LoJack

LoJack
LoJack Corporation
Type Corporation(NASDAQ:LOJN)
Industry Vehicle Tracking
Founded Massachusetts (1978)
Headquarters Westwood, MA, U.S.
Area served Worldwide
Key people Richard Riley, Executive Chairman
Ronald Waters III, CEO
Products See products section.
Revenue increase $199M (2008)[1]
Net income increase $ 8.9M (2008)[1]
Employees 680
Website www.lojack.com

The LoJack Stolen Vehicle Recovery System is an aftermarket vehicle tracking system that allows vehicles to be tracked by police, with the aim of recovering them in case of theft. The manufacturer claims a 90% recovery rate.[2] The name "LoJack" was coined to be the "antithesis of hijack", wherein "hijack" refers to the theft of a vehicle through force.[3]

LoJack’s core business comprises the tracking and recovery of cars, trucks, construction equipment, commercial vehicles and motorcycles. However, LoJack is expanding into new markets through licensing agreements and investments in areas such as cargo security and people at risk of wandering (probationers, parolees, and Alzheimer's patients). LoJack Corporation claims that over 250,000 vehicles have been recovered worldwide since the product was introduced more than two decades ago.[2]

Contents

How it works

The core of the LoJack Stolen Vehicle Recovery System is a small, silent radio transceiver that is clandestinely installed in a vehicle. The vehicle is not marked as possessing a LoJack transceiver, and the location of the transceiver within the vehicle varies from one car to the next. Once installed, the unit and the vehicle's VIN are registered in a database which interfaces with the National Crime Information Center (NCIC) system used by federal, state and local law enforcement agencies throughout the US. In the event of a theft, a customer reports the incident to the police, who make a routine entry into the state police crime computer, including the stolen vehicle's VIN. This theft report is automatically processed by LoJack computers, triggering a remote command to the specific LoJack unit in the stolen vehicle.

The command tells the LoJack unit to start sending out signals to tracking units on board some police cars. Every police car so equipped, that is within a 2-3 mile radius of the signal source, will be alerted. The tracking units will display an alphanumeric serial number and an indication of the approximate direction and distance to the stolen vehicle. Based on the serial number, the police can obtain a physical description of the vehicle, including make (brand), model, color, VIN, and license plate number. Police aircraft can also be equipped with tracking units; airborne units can receive the (line-of-sight) signals from further away than ground-based units.

The company’s systems are operable in 27 US states, the District of Columbia, and in 30+ countries.

Upgraded (more expensive) systems can alert the owner of a vehicle in the event the car is moved or started.

LoJack transmits on a radio (RF) carrier frequency of 173.075 MHz. Vehicles with the system installed send a 200 millisecond (ms) chirp every ten seconds on this frequency. When being tracked after reported stolen, the devices send out a 200 ms signal once per second.[4][5] The radio frequency transmitted by LoJack is near the VHF spectrum band formerly used in North America by analog television channel 7,[6] although there was minimal interference due to the low power of radiation, brief chirp duration, and long interval between chirps.[7]

Security issues

Vehicle tracking systems are potentially vulnerable to jamming attacks since the device must transmit incident messages to a receiver or telecommunications network.[8] Inexpensive handheld jammers have ranges around 5m, larger jammers can disrupt communication devices within a 200m radius. XM, 3G, GPS, GSM, UHF, VHF and bluetooth devices can all be muted with an appropriate transmitter device.

Products

LoJack Stolen Vehicle Recovery System

A small, silent transmitter hidden in a vehicle allows the police to track and recover it. The unit is hidden within the vehicle.

LoJack Early Warning

An optional component of the LoJack System, Early Warning alerts the owner by phone, e-mail or text message if the protected vehicle has been moved without authorization. A personal key fob sends a signal to the system to disable the warning as long as the owner is carrying it. LoJack offers the Early Warning product for cars, trucks and motorcycles.

The tracking device that automatically activates inside police cars if a vehicle equipped with a LoJack is activated within a few miles.

LoJack For Motorcycles

Police can track and recover a stolen motorcycle.

LoJack For Construction

Tracking units can be covertly placed in construction equipment.

LoJack For Fleet and Trucking

Protection for tractor trailers, semis, rigs, haulers, and vans.

LoJack InTransit

Cargo tracking devices and service.

LoJack SafetyNet

Multifaceted solution for tracking and rescuing people at risk of wandering including parolees and people with Alzheimer's.

