Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
PhysicalSectorsVideo SurveillanceConstruction, Real Estate, Property Management

Using Thermal to Deter Construction Equipment Theft

By John Distelzweig
Using Thermal to Deter Construction Equipment Theft - Security Magazine
July 9, 2018

Construction companies and job sites lose as much as $1 billion annually from equipment theft, according to the 2016 Equipment Theft Report published by the National Equipment Register (NER) and the National Insurance Crime Bureau (NICB). Theft of materials, such as copper plumbing and other construction materials drives these losses even higher. Contractors are all too familiar with these statistics, as construction sites are some of the hardest hit locations for intrusion, vandalism and burglary. These losses can be significantly reduced, or stopped altogether, with appropriate use of surveillance technologies like thermal cameras, as shown below.

The first security challenge starts at the perimeter of the site. With such large, open areas, it can be expensive and impractical to install fencing or barriers around the entire property. This leaves sites vulnerable to trespassers and exposes equipment such as skid-steer loaders, generators, and welders to theft. In the aforementioned 2016 report, NER states, “the average estimated value of a stolen piece of equipment is $29,258.” Loss of equipment is not only costly, but it can also cause project delays, generating even more unexpected expenses for construction firms.

Construction sites often neglect to install security and surveillance equipment. This can be due to an inability to find solutions that are suitably rugged, easy to deploy, and able to work properly at job sites that often lack sufficient lighting at night. As a result, loss of equipment can go unnoticed for days, and when it is discovered no details of how or when it occurred are available. This hampers recovery efforts, which are already difficult as is. In 2016, the NICB compiled 11,754 reports of stolen equipment, and only 21 percent of equipment was recovered.

Security budgets may be limited, which makes the deployment of solutions that are time-consuming to install impractical. Intrusion detection solutions utilizing technologies such as fiber optic perimeter fencing systems, beam-break sensors, or outdoor motion detectors are examples of those whose costs often outweigh benefits. Such systems can be costly to install and fine-tune and may be rendered inoperable by activities at the site that knock equipment out of alignment, requiring costly technician trips to reset the devices. Video analytics can be a practical approach, with camera mounted centrally, out of harms way, and monitoring the perimeter for intruders. However, analytics systems that rely on visible cameras often require substantial lighting to be effective at night, when most crime occurs. Well-lit construction sites can potentially attract more theft, as thieves can easily spot on-site equipment that has a high grey-market value. Even with sufficient lighting, visible cameras with analytics can be hampered by weather conditions that prevent them from seeing beyond a few feet, rendering the blind. Further, tarps and loose materials on the site may get blown around, causing them to trigger some analytics, generating excessive false alarms, which erodes the bottom lime and causes distrust of the system in general.

Saros thermal cameras image - Security Magazine

Thermal cameras can solve many of these problems. By pairing thermal cameras with video analytics, security professionals can offer a solution that does not rely on visible light, affords the ability to see through moderate weather conditions, maintaining protection where visible systems fail. By detecting heat instead of light, thermal cameras will identify an intruder as a well-defined hot object, relative to the atmosphere, and nuisance items like tarps or materials will appear much differently, making them easier for analytics to ignore. Use of thermal cameras with analytics has been steadily increasing as more security professionals recognize the value and reliability of these systems.

In the past, thermal imagers were often considered to be military-grade solutions better suited for covert, government operations. Now, thermal has become more affordable, opening the door to a broader range of commercial deployments. In the construction sector, thermal cameras have become a game-changer for perimeter security, illustrating why implementing first-class technology is valuable and effective. With thermal cameras, an approaching person, object or vehicle, can be detected in total darkness, or through sun glare, rain, fog, smoke and foliage. With long-range detection, sharp images, and high-performing video analytics, thermal cameras reduce false alarms, and therefore, lower the overall total cost of ownership for the construction firm.

Remote monitoring enables customers to receive the benefits of an on-site guard, but at a much lower cost. This is achieved via solutions combining multiple technologies, such as thermal imagers, analytics, and optical sensors, integrated into an easily deployable package. Remote security personnel can receive intrusion notifications and verify them video clips showing both thermal and color images for maximum situation awareness. These combined technology solutions also enable security operators to better determine whether an individual on the property is a construction worker who forgot his ID or a suspect who warrants an audible warning and a police dispatch.

Together, thermal-based analytics and virtual guarding technologies provide a new level of 24/7 protection and peace of mind for construction sites and will continue to see rapid adoption across the construction sector in the years to come.

KEYWORDS: copper theft perimeter security theft prevention thermal cameras video surveillance tools

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

John distelzweig security magazine

John Distelzweig, General Manager and Vice President of Security, FLIR Systems

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Columns
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Hydro One to Deter Metal Theft with Composite Copper and Steel

    See More
  • Companies Join to Address Construction Jobsite Theft

    See More
  • Thermal Cameras Work to Detect Metal Theft, Intrusion

    See More

Related Products

See More Products
  • 9780367221942.jpg

    From Visual Surveillance to Internet of Things: Technology and Applications

  • The Complete Guide to Physical Security

  • into to sec.jpg

    Introduction to Security, 10th Edition

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing