Ctrack swoops on felons

March 2016 Editor's Choice, Asset Management, Security Services & Risk Management

A telematics specialist recently pounced on a number of criminals involved in signal jamming, a popular form of preventing telematics units from broadcasting its position to its service provider. According to the company’s spokesperson, instances of signal jamming in South Africa are occurring on a more frequent basis month-on-month.

This week, Ctrack’s call centre received a distress call from a customer that was experiencing difficulty in locating her vehicle (a truck and trailer) through the telematics device. “The customer called us as she was trying to request a position from the unit, but was not receiving response. Our call centre realised that there was a problem,” explained Hein Jordt, MD of Ctrack’s Fleet Management Solutions division.

“The client also informed us that she could not reach the driver or his assistant driver on on either of their phones, which alerted us of a possible hijack.”

Ctrack acted immediately, issuing an alert on the vehicle as ‘hijacked’ and implemented a number of back-end activities through their technology to facilitate the search. Shortly afterwards, the commercial vehicle with goods and cargo was located in Midrand (Gauteng) via Ctrack’s jamming detection solution and a team of in-house recovery experts was dispatched to the identified area.

Upon arriving at the location of the vehicle, Ctrack’s response team confronted three suspects, arguably the masterminds of the operation, and apprehended them until SAPS arrived on the scene and arrested them.

The scene itself was littered with other stolen vehicles, possibly getaway vehicles or vehicles that will be stripped and gutted for automotive parts on the blackmarket.

The signal jamming device used in the hijacking was also found.

A stolen bakkie was also recovered recently, which was taken from the premises of a small business in Gauteng during a weekend heist. Bakkies and trucks, however, aren’t the only vehicles being targeted by tech-savvy criminals in South Africa. Ctrack’s response team also recoverd a client’s 2015 Supercharged Range Rover, which was hijacked on the R511 on the outskirts of Johannesburg.

“Considering the fact that criminals are investing in technology in order to commit crime, it remains critically important that South Africans consider their visibility status,” Jordt said. “We’re confident that we have the insights and technology to make motoring safer for South Africans, and our latest recoveries prove that we go the extra mile in ensuring our customers get their belongings back.”

For more information contact Ctrack, +27 (0)12 450 2744, stephanv@ctrack.co.za, www.ctrack.com





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Visual Intelligence for driver and vehicle safety
News & Events Asset Management Transport (Industry)
Webfleet, Bridgestone’s fleet management solution, and Peregrine.ai, a Berlin-based startup transforming mobility through AI-powered vision systems, announced the launch of a next-generation driver assistance solution.

Read more...
What is your ‘real’ security posture?
BlueVision Editor's Choice Information Security Infrastructure AI & Data Analytics
Many businesses operate under the illusion that their security controls, policies, and incident response plans will hold firm when tested by cybercriminals, but does this mean you are really safe?

Read more...
What is your ‘real’ security posture? (Part 2)
BlueVision Editor's Choice Information Security Infrastructure
In the second part of this series of articles from BlueVision, we explore the human element: social engineering and insider threats and how red teaming can expose and remedy them.

Read more...
IQ and AI
Leaderware Editor's Choice Surveillance AI & Data Analytics
Following his presentation at the Estate Security Conference in October, Craig Donald delves into the challenge of balancing human operator ‘IQ’ and AI system detection within CCTV control rooms.

Read more...
Onsite AI avoids cloud challenges
SMART Security Solutions Technews Publishing Editor's Choice Infrastructure AI & Data Analytics
Most AI programs today depend on constant cloud connections, which can be a liability for companies operating in secure or high-risk environments. That reliance exposes sensitive data to external networks, but also creates a single point of failure if connectivity drops.

Read more...
Toxic combinations
Editor's Choice
According to Panaseer’s latest research, 70% of major breaches are caused by toxic combinations: overlapping risks that compound and amplify each other, forming a critical vulnerability to be exploited.

Read more...
Global hub for predictive road safety intelligence
News & Events Asset Management Transport (Industry)
One year since its formation, Netstar’s advanced Global Fleet Bureau is more than an operational facility for international fleet management, it has become a big-data nerve centre delivering unprecedented value to clients.

Read more...
Syndicates exploit insider vulnerabilities in SA
Information Security Security Services & Risk Management
Today’s cyber criminals do not just exploit vulnerabilities in your systems; they exploit your people, turning trusted team members into unwitting accomplices or deliberate collaborators in their schemes.

Read more...
Continuum launches centralised access and identity management
Editor's Choice Access Control & Identity Management Integrated Solutions Facilities & Building Management
Continuum Identity is a newly launched company in the identity management and access control sector, targeting the complexity of managing various Access and Identity Management (AIM) systems.

Read more...
SABRIC Annual Crime Statistics 2024
News & Events Security Services & Risk Management Residential Estate (Industry)
SABRIC has released its Annual Crime Statistics for 2024, reflecting a significant decline in financial crime losses, but also warning of the growing threat posed by artificial intelligence (AI) in fraud schemes.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.