LoJack for Laptops

A software product from Vancouver, British Columbia, based Absolute Software that enables law enforcement to recover stolen laptops by tracing them via the Internet.[9][10] The product was initially sold under the name "Computrace". In 2005, Absolute Software licensed the LoJack brand name and produces the software under both the Computrace and "LoJack for Laptops" product names.[11] Unlike the LoJack for vehicles and equipment products, which use a small radio beacon installed in the tracked device, the Computrace/LoJack for Laptops product is laptop tracking software that periodically phones home to Absolute Software's server to both announce its location and to check to see if the machine has been reported stolen.[12][13] LoJack comes preinstalled in the BIOSes of, at least, Lenovo, HP, Dell, Fujitsu, Panasonic, Toshiba, and Asus machines.[14] It is disabled by default and can be enabled by purchasing a license for Computrace; upon being enabled, the BIOS will copy a downloader named rpcnetp.exe from the BIOS flash ROM to %WINDIR%\System32 (which usually resolves to C:\WINDOWS\System32) which will in turn download the actual agent rpcnet.exe and install it as a windows service. Recently[when?], Dell, Lenovo, Panasonic and Fujitsu appear to have discontinued this method and require manual installation.[citation needed] Once enabled, Computrace cannot be disabled or deinstalled without assistance from Absolute Software, not even by reformatting or substituting the hard disk, because the BIOS keeps reinstalling or repairing it prior to loading the operating system.

From then on, rpcnet.exe will phone home to Absolute Software servers once a day, querying for a possible theft report, and, in any case, transmitting the results of a comprehensive system scan, IP address, user- and machine names and location data, which it obtains either by tapping the GPS data stream on machines equipped with GPS hardware, or by triangulating available WLAN access points in the vicinity, by providing WLAN IDs and signal strengths so Absolute Software servers can geolocate the device using the Mexens Technology data base.[citation needed]

If Absolute receives a theft report, the service can be remotely commanded to phone home every 15 minutes, install additional 3rd vendor software, such as a key logger or a forensic package, make screenshots, etc.

Computrace also supports Intel's AT-p anti theft protection scheme: If it is unable to phone home within a configurable time interval it will require a special BIOS password upon the next reboot. It can be configured to shut down the machine's power supply immediately in this case, to force a reboot.

As the Computrace client exhibits trojan-like behaviour, it was detected as TR/Hijack.Explor.1245 or W32/Agent.SW!tr by antivirus software; however, these warnings have been discontinued.[citation needed]

At the Black Hat Briefings conference in 2009, researchers Anibal Sacco[15] and Alfredo Ortega showed that the implementation of the Computrace/LoJack agent embedded in the BIOS has vulnerabilities and that this "available control of the anti-theft agent allows a highly dangerous form of BIOS-enhanced rootkit that can bypass all chipset or installation restrictions and reutilize many existing features offered in this kind of software."[16][17] Absolute Software rejected the claims made in the research, stating that "the presence of the Computrace module in no way weakens the security of the BIOS". Another independent analyst confirmed the flaws, noted that a malware hijacking attack would be a "highly exotic one", and suggested that the larger concern was that savvy thieves could disable the phone home feature.[18]

Later, Core Security Technologies proved the researcher's finding by making publicly available several proofs of concept, videos, and utilities on its webpage.[19]

Company

The manufacturing company is also called LoJack NYSELOJN.

See also

References

  1. ^ a b http://www.lojack.com/about/Documents/Press_Release_Q4_08_FINAL.pdf
  2. ^ a b "What is LoJack". http://www.lojack.com/what/index.cfm. Retrieved 2006-08-23. 
  3. ^ Hindo, Brian (2006-01-16). "LoJack's Stronger Signal". BusinessWeek. http://www.businessweek.com/magazine/content/06_03/b3967098.htm. 
  4. ^ "Request for Waiver of Section 90.20(e)(6)". FCC (USA). 2000-08-31. http://www.fcc.gov/Bureaus/Wireless/Orders/2000/da001987.txt. Retrieved 2008-05-31. 
  5. ^ "LoJack Radio Frequency, How LoJack Works". Freq of Nature. http://www.freqofnature.com/index.php?m=Common&p=LoJack. Retrieved 2008-05-31. 
  6. ^ "Television Frequency Table". http://www.csgnetwork.com/tvfreqtable.html. Retrieved 2008-05-31. 
  7. ^ "Private Land Mobile Services; Stolen Vehicle Recovery Systems - Proposed Rule.". Federal Register (Volume 71, Number 163). 2006-08-23. http://edocket.access.gpo.gov/2006/E6-13743.htm. Retrieved 2008-05-31. 
  8. ^ John Mooney. "Gangs using jammers to deactivate alarms". Times Online. http://www.timesonline.co.uk/tol/news/world/ireland/article7107249.ece. 
  9. ^ David A. Andelman (2005-08-19). "Does LoJack For Laptops Work?". Forbes. http://www.forbes.com/technology/2005/08/19/digilife-lojack-laotops-cx_daa_0819digilife.html. 
  10. ^ LoJack foils laptop theft, Techworld.com
  11. ^ "LoJack licenses technology to track stolen computers". Boston Business Journal. June 27, 2005. http://www.bizjournals.com/boston/stories/2005/06/27/daily5.html. Retrieved 2009-04-10. 
  12. ^ Heath, Nick (15 Apr 2008). "Thieves caught out as PCs 'phone home'". zdnet.co.uk. http://news.zdnet.co.uk/security/0%2C1000000189%2C39386003%2C00.htm. Retrieved 2009-04-10. 
  13. ^ "Absolute Software Service Agreement" (pdf). Absolute Software. July 30, 2008. http://www.absolute.com/service_agreement.pdf. Retrieved 2009-04-10. "Must permit the regular, unimpeded transmission of communications and other data between the Customer Computer and the Monitoring Center in order to enable the Service, including without limitation allow access through your configured firewalls" [dead link]
  14. ^ Absolute Software, Partner: BIOS Compatibility, absolute.com
  15. ^ Sacco, Anibal; Alfredo Ortéga. "Deactivate the Rootkit". Exploiting Stuff. http://exploiting.wordpress.com/2009/09/11/138/. Retrieved 2009-10-06. 
  16. ^ Robertson, Jordan. "Anti-theft software could create security hole". The Associated Press. http://www.google.com/hostednews/ap/article/ALeqM5gDEcxr3CSkM0RlVSqVzNWlccf6XwD99P33N82. Retrieved 2009-08-06. 
  17. ^ Sacco, Anibal; Alfredo Ortéga. "Deactivate the Rootkit". Black Hat Briefings. http://www.coresecurity.com/content/Deactivate-the-Rootkit. Retrieved 2009-08-06. 
  18. ^ "Absolute Software downplays BIOS rootkit claims". ZDNet. http://blogs.zdnet.com/security/?p=3936. Retrieved 2009-08-20. 
  19. ^ Sacco, Anibal; Alfredo Ortéga. "Deactivate the Rootkit". Core Security Technologies. http://corelabs.coresecurity.com/index.php?module=Wiki&action=view&type=publication&name=Deactivate_the_Rootkit. Retrieved 2009-09-08. 

