Elon at the Intersection: The Alarming Rise of Wireless Hijacks

May 19, 2025
When pedestrians in tech-savvy cities heard the voices of Elon Musk and Mark Zuckerberg at the crosswalk, it wasn’t a stunt — it was a striking example of how unsecured wireless protocols are leaving public infrastructure open to real-world exploits.

It began with a voice. Then another. In April, pedestrians in Palo Alto, Menlo Park and Redwood City, Calif., experienced something curious and unsettling at the crosswalks. Instead of the expected “Walk sign is on,” pedestrians hear eerily lifelike impersonations of tech luminaries, such as Elon Musk and Mark Zuckerberg. 

“You know, they say money can’t buy happiness… but it can buy a Cybertruck, and that’s pretty sick, right?” 

This incident wasn’t a prank by a tech-savvy theater troupe. It was a real-world intrusion into city infrastructure. And it wasn’t isolated to Silicon Valley. Around the same time, Seattle saw a variation of the hack: anomalous crosswalk announcements and Bluetooth-connected signage manipulated to deliver bizarre or profane audio clips. 

While these intrusions prompted laughter, confusion and numerous online comments, they also highlighted a more serious issue: the deeply embedded wireless vulnerabilities that have been hiding in plain sight across our urban landscapes. 

When Wireless Protocols Go Unchecked

Bluetooth, in both its Classic and Low Energy (BLE) forms, was designed for convenience and ease of use. It connects our headphones, fitness trackers, thermostats and even our cars. Increasingly, it also connects public infrastructure: from crosswalk systems and traffic signs to medical devices and industrial sensors. 

But as Bluetooth’s presence has grown, security practices haven’t always kept up. Devices often ship with default PINs, unauthenticated pairing modes and minimal encryption. In the case of the San Francisco Bay Area hack, the user manual is freely available online and includes step-by-step pairing instructions and access paths for uploading custom audio. The configuration software required no license or credentials. Once within range, it was disturbingly simple to hijack a crosswalk speaker system. 

Seattle’s incident, while different in execution, followed a similar script: discover an unsecured or misconfigured Bluetooth endpoint, and inject custom audio with little to no resistance. 

This event wasn’t the work of elite cyber operatives. These intrusions required minimal technical skill, just curiosity, time and a Bluetooth sniffer, which is available online for under $50. 

The Myth of “Low-Risk” Devices

Crosswalks seem like an odd target. The individuals responsible stole no data and destroyed no systems. However, that’s precisely what makes these incidents dangerous: they reveal how easy it is to breach systems long assumed benign and isolated. Suppose a prankster can make a pedestrian signal cry out for emotional support. What’s to stop a more malicious actor from turning off traffic control nodes or accessing real-time transit feeds? 

The discussion around cybersecurity used to center on data protection, focusing on guarding against ransomware, phishing and the leakage of sensitive information, but the attack surface has expanded. The proliferation of wireless protocols, such as Bluetooth, Zigbee and Wi-Fi, in operational technology (OT) environments means that digital vulnerabilities can now impact physical systems in the real world. 

Trust by Default

At the heart of these incidents is a failure of assumptions. City planners, vendors and citizens alike trust that public systems are secure. They assume devices labeled “infrastructure-grade” are hardened against tampering. They believe that a Bluetooth connection won’t be accessible from the street or that a firmware update process requires authentication. 

Those assumptions need to change. Every discoverable wireless interface is a potential entry point, and every unencrypted signal is an invitation to a compromise. As wireless integration becomes more pervasive, so too must increase diligence. 

What Can Cities Do?

These incidents are a wake-up call, not a cause for panic. The first step is awareness.

For municipal IT leaders, urban technologists and infrastructure vendors, here are some practical questions to ask: 

  • Is Bluetooth discoverability turned off by default? Devices should not broadcast their presence unless there is a clear and concise operational reason to do so.

  • Are pairing modes protected with non-default credentials or cryptographic validation? Avoid PINs like “0000” or “1234,” and consider multi-layer authentication where feasible.

  • Is the system isolated from broader networks? Segmentation prevents local intrusions from escalating into broader compromises.

  • Can wireless activity be monitored in real time? Most infrastructure has no visibility into wireless communications, making it challenging to detect tampering before it’s too late.

 Importantly, municipal procurement processes should start including wireless security as a mandatory requirement, much as fire codes and power safety are non-negotiable. 

A Broader Cultural Shift

The crosswalk hacks worked not because the attackers were brilliant, but because the defenses were nonexistent. These events are not isolated flukes; they’re previews of a future where Bluetooth-enabled devices control everything from parking meters to emergency alerts. 

As a society, the populace needs to retire the notion that “convenient” and “secure” are mutually exclusive. Yes, wireless technology can improve efficiency and reduce costs, but municipalities must deploy it with intent and appropriate safeguards. 

Seattle and Palo Alto now join a growing list of cities learning this lesson the hard way. Hopefully, others can learn from their experience before the next “talking crosswalk” becomes a national headline. 

Funny, Until It Isn’t

Yes, Elon Musk’s AI-generated voiceovers were amusing, but humor has a way of softening the impact of truth. These were not just pranks; they were demonstrations of how easy it is to tamper with public systems when people ignore basic wireless security protocols. 

As the line between cyber and physical systems blurs, cities must be proactive in their approach. What happened in Palo Alto and Seattle may be remembered for its novelty, but the vulnerabilities it exposed are anything but. 

Let’s take wireless security seriously before the next message from our municipal infrastructure isn’t so funny.

About the Author

Joseph Salazar | Senior Product Marketing Manager

Joseph Salazar is a seasoned cybersecurity professional with over 20 years of experience in both military and civilian sectors. He is a retired Major from the U.S. Army Reserves, where he served for 22 years as a Counterintelligence Agent, Military Intelligence Officer, and Cybersecurity Officer. Throughout his civilian career in cybersecurity, Salazar has held numerous roles and co-authored a book on deception technology. He maintains the CISSP, CEH, and EnCE certifications and is currently a Senior Product Marketing Manager at Bastille Networks.