Anti-theft systems protect valuables such as vehicles and personal property like wallets, phones, and jewelry. They are also used in retail settings to protect merchandise in the form of security tags and labels. Anti-theft systems include devices such as
locks and keys,
RFID tags
Radio-frequency identification (RFID) uses electromagnetic fields to automatically identify and track tags attached to objects. An RFID system consists of a tiny radio transponder, a radio receiver and transmitter. When triggered by an electromagn ...
, and
GPS locators.
Anti-theft
Under normal circumstances,
theft
Theft is the act of taking another person's property or services without that person's permission or consent with the intent to deprive the rightful owner of it. The word ''theft'' is also used as a synonym or informal shorthand term for some ...
is prevented simply through the application, and social acceptance, of
property law
Property law is the area of law that governs the various forms of ownership in real property (land) and personal property. Property refers to legally protected claims to resources, such as land and personal property, including intellectual pro ...
. The best anti-theft device ownership-marking, e.g.
license plates
A vehicle registration plate, also known as a number plate (British English), license plate (American English), or licence plate (Canadian English), is a metal or plastic plate attached to a motor vehicle or trailer for official identificat ...
, name tags,
RFID
Radio-frequency identification (RFID) uses electromagnetic fields to automatically identify and track tags attached to objects. An RFID system consists of a tiny radio transponder, a radio receiver and transmitter. When triggered by an electromag ...
. When clear owner identification is not possible, and when there is a lack of social observance, people may be inclined to take possession of items to their own benefit at the expense of the original owner. ''Motive'' and ''opportunity'' are two enabling factors for theft. Given that motives for theft are varied and complex, and are, generally speaking, not within the control of the victim, most methods of theft prevention rely on reducing opportunities for theft.
Motives for actively preventing theft
Items may require an anti-theft system for a variety of reasons, which may occur in combination depending on the type of item and its purpose:
* The item is expensive and/or has sentimental value (prestigious car, family heirloom, birthday gift, war medals, coin collection)
* The item is difficult/impossible to replace if lost (produced in low numbers,
antiques
An antique ( la, antiquus; 'old', 'ancient') is an item perceived as having value because of its aesthetic or historical significance, and often defined as at least 100 years old (or some other limit), although the term is often used loosely ...
, unique works of art)
* The item is easy to steal (retail/supermarket products, office stationery)
* The item may be left unattended in an unsafe environment for a certain amount of time (laptop in a library, car in a carpark)
* Improper use of the item may cause considerable damage or encourage further unauthorized actions (theft of car keys, stolen building access keys,
identity theft
Identity theft occurs when someone uses another person's personal identifying information, like their name, identifying number, or credit card number, without their permission, to commit fraud or other crimes. The term ''identity theft'' was co ...
)
* The item is desirable to others (jewelry, mobile phones, rare
collectibles
A collectable (collectible or collector's item) is any object regarded as being of value or interest to a collector. Collectable items are not necessarily monetarily valuable or uncommon. There are numerous types of collectables and terms t ...
, auto parts, industrial designs)
* The item is otherwise unobtainable: (Alcohol, Tobacco products, age related substances)
Use of theft prevention
Equally varied are the methods developed for theft prevention. Anti-theft systems have evolved to counter new theft techniques as they have appeared in society. The choice for a particular anti-theft system is dependent on the following factors:
Financial cost
In addition to the initial obtainable cost of an item, the cost of replacement or recovery from theft of the item is usually considered when considering the cost of installing an anti-theft system. This cost estimation usually determines the maximum cost of the anti-theft system and the need to secure it. Expensive items will generally be secured with a higher cost anti-theft system, while low-cost items will generally be secured at a lower cost. Insurance companies will often mandate a minimum type of anti-theft system as part of the conditions for insurance.
Threshold for theft
Anti-theft systems are designed to raise the difficulty of theft to an infeasible (but not necessarily impossible) level. The kind of system implemented often depends on the acceptable threshold for theft. For example, keeping money in an inside shirt pocket increases the difficulty of theft above that necessary if the pocket was on a backpack, since unauthorized access is made sufficiently more difficult. Methods of theft evolve to decrease the difficulty of theft, increased by newer anti-theft systems. Because of evolution on both sides and the social aspect of theft, the threshold for theft is very dynamic and heavily dependent on the environment. Doors in quiet suburban neighborhoods are often left unlocked, as the perceived thresholds for theft are very high.
Ease of use
Security
Security is protection from, or resilience against, potential harm (or other unwanted coercive change) caused by others, by restraining the freedom of others to act. Beneficiaries (technically referents) of security may be of persons and social ...
is often compromised through the lax application of theft-prevention practices and human nature in general. The average anti-theft device does not require any additional effort while using the secured item, without reducing the level of security. In practice, users of security systems may intentionally reduce the effectiveness of an anti-theft system to increase its usability (see
passwords
A password, sometimes called a passcode (for example in Apple devices), is secret data, typically a string of characters, usually used to confirm a user's identity. Traditionally, passwords were expected to be memorized, but the large number of ...
