Preventing Camera Theft

By: Brian Rhodes, Published on Mar 17, 2012

Reports of video surveillance cameras being stolen are surprisingly common. While the crime is ironic, the theft of camera equipment can be costly. Cameras themselves are tools used to prevent items from being stolen, but what can be done to protect cameras from being stolen themselves? In this note, we examine why cameras might be a target of theft and describe 6 effective methods for keeping them secured.

Stealing cameras

The motivation behind stealing cameras is questionable. As we previously noted, used surveillance security equipment has very limited value. It does not appear that cameras are stolen with the primary motivation to resell. From our experience, we believe the primary motivation is:

  • General Vandalism: no overt aim other than to destroy the camera
  • Objection to camera placement: someone disagrees with where a camera is placed and removes it as protest
  • Precursor crime to other crimes: cameras are removed beforehand to eliminate surveillance in an area 
  • Removing recorded video: criminals foolishly assume that removing cameras also eliminates recorded evidence

News reports describing this problem emerge from all parts of the globe:

6 Protection Methods

In the following section, we address six common methods of protecting cameras. We have listed these methods in order of effectiveness and aesthetic impact.

Mounting Height

If cameras are difficult to reach, then they are more difficult to steal. Mounting cameras high is the easiest, most common and most disupted technique to stop cameras from being stolen or damaged. Many recommend mounting cameras between 12 and 15 feet high. This makes it impossible for a person to reach unaided.

Here is an example of a camera mounted high and out of reach:

However, the big downside is that the higher the camera is mounted, the steeper the downtilt to monitor what is happening on the ground. This results in bad angles and seeing the top of heads rather than faces. This can defeat the purpose of having a camera as shown in the real world example below:

Get Notified of Video Surveillance Breaking News
Get Notified of Video Surveillance Breaking News

Tamper Screws

A simple and effective measure is to install all exterior cameras with tamper-resistant hardware. This hardware features a specially formed head that can only be turned by matching specially bitted drivers. Mounting cameras with common phillips-head fasteners mean they can be uninstalled with common phillips-head drivers. These tamper resistant fasteners are most costly than common mounting hardware (as expensive as $5 per fastener) and available in all sizes. Matching driver tools and bits can be order from a variety of sources, including security products resellers and tool distributors.

Anti-climb Brackets

These brackets are a spiked harnesses that surround a pole just under a camera. This method of protecting cameras is aggressive, unsightly and not suitable for all mounting locations, but for cameras mounted on poles they are especially effective in discouraging tampering or theft. While mounted at height, these cameras are vulnerable to being accessed by climbing the pole to which they are mounted. These spikes present a physical barrier between the camera and the theft attempt. The effectiveness of this method may rely somewhat on the psychlogical effect of including sharp spikes. These brackets are available in a variety of configurations and can be bought for about $150 per assembly.

Camera Cage

As a last resort, a camera cage can be considered. These products are unsightly, attract undue attention, and accumulate trash and attract pests. These problems do not even begin to address the impact a cage might have on a camera's Field of View. However, covering a camera in an expanded metal cage certainly requires devoted attention to defeat. These products are made to mount directly to a building with lagbolts, and may feature trapdoors or access panels secured close with padlocks. Camera cages are available in a variety of sizes and finishes, and cost about $300 per unit.

Tamper Alarms

Some IP cameras support tamper alarming onboard the camera. This feature provides for the camera to send an alarm when the Field of View quickly and significantly changes as if someone spraypaints the lens or physically removes the camera from a mount. This feature does nothing to make it more difficult to steal a camera, but it does enable the camera to send an alarm out sooner than may otherwise be detected. For this feature to be useful, it must be properly configured and monitored, which minimizes the utility of the alarm. This feature is not available on all cameras but, if available, has a nominal configuration cost.

Layers of Security

Video surveillance is best used as a single 'security layer' among other security systems. Training elements of the intrusion system on surveillance cameras is a prudent move. This may be as simple as orienting a PIR motion detector to include areas where cameras are located, up to including contact switches on the back of cameras themselves. Supplementing light in areas where cameras are located has a mixed opinion on preventing crime, but the additional lighting can also help the cameras perform better by avoiding low light situations. These methods are hard to quantify in specific costs, but generally existing systems can be inexpensively expanded to address these areas.

Conclusion

Surveillance camera theft is a global problem motivated by a variety of reasons. Using these methods will help protect cameras from being stolen. Spending money to protect these devices during installation can prevent much great expenses for replacing equipment later. 

