Knowledge (XXG)

Anti-theft system

Source 📝

171: 162: 410: 280:
that necessary if the pocket were on a backpack, since unauthorized access is made sufficiently more difficult. Methods of theft evolve to decrease the difficulty of theft, increased by newer anti-theft systems. Because of evolution on both sides and the social aspect of theft, the threshold for theft is very dynamic and heavily dependent on the environment. Doors in quiet suburban neighborhoods are often left unlocked, as the perceived thresholds for theft are very high.
344: 1268: 1288: 36: 1278: 363:
Items with specific functionality can often be disabled to prevent use of the item should it be stolen. The anti-theft system can require disabling on every use, or enabling when the item should be secured. Disabling the anti-theft system is usually done by requiring identification of the owner at
316:
A very common method of preventing theft is the placement of valuables in a safe location. The definition of safe depends on the minimum threshold for theft as determined by the owner. Desk stationery is often considered to be secured if placed in an unlocked drawer away from view, while expensive
279:
Anti-theft systems are designed to raise the difficulty of theft to an infeasible (but not necessarily impossible) level. The kind of system implemented often depends on the acceptable threshold for theft. For example, keeping money in an inside shirt pocket increases the difficulty of theft above
270:
In addition to the initial obtainable cost of an item, the cost of replacement or recovery from theft of the item is usually considered when considering the cost of installing an anti-theft system. This cost estimation usually determines the maximum cost of the anti-theft system and the need to
334:
also fall into this category; newer systems also prevent the car from starting or raise an SOS alarm if ever the tracking device is detached from the car or valuable asset. The revolution of mobile applications and wireless communication make possible to get notified by your phone, when your
291:
is often compromised through the lax application of theft-prevention practices and human nature in general. The average anti-theft device does not require any additional effort while using the secured item, without reducing the level of security. In practice, users of security systems may
429:
are such security tags - a forensic fluid which contains millions of tiny fragments which have a unique number called "SIN" ("SelectaDNA identification number"), and registered in a national police database together with the owner's details, is etched into each of those particles.
271:
secure it. Expensive items will generally be secured with a higher cost anti-theft system, while low-cost items will generally be secured at a lower cost. Insurance companies will often mandate a minimum type of anti-theft system as part of the conditions for insurance.
261:
Equally varied are the methods developed for theft prevention. Anti-theft systems have evolved to counter new theft techniques as they have appeared in society. The choice for a particular anti-theft system is dependent on the following factors:
135:
protect valuables such as vehicles and personal property like wallets, phones, and jewelry. They are also used in retail settings to protect merchandise in the form of security tags and labels. Anti-theft systems include devices such as
209:
