Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
PhysicalPhysical SecurityInfrastructure:Electric,Gas & Water

When Metal Theft Becomes a Life Safety Crisis

By Alan Saquella
Person in red hoodie
Vladyslav Lytvyshchenko via Unsplash
April 21, 2026

The Changing Nature of Metal Theft

By any traditional measure, scrap and metal theft has long been categorized as a property crime, costly, disruptive, and frustrating, but rarely viewed as an immediate threat to human life. That framing, however, no longer reflects reality. What was once considered a nuisance crime has evolved into something far more consequential, particularly when it intersects with critical infrastructure.

Building on the risks outlined in “Scrap Disposal: When the End of the Supply Chain Becomes a Brand and Public Safety Risk,” by Marcos Fontes, a more serious dimension comes into focus when essential systems are targeted. In these cases, the impact extends well beyond inconvenience or reputational damage. It begins to affect life safety, regulatory compliance, and the overall resilience of the communities these systems are designed to support. What may initially appear as opportunistic theft can quickly escalate into a cascading failure with very human consequences.

A Hidden But Critical Vulnerability

During my tenure as Director of Security and Investigations at a telecommunications company, a pattern of routine metal thefts revealed just how dangerous this evolution had become. Criminals were targeting backup power supply cabinets; unremarkable enclosures scattered throughout both urban and suburban environments. Inside these cabinets were industrial batteries, each weighing approximately seventy-eight pounds, with multiple units housed within a single enclosure. Their purpose was straightforward but critical: to ensure uninterrupted telephone service during power outages.

This function is not simply a customer convenience. It is a regulatory requirement. Telecommunications providers operate under mandates established by the Federal Communications Commission (FCC), which require continuity of service so that individuals can access emergency systems, including 911. These cabinets, unnoticed by the public, serve as a silent but essential safeguard. When they are compromised, that safeguard disappears.

The implications of this vulnerability are profound. Imagine a power outage affecting a residential area. In the darkness and uncertainty, an individual, elderly, isolated, or medically vulnerable, experiences an emergency and attempts to call 911. The call fails. Not because of the outage itself, but because the backup system designed to maintain connectivity had already been stripped of its batteries hours earlier. In that moment, the incident is no longer a property crime. It is a life safety failure with potentially tragic consequences.

The Convergence of Risk

This shift in impact brings with it a convergence of risks. The human cost is the most immediate and concerning, but it is far from the only one. Regulatory exposure becomes a factor when service continuity requirements are not met. Legal liability increases as organizations may be scrutinized for failing to adequately protect critical infrastructure. At the same time, reputational damage can erode public trust, particularly once such incidents gain media attention. What begins as scrap theft becomes a multi-dimensional crisis.

The scale of the problem only amplifies its seriousness. In one metropolitan area with a population exceeding five million, approximately 5,500 of these cabinets were deployed across a wide range of environments. Over time, 361 of them were breached. The attacks were not only frequent but highly efficient. Each followed a similar pattern — forced entry, severed cables, and rapid battery removal, typically completed in under three minutes.

Despite the presence of tamper alarms connected directly to a Network Operations Center, response efforts were consistently outpaced. Law enforcement response times often stretched to 45 minutes or longer, complicated by the need to coordinate with technicians who could access the secure cabinets. In some jurisdictions, these incidents were deprioritized altogether, categorized as non-violent property crimes. By the time responders arrived, the perpetrators were long gone.

Beyond the immediate operational impact, additional risks began to surface. These industrial batteries contain hazardous materials, including lead and sulfuric acid. While some stolen units were funneled into scrap markets, others were discarded improperly, ending up in landfills, waterways, and drainage systems. This introduced environmental and public health concerns, along with the potential for regulatory violations extending beyond telecommunications into environmental protection.

The True Cost of “Simple” Theft

The monetary impact, while significant, tells only part of the story. Direct losses from stolen equipment exceeded $2 million. However, the indirect costs, often more damaging over time, included regulatory penalties, customer attrition due to reliability concerns, increased insurance exposure, and the expense of emergency repair and replacement operations. When combined with reputational damage, the full cost multiplied well beyond the initial loss figures.

Shifting to Intelligence-Led Response

Addressing a problem of this scale and complexity required moving beyond traditional investigative approaches. The randomness, speed, and geographic dispersion of the thefts rendered conventional methods ineffective. Instead, the response shifted toward intelligence-led, data-driven strategies. By leveraging such tools, investigators were able to map incidents, analyze spatial relationships, and identify patterns that were not immediately visible.

What initially appeared to be random activity began to reveal subtle consistencies. Certain environmental factors, access routes, and location characteristics emerged as common denominators. This allowed investigators not only to understand past incidents but also to anticipate future ones. Surveillance efforts became more targeted, and connections to known offenders and scrap networks were established. These efforts led to the identification and arrest of three organized criminal groups responsible for the thefts.