Further reading

External links


Wikimedia Foundation. 2010.

Игры ⚽ Поможем написать реферат

Look at other dictionaries:

  • Steven Levitt — Infobox Scientist box width = 250px name = Steven D. Levitt image size = 160px caption = birth date = birth date and age|1967|5|29 birth place = death date = death place = residence = citizenship = nationality = flag|United States ethnicity =… …   Wikipedia

  • Vehicle Theft Protection Program — is an educational initiative in North America started by the National Insurance Crime Bureau (NICB) and LoJack Corporation designed to help owners of cars, motorcycles, construction equipment and commercial vehicles better understand how to… …   Wikipedia

  • Радиопеленгация — определение направления на источник радиоизлучения. Радиопеленгацию осуществляют при помощи радиопеленгаторов. Радиопеленгатор состоит из антенной системы и приёмно индикаторного устройства. Радиопеленгация может быть в различной степени… …   Википедия

  • List of company name etymologies — This is a list of company names with their name origins explained. Some origins are disputed. NOTOC #*20th Century Fox – Film studio; formed in 1935 through the merger of William Fox s Fox Film, and Twentieth Century Pictures. [… …   Wikipedia

  • Etymologie von Firmennamen — Dies ist eine Liste von Unternehmensnamen (Firmen) und ihrer Herkunft (Etymologie). # 20th Century Fox gebildet 1935 durch die Fusion William Fox’ Fox Film und Twentieth Century Pictures. 3M Die Minnesota Mining and Manufacturing Company (etwa… …   Deutsch Wikipedia

  • Etymologische Liste von Unternehmensnamen — Dies ist eine Liste von Unternehmensnamen (Firmen) und ihrer Herkunft (Etymologie). # 20th Century Fox gebildet 1935 durch die Fusion William Fox’ Fox Film und Twentieth Century Pictures. 3M Die Minnesota Mining and Manufacturing Company (etwa… …   Deutsch Wikipedia

  • Firmennamen — Dies ist eine Liste von Unternehmensnamen (Firmen) und ihrer Herkunft (Etymologie). # 20th Century Fox gebildet 1935 durch die Fusion William Fox’ Fox Film und Twentieth Century Pictures. 3M Die Minnesota Mining and Manufacturing Company (etwa… …   Deutsch Wikipedia

  • Rootkit — Pronunciation of Rootkit in US English Un rootkit (le nom « outil de dissimulation d activité » est également utilisé[1]), parfois simplement « kit », est un ensemble de techniques mises en œuvre par un ou plusieurs logiciels …   Wikipédia en Français

  • Liste von Unternehmen mit Namensherkunftserklärungen — Dies ist eine Liste von Namen von Firmen und Unternehmen sowie ihrer Herkunft (Etymologie). Häufig sind diese Abkürzungen oder Akronyme der Namen der Gründer, voriger Gesellschaften oder des Unternehmensziels. Inhaltsverzeichnis A B C D E F G H I …   Deutsch Wikipedia

  • Security — is the condition of being protected against danger, loss, and criminals. In the general sense, security is a concept similar to safety. The nuance between the two is an added emphasis on being protected from dangers that originate from outside.… …   Wikipedia

Share the article and excerpts

Direct link
Do a right-click on the link above
and select “Copy Link”