San Diego Police Break Up Jeep Wrangler Theft Operation

Photo of author

By Car Brand Experts


Three individuals have been arrested in connection with the theft of over 150 Jeep Wranglers in San Diego since 2014, according to reports from ABC 10 News. The suspects, affiliated with the Hooligan motorcycle gang, are accused of stealing these vehicles and smuggling them into Mexico, where they would either be sold or disassembled for parts. This operation mirrors a similar string of vehicle thefts that occurred in Houston last year. In both instances, the stolen cars were not taken using rudimentary tools like coat hangers and screwdrivers, but rather with advanced electronic equipment that allowed the thefts to be executed without damaging the vehicles.

The indictment details that the thieves would scout their targets for several days, recording the vehicle identification numbers (VINs). This preliminary work enabled them to create duplicate keys, which could then be programmed inside the car using specialized software. Surveillance footage from one victim captured the entry method used by the thieves, prompting law enforcement to identify a list of 20 Jeeps. They inquired with FCA to see if anyone other than the legitimate owners had requested duplicate keys. Remarkably, every Jeep on that list had a key requested by a third party through a dealership in Cabo San Lucas, Mexico.

This incident highlights the urgent need for enhanced security measures as vehicles become increasingly computerized. While hacking poses a significant threat, the large-scale thefts of FCA vehicles have now occurred twice. Moreover, the method allegedly employed by the Hooligans mirrors a plot from the movie Gone In 60 Seconds, involving an insider at a dealership who facilitated the ordering of "theft-proof" keys. The most sophisticated computer security systems can be rendered ineffective if there is a person able to bypass them. It appears that for every advancement in security, there is always someone ready to exploit the system.

.

Leave a Comment

For security, use of Google's reCAPTCHA service is required which is subject to the Google Privacy Policy and Terms of Use.

Pin It on Pinterest

Share This

Share This

Share this post with your friends!