YouTuber's Glitter Bomb Tricks Parcel Thieves

upnorth

Moderator
Thread author
Verified
Staff Member
Malware Hunter
Well-known
Jul 27, 2015
5,459
A former Nasa engineer spent six months building a glitter bomb trap to trick thieves after some parcels were stolen from his doorstep.

The device, hidden in an Apple Homepod box, used four smartphones, a circuit board and 1lb (453g) of glitter. Mark Rober, who is now a YouTuber, caught the original thieves on his home security camera. He decided to take action after the police said they were unable to investigate the case. He designed the elaborate bomb so that it would be activated when the package in which it was hidden was opened by thieves. The phone cameras and microphones would record the moment. The device contained an accelerometer to detect motion. When the parcel was jostled, the device would check the GPS signal to see if it had been moved from its spot. If it had, then it would send a signal to activate the phones and start recording. The glitter was in a cup that spun round on a motor when released as the box was opened. The device was also engineered to squirt a tube of strong-smelling fart spray every 30 seconds. The package was left on Mr Rober's porch with a label saying it had been sent by "Kevin McCallister" - the boy played by Macaulay Culkin in the 1990 movie Home Alone. It was stolen on several occasions and re-set to explode and capture the footage every time. On every occasion, the thieves abandoned the package once it had been triggered and they or their property had been doused in glitter.
 

About us

  • MalwareTips is a community-driven platform providing the latest information and resources on malware and cyber threats. Our team of experienced professionals and passionate volunteers work to keep the internet safe and secure. We provide accurate, up-to-date information and strive to build a strong and supportive community dedicated to cybersecurity.

User Menu

Follow us

Follow us on Facebook or Twitter to know first about the latest cybersecurity incidents and malware threats.

Top