are two enabling factors for theft. Given that motives for theft are varied and complex, and are, generally speaking, not within the control of the victim, most methods of theft prevention rely on reducing opportunities for theft.
329:
Another common method is the alerting of other individuals to the act of theft. This is commonly seen in department stores, where security systems at exits alert store employees of the removal of unpaid items. Older
201:. When clear owner identification is not possible, and when there is a lack of social observance, people may be inclined to take possession of items to their own benefit at the expense of the original owner. 364:
some stage of use. Identification can occur physically or through other methods (physical keys, numerical codes, complex passwords, biometric identification). This can work even retrospectively
355:
Valuable items may be attached to a larger immobile object, usually furniture or walls. Large vehicles may also be locked in such a way to prevent their being operated.
300:. For example, a home security system will usually be enabled and disabled with an easy-to-remember code such as "1111" or "1234", instead of a more secure combination. 674: 238:
Improper use of the item may cause considerable damage or encourage further unauthorized actions (theft of car keys, stolen building access keys,
450:
Assets can be marked with various forensic marking materials for law enforcement tracking of the item. Examples of this type of marking include
335:
properties are stolen. Probably the first solution of mobile application based theft detection is BluCop, which was published in December 2010.
218:
Items may require an anti-theft system for a variety of reasons, which may occur in combination depending on the type of item and its purpose:
372:‌given that a stolen credit card can easily be invalidated with a phone call to the issuing bank, the motivation to steal one is reduced. 379:. Many vehicles have factory-installed anti-theft units, which provide protection through the ignition system. Under the hood there is a 1146: 170: 161: 53: 119: 442:" with information regarding their whereabouts and other information that can assist law enforcement in tracking down the devices. 222:
The item is expensive and/or has sentimental value (prestigious car, family heirloom, birthday gift, war medals, coin collection)
100: 418: 404: 72: 1171: 235:
The item may be left unattended in an unsafe environment for a certain amount of time (laptop in a library, car in a carpark)
141: 57: 409: 1249: 1166: 1083: 417:
Security tags are devices that are attached to products to prevent shoplifting and are often used in conjunction with an
79: 1317: 438:
Electronic devices such as laptops, cell phones and even gadgets such as iPods now have software that enable them to "
1030: 667: 1232: 375:
In the case of vehicle theft, the best deterrent to theft is in the installation of an approved vehicle anti-theft
194: 137: 86: 46: 1312: 467: 68: 987: 1281: 1204: 850: 660: 725: 426: 380: 1151: 1244: 1138: 1113: 1093: 1045: 813: 388: 376: 348: 1287: 1050: 924: 565: 536:
Das, Debashis; Banerjee, Sourav; Ghosh, Uttam; Biswas, Utpal; Bashir, Ali Kashif (2021-02-25).
93: 952: 683: 557: 493: 583: 1216: 1199: 992: 957: 767: 757: 720: 549: 1161: 1088: 904: 833: 511: 292:
intentionally reduce the effectiveness of an anti-theft system to increase its usability
1322: 1108: 1010: 914: 909: 632: 343: 252:
The item is otherwise unobtainable: (Alcohol, Tobacco products, age related substances)
