Product Description
Details
The Ghost-II adds another layer of convenience by allowing two smartphones and two key-fob tags to disarm the Ghost-II. The Ghost-II cannot be found using normal theft methods as it has no LED’s or buttons giving away its location. Moreover, due to the use of the latest micro-manufacturing techniques the Ghost-II is small enough to hide almost anywhere in the vehicle.
- Two attempts to start the engine if the starter inhibit mode is selected
- 15 seconds of ignition switched on after the engine has been stalled or gearbox locked without entering the Disarm sequence
- Wheel movement with entering the Disarm sequence
- Attempted new key learning (not all vehicles)
- Anti-hijack once the vehicle has come to a stop and no Disarm sequence has been entered
- The ignition is switched on and the Ghost-II does not respond or has been removed
Shadow
The Shadow is a security add-on unit that can add a siren without giving away the location of the Ghost-II unit. The Shadow is connected to the same CAN data network as the Ghost-II but is located away from the Ghost-II.
The Shadow will trigger the siren output under the following conditions (*these are general guidelines, implementation in vehicles varies)
The Shadow also has a miniature internal relay that can be used as a backup immobilisation should the Ghost-II be found and removed. This gives an extra layer of protection against a thief who has time to rip apart a vehicle to look for the Ghost. This relay immobilisation can also be used to add engine stall features to vehicles where this cannot be done via the CAN data connection alone.
Advantages:
![]() |
Engine start blocking The Ghost-II will prevent the start of the engine unless the unique, user defined Disarm sequence has been entered first |
|
Stops key cloning and ECU swapping A thief cannot simply add a new key or replace an ECU to bypass the Ghost-II and start the vehicle. Only a correct Disarm sequence will allow the engine to start. |
![]() |
Undetectable using diagnostics A modern thief can use diagnostics to detect circuit cuts on modern vehicles. The Ghost has no circuit cuts so it cannot be found using these methods |
|
Weatherproof tiny device The Ghost-II is concealed and so small it can be installed and wrapped into the vehicle harness anywhere in the vehicle making it near impossible for a thief to find. |
![]() |
No radio frequency signals Thieves cannot use sophisticated RF scanning, code grabbing technology to detect what security device your vehicle has when it does not transmit any signals with any other security systems. |
|
Emergency Disarm sequence If the disarm sequence is forgotten, the car is sold or a button is broken there is a secure, unique reset code for each device. |
![]() |
Advantages of using the CAN data network The use of the CAN data bus has several advantages including low risk during installation, low probability of detection, and allows for placement almost anywhere in the vehicle. |
|
Service / Valet mode Service mode allows your vehicle to temporarily start and drive without requiring the Disarm sequence. The Ghost-II will exit service mode based on speed and time or by simply entering the Disarm sequence. |
![]() |
Silent operation Because the unit communicates with the ECU on the data bus to immobilise the vehicle there is no way a thief could listen for the tell tale clicking of a traditional immobiliser relay. |
|
Tested for each vehicle Due to the nature of the data bus communication the Ghost-II has been adapted and tested for every vehicle we list as compatible. If we list your vehicle you can be sure we have thoroughly tested its operation with the Ghost-II. |