World Library  
Flag as Inappropriate
Email this Article

Anti-theft system

Article Id: WHEBN0001717626
Reproduction Date:

Title: Anti-theft system  
Author: World Heritage Encyclopedia
Language: English
Subject: MacKeeper, Australian Design Rules, Kensington Security Slot, Remote starter, GPS2SMS
Collection: Crime Prevention, Security Technology, Vehicle Security Systems, Wireless Locating
Publisher: World Heritage Encyclopedia
Publication
Date:
 

Anti-theft system

An anti-theft system is any device or method used to prevent or deter the unauthorized appropriation of items considered valuable. Theft is one of the most common and oldest criminal behaviours. From the invention of the first lock and key to the introduction of RFID tags and biometric identification, anti-theft systems have evolved to match the introduction of new inventions to society and the resulting theft of them by others.

Contents

  • Theft: motive and opportunity 1
  • Motives for actively preventing theft 2
  • Use of theft prevention 3
    • Financial cost 3.1
    • Threshold for theft 3.2
    • Ease of use 3.3
  • Methods of theft prevention 4
    • Sequestering of valuable items 4.1
    • Raising the awareness of theft 4.2
    • Preventing removal of items 4.3
    • Disabling the stolen item 4.4
    • Security tags 4.5
    • Tracking software 4.6

Theft: motive and opportunity

Under normal circumstances, theft is prevented simply through the application and social acceptance of property law. Ownership is often indicated by means of visual marking (license plates, name tags). When clear owner identification is not possible and when there is a lack of social observance, people may be inclined to take possession of items to their own benefit at the expense of the original owner. Motive and opportunity are two enabling factors for theft. Given that motives for theft are varied and complex and are generally speaking not within the control of the victim, most methods of theft prevention rely on reducing opportunities for theft.

Motives for actively preventing theft

Items may require an anti-theft system for a variety of reasons, which may occur in combination depending on the type of item and its purpose:

  • The item is expensive and/or has sentimental value (prestigious car, family heirloom, birthday gift, war medals, coin collection)
  • The item is difficult/impossible to replace if lost (produced in low numbers, antiques, unique works of art)
  • The item is easy to steal (retail/supermarket products, office stationery, no security tags (TJ)
  • The item may be left unattended in an unsafe environment for a certain amount of time (laptop in a library, car in a carpark)
  • Improper use of the item may cause considerable damage or encourage further unauthorized actions (theft of car keys, stolen building access keys, identity theft)
  • The item is desirable to others (jewelry, mobile phones, rare collectibles, auto parts, industrial designs)
  • The item is otherwise unobtainable: (Alcohol, Tobacco products, age related substances)

Use of theft prevention

Equally varied are the methods developed for theft prevention. Anti-theft systems have evolved to counter new theft techniques as they have appeared in society. The choice for a particular anti-theft system is dependent on the following factors:

Financial cost

In addition to the initial obtainable cost of an item, the cost of replacement or recovery from theft of the item is usually considered when considering the cost of installing an anti-theft system. This cost estimation usually determines the maximum cost of the anti-theft system and the need to secure it. Expensive items will generally be secured with a higher cost anti-theft system, while low-cost items will generally be secured at a lower cost. Insurance companies will often mandate a minimum type of anti-theft system as part of the conditions for insurance.

Threshold for theft

Anti-theft systems are designed to raise the difficulty of theft to an infeasible (but not necessarily impossible) level. The kind of system implemented often depends on the acceptable threshold for theft. For example, keeping money in an inside shirt pocket increases the difficulty of theft above that necessary if the pocket was on a backpack, since unauthorized access is made sufficiently more difficult. Methods of theft evolve to decrease the difficulty of theft, increased by newer anti-theft systems. Because of evolution on both sides and the social aspect of theft, the threshold for theft is very dynamic and heavily dependent on the environment. Doors in quiet suburban neighbourhoods are often left unlocked, as the perceived thresholds for theft are very high.

