Theft Alarm system. Theft Alarm for Android and IOS - Hideez

Hideez Theft Alarm for Android and IOS


Get a notification when the Bluetooth signal strength between your Hideez device and your mobile device or computer falls below the level you indicated (Only for Android, iOS).

The beep goes based on proximity sensor. Anti theft alarm system of Hideez Key takes photos and sends them to the specified email address in case your device is connected to the internet.

Methods of theft prevention

There are a number of general categories of anti-theft systems:

Sequestering of valuable items is a very common method of preventing theft is the placement of valuables in a safe location. The definition of safe depends on the minimum threshold for theft as determined by the owner. Desk stationery is often considered to be secured if placed in an unlocked drawer away from view, while expensive jewelry might be placed in a safe behind a picture in a home.

Raising the awareness of theft. Another common method is the alerting of other individuals to the act of theft. This is commonly seen in department stores, where security systems at exits alert store employees of the removal of unpaid items. Older car alarms also fall into this category; newer systems also prevent the car from starting. The revolution of mobile applications and wireless communication make possible to get notified by your phone, when your properties are stolen. Probably the first solution of mobile application based theft detection is BluCop, which was published in December 2010.

Preventing removal of items

Yet another method is the attachment of items to a larger immobile object, usually furniture or walls.

Disabling the stolen item

Items with specific functionality can often be disabled to prevent use of the item should it be stolen. The anti-theft system can require disabling on every use, or enabling when the item should be secured. Disabling the anti-theft system is usually done by requiring identification of the owner at some stage of use. Identification can occur physically or through other methods (physical keys, numerical codes, complex passwords, biometric identification). This can work even retrospectively: as a stolen credit card can easily be invalidated with a phone call to the issuing bank, the motivation to steal one is reduced.

In the case of vehicle theft, the best deterrent to theft is in the installation of an approved vehicle anti theft passive immobilizer. Many vehicles have OEM (factory installed) units and afford protection through the ignition system. OEM immobilizers function through the ECM/PCM (computer) under the hood of the vehicle. In general terms, the RFID tag attached to the key must be read by the ECM in order to allow ignition to occur. Unfortunately, organized crime thieves are able to bypass these systems and steal any vehicle at will. An approved immobilizer uses a 3 circuit isolation system which thwarts even the most experienced thief.

Security tags

Security tags are devices that are attached to products to prevent shoplifting and are often used in conjunction with an Electronic article surveillance system. SelectaDNA or Smartwater are such security tags - a forensic fluid which contains millions of tiny fragments which have a unique number called "SIN" ("SelectaDNA identification number"), and registered in a national police database together with the owner's details, is etched into each of those particles.

Tracking software

Electronic devices such as laptops, cell phones and even gadgets such as iPods now have software that enable them to "phone home" with information regarding their whereabouts and other information that can assist law enforcement in tracking down the devices.

Forensic marking

Assets can be marked with various forensic marking materials for law enforcement tracking of the item. An example of this type of marking includes SelectaDNA and Smartwater.