239: 537: 1306: 1271: 1060: 1025: 1020: 972: 944: 919: 845: 828: 777: 740: 730: 712: 569: 1237: 1194: 1176: 967: 962: 929: 823: 818: 799: 784: 772: 762: 747: 735: 703: 246: 190: 145: 395:
uses a three circuit isolation system which can thwart even an experienced thief.
1291: 1103: 1098: 1035: 1015: 886: 608: 538:"A decentralized vehicle anti-theft system using Blockchain and smart contracts" 472: 392: 35: 553: 383:
that controls the operation of the engine. It is programmed to verify that the
1065: 982: 934: 881: 794: 789: 455: 451: 439: 422: 225:
The item is difficult/impossible to replace if lost (produced in low numbers,
561: 1211: 865: 838: 808: 331: 584:"How do security tags and labels work | Retail Security | SecurityTags.com" 232:
The item is easy to steal (retail/supermarket products, office stationery)
1156: 1040: 896: 855: 384: 295: 288: 226: 17: 977: 860: 752: 189:
is prevented simply through the application, and social acceptance, of
652: 408: 342: 186: 1055: 318: 308:
There are a number of general categories of anti-theft systems:
198: 656: 694: 633:"Theft & Larceny | Motivations, Types, & Case Studies" 245:
The item is desirable to others (jewelry, mobile phones, rare
29: 512:"Do Anti-Theft Bags Work? Prevention Is Better Than Nothing" 494:"The best anti-theft devices if your alarm isn't enough" 179:
RFID tag concealed beneath the label of a whisky bottle
193:. The best anti-theft device ownership-marking, e.g. 1225: 1187: 1137: 1126: 1076: 1003: 943: 895: 874: 711: 702: 60:. Unsourced material may be challenged and removed. 668: 8: 1134: 708: 675: 661: 653: 391:will allow ignition to occur. An approved 387:attached to the key is correct before the 120:Learn how and when to remove this message 542:Peer-to-Peer Networking and Applications 484: 413:Anti-theft tag on a laptop in a store 214:Motives for actively preventing theft 7: 1277: 492:Edsall, Nicole (September 9, 2019). 58:adding citations to reliable sources 1250:Vehicle identification number (VIN) 25: 637:www.criminaljusticeschoolinfo.com 249:, auto parts, industrial designs) 1286: 1276: 1267: 1266: 693:Part of a series of articles on 169: 160: 34: 419:electronic article surveillance 405:Electronic article surveillance 45:needs additional citations for 325:Raising the awareness of theft 312:Sequestering of valuable items 1: 1084:Approach and departure angles 317:jewelry might be placed in a 473:Ketan Kadam § Invention 321:behind a picture in a home. 185:Under normal circumstances, 1147:Automotive light bulb types 339:Preventing removal of items 304:Methods of theft prevention 293: 1339: 554:10.1007/s12083-021-01097-3 402: 1262: 690: 468:Danish bicycle VIN-system 359:Disabling the stolen item 1167:high-intensity discharge 27:A loss prevention method 613:Encyclopedia Britannica 257:Use of theft prevention 851:Stressed member engine 414: 352: 229:, unique works of art) 983:Windshield/windscreen 412: 389:engine control module 346: 1152:Daytime running lamp 54:improve this article 1318:Security technology 1114:Weight distribution 1046:Omniview technology 377:passive immobilizer 349:steering wheel lock 275:Threshold for theft 69:"Anti-theft system" 1233:Registration plate 415: 353: 133:Anti-theft systems 1300: 1299: 1258: 1257: 1122: 1121: 953:Glass run channel 887:Trunk/boot/dickie 684:Automotive design 434:Tracking software 130: 129: 122: 104: 16:(Redirected from 1330: 1313:Crime prevention 1290: 1280: 1279: 1270: 1269: 1217:Window deflector 1200:Side-view mirror 1135: 758:Continental tire 721:Backbone chassis 709: 677: 670: 663: 654: 647: 646: 644: 643: 629: 623: 622: 620: 619: 605: 599: 598: 596: 595: 580: 574: 573: 548:(5): 2775–2788. 