Ease of use

Security is often compromised through the lax application of theft-prevention practices and human nature in general. The average anti-theft device does not require any additional effort while using the secured item, without reducing the level of security. In practice, users of security systems may intentionally reduce the effectiveness of an anti-theft system to increase its usability (see passwords). For example, a home security system will usually be enabled and disabled with an easy-to-remember code such as "1111" or "123", instead of a more secure combination.

Methods of theft prevention

There are a number of general categories of anti-theft systems:

Sequestering of valuable items

A very common method of preventing theft is the placement of valuables in a safe location. The definition of safe depends on the minimum threshold for theft as determined by the owner. Desk stationery is often considered to be secured if placed in an unlocked drawer away from view, while expensive jewelry might be placed in a safe behind a picture in a home.

Raising the awareness of theft

Another common method is the alerting of other individuals to the act of theft. This is commonly seen in department stores, where security systems at exits alert store employees of the removal of unpaid items. Older car alarms also fall into this category; newer systems also prevent the car from starting. The revolution of mobile applications and wireless communication make possible to get notified by your phone, when your properties are stolen. Probably the first solution of mobile application based theft detection is BluCop, which was published in December 2010.

Preventing removal of items

Yet another method is the attachment of items to a larger immobile object, usually furniture or walls.

Disabling the stolen item

Items with specific functionality can often be disabled to prevent use of the item should it be stolen. The anti-theft system can require disabling on every use, or enabling when the item should be secured. Disabling the anti-theft system is usually done by requiring identification of the owner at some stage of use. Identification can occur physically or through other methods (physical keys, numerical codes, complex passwords, biometric identification). This can work even retrospectively: as a stolen credit card can easily be invalidated with a phone call to the issuing bank, the motivation to steal one is reduced.

In the case of vehicle theft, the best deterrent to theft is in the installation of an approved vehicle anti theft passive immobilizer. Many vehicles have OEM (factory installed) units and afford protection through the ignition system. OEM immobilizers function through the ECM/PCM (computer) under the hood of the vehicle. In general terms, the RFID tag attached to the key must be read by the ECM in order to allow ignition to occur. Unfortunately, organized crime thieves are able to bypass these systems and steal any vehicle at will. An approved immobilizer uses a 3 circuit isolation system which thwarts even the most experienced thief.

Security tags

Security tags are devices that are attached to products to prevent shoplifting and are often used in conjunction with an Electronic article surveillance system. SelectaDNA or Smartwater are such security tags - a forensic fluid which contains millions of tiny fragments which have a unique number called "SIN" ("SelectaDNA identification number"), and registered in a national police database together with the owner's details, is etched into each of those particles.

Tracking software

Electronic devices such as laptops, cell phones and even gadgets such as iPods now have software that enable them to "phone home" with information regarding their whereabouts and other information that can assist law enforcement in tracking down

This article was sourced from Creative Commons Attribution-ShareAlike License; additional terms may apply. World Heritage Encyclopedia content is assembled from numerous content providers, Open Access Publishing, and in compliance with The Fair Access to Science and Technology Research Act (FASTR), Wikimedia Foundation, Inc., Public Library of Science, The Encyclopedia of Life, Open Book Publishers (OBP), PubMed, U.S. National Library of Medicine, National Center for Biotechnology Information, U.S. National Library of Medicine, National Institutes of Health (NIH), U.S. Department of Health & Human Services, and USA.gov, which sources content from all federal, state, local, tribal, and territorial government publication portals (.gov, .mil, .edu). Funding for USA.gov and content contributors is made possible from the U.S. Congress, E-Government Act of 2002.
 
Crowd sourced content that is contributed to World Heritage Encyclopedia is peer reviewed and edited by our editorial staff to ensure quality scholarly research articles.
 
By using this site, you agree to the Terms of Use and Privacy Policy. World Heritage Encyclopedia™ is a registered trademark of the World Public Library Association, a non-profit organization.
 



Copyright © World Library Foundation. All rights reserved. eBooks from World eBook Library are sponsored by the World Library Foundation,
a 501c(4) Member's Support Non-Profit Organization, and is NOT affiliated with any governmental agency or department.