Comments : PRO Members only. Login. or Join.

Related Reports on Tutorials

Lens Focal Length Tutorial on Jul 10, 2019
3mm, 6mm, 2.8 - 9mm, 5 - 50mm, etc. Camera specifications often list lens lengths but what do they mean? These metrics are important in...
Subnetting for Video Surveillance on Apr 30, 2019
This guide explains when subnetting is used on security networks, and how it works. We explain how to add or remove IP addresses to your range,...
Door Operators Access Control Tutorial on Apr 17, 2019
Doors equipped with door operators, specialty devices that automate opening and closing, tend to be quite complex. The mechanisms needed to...
Pole Mount Camera Installation Guide on Apr 11, 2019
Poles are a popular but challenging choice for deploying surveillance cameras outdoors. Poles are indispensable for putting cameras at the right...
ONVIF Video Surveillance Tutorial on Jan 29, 2019
ONVIF is well known within the surveillance industry as an interface to connect IP cameras and VMS systems. However, new users may find it...
Access Control Turnstiles Guide on Jan 28, 2019
Turnstiles control pedestrian access to secured areas, essentially becoming moving portions of fences, walls, or barricades for physically stop...
Cable Trenching for Surveillance on Jan 21, 2019
Trenching cable for surveillance is surprisingly complex. While using shovels, picks, and hoes is not advanced technology, the proper planning,...
H.265 / HEVC Codec Tutorial on Jan 08, 2019
H.265 support improved significantly in 2018, with H.265 camera/VMS compatibility increased compared to only a year ago, and most manufacturers...
Building Occupancy Codes and Access Control Tutorial on Nov 01, 2018
A building or room's classification can greatly impact which building codes must be followed. In terms of access control, these 'occupancy codes'...
AHJ / Authority Having Jurisdiction Tutorial on Sep 27, 2018
One of the most powerful yet often underappreciated characters in all of physical security is the Authority Having Jurisdiction (AHJ). Often,...

Most Recent Industry Reports

Wyze Disruptive AI Analytics Tested on Jul 17, 2019
$20 camera disruptor Wyze has released free person detection deep learning analytics to all of their users, claiming users will "Only get notified...
Anyvision Aims For 2022 Revenue of $1 Billion on Jul 17, 2019
Only 3 video surveillance manufacturers do a billion dollars or more in annual revenue - Hikvision, Dahua, and Axis. Now, Anyvision plans to join...
HD Analog vs IP Guide on Jul 16, 2019
For years, HD resolution and single cable signal/power were IP camera advantages, with analog cameras limited to much lower resolution and...
How To Troubleshoot Wiegand Reader Problems - Inverted Wiring on Jul 16, 2019
Wiegand is the dominant method of connecting access readers, but problems can arise for installers. In fact, one of the most difficult reader...
ZeroEyes Gun Detection Startup on Jul 16, 2019
A gun detection video analytics startup, ZeroEyes, is being led by a group of 6 former Navy SEALs, aiming to "save lives" by using AI to assist...
Motorola Acquires Watchguard, Adds to Vigilant And Avigilon on Jul 15, 2019
2 years ago, Motorola had no position nor relevancy to video surveillance. Now, they own major video surveillance, LPR and body camera providers...
Hikvision Global News Reports Directory on Jul 15, 2019
Hikvision has received the most global news reporting of any video surveillance company, ever, ranging from the WSJ, the Financial Times, Reuters,...
Vivotek Trend Micro Cyber Security Camera App Tested on Jul 15, 2019
Vivotek and Trend Micro are claiming five million blocked attacks on IP cameras, with their jointly developed app for Vivotek cameras. This new...
Beware African 50,000 IP Camera Contract Scam on Jul 12, 2019
A “Nigerian Prince” scam for the video surveillance market is going around. You, or at least we, could be lucky enough to be the single bidder for...
Axis ARTPEC-7 P1375-E Camera Tested on Jul 12, 2019
Axis claims the new P1375-E box camera with ARTPEC-7 chip delivers "clear, sharp images in any lighting condition." But how well does it do? We...

The world's leading video surveillance information source, IPVM provides the best reporting, testing and training for 10,000+ members globally. Dedicated to independent and objective information, we uniquely refuse any and all advertisements, sponsorship and consulting from manufacturers.

About | FAQ | Contact