533: 527: 526: 524: 523: 518:. 3 January 2020 508: 502: 501: 489: 446:Forensic marking 371: 367: 299: 173: 164: 125: 118: 114: 111: 105: 103: 62: 38: 30: 21: 1338: 1337: 1333: 1332: 1331: 1329: 1328: 1327: 1303: 1302: 1301: 1296: 1254: 1221: 1183: 1131: 1129: 1118: 1089:Breakover angle 1072: 999: 939: 891: 870: 698: 686: 681: 651: 650: 641: 639: 631: 630: 626: 617: 615: 607: 606: 602: 593: 591: 582: 581: 577: 535: 534: 530: 521: 519: 510: 509: 505: 491: 490: 486: 481: 464: 448: 436: 407: 401: 369: 365: 361: 341: 327: 314: 306: 286: 277: 268: 259: 216: 183: 182: 181: 180: 176: 175: 174: 166: 165: 154: 126: 115: 109: 106: 63: 61: 51: 39: 28: 23: 22: 15: 12: 11: 5: 1336: 1334: 1326: 1325: 1320: 1315: 1305: 1304: 1298: 1297: 1295: 1294: 1284: 1274: 1263: 1260: 1259: 1256: 1255: 1253: 1252: 1247: 1242: 1241: 1240: 1229: 1227: 1223: 1222: 1220: 1219: 1214: 1209: 1208: 1207: 1197: 1191: 1189: 1188:Other elements 1185: 1184: 1182: 1181: 1180: 1179: 1174: 1169: 1164: 1154: 1149: 1143: 1141: 1132: 1127: 1124: 1123: 1120: 1119: 1117: 1116: 1111: 1109:Turning radius 1106: 1101: 1096: 1091: 1086: 1080: 1078: 1074: 1073: 1071: 1070: 1069: 1068: 1063: 1053: 1048: 1043: 1038: 1033: 1028: 1023: 1018: 1013: 1011:Bumper sticker 1007: 1005: 1004:Other elements 1001: 1000: 998: 997: 996: 995: 990: 980: 975: 970: 965: 960: 955: 949: 947: 941: 940: 938: 937: 932: 927: 922: 917: 912: 907: 901: 899: 893: 892: 890: 889: 884: 878: 876: 872: 871: 869: 868: 863: 858: 853: 848: 843: 842: 841: 831: 826: 821: 816: 811: 806: 805: 804: 803: 802: 787: 782: 781: 780: 775: 765: 760: 755: 750: 745: 744: 743: 733: 728: 723: 717: 715: 706: 700: 699: 691: 688: 687: 682: 680: 679: 672: 665: 657: 649: 648: 624: 609:"Property law" 600: 575: 528: 503: 498:Digital Trends 483: 482: 480: 477: 476: 475: 470: 463: 460: 447: 444: 435: 432: 400: 397: 360: 357: 340: 337: 326: 323: 313: 310: 305: 302: 285: 282: 276: 273: 267: 266:Financial cost 264: 258: 255: 254: 253: 250: 243: 240:identity theft 236: 233: 230: 223: 215: 212: 195:license plates 178: 177: 168: 167: 159: 158: 157: 156: 155: 153: 150: 138:locks and keys 128: 127: 42: 40: 33: 26: 24: 14: 13: 10: 9: 6: 4: 3: 2: 1335: 1324: 1321: 1319: 1316: 1314: 1311: 1310: 1308: 1293: 1289: 1285: 1283: 1275: 1273: 1265: 1264: 1261: 1251: 1248: 1246: 1243: 1239: 1236: 1235: 1234: 1231: 1230: 1228: 1224: 1218: 1215: 1213: 1210: 1206: 1203: 1202: 1201: 1198: 1196: 1193: 1192: 1190: 1186: 1178: 1175: 1173: 1170: 1168: 1165: 1163: 1160: 1159: 1158: 1155: 1153: 1150: 1148: 1145: 1144: 1142: 1140: 1136: 1133: 1125: 1115: 1112: 1110: 1107: 1105: 1102: 1100: 1097: 1095: 1092: 1090: 1087: 1085: 1082: 1081: 1079: 1075: 1067: 1064: 1062: 1059: 1058: 1057: 1054: 1052: 1049: 1047: 1044: 1042: 1039: 1037: 1034: 1032: 1029: 1027: 1026:Hood ornament 1024: 1022: 1021:Front-end bra 1019: 1017: 1014: 1012: 1009: 1008: 1006: 1002: 994: 991: 989: 986: 985: 984: 981: 979: 976: 974: 973:Quarter glass 971: 969: 966: 964: 961: 959: 956: 954: 951: 950: 948: 946: 942: 936: 933: 931: 928: 926: 923: 921: 918: 916: 913: 911: 908: 906: 903: 902: 900: 898: 894: 888: 885: 883: 880: 879: 877: 873: 867: 864: 862: 859: 857: 854: 852: 849: 847: 844: 840: 837: 836: 835: 832: 830: 829:Quarter panel 827: 825: 822: 820: 817: 815: 812: 810: 807: 801: 798: 797: 796: 793: 792: 791: 788: 786: 783: 779: 776: 774: 771: 770: 769: 766: 764: 761: 759: 756: 754: 751: 749: 746: 742: 