The nature and extent of electronic theft methods for cars
NEW YORK, March 12, 2013 /PRNewswire/ -- Reportlinker.com announces that a new market research report is available in its catalogue:
The nature and extent of electronic theft methods for cars
http://www.reportlinker.com/p01119561/The-nature-and-extent-of-electronic-theft-methods-for-cars.html#utm_source=prnewswire&utm_medium=pr&utm_campaign=Fruit_and_Vegetable
Electronic immobiliser systems are standard equipment in most modern cars. Fitment of this anti-theft technology is probably the biggest single contributor to the reductions in car theft seen in many markets since the 1990s. Over time the immobiliser systems have been refined yet there is persistent feedback from the market which suggests that even the most sophisticated modern electronic protection can be overcome, using equipment readily available on the internet, allowing thieves to steal cars without access to the owner's keys.
Referring to such techniques as 'electronic theft', this report sets out to determine to what extent this anecdotal information is true and to separate 'fact' from 'fiction'. In doing so, the report will answer the following important questions:
- To what extent are electronic theft methods used in car theft today?
- Is this type of theft a growing problem?
- What particular electronic theft methods are used?
• This report includes analysis of a range of electronic theft methods, which represent a growing theft risk for vehicles. Focusing on third party tools available to locksmiths, the report will investigate what security weakness do they leverage to be able to reprogram new keys. • Additionally, the report also analyses how actual theft tools (recovered from stolen vehicles) operate and what weaknesses they exploit.• The report also looks at how many cars are being stolen in this way, to help OEMs perform more accurate risk assessments.
Table of Contents
1. Executive Summary1.1 The Extent of Electronic Theft Methods1.2 Typical Methods used by Thieves1.3 Tackling Electronic Theft
2. Overview
2.1 Background2.2 Definition of 'Electronic Theft'2.3 Objectives2.4 Methodology2.5 Special Acknowledgments
3. How Thieves Steal Modern Cars without the Key
3.1 Gaining Entry to the Vehicle3.1.1. Opportunism3.1.2. Manipulation of the Door Lock Mechanism3.1.3. Breaking the Side Window Glass3.1.4. Key Fob Signal Manipulation3.1.5. Key Fob Signal Blocking3.1.6. Direct Signal Manipulation3.1.7. Deception3.2 Starting the Vehicle Engine3.2.1. Programming a New Key to the Vehicle3.2.2. Cloning Existing Vehicle Key3.2.3. Replacement of Security-Relevant Components3.2.4. Key Fob Signal Manipulation3.2.5. Immobiliser Override3.2.6. Possible Future Methods3.3 Case Studies
4. The Extent of Electronic Theft Methods
4.1 Interpretation of the Data4.2 Conclusions4.3 Increase in Theft Without Keys4.4 Future Predictions4.5 Country-by-Country Analysis
List of Figures
Fig. 2. High-Risk Vehicle Theft Trends and Electronic Theft Penetration
Fig. 3. Entry and Start Methods used by Thieves
Fig. 4. Historical Perspective of Vehicle Theft in England and Wales
Fig. 5. Summary of Vehicle Entry and Start Methods used by Thieves
Fig. 6. How Thieves Gain Access to Vehicles
Fig. 7. Constraints of Different Access Methods
Fig. 8. Smart Key Relay Attack Method (Access)
Fig. 9. SBD Relay Attack Evaluation Devices
Fig. 10. How Thieves Start Vehicles without the Original Key
Fig. 11. Electronic Theft Method Timeline
Fig. 12. Typical New Key Programming Process (Aftermarket Tool)
Fig. 13. Comparison of Key Programming and Key Cloning
Fig. 14. Smart Key Relay Attack Method (Engine Start)
Fig. 15. Immobiliser Override ECU for Mercedes-Benz Sprinter Van
Fig. 16. Summary of Modus Operandi Observed in Case Studies
Fig. 17. Countries where Electronic Theft Data has been Estimated
Fig. 18. Electronic Theft Rates by Region
Fig. 19. Cars Stolen 'With Key' –Sample of UK Premium and Luxury Parc
Fig. 20. Proportion of Cars Stolen 'Without Key' in London
Fig. 21. Evolution in Theft Methods of Traqueur Fleet in France,
Fig. 22. Methods Covered by 'Theft Without the key'
Fig. 23. Different Weaknesses in Vehicle Security Systems
Fig. 24. Security-Related Exploits Possible using Reverse Engineering
To order this report:Fruit_and_Vegetable Industry: The nature and extent of electronic theft methods for cars
Contact Clare: [email protected]
US:(339) 368 6001
Intl:+1 339 368 6001
SOURCE Reportlinker
WANT YOUR COMPANY'S NEWS FEATURED ON PRNEWSWIRE.COM?

Newsrooms &
Influencers

Digital Media
Outlets

Journalists
Opted In
Share this article