Burglar Caught in the Act with Axis Home Video Surveillance

Video surveillance proved to benefit one Texas resident when his home security system helped police identify a burglar.

Homeowner Thomas Marik received a startling phone call from his wife one August afternoon to find out that the couple’s home was burglarized. Marik and his wife were out for the day, so no one was home at the time of the break-in. The couple never experienced a burglary before in their Austin, Texas, neighborhood, but they were prepared.

Marik, a member of the security industry, won an Axis home security camera at an ASIS convention in San Diego, Calif., back in 2007.

“I rushed home as fast as I could,” Marik told Austin-based ABC-affiliate KVUE. “I ran immediately to the computer, and found that I had gotten some good usable video.”

The surveillance camera goes through Marik’s home router and connects to a PC that runs the Axis recording software. Marik is able to view the surveillance footage through his home PC and smartphone. The burglar(s) stole various electronic devices including a digital camera, cell phone, flat-screen TV and laptop computer, but didn’t touch Marik’s PC, according to police reports.

From a few seconds of footage snapped by the camera (click video footage below), a suspect was identified as Ray Adam Luna, 18. Investigators were able to identify Luna based on a tattoo visible through the video.

Nearly one week after the burglary, a warrant was issued and an arrest was made.

Marik never intended to catch a thief by installing the surveillance system. He was just interested in watching the shenanigans his cat got into on the front porch throughout the day on his smartphone.

“I mostly deployed the video camera as a curiosity,” Marik said.

Most home burglaries don’t include incriminating evidence on video. Marik unknowingly positioned the camera in a perfect spot to a catch a thief. The Austin Police Department wouldn’t have been able to clearly identify a suspect without Marik’s surveillance footage.

“His video made the case. If it wasn’t for this, we wouldn’t have a suspect,” said Sgt. David Socha of the Austin Police Department to Austin-based ABC-affiliate KVUE.

Despite that fact that an arrest was made, Marik knows the odds of officers retrieving his family's stolen belongings are slim.

“I’m not counting on getting any of my stuff back, but I’m pleased that there was somebody arrested,” said Marik.

Since Marik’s home burglary, Austin PD have implemented community patrols in his neighborhood. The area had its share of home burglaries prior to the recorded break-in, according to Marik, but now, officers are actively patrolling the area in an effort to protect the community.

About the Author

Christina Miralla is the associate content editor at 1105 Media, Inc.

Featured

  • Gaining a Competitive Edge

    Ask most companies about their future technology plans and the answers will most likely include AI. Then ask how they plan to deploy it, and that is where the responses may start to vary. Every company has unique surveillance requirements that are based on market focus, scale, scope, risk tolerance, geographic area and, of course, budget. Those factors all play a role in deciding how to configure a surveillance system, and how to effectively implement technologies like AI. Read Now

  • 6 Ways Security Awareness Training Empowers Human Risk Management

    Organizations are realizing that their greatest vulnerability often comes from within – their own people. Human error remains a significant factor in cybersecurity breaches, making it imperative for organizations to address human risk effectively. As a result, security awareness training (SAT) has emerged as a cornerstone in this endeavor because it offers a multifaceted approach to managing human risk. Read Now

  • The Stage is Set

    The security industry spans the entire globe, with manufacturers, developers and suppliers on every continent (well, almost—sorry, Antarctica). That means when regulations pop up in one area, they often have a ripple effect that impacts the entire supply chain. Recent data privacy regulations like GDPR in Europe and CPRA in California made waves when they first went into effect, forcing businesses to change the way they approach data collection and storage to continue operating in those markets. Even highly specific regulations like the U.S.’s National Defense Authorization Act (NDAA) can have international reverberations – and this growing volume of legislation has continued to affect global supply chains in a variety of different ways. Read Now

  • Access Control Technology

    As we move swiftly toward the end of 2024, the security industry is looking at the trends in play, what might be on the horizon, and how they will impact business opportunities and projections. Read Now

Featured Cybersecurity

Webinars

New Products

  • ResponderLink

    ResponderLink

    Shooter Detection Systems (SDS), an Alarm.com company and a global leader in gunshot detection solutions, has introduced ResponderLink, a groundbreaking new 911 notification service for gunshot events. ResponderLink completes the circle from detection to 911 notification to first responder awareness, giving law enforcement enhanced situational intelligence they urgently need to save lives. Integrating SDS’s proven gunshot detection system with Noonlight’s SendPolice platform, ResponderLink is the first solution to automatically deliver real-time gunshot detection data to 911 call centers and first responders. When shots are detected, the 911 dispatching center, also known as the Public Safety Answering Point or PSAP, is contacted based on the gunfire location, enabling faster initiation of life-saving emergency protocols. 3

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area. 3

  • AC Nio

    AC Nio

    Aiphone, a leading international manufacturer of intercom, access control, and emergency communication products, has introduced the AC Nio, its access control management software, an important addition to its new line of access control solutions. 3