
Security Intelligence
Security for Luxury and Classic Car Collections | CloseProtectionHire
Expert guide to security for luxury automotive collections: relay theft prevention, storage security, Thatcham standards, transport to auctions, and protecting high-value vehicles. 1,900+ words.
Written by James Whitfield, Senior Security Consultant
A high-value automotive collection is one of the more complex personal security challenges an HNWI security programme encounters. Unlike a static residential property, vehicles move – to events, to auction, to specialist workshops, to concours d’elegance venues across the country and internationally. Each movement creates a targeting window. The collection also has a public-facing dimension: auction catalogues, classic car publications, and social media coverage generate the visibility that criminal networks rely on for intelligence.
This article addresses the threat picture, physical and electronic security standards, transport security, and the insurance-security nexus for high-value automotive collections.
The Threat Picture
The ABI’s Motor Insurance Fraud and Theft report 2023 recorded a 12 per cent year-on-year increase in vehicle theft claims, with average claim values for high-end vehicles substantially above the sector average. While the ABI data covers all vehicle categories, the organised criminal networks targeting luxury and classic cars operate at a distinct level of sophistication.
Relay attack has become the dominant method for keyless entry vehicles. Two operatives working together can unlock and start a target vehicle in under 60 seconds, using amplifiers to relay the key fob signal from inside a property to a device held beside the car. Rolls-Royce, Bentley, McLaren, Ferrari, Lamborghini, Porsche, and Aston Martin have all featured in documented relay attack cases. No marque is immune – the vulnerability is the keyless entry technology, not the brand’s security measures.
Organised Retail Crime (ORC) targeting high-value vehicles operates across multiple jurisdictions. INTERPOL Operation Cicero targeted networks transporting stolen luxury vehicles across European borders, recovering dozens of high-value cars and arresting multiple suspects across several countries. These networks use a well-established model: intelligence gathering, targeted theft, rapid movement across borders, and sale through legitimate-appearing channels in jurisdictions with different vehicle history databases.
Intelligence gathering by criminal networks draws on surprisingly open sources. Auction catalogues from Barrett-Jackson, RM Sotheby’s, Gooding and Company, Bonhams, and Silverstone Auctions identify vehicles, their values, and their owners by implication. Classic car forums carry detailed ownership discussions. Social media posts at high-profile events – Goodwood Festival of Speed, Goodwood Revival, Pebble Beach Concours d’Elegance, Salon Prive – provide real-time confirmation of vehicle presence, owner attendance, and approximate home region.
The risk is not limited to theft. Once a criminal network has identified a significant collection, the individual owner may become a target for intimidation, burglary of the residence, or in extreme cases, direct approaches designed to acquire specific vehicles under duress.
Key Fob Security: The First Line of Defence
The NCSC publishes specific guidance on keyless vehicle theft mitigation. The core recommendation is signal blocking: Faraday pouches or metal boxes for key fob storage when not in use prevent signal relay. The fob must be stored away from exterior walls and doors – the relay device outside can amplify a signal through most domestic building materials.
Secondary mechanical deterrents – steering locks, gear lock devices, wheel clamps for stored vehicles – remain relevant. A relay attack can unlock and start the car, but a visible steering lock prevents it being moved without removal, adding time and risk for the attacker. High-visibility deterrents also encourage criminals to select an easier target.
OBD port security devices prevent the ECU from being read to clone a key. For vehicles where relay attack is not possible (older classics without keyless entry), OBD port programming remains an alternative theft method – the port is typically under the dashboard and accessible in under a minute without specialist tools if the door is already open.
Tracker Standards: Thatcham Categories
The Thatcham Research Organisation sets the independent certification standards for vehicle security products in the UK. The current category structure (2019 revision) for tracking and recovery devices is:
Category S7/SF – the highest tier for stolen vehicle recovery. Requires driver verification (a tag or PIN that must be presented on entry), motion alert (the system activates when the vehicle moves without authentication), and an active subscription to a monitoring centre. Recovery rates for vehicles fitted with Category S7 devices substantially exceed the overall market average.
Category 6 – electronic tracking without driver identity component. Provides location data to a monitoring centre but does not alert on unauthorised movement without driver authentication.
Specialist insurers for high-value collections – Hagerty, Hiscox, and Chubb – typically specify Category S7/SF or equivalent as a policy condition for vehicles above a certain value threshold. Some policies require monitoring through specific approved providers: Tracker, Vodafone Automotive, or Meta Trak. Policy conditions should be reviewed annually, as Thatcham updates its category structure periodically.
Insurance coverage without a compliant tracker is not just a financial risk – it may result in a claim being declined entirely if the policy schedule specified a tracking standard that was not met at the time of theft.
Storage Security Standards
Garage doors and access points should meet a minimum of LPCB SR2 standard (Loss Prevention Certification Board, LPS 1175 Issue 8) for physical attack resistance. SR2 indicates three minutes of resistance to attack by common tools – sufficient to deter opportunistic intrusion and significantly delay a prepared attacker. For the highest-value collections, SR3 or SR4 standard is proportionate.
Alarm systems should conform to BS EN 50131 Grade 3 at minimum for collections of significant value. Grade 3 is designed to deter a professional intruder with planning. Grade 4 – designed against highly skilled, equipped adversaries – is appropriate for the most valuable collections. Alarm systems should be monitored by a BS 5979 Category II Alarm Receiving Centre (ARC) with a police URN (Unique Reference Number) to allow a direct response.
