Vehicle Theft Protection Tips

Preliminary 2007 crime data released by the FBI in January contains some positive news on the vehicle theft front. Not only is 2007 on track to be the fourth consecutive year of declining vehicle thefts, but if the preliminary figure of minus 7.4 percent holds, it will be the largest single year percent drop in thefts since 1999 and it will contribute to the overall 11 percent reduction in vehicle thefts, nationally, since 2000.

However, the good news is no reason for vehicle owners or law enforcement to relax their vigilance.

“While there is overall great news in our new report, there is also room for concern,” said NICB President and CEO Robert M. Bryant. “Success against vehicle theft can be fleeting without an ongoing and adaptive program that couples the best in theft prevention/recovery technology with law enforcement operations. We must not become complacent in the wake of success.

“Bait cars, license plate readers and owner-applied theft deterrence and recovery systems have delivered outstanding results. In the coming years, technological advances may well defeat vehicle theft as a major crime problem in the United States, but until then we must continue using everything at our disposal to keep achieving the kinds of results that we have had over the last four years.”

NICB recommends the following actions under its “layered approach” to vehicle theft protection:

Common Sense -- An unlocked vehicle with a key in the ignition is an open invitation to any thief, regardless of which anti-theft device you use. The common sense approach to protection is the simplest and most cost-effective way to thwart would-be thieves. Secure your vehicle even if parking for brief periods. You should always:

  • Remove your keys from the ignition.
  • Lock your doors/close your windows.
  • Park in a well-lit area.

Warning Device -- The second layer of protection is a visible or audible device which alerts thieves that your vehicle is protected. Popular second layer devices include:

  • Audible alarms.
  • Steering column collars.
  • Steering wheel/brake pedal lock.
  • Wheel locks.
  • Theft deterrent decals.
  • Identification markers in or on vehicle.
  • VIN etching
  • Micro dot marking.

Immobilizing Device -- The third layer of protection is a device which prevents thieves from bypassing your ignition and hot-wiring the vehicle. Some electronic devices have computer chips in ignition keys. Other devices inhibit the flow of electricity or fuel to the engine until a hidden switch or button is activated. Popular third layer devices include:

  • Smart keys.
  • Fuse cut-offs.
  • Kill switches.
  • Starter, ignition, and fuel pump disablers.
  • Wireless ignition authentication.

Tracking Device -- The final layer of protection is a tracking device which emits a signal to police or a monitoring station when the vehicle is stolen. Tracking devices are very effective in helping authorities recover stolen vehicles. Some systems employ “telematics” which combine GPS and wireless technologies to allow remote monitoring of a vehicle. If the vehicle is moved the system will alert the owner and the vehicle can be tracked via computer.

Featured

  • Gaining a Competitive Edge

    Ask most companies about their future technology plans and the answers will most likely include AI. Then ask how they plan to deploy it, and that is where the responses may start to vary. Every company has unique surveillance requirements that are based on market focus, scale, scope, risk tolerance, geographic area and, of course, budget. Those factors all play a role in deciding how to configure a surveillance system, and how to effectively implement technologies like AI. Read Now

  • 6 Ways Security Awareness Training Empowers Human Risk Management

    Organizations are realizing that their greatest vulnerability often comes from within – their own people. Human error remains a significant factor in cybersecurity breaches, making it imperative for organizations to address human risk effectively. As a result, security awareness training (SAT) has emerged as a cornerstone in this endeavor because it offers a multifaceted approach to managing human risk. Read Now

  • The Stage is Set

    The security industry spans the entire globe, with manufacturers, developers and suppliers on every continent (well, almost—sorry, Antarctica). That means when regulations pop up in one area, they often have a ripple effect that impacts the entire supply chain. Recent data privacy regulations like GDPR in Europe and CPRA in California made waves when they first went into effect, forcing businesses to change the way they approach data collection and storage to continue operating in those markets. Even highly specific regulations like the U.S.’s National Defense Authorization Act (NDAA) can have international reverberations – and this growing volume of legislation has continued to affect global supply chains in a variety of different ways. Read Now

  • Access Control Technology

    As we move swiftly toward the end of 2024, the security industry is looking at the trends in play, what might be on the horizon, and how they will impact business opportunities and projections. Read Now

Featured Cybersecurity

Webinars

New Products

  • AC Nio

    AC Nio

    Aiphone, a leading international manufacturer of intercom, access control, and emergency communication products, has introduced the AC Nio, its access control management software, an important addition to its new line of access control solutions. 3

  • FEP GameChanger

    FEP GameChanger

    Paige Datacom Solutions Introduces Important and Innovative Cabling Products GameChanger Cable, a proven and patented solution that significantly exceeds the reach of traditional category cable will now have a FEP/FEP construction. 3

  • Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

    Connect ONE®

    Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation. 3