Designing Security for Modern Threats

While the investigative success was significant, it also highlighted a fundamental issue: the infrastructure itself had not been designed with this level of threat in mind. Many of the cabinets were easily accessible, secured with outdated locking mechanisms, and placed without sufficient consideration of environmental risk factors. The system had been built for a different era of threat.

The solutions, in many respects, were not overly complex. They required a return to foundational security principles. Strengthening physical security through hardened locks and reinforced enclosures proved effective. Incorporating situational risk assessments into placement decisions added another layer of protection. In some cases, simple measures, such as steel barriers or improved locking systems, significantly reduce vulnerability. The lesson was clear: sophisticated threats do not always require complex solutions, but they do demand intentional design.

Closing the Response Gap

This case underscores a broader shift that security professionals must recognize. Metal theft, particularly when it targets critical infrastructure, can no longer be treated as a minor or isolated issue. It must be understood as a life safety and continuity risk that cuts across organizational boundaries. Effective response requires collaboration between security, operations, compliance, and environmental teams. It also demands the integration of advanced analytics and intelligence capabilities into everyday security practices.

Most importantly, it highlights the need to address the response gap. Organizations cannot rely solely on external law enforcement to mitigate these threats. Prevention, rapid detection, and internal response capabilities must be built into the system itself. Legacy infrastructure, designed decades ago, must be reassessed considering modern threat capabilities. What was once adequate may now represent a critical vulnerability.

A Final Warning

What began as a series of “simple” thefts revealed a layered and systemic risk, one that touched public safety, environmental protection, regulatory compliance, and corporate reputation. The most important takeaway is both simple and urgent: not all theft is created equal.

When criminals target the hidden infrastructure that supports essential services, the consequences extend far beyond economic loss. They strike at the systems people rely on in their most vulnerable moments.

In this case, adaptive investigative strategies and infrastructure improvements helped prevent further harm. But the broader warning remains. If the end of the supply chain can become a brand risk, then critical infrastructure theft can become a life safety crisis.

And it must be treated accordingly.

KEYWORDS: critical infrastructure critical infrastructure security metal theft metal thefts theft theft prevention

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Alan

Alan Saquella, CPP, is an influential security and investigations expert with more than 30 years of security and investigations experience in corporate and public organizations at the executive level. He served for many years as the Security Operations and Investigations Director at Cox Communications before assuming his current role as a faculty team member at Embry-Riddle Aeronautical University — College of Business, Security and Intelligence. Saquella is also the Director, Investigations and Research at Verensics and a Member of the Identity Theft Advisory Board. Image courtesy of Saquella

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Cyber tech background

    Security’s Top Cybersecurity Leaders 2026

    Security magazine’s Top Cybersecurity Leaders 2026 award...
    Top Cybersecurity Leaders
  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Education & Training
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Popular Stories

Man on laptop

Healthcare Executives Face a New Era of Personal Risk

Man walking with briefcase

The Rising Tide of Executive Protection: Corporations Ramp Up Security in an Era of Heightened Threats

Stadium

Physical Security in Global Arenas: How AI Improves Security at Scale

Chatbot prompt screen

8 in 10 AI Chatbots Likely to Help Plan Attacks, Hate Crimes

Head in front of monitors

Ransomware Response: How Businesses Regain Control Under Pressure

SEC 2026 Benchmark Banner
SEC 2026 Benchmark Banner

Events

April 21, 2026

The Blind Spot in Enterprise Security: Managing Workforce Risk Post-Hire

Organizations continuously monitor their networks and systems for risk, yet the people with legitimate access are often the least monitored part of the model. Discover a Workforce Risk Intelligence Framework that adds a dedicated layer focused on workforce risk.

April 30, 2026

Building a Campus-Wide Culture of Security and Shared Responsibility

In today’s higher education environment, where institutions face evolving and multifaceted incidents, safety must be embedded into the fabric of campus culture. Learn strategies for generating collective buy-in from faculty, staff, students and senior leadership. 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
SEC 2026 Top Cybersecurity Leaders

Related Articles

  • Fist in black and white

    Creating a safer workplace: California Senate Bill 553 becomes law

    See More
  • greeting

    Leveraging security as a business enabler

    See More
  • Glowing police siren

    Revolutionizing public safety and criminal justice through AI

    See More

Related Products

See More Products
  • High-Rise Security and Fire Life Safety, 3rd edition

  • Physical Security and Safety: A Field Guide for the Practitioner

  • school security.jpg

    School Security: How to Build and Strengthen a School Safety Program

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media, Inc. and BNP Media II, LLC.

Design, CMS, Hosting & Web Development :: ePublishing