Criminals have developed a new technique to break into homes that have reinforced windows and doors.
Typically, these areas are strengthened with steel bars to prevent unauthorized entry. However, robbers now use car jacks to manipulate these barriers.
By placing the jack between the steel bars, they gradually increase the gap, creating enough space to squeeze through and gain access to the house.
This method, which relies on mechanical force, has become increasingly common as it allows intruders to bypass the steel reinforcements without alerting neighbors or triggering alarms.
The process is quiet and effective, taking advantage of a tool designed for vehicle maintenance.
Also Read
- Rigathi Gachagua: Nilikuwa nimewarn Ruto akigusa mlima itamletea shida, ona sasa Ni vizuri alianza vita na sisi mapema. Tumejua yeye ni adui. 2027 tutapeleka yeye Sugoi.
- Grief and anger as mourners reject DP Kindiki’s speech at burial
- Nyinyi Wabunge Mmekuwa kama Ng’ombe!!Furious MP Salasya Lectures MPs Face to Face over Adani Deal!Ruto akisema Adani ni Nzuri Mnapiga Makofi,akirudi na Kusema Adani ni mbaya Mnapiga makofi Sasa nyinyi si ni Mavi tu! Watch Out
- Bomet : A Candidate Escapes with School Generator after KCSE ends
- This young man from Garissa was arrested for impersonating a woman and duping an Isiolo County government Official after swindling Money from Him. Watch Out
Once the jack is positioned, the criminals simply expand it until the steel bars bend or shift enough to allow entry.
Since many homeowners assume that steel reinforcement offers complete protection, they may not realize the vulnerability created by this method.
It’s a reminder that no security measure is foolproof, and regular reviews of home security systems are essential to stay ahead of potential threats.
Homeowners are urged to consider additional protective measures, such as installing stronger bars, reinforcing locks, or using advanced alarm systems that can detect unusual movements around windows and doors.
While the use of a car jack may seem like a basic approach, it highlights how even the most seemingly secure barriers can be compromised with the right tools and persistence.