Scroll to top
Security for Luxury and Classic Car Collections | CloseProtectionHire

Security Intelligence

Security for Luxury and Classic Car Collections | CloseProtectionHire

Expert guide to security for luxury automotive collections: relay theft prevention, storage security, Thatcham standards, transport to auctions, and protecting high-value vehicles. 1,900+ words.

6 May 2026

Written by James Whitfield, Senior Security Consultant

A high-value automotive collection is one of the more complex personal security challenges an HNWI security programme encounters. Unlike a static residential property, vehicles move – to events, to auction, to specialist workshops, to concours d’elegance venues across the country and internationally. Each movement creates a targeting window. The collection also has a public-facing dimension: auction catalogues, classic car publications, and social media coverage generate the visibility that criminal networks rely on for intelligence.

This article addresses the threat picture, physical and electronic security standards, transport security, and the insurance-security nexus for high-value automotive collections.

The Threat Picture

The ABI’s Motor Insurance Fraud and Theft report 2023 recorded a 12 per cent year-on-year increase in vehicle theft claims, with average claim values for high-end vehicles substantially above the sector average. While the ABI data covers all vehicle categories, the organised criminal networks targeting luxury and classic cars operate at a distinct level of sophistication.

Relay attack has become the dominant method for keyless entry vehicles. Two operatives working together can unlock and start a target vehicle in under 60 seconds, using amplifiers to relay the key fob signal from inside a property to a device held beside the car. Rolls-Royce, Bentley, McLaren, Ferrari, Lamborghini, Porsche, and Aston Martin have all featured in documented relay attack cases. No marque is immune – the vulnerability is the keyless entry technology, not the brand’s security measures.

Organised Retail Crime (ORC) targeting high-value vehicles operates across multiple jurisdictions. INTERPOL Operation Cicero targeted networks transporting stolen luxury vehicles across European borders, recovering dozens of high-value cars and arresting multiple suspects across several countries. These networks use a well-established model: intelligence gathering, targeted theft, rapid movement across borders, and sale through legitimate-appearing channels in jurisdictions with different vehicle history databases.

Intelligence gathering by criminal networks draws on surprisingly open sources. Auction catalogues from Barrett-Jackson, RM Sotheby’s, Gooding and Company, Bonhams, and Silverstone Auctions identify vehicles, their values, and their owners by implication. Classic car forums carry detailed ownership discussions. Social media posts at high-profile events – Goodwood Festival of Speed, Goodwood Revival, Pebble Beach Concours d’Elegance, Salon Prive – provide real-time confirmation of vehicle presence, owner attendance, and approximate home region.

The risk is not limited to theft. Once a criminal network has identified a significant collection, the individual owner may become a target for intimidation, burglary of the residence, or in extreme cases, direct approaches designed to acquire specific vehicles under duress.

Key Fob Security: The First Line of Defence

The NCSC publishes specific guidance on keyless vehicle theft mitigation. The core recommendation is signal blocking: Faraday pouches or metal boxes for key fob storage when not in use prevent signal relay. The fob must be stored away from exterior walls and doors – the relay device outside can amplify a signal through most domestic building materials.

Secondary mechanical deterrents – steering locks, gear lock devices, wheel clamps for stored vehicles – remain relevant. A relay attack can unlock and start the car, but a visible steering lock prevents it being moved without removal, adding time and risk for the attacker. High-visibility deterrents also encourage criminals to select an easier target.

OBD port security devices prevent the ECU from being read to clone a key. For vehicles where relay attack is not possible (older classics without keyless entry), OBD port programming remains an alternative theft method – the port is typically under the dashboard and accessible in under a minute without specialist tools if the door is already open.

Tracker Standards: Thatcham Categories

The Thatcham Research Organisation sets the independent certification standards for vehicle security products in the UK. The current category structure (2019 revision) for tracking and recovery devices is:

Category S7/SF – the highest tier for stolen vehicle recovery. Requires driver verification (a tag or PIN that must be presented on entry), motion alert (the system activates when the vehicle moves without authentication), and an active subscription to a monitoring centre. Recovery rates for vehicles fitted with Category S7 devices substantially exceed the overall market average.

Category 6 – electronic tracking without driver identity component. Provides location data to a monitoring centre but does not alert on unauthorised movement without driver authentication.

Specialist insurers for high-value collections – Hagerty, Hiscox, and Chubb – typically specify Category S7/SF or equivalent as a policy condition for vehicles above a certain value threshold. Some policies require monitoring through specific approved providers: Tracker, Vodafone Automotive, or Meta Trak. Policy conditions should be reviewed annually, as Thatcham updates its category structure periodically.

