Groundbreaking Study Reveals Top Six Items Stolen During Home Burglaries

Studies show that burglars typically spend no more than one minute breaking into a home and fewer than 10 minutes inside. Although they work quickly, burglars have a keen eye for valuable possessions. The FBI reports that each home burglary victim suffers an average of $2,188 in property loss.

To find out which items are most likely to be among a burglar’s loot, the Electronic Security Association (ESA) looks to a recent study entitled, “Understanding Decisions to Burglarize from the Offender’s Perspective.” The research, which is based on interviews with 422 incarcerated burglars, sheds light on what motivates burglars to commit crimes. Here are the top six most coveted possessions according to the 2012 study.

6. Clothing and Shoes

Carrie Bradshaw isn’t the only one who likes her money hanging in the closet where she can see it: Americans do, too.  According to the Bureau of Economic Analysis, U.S. consumers spend an average of $1,700 a year or 2.72 percent of their yearly income on their wardrobes. About 18 percent of burglars reported that they frequently rummaged through victims’ closets in search of clothing and shoes. And, it’s ok if the shoes don’t fit; about 31 percent of offenders said they would spend the income gained during a crime to purchase clothes (in their own size).

5. Prescription Drugs

It’s bad enough that 40 percent of house guests admit to snooping through a homeowners’ medicine cabinets, but burglars are even worse. Half of the burglars interviewed said that once inside a home, they are on the lookout for prescription drugs. And, they rarely come up empty-handed. A recent report produced by Mayo Clinic and Olmsted Medical Center revealed that nearly 70 percent of Americans take at least one prescription drug, more than 50 percent take two and 20 percent take five or more.

4. Electronics

In addition to TVs and stereos, the average U.S. household owns five web-enabled devices and six percent own more than 15 devices. With several high-tech goods lying around the average home, it’s no wonder that nearly 64 percent of convicted burglars said that they’ve taken electronics during a burglary. Although the easiest devices to grab are smartphones, laptops, cameras and tablets, ambitious burglars will pull a flat-screen TV off the wall or help themselves to a desktop computer.

3. Illegal Drugs

More than half of offenders (51 percent) indicated that their top reasons for committing burglaries were related to their need to acquire drugs or the money to purchase them.  While it’s unclear how many U.S. homes stow illegal drugs, nearly 66 percent of burglars told researchers that they stole illegal drugs from victims’ homes. It’s not an exaggeration to say that many perpetrators weren’t in their right minds; approximately 73 percent of respondents said they used drugs and/or alcohol while engaging in a burglary.

2. Jewelry

Diamonds may be a girl’s best friend, but they rank second on a burglar’s wish list. From ruby earrings to 14 karat gold watches, jewelry is one of the easiest things to sell to a pawn shop, which makes it a “must steal” item for many criminals. About 68 percent of burglars are interested in obtaining jewelry during a crime and research shows that 78 percent actually end up nabbing jewels.

1. Cash

Unsurprisingly, an overwhelming amount of burglars abide by the old adage, “Cash is king.” While more consumers are reaching for a debit or credit card to make purchases, a recent report from Bankrate.com showed that 88 percent of Americans still carry cash. Cold, hard cash is virtually untraceable and easy to exchange for goods, which makes it the most coveted and most stolen item during burglaries.

Featured

  • Gaining a Competitive Edge

    Ask