprsAndGps and RS485 real-time control of the pan/tilt/zoom functions of the dome camera on the roof of the vehicle is possible.

Motorbike and pickup security on farm
Lay TwistedPair around farm perimeter as described under SecuringPerimeter and install multiple DrillBoxes. From the DrillBoxes a DhCp lease is handed out by MeshNetworking. Install MeshNetworking and EmbeddedPc inside pickup or motorbike. Mount a dome camera on the roof and backseat of motorbike repspectivly. Using RadioModems the farmer sends a panic to the vehicle on the 433mhz band. A security operator manipulates the dome camera using RS485 through the MeshNetworking towers to visually inspect in real-time the situation.

The dome camera on the nose of the motorbike and back of bike is continually streamed to a server on the farm. On receiving a distress the operator can watch a time compressed image of any events before and after receiving a panic signal. Lets presume your are being executed in real-time. You might not want all the farmers around you to witness such an event. To protect your privacy the operator only will watch what is going on. He could then send an SMS to each farmer indicating that you are being fired upon. With opensource tools any amount of privacy protection is available.

Datadot spray on security
http://www.datadotsecurity.com or http://www.datadot.co.za sprays thousands of micro dots on the vehicle. With a http://www.donthijackme.co.za sticker on the bumper the thief can determine if the vehicle does have micro dots or not by looking up the registration number on the website. This database should be available in a text file for easy downloading. Thus crime syndicates can keep local copies on their PCs. Everything is done so that the crime syndicates can know exactly which vehicles have tracking devices. This is why hardly any http://www.escom.co.za and http://www.telkom.co.za bakkies gets hijacked. The syndicates knows that every single vehicle of theirs has a tracking device.

From http://www.datadot.co.za website "...Cellphones, DVD players, Office Equipment, Personal Computers, Digital Cameras, Quad Bikes, Jet Ski’s and other personal valuables are marked with Data Dots and linked to the exclusive Micro Asset Tracking database. Each unique pin number is registered on the Micro Asset Tracking SA National database. Client details are linked to each individual pin number. " Car rental companies have data dotted their complete fleet. The criminals are convinced that these vehicles are data dotted and thus hardly any of their vehicles get hijacked.

My view is that this database should not be exclusive but freely available to the criminals and public. For example there was a story in the newspaper about a taxi being hijacked. About 500m from the spot where they took the vehicle they noticed it was data dotted. They stopped the taxi and abandoned it. But the driver had a gun pressed against his head. Had he been able to convince the hijackers that he the vehicle was data dotted they would not have hijacked him to begin with in the first place. And the same logic can be extended to residences.

Bluffing won't work but will only get you killed. Like the sticker on the back of cars:"Protected by satellite". Nobody believes it. No, the crook must be able to phone in your number plate to the syndicate who will cross-check the number on their local copy of vehicles downloaded from http://www.donthijack.co.za. This website integrity must be beyond dispute. A person must be able to prove to http://www.donthijack.co.za that they do indeed have a subscription with http://www.netstar.co.za or a Gps and Gprs tracking system. See  EmbeddedPc and GpsAndGprs. In the same way that http://www.telkom.co.za and http://www.escom.co.za don't have to bluff - everybody is convinced their vehicles are being tracked in realtime. I have discussed integrating GPRS, GPS with an embedded Pc at length elsewhere.

Using WindowsAutomation (http://www.autoitscript.com/autoit3/) software extract the GPS coordinates of every single street from the http://shop.veza.co.za/ProductInfo.aspx?productid=VT05S or http://www.veza.co.za GPS road software package. And then prove to http://www.donthijackme.co.za that you do indeed have an embedded PC with every single street and it's GPS coordinates and that the EmbeddedPc at your base and in your car is comparing your route in real-time by having the car GPRS your coordinates every three minutes to the base. Customizing the software to your driving routine is trivial. For example there are certain roads where you would never stop, or robots where you would never open your door. Or driving away at 2am. There is even commercial FacialRecognition software for R6000,00 that can automatically authenticate the driver behind the wheel every time the door opens and GPRS a Jpeg image to a central base if that person is not you.