). For example, a home security system will usually be enabled and disabled with an easy-to-remember code such as "1111" or "123", instead of a more secure combination.
Methods of theft prevention
There are a number of general categories of anti-theft systems:
Sequestering of valuable items
A very common method of preventing theft is the placement of valuables in a safe location. The definition of safe depends on the minimum threshold for theft as determined by the owner. Desk stationery is often considered to be secured if placed in an unlocked drawer away from view, while expensive jewelry might be placed in a
safe
A safe (also called a strongbox or coffer) is a secure lockable box used for securing valuable objects against theft or fire. A safe is usually a hollow cuboid or cylinder, with one face being removable or hinged to form a door. The body and ...
behind a picture in a home.
Raising the awareness of theft
Another common method is the alerting of other individuals to the act of theft. This is commonly seen in department stores, where security systems at exits alert store employees of the removal of unpaid items.
Older
car alarm
A car alarm is an electronic device installed in a vehicle in an attempt to discourage theft of the vehicle itself, its contents, or both. Car alarms work by emitting high-volume sound (often a vehicle-mounted siren, klaxon, pre-recorded verbal ...
s also fall into this category; newer systems also prevent the car from starting or raise an SOS alarm if ever the tracking device is detached from the car or valuable asset.
The revolution of mobile applications and wireless communication make possible to get notified by your phone, when your properties are stolen. Probably the first solution of mobile application based theft detection is BluCop, which was published in December 2010.
Preventing removal of items
Yet another method is the attachment of items to a larger immobile object, usually furniture or walls.
Disabling the stolen item
Items with specific functionality can often be disabled to prevent use of the item should it be stolen. The anti-theft system can require disabling on every use, or enabling when the item should be secured. Disabling the anti-theft system is usually done by requiring identification of the owner at some stage of use. Identification can occur physically or through other methods (physical keys, numerical codes, complex passwords, biometric identification). This can work even retrospectively: as a stolen credit card can easily be invalidated with a phone call to the issuing bank, the motivation to steal one is reduced.
In the case of vehicle theft, the best deterrent to theft is in the installation of an approved vehicle anti-theft
passive immobilizer
An immobiliser or immobilizer is an electronic security device fitted to a motor vehicle that prevents the engine from being started unless the correct key (''transponder'' or '' smart key'') is present. This prevents the vehicle from being " ...
. Many vehicles have factory-installed anti-theft units, which provide protection through the ignition system. Under the hood there is a
computer
A computer is a machine that can be programmed to Execution (computing), carry out sequences of arithmetic or logical operations (computation) automatically. Modern digital electronic computers can perform generic sets of operations known as C ...
that controls the operation of the engine. It is programmed to verify that the
RFID tag
Radio-frequency identification (RFID) uses electromagnetic fields to automatically identify and track tags attached to objects. An RFID system consists of a tiny radio transponder, a radio receiver and transmitter. When triggered by an electromagn ...
attached to the key is correct before the ECM will allow ignition to occur. An approved
immobilizer
An immobiliser or immobilizer is an electronic security device fitted to a motor vehicle that prevents the engine from being started unless the correct key (''transponder'' or '' smart key'') is present. This prevents the vehicle from being " ...
uses a three circuit isolation system which thwarts even the most experienced thief.
Security tags
Security tags are devices that are attached to products to prevent shoplifting and are often used in conjunction with an
electronic article surveillance
Electronic article surveillance is a technological method for preventing shoplifting from retail stores, pilferage of books from libraries or removal of properties from office buildings. Special tags are fixed to merchandise; these tags are remove ...
system.
SelectaDNA
SelectaDNA is a forensic property marking system used as part of crime prevention strategies for businesses and residential properties.
SelectaDNA offers a full range of property and offender marking products combining its unique DNA coding with ...
or
Smartwater are such security tags - a forensic fluid which contains millions of tiny fragments which have a unique number called "SIN" ("SelectaDNA identification number"), and registered in a national police database together with the owner's details, is etched into each of those particles.
Tracking software
Electronic devices such as laptops, cell phones and even gadgets such as iPods now have software that enable them to "
phone home
In computing, phoning home is a term often used to refer to the behavior of security systems that report network location, username, or other such data to another computer.
Phoning home may be useful for the proprietor in tracking a missing or st ...
" with information regarding their whereabouts and other information that can assist law enforcement in tracking down the devices.
Forensic marking
Assets can be marked with various forensic marking materials for law enforcement tracking of the item. Examples of this type of marking include SelectaDNA and Smartwater.
See also
*
Danish bicycle VIN-system
The Danish bicycle VIN-system is a system introduced in 1942 by the Denmark, Danish government, providing all bicycles in Denmark with a unique code. The Vehicle Identification Number, VIN code is a combination of Letter (alphabet), letters and num ...
*
Steering-wheel lock
A steering-wheel lock is a visible anti-theft deviceSeelhorst, Mary"Think It's New? Think Again!" March 2002.''Popular Mechanics'', Retrieved 8 February 2017. that immobilizes the steering wheel of a car.
Also known as a crook lock, or club loc ...
References
{{CarDesign nav
Crime prevention
Security technology
Theft