CCTV should meet BS 8418:2015 for detector-activated CCTV systems – the relevant standard for systems intended to generate alarm notifications. Retention should be a minimum of 31 days. Camera placement should cover all access points, with at least one camera providing face-quality imagery at each entry.
Fire suppression: for enclosed garage storage, clean agent systems using Novec 1230 or FM-200 suppress fire without causing water or chemical damage to vehicles. CO2 systems can cause paint damage if discharge is excessive. Halon is no longer available under Montreal Protocol restrictions. Specialist automotive storage facilities use inert gas systems as standard.
Access logging: every entry to and exit from a collection storage area should be logged against a named individual with a timestamp. This serves both as a deterrent and as an investigation asset if a theft or damage incident occurs.
Transport Security: The Highest-Risk Window
When a collection vehicle is transported to an auction, a specialist workshop, or a concours event, it leaves the controlled security environment of the storage facility. The transport phase is the highest-risk window in the vehicle’s movement cycle.
Key security principles for collection vehicle transport:
Enclosed transporters. Open car carriers expose the vehicle to observation during transit, allowing a following vehicle to identify destination and route. Enclosed specialist transporters prevent visual identification and protect the vehicle from weather and road debris.
Compartmentalised route information. The transporter driver should hold confirmed departure and arrival information but not full routing details for intermediate stops. This limits the intelligence available if a driver is compromised or approached.
GPS monitoring. The owner or their security team should be able to monitor the transporter’s real-time location throughout the journey. Any deviation from the expected route should trigger an immediate check-in call.
Schedule confidentiality. Transport schedules should be distributed on a strict need-to-know basis. Auction houses, specialist restorers, and event organisers should be given arrival windows rather than precise schedules. Staff involved in the movement should sign an NDA if the collection’s profile warrants it.
Security follow vehicle. For vehicles with a combined value above GBP 500,000, or where intelligence suggests a specific targeting risk, a security follow vehicle adds a response capability and a deterrent presence throughout the journey.
P1 City Context
In several P1 cities, the luxury vehicle environment creates specific security considerations.
Dubai has one of the highest concentrations of luxury and supercar ownership globally. Vehicle crime rates are lower than many comparator cities, but high-profile collections attract significant social media attention that can create targeting intelligence. DIFC-area showroom events and automotive exhibitions should be assessed using the same social media discipline applied to European concours events.
Istanbul has a documented pattern of luxury vehicle theft linked to professional networks operating between Turkey and Eastern Europe. FCDO security advisories for Turkey remain at an elevated level.
Manila has a strong car culture among high-net-worth families, and vehicle theft – including targeted theft of high-value vehicles – is documented in OSAC Philippines advisories. Tracked vehicles and secure compound storage are standard operating procedure for significant collections.
Internal Links
For broader high-value asset protection guidance, see our articles on protecting and transporting high-value assets and security considerations in high-net-worth real estate transactions.
Key Takeaways
A high-value automotive collection requires a layered security programme that addresses storage, in-use, transport, and the digital footprint of ownership. Relay attack has replaced traditional bypass as the dominant theft method – physical and signal-blocking countermeasures are the first response. Specialist insurance conditions must be maintained continuously. Transport is the most exposed phase and warrants proportionate investment in enclosed carriers, compartmentalised scheduling, and live monitoring.
James Whitfield is a Senior Security Consultant with experience across high net worth personal security, asset protection, and risk assessment in complex environments. This article is for informational purposes only and does not constitute legal or regulatory advice.
Key takeaways
Relay Attack Is Now the Dominant Theft Method for High-Value Vehicles
Traditional mechanical bypass has largely been replaced by relay attack for keyless entry vehicles. Signal-blocking Faraday pouches for key fobs, physical steering locks as a secondary deterrent, and parking position (not adjacent to a wall or hedge that allows signal relay) are the primary countermeasures. The NCSC guidance on keyless vehicle theft provides the technical baseline.
Social Media and Auction Attendance Create a Real Targeting Window
Criminal networks monitor social media accounts of collectors and use publicly available auction catalogue information to identify targets. A real-time Instagram post from Goodwood Revival or Pebble Beach confirms vehicle ownership, approximate value, and the owner's current location. Collection owners should implement strict social media discipline -- no real-time location disclosure during events.
Specialist Insurance Requires Specific Security Standards
Agreed-value policies from Hagerty, Hiscox, and Chubb typically stipulate minimum security requirements: Thatcham Category S7/SF tracker with active monitoring subscription, approved secure storage, and sometimes specific alarm grade standards. Non-compliance with policy conditions can invalidate a claim. Review the schedule annually against current Thatcham category designations.
Transport Is the Highest-Risk Phase for Collection Vehicles
During transit to an auction or event, the vehicle is outside the controlled storage environment and its movement is potentially known to a wider group of people. Enclosed transporters, compartmentalised route information, GPS monitoring, and strict schedule confidentiality significantly reduce transit risk. For the highest-value vehicles, a security follow vehicle is proportionate.
Storage Standards Must Match Vehicle Value
LPCB SR2 for access points, BS EN 50131 Grade 3 or 4 alarm systems, and monitored CCTV meeting BS 8418 are the appropriate standards for a collection of significant value. Inert gas fire suppression protects vehicles without causing water or chemical damage. Every access event should be logged against a named individual.
Frequently Asked Questions
Request a Consultation
Describe your security requirements below. All enquiries are confidential and handled by licensed consultants.
Your enquiry has been received. A security consultant will contact you within 24 hours to discuss your requirements.
