Gone in Two Minutes: Is My EV Going to Be Stolen?

The rise of the technological car age is undeniable. We are already talking about autonomous systems, with American revolutionaries like Tesla bringing their advanced capabilities to Australian roads. The vehicle of the future is here.

But while manufacturers look ahead, thieves are looking under the bonnet, or, more accurately, under the headlights.

In Brisbane, reports have been alarming: high-end, expensive Toyotas are being stolen without keys. How are they doing it?

The answer, and the term you are going to hear a lot in any “news” article is the CANbus. The theft involves sophisticated manipulation, sometimes through as simple a port as the headlights, or even by cutting a hole in the side of the car, to gain access to the vehicle’s central wiring system.

The acronym CAN refers to the messages and data exchanged over a Controller Area Network (CAN) bus, which acts as the central nervous system of a modern car.

Think of it as a shared chat line that lets all the parts of a car communicate to each other using just two wires. Instead of each part needing its own cable, everything—from the engine and brakes to the airbags and dashboard—uses the same connection. Each part sends little messages, and the parts that need that information listen and respond. It keeps your car running smoothly and reduces complicated wiring.

But that shared connection is also the responsibility for this surge in theft, allowing sophisticated bypasses of the traditional ignition.

Yes, they do! But, we have some serious statistics to back up why they are better equipped.

If your car is vulnerable because of its internal network, the most effective security measure is switching to a platform built with digital security as a foundational principle.

Here are four reasons why your next Electric Vehicle (EV) is far more secure than the petrol car sitting in your driveway:

1. The Stricter Control Frame

That same CANbus the news is so focused on plays an important feature in EVs, but with a critical difference.

Unlike a petrol or combustion vehicle, an EV cannot simply be hot-wired. An EV cannot start unless the Vehicle Control Unit (VCU), Battery Management System (BMS), inverter, and immobiliser all authenticate each other at the exact same time.

Making physical manipulation practically impossible. Should the controller detect any malformed CAN messages—the kind a thief might inject to bypass the ignition—the EV will simply refuse to enter ‘drive ready mode.’ No ignition bypass techniques through these ‘technological machines’ can actually happen.

2. Additional Digital Security Layers Beyond the CANbus

EVs tend to incorporate far more software-defined safeguards because the entire traction system is electronic by design. These features sit above or alongside the CANbus and raise the difficulty of unauthorised control significantly:

  • Encrypted Key Authentication: Modern EVs use rolling codes, challenge-response systems, or cryptographic keys that cannot be spoofed with basic relay attacks.

  • Secure Vehicle Gateways: Many EVs have centralised security gateways that actively filter CAN traffic. Without proper authentication, external devices cannot send control messages.

  • High-Voltage Safety Interlocks: If a thief attempts to access the battery or disconnect high-voltage components, the system instantly reports a fault and disables propulsion.

  • Drive Authorisation Logic: EVs generally require multiple electronic control units (ECUs) to confirm the ‘ready’ state; manipulating one module is insufficient for theft.

3. Connectivity and Traceability Reduce Theft Appeal

EVs are connected platforms by design, which dramatically lowers their appeal to organised theft rings seeking low-risk, fast-resale vehicles. They often include:

  • Persistent GPS tracking.

  • Remote immobilisation.

  • Real-time telematics heartbeat signals.

  • User smartphone integration.

  • VIN-linked cloud accounts.

As soon as an EV is unlawfully accessed, the associated app or cloud service frequently logs the intrusion. Stolen-vehicle tracking is far more effective with EVs, and thieves are keenly aware of the resulting higher recovery rates.

4. Practical Limitations Associated With Charging and Use

Even if someone manages to steal an EV, operating it creates practical challenges that further complicate black market use:

  • Traceable Charging: Public charging stations require accounts, authorisation, or payment methods traceable to an identity.

  • Home Charging Dependence: EVs are hard to hide from law enforcement if left plugged in.

  • Limited Range: A stolen EV cannot simply be refuelled at a servo in 2 minutes. If the battery is low, the thief has a small window to move it before needing a traceable recharge.

  • Charging Logs: Many charging networks retain detailed session metadata, making post-theft movements easy to track. These factors reduce the usefulness of a stolen EV in the black market, further lowering theft incidence.

Look, let’s be honest, we can’t sit here and guarantee that any vehicle is 100% safe from being stolen. But, for the most part, when you weigh the sophisticated, multi-layered security of an EV against the single-point vulnerabilities of older combustion vehicles, you will be significantly better off with an EV.