If the door does open an alert is sent in real-time to your base. Now imagine if you could convince the crime syndicates that your vehicle has such a system onboard. Don't you think they will go and hijack somebody else? And there is nothing "hitechish" or "sophisticated" about what I am describing - just standard MySql database, Python, EmbeddedPc, GPRS modem, DcDcConverter, GPS and http://www.netstar.co.za radio transponder backup system. It is trivially easy to implement.

Weight sensor
Place a weight sensor underneath each seat and a sensor which measures the overall increase in weight in the car. Lets presume the hijacker forces you to drive so that the facial recognition software authenticates your face and he sits in the back then the difference in weight will send an alert. All these facets must be advertised on the web page http://www.antihijack.co.za or something similar - any way of proving that you are not bluffing.

Contractors in dangerous areas
If you are contractor and your vehicles has to enter township or squatter areas, you are virtually guaranteed to get hijacked at some point in time. Replace the dashboard with Lexar BulletProofGlass. A vibration sensor detects any attempt at smashing through the glass to get to the the http://www.netstar.co.za tracking device and GpsAndGprs modem. Ideally one should use stainless steel. But placing electronics inside a steel box creates what is known as a FarradayCage. It blocks all electromagnetic signals from entering or leaving the box. The other problem is that GSM uses Spread spectrum frequency hopping which can easily be jammed with a jamming device. Connect the http://www.roundsolutions.com modem patented jamming detection relay to the panic button of the http://www.netstar.co.za radio device. Which is why only http://www.netstar.co.za should be used as a tracking company because as part of the Altech group only they have the most radio towers using secret frequencies. I am not pushing Netstar as a company merely stating a fact. If the last known GPS coordinates are known to Netstar it makes it much more likely to find your vehicle using their radio triangulation - they know at least where to start looking.

Advertise all these measures
Advertise all these measurres as explained under datadot. The criminal must be convinced by check your numberplate against a the webaddress that you do indeed check GPRS the an image of the boot and inside of car to the base in realtime, do have a http://www.netstar.co.za radio transponder, weight sensor, GPS, are in 24hour permanent GPRS contact etc. All these measures combined will dissuade a hijacker from attempting to take your vehicle. As far as privacy invasion is concerned, you must weigh the benefits versus the a disadvantages such as being killed.

Farm security
Most farm attacks are to steel the vehicle. Train a ZoneMinder camera on the bakkie. Implement this in such a way that the farmer's privacy is not violated. In other words park the vehicle in the garage. Any movement around the vehicle a picture is sent in realtime over MeshNetworking to the security company. Each farmer should decide for himself just how much of an invasion of his privacy vs. security must be allowed.Such a security measure should be advertised as explained under "Datadot spray on security" on this page. The criminals are ruthless and will first kill the farmer before driving of with his vehicle. They will be caught but it won't bring his life back. The same concept can be extended to urban situations around the garage. It all depends on the bandwidth which is why it is so critical that a TelephoneNetworkRollout and MeshNetworking be implemented. http://www.lowvelder.co.za/show_story.asp?storyid=8315

A farmhouse must only have ONE entrance for the vehicle. You activate the gates using RadioModems and having a security guard remotely enable the gate to be opened and closed. Both signals are necessary to open/close the gates. The security guard alone won't be able to activate the gates and neither will the farmer be able to leave or enter the premises without the guard visually inspecting the premise via video link over MeshNetworking and then providing an activation signal. This security setup must now be advertised to all so that the would criminals realise that even if they kill the farmer outside his premise they won't be able to remotely open the gates to get to his family and vehicle without [[RemoteAuthentication].

Motorbike roaming
Farmer attaches a homing beacon on to him, his motorbike trains a camera on him the whole time for surveillance.

Security watches over you when you arrive at home
* http://www.news24.com/Beeld/My_Storie/0,,3-2053_1953954,00.html - AntiHijacking

Metal spikes in road
Casinos use activate MetalSpikes in the road to cut-off the escape of armed robbers. In a residential setting install the spikes at the entrance and exit of a street. Before a person arrives or departs from his house a GpsAndGprs signal is sent to your street coordinator who in with RobotPatrolling and a boom halts your vehicle before you can exit the street. The boom will be in a permanent raised position so as not to impede the flow of traffic and won't be activated to stop every car only the residents in a street. This will prevent vehicles from being hijacked in the driveway.