Preventing Camera Theft

Author: Brian Rhodes, Published on Mar 17, 2012

Reports of video surveillance cameras being stolen are surprisingly common. While the crime is ironic, the theft of camera equipment can be costly. Cameras themselves are tools used to prevent items from being stolen, but what can be done to protect cameras from being stolen themselves? In this note, we examine why cameras might be a target of theft and describe 6 effective methods for keeping them secured.

Stealing cameras

*** ********** ****** ******** ******* ** ************. ** ** ********** noted,**** ************ ******** ********* *** **** ******* *****. ** **** *** ****** **** ******* *** ****** **** the ******* ********** ** ******. **** *** **********, ** ******* the ******* ********** **:

  • ******* *********:** ***** *** ***** **** ** ******* *** ******
  • ********* ** ****** *********:******* ********* **** ***** * ****** ** ****** *** ******* it ** *******
  • ********* ***** ** ***** ******: ******* *** ******* ********** ** ********* ************ ** ** area 
  • ******** ******** *****: ********* ********* ****** **** ******** ******* **** ********** ******** evidence

**** ******* ********** **** ******* ****** **** *** ***** ** the *****:

6 ********** *******

** *** ********* *******, ** ******* *** ****** ******* ** protecting *******. ** **** ****** ***** ******* ** ***** ** effectiveness *** ********* ******.

Mounting ******

** ******* *** ********* ** *****, **** **** *** **** difficult ** *****. ******** ******* **** ** *** *******, **** common *** **** ******** ********* ** **** ******* **** ***** stolen ** *******. **** ********* ******** ******* ******* ** *** 15 **** ****. **** ***** ** ********** *** * ****** to ***** *******.

**** ** ** ******* ** * ****** ******* **** *** out ** *****:

*******, *** *** ******** ** **** *** ****** *** ****** is *******, *** ******* *** ******** ** ******* **** ** happening ** *** ******. **** ******* ** *** ****** *** seeing *** *** ** ***** ****** **** *****. **** *** defeat *** ******* ** ****** * ****** ** ***** ** the**** ***** ************:

Tamper ******

* ****** *** ********* ******* ** ** ******* *** ******** cameras **** ******-********* ********. **** ******** ******** * ********* ****** head **** *** **** ** ****** ** ******** ********* ****** drivers. ******** ******* **** ****** ********-**** ********* **** **** *** be *********** **** ****** ********-**** *******. ***** ****** ********* ********* are **** ****** **** ****** ******** ******** (** ********* ** $5 *** ********) *** ********* ** *** *****. ******** ****** tools *** **** *** ** ***** **** * ******* ** sources, ********* ******** ******** ********* *** **** ************.

Anti-climb ********

***** ******** *** * ****** ********* **** ******** * **** just ***** * ******. **** ****** ** ********** ******* ** **********, unsightly *** *** ******** *** *** ******** *********, *** *** cameras ******* ** ***** **** *** ********** ********* ** ************ tampering ** *****. ***** ******* ** ******, ***** ******* *** vulnerable ** ***** ******** ** ******** *** **** ** ***** they *** *******. ***** ****** ******* * ******** ******* ******* the ****** *** *** ***** *******. *** ************* ** **** method *** **** ******** ** *** ************ ****** ** ********* sharp ******. ***** ******** *** ********* ** * ******* ** configurations *** *** ** ****** *** ***** $*** *** ********.

Camera ****

** * **** ******, * ****** **** *** ** **********. These ******** *** *********, ******* ***** *********, *** ********** ***** and ******* *****. ***** ******** ** *** **** ***** ** address *** ****** * **** ***** **** ** * ******'* Field ** ****. *******, ******** * ****** ** ** ******** metal **** ********* ******** ******* ********* ** ******. ***** ******** are **** ** ***** ******** ** * ******** **** ********, and *** ******* ********* ** ****** ****** ******* ***** **** padlocks. Camera ***** *** ********* ** * ******* ** ***** *** finishes, *** **** ***** $*** *** ****.

Tamper ******

**** ** ******* ************* *************** *** ******. **** ******* ******** *** *** ****** ** send ** ***** **** *** ***** ** **** ******* *** significantly ******* ** ** ******* *********** *** **** ** ********** removes *** ****** **** * *****. **** ******* **** ******* to **** ** **** ********* ** ***** * ******, *** it **** ****** *** ****** ** **** ** ***** *** sooner **** *** ********* ** ********. *** **** ******* ** be ******, ** **** ** ******** ********** *** *********, ***** minimizes *** ******* ** *** *****. **** ******* ** *** available ** *** ******* ***, ** *********, *** * ******* configuration ****.