739: 738: 737: 734: 732: 731:Body-on-frame 729: 727: 724: 722: 719: 718: 716: 714: 710: 707: 705: 701: 697: 696: 689: 685: 678: 673: 671: 666: 664: 659: 658: 655: 638: 634: 628: 625: 614: 610: 604: 601: 589: 588:Security Tags 585: 579: 576: 571: 567: 563: 559: 555: 551: 547: 543: 539: 532: 529: 517: 516:DigiTravelist 513: 507: 504: 499: 495: 488: 485: 478: 474: 471: 469: 466: 465: 461: 459: 457: 453: 445: 443: 441: 433: 431: 428: 424: 420: 411: 406: 399:Security tags 398: 396: 394: 390: 386: 382: 378: 373: 358: 356: 350: 345: 338: 336: 333: 324: 322: 320: 311: 309: 303: 301: 297: 290: 283: 281: 274: 272: 265: 263: 256: 251: 248: 244: 241: 237: 234: 231: 228: 224: 221: 220: 219: 213: 211: 208: 204: 200: 197:, name tags, 196: 192: 188: 172: 163: 151: 149: 147: 143: 139: 134: 124: 121: 113: 102: 99: 95: 92: 88: 85: 81: 78: 74: 71: –  70: 66: 65:Find sources: 59: 55: 49: 48: 43:This article 41: 37: 32: 31: 19: 1238:vanity plate 1177:trafficators 988:washer fluid 968:Power window 963:Opera window 875:Compartments 763:Crumple zone 748:Cabrio coach 692: 640:. Retrieved 636: 627: 616:. Retrieved 612: 603: 592:. Retrieved 590:. 2019-01-31 587: 578: 545: 541: 531: 520:. Retrieved 515: 506: 497: 487: 449: 437: 416: 374: 362: 354: 328: 315: 307: 287: 278: 269: 260: 247:collectibles 217: 206: 202: 191:property law 184: 146:GPS locators 132: 131: 116: 107: 97: 90: 83: 76: 64: 52:Please help 47:verification 44: 1172:sealed beam 1104:Roll center 1099:Ride height 1036:Japan black 1031:Instruments 1016:Curb feeler 882:Hood/bonnet 393:immobilizer 294:(see also: 284:Ease of use 207:opportunity 1307:Categories 958:Greenhouse 642:2020-02-12 618:2020-02-12 594:2020-02-12 522:2020-02-12 479:References 456:Smartwater 452:SelectaDNA 440:phone home 427:Smartwater 423:SelectaDNA 403:See also: 332:car alarms 152:Anti-theft 110:April 2020 80:newspapers 1212:Tow hitch 1130:equipment 1056:Tire/tyre 915:Gull-wing 905:Butterfly 866:Trunk lid 809:Monocoque 713:Framework 570:233962665 562:1936-6442 142:RFID tags 18:Antitheft 1272:Category 1157:Headlamp 1139:Lighting 1128:Exterior 1094:Overhang 1077:Geometry 1061:run-flat 1041:Nerf bar 856:Subframe 824:Platform 814:Overhang 726:Beltline 462:See also 421:system. 385:RFID tag 381:computer 351:in a car 296:Password 289:Security 227:antiques 1282:Commons 978:Sunroof 930:Suicide 925:Sliding 920:Scissor 861:Tonneau 846:Spoiler 753:Chassis 370:‍ 366:‍ 94:scholar 1292:Portal 1162:hidden 910:Canopy 819:Pillar 800:shaker 785:Grille 778:skirts 773:ponton 768:Fender 741:Dagmar 736:Bumper 568:  560:  203:Motive 144:, and 96:  89:  82:  75:  67:  1323:Theft 1245:Theft 1226:Legal 1205:power 1066:spare 1051:Parts 993:wiper 945:Glass 897:Doors 795:scoop 566:S2CID 187:theft 101:JSTOR 87:books 1195:Horn 935:Swan 839:rack 834:Roof 790:Hood 704:Body 695:cars 558:ISSN 454:and 319:safe 205:and 199:RFID 73:news 550:doi 425:or 148:. 56:by 1309:: 635:. 611:. 586:. 564:. 556:. 546:14 544:. 540:. 514:. 496:. 458:. 347:A 140:, 676:e 669:t 662:v 645:. 621:. 597:. 572:. 552:: 525:. 500:. 368:— 298:) 242:) 123:) 117:( 112:) 108:( 98:· 91:· 84:· 77:· 50:. 20:)

Index

Antitheft

verification
improve this article
adding citations to reliable sources
"Anti-theft system"
news
newspapers
books
scholar
JSTOR
Learn how and when to remove this message
locks and keys
RFID tags
GPS locators


theft
property law
license plates
RFID
antiques
identity theft
collectibles
Security
Password
safe
car alarms

steering wheel lock

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.