Insurance coverage without a compliant tracker is not just a financial risk – it may result in a claim being declined entirely if the policy schedule specified a tracking standard that was not met at the time of theft.

Storage Security Standards

Garage doors and access points should meet a minimum of LPCB SR2 standard (Loss Prevention Certification Board, LPS 1175 Issue 8) for physical attack resistance. SR2 indicates three minutes of resistance to attack by common tools – sufficient to deter opportunistic intrusion and significantly delay a prepared attacker. For the highest-value collections, SR3 or SR4 standard is proportionate.

Alarm systems should conform to BS EN 50131 Grade 3 at minimum for collections of significant value. Grade 3 is designed to deter a professional intruder with planning. Grade 4 – designed against highly skilled, equipped adversaries – is appropriate for the most valuable collections. Alarm systems should be monitored by a BS 5979 Category II Alarm Receiving Centre (ARC) with a police URN (Unique Reference Number) to allow a direct response.

CCTV should meet BS 8418:2015 for detector-activated CCTV systems – the relevant standard for systems intended to generate alarm notifications. Retention should be a minimum of 31 days. Camera placement should cover all access points, with at least one camera providing face-quality imagery at each entry.

Fire suppression: for enclosed garage storage, clean agent systems using Novec 1230 or FM-200 suppress fire without causing water or chemical damage to vehicles. CO2 systems can cause paint damage if discharge is excessive. Halon is no longer available under Montreal Protocol restrictions. Specialist automotive storage facilities use inert gas systems as standard.

Access logging: every entry to and exit from a collection storage area should be logged against a named individual with a timestamp. This serves both as a deterrent and as an investigation asset if a theft or damage incident occurs.

Transport Security: The Highest-Risk Window

When a collection vehicle is transported to an auction, a specialist workshop, or a concours event, it leaves the controlled security environment of the storage facility. The transport phase is the highest-risk window in the vehicle’s movement cycle.

Key security principles for collection vehicle transport:

Enclosed transporters. Open car carriers expose the vehicle to observation during transit, allowing a following vehicle to identify destination and route. Enclosed specialist transporters prevent visual identification and protect the vehicle from weather and road debris.

Compartmentalised route information. The transporter driver should hold confirmed departure and arrival information but not full routing details for intermediate stops. This limits the intelligence available if a driver is compromised or approached.

GPS monitoring. The owner or their security team should be able to monitor the transporter’s real-time location throughout the journey. Any deviation from the expected route should trigger an immediate check-in call.

Schedule confidentiality. Transport schedules should be distributed on a strict need-to-know basis. Auction houses, specialist restorers, and event organisers should be given arrival windows rather than precise schedules. Staff involved in the movement should sign an NDA if the collection’s profile warrants it.

Security follow vehicle. For vehicles with a combined value above GBP 500,000, or where intelligence suggests a specific targeting risk, a security follow vehicle adds a response capability and a deterrent presence throughout the journey.

P1 City Context

In several P1 cities, the luxury vehicle environment creates specific security considerations.

Dubai has one of the highest concentrations of luxury and supercar ownership globally. Vehicle crime rates are lower than many comparator cities, but high-profile collections attract significant social media attention that can create targeting intelligence. DIFC-area showroom events and automotive exhibitions should be assessed using the same social media discipline applied to European concours events.

Istanbul has a documented pattern of luxury vehicle theft linked to professional networks operating between Turkey and Eastern Europe. FCDO security advisories for Turkey remain at an elevated level.

Manila has a strong car culture among high-net-worth families, and vehicle theft – including targeted theft of high-value vehicles – is documented in OSAC Philippines advisories. Tracked vehicles and secure compound storage are standard operating procedure for significant collections.

For broader high-value asset protection guidance, see our articles on protecting and transporting high-value assets and security considerations in high-net-worth real estate transactions.

Key Takeaways

A high-value automotive collection requires a layered security programme that addresses storage, in-use, transport, and the digital footprint of ownership. Relay attack has replaced traditional bypass as the dominant theft method – physical and signal-blocking countermeasures are the first response. Specialist insurance conditions must be maintained continuously. Transport is the most exposed phase and warrants proportionate investment in enclosed carriers, compartmentalised scheduling, and live monitoring.


James Whitfield is a Senior Security Consultant with experience across high net worth personal security, asset protection, and risk assessment in complex environments. This article is for informational purposes only and does not constitute legal or regulatory advice.

Summary

Key takeaways

1
1
Relay Attack Is Now the Dominant Theft Method for High-Value Vehicles

Traditional mechanical bypass has largely been replaced by relay attack for keyless entry vehicles. Signal-blocking Faraday pouches for key fobs, physical steering locks as a secondary deterrent, and parking position (not adjacent to a wall or hedge that allows signal relay) are the primary countermeasures. The NCSC guidance on keyless vehicle theft provides the technical baseline.

2
2
Social Media and Auction Attendance Create a Real Targeting Window

Criminal networks monitor social media accounts of collectors and use publicly available auction catalogue information to identify targets. A real-time Instagram post from Goodwood Revival or Pebble Beach confirms vehicle ownership, approximate value, and the owner's current location. Collection owners should implement strict social media discipline -- no real-time location disclosure during events.

3
3
Specialist Insurance Requires Specific Security Standards

Agreed-value policies from Hagerty, Hiscox, and Chubb typically stipulate minimum security requirements: Thatcham Category S7/SF tracker with active monitoring subscription, approved secure storage, and sometimes specific alarm grade standards. Non-compliance with policy conditions can invalidate a claim. Review the schedule annually against current Thatcham category designations.

4
4
Transport Is the Highest-Risk Phase for Collection Vehicles

During transit to an auction or event, the vehicle is outside the controlled storage environment and its movement is potentially known to a wider group of people. Enclosed transporters, compartmentalised route information, GPS monitoring, and strict schedule confidentiality significantly reduce transit risk. For the highest-value vehicles, a security follow vehicle is proportionate.

5
5
Storage Standards Must Match Vehicle Value

LPCB SR2 for access points, BS EN 50131 Grade 3 or 4 alarm systems, and monitored CCTV meeting BS 8418 are the appropriate standards for a collection of significant value. Inert gas fire suppression protects vehicles without causing water or chemical damage. Every access event should be logged against a named individual.

FAQ

Frequently Asked Questions

Relay attack theft exploits keyless entry systems. Two criminals work together: one stands near the house to amplify the key fob signal through walls, the other stands next to the target vehicle with a relay device. The car receives the amplified signal, believes the key is present, and unlocks. The vehicle is then driven away – the entire process can take under 60 seconds. The NCSC recommends storing key fobs in signal-blocking Faraday pouches or metal boxes when not in use. Physical steering locks provide an additional deterrent layer.

For insurance purposes on high-value vehicles, insurers typically require a minimum of Thatcham Category 6 (electronic tracking) or Category 7 (driver identity). For supercar and hypercar values, Hiscox, Hagerty, and Chubb specialist policies commonly specify Category S7/SF (the Thatcham 2019 category replacing the older S5/S6/S7 structure). Many agreed-value specialist insurers require Solera/Thatcham-approved monitoring services including an active subscription to a stolen vehicle recovery network such as Tracker or Vodafone Automotive.

Professional criminal networks target luxury car collections with a level of planning that goes far beyond opportunistic theft. Research phases include monitoring auction catalogues (Barrett-Jackson, RM Sotheby’s, Gooding and Company), tracking social media posts at Goodwood Revival, Pebble Beach Concours d’Elegance, and similar events, and using online classic car forums as OSINT sources. The ABI’s Motor Insurance Fraud and Theft 2023 report recorded a 12 per cent year-on-year increase in vehicle theft claims, with high-value vehicles over-represented in that data. INTERPOL Operation Cicero specifically targeted international networks transporting stolen luxury vehicles across borders.

The transport phase is the highest-risk window for collection vehicles. Key requirements include: using enclosed specialist transporters rather than open car carriers (prevents real-time targeting by following vehicles); ensuring the driver holds no copy of the full route plan or destination in advance; GPS tracking of the transporter with monitoring by owner’s security team; insurance transit schedule kept to strict need-to-know distribution; and pre-arranged secure, CCTV-covered collection and delivery points. For vehicles above GBP 500,000 in value, a follow vehicle with a security presence during transit is proportionate.

Storage security should meet LPCB SR2 standard for garage doors and access points – the minimum required for LPS 1175 Issue 8 attack resistance testing. Alarm systems should conform to BS EN 50131 Grade 3 or Grade 4 for the highest-value installations, with monitoring through a BS 5979 Category II alarm receiving centre. Moisture and fire suppression using inert gas systems (Novec 1230 or FM-200) is recommended for enclosed spaces. CCTV should meet BS 8418:2015 for detector-activated systems. Access should be limited to named, vetted individuals – a record of every entry and exit maintained.
Get in Touch

Request a Consultation

Describe your security requirements below. All enquiries are confidential and handled by licensed consultants.

Confidential. Your details are never shared with third parties.