Layers ** ********

***** ************ ** **** **** ** * ****** '******** *****' among ***** ******** *******. ******** ******** ** *** ********* ****** on ************ ******* ** * ******* ****. **** *** ** as ****** ** ********* * *** ****** ******** ** ******* areas ***** ******* *** *******, ** ** ********* ******* ******** on *** **** ** ******* **********. ************* ***** ** ***** where ******* *** ********** * ***** ******* ** ********** *****, *** *** ********** ******** *** **** **** *** ******* perform ****** ** ******** *** ***** **********. ***** ******* *** **** to ******** ** ******** *****, *** ********* ******** ******* *** be ************* ******** ** ******* ***** *****.

**********

************ ****** ***** ** * ****** ******* ********* ** * variety ** *******. ***** ***** ******* **** **** ******* ******* from ***** ******. ******** ***** ** ******* ***** ******* ****** installation *** ******* **** ***** ******** *** ********* ********* *****. 

Login to read this IPVM report.
Why do I need to log in?
IPVM conducts unique testing and research funded by member's payments enabling us to offer the most independent, accurate and in-depth information.

Related Reports on Tutorials

Super Low Light Surveillance Guide on Aug 01, 2017
At the beginning of this decade, low light performance of megapixel cameras was generally terrible. This was the era of super slow shutter where...
Batteries For Alarm Systems Tutorial on Jul 11, 2017
Alarm systems use backup batteries in order to continue working if an intruder attempts to disable the alarm by cutting power to the building. In...
H.265 / HEVC Codec Tutorial 2017 on Jun 30, 2017
For years, video surveillance professionals have talked about the potential for H.265. Now, in 2017, H.265 is starting to gain mainstream...
Selling and Valuing Security Integrators on May 12, 2017
This ia a tutorial in how to (1) determine your security integrator's value and (2) to sell your security integrator. If you own an integrator,...
Duress Codes For Alarms Systems on May 02, 2017
An alarm system can call for help in the event of an attempted break in, but only if it is armed. If an adversary forces an authorized user to...
Burglar Alarm Strobes Guide on Mar 31, 2017
Strobes provide visual notification of alarm incidents, as sirens are used to give audible notification. Using a strobe gives alarm users and alarm...
Burglar Alarm Sirens Guide on Mar 27, 2017
Sirens are used to alert users to an alarm condition. In this note, we examine how to choose, locate, and install alarm sirens, including Siren...
Glass Break Sensor Tutorial on Mar 21, 2017
Burglars often break glass windows to get into a house. Using glass break detectors in conjunction with alarm contacts is a good way to protect the...
Alarm Panic Switches Tutorial on Mar 16, 2017
Panic switches allow silently triggering an alarm system when it is otherwise disarmed. In this tutorial we explain and contrast the 7 most common...
Environmental Sensors For Burglar Alarm Tutorials on Mar 15, 2017
Intrusion detection systems can be used to alert users to environmental issues. By connecting sensors that monitor the heat, humidity, and...

Most Recent Industry Reports

FLIR Restructures Security Division on Aug 22, 2017
FLIR's goal was once to have a single end-to-end security solution. However, FLIR's Security business unit has been struggling, with several areas...
Honeywell Total Connect 2.0 Tested on Aug 22, 2017
Honeywell is one of the biggest brands in security, with Total Connect 2.0 being the company's remote security and smarthome platform. We bought...
IP Camera Cabling Testing Statistics on Aug 22, 2017
Test and certify, or crimp and pray? Some integrators certify every cable they run, while others only inspect cables that have video issues. 130...
Dahua 4K IR PTZ Tested on Aug 21, 2017
4K has made its way to IR PTZs. In this report, we examine the Dahua 6AE830VNI, a 4K PTZ with 30x optical zoom, 200m (~650') integrated IR, and...
Top Used License Plate Capture Cameras on Aug 21, 2017
Capturing license plates is a common video surveillance application. But what cameras do integrators mostly commonly used? Special purpose LPC...
VLAN For Video Surveillance Usage Statistics on Aug 21, 2017
VLANs (see our tutorial) are an option for networks using video surveillance, but how often are they actually used? 125+ integrators told us how...
Avigilon CEO Attacks Asian Companies Cyber Insecurity on Aug 18, 2017
Avigilon CEO is taking aim at their Asian competitors. And he is going directly after these company's cyber security issues. In this note, we...
Sony Next Gen HD Dome Camera Tested (SNC-EM642R) on Aug 18, 2017
Sony has released their latest generation, claiming improved WDR and low light, increased IR range, and more. We tested the SNC-EM642R outdoor IR...
IP Networking Course September 2017 on Aug 17, 2017
This is the only networking course designed specifically for video surveillance professionals plus it includes live training, personal help and...
Knightscope Raises $10 Million With $3,320 Average Per Investor on Aug 17, 2017
Congrats to Knightscope. And condolences to their legion of little investors. Knightscope has disclosed they have raised $10+ million from their...

The world's leading video surveillance information source, IPVM provides the best reporting, testing and training for 10,000+ members globally. Dedicated to independent and objective information, we uniquely refuse any and all advertisements, sponsorship and consulting from manufacturers.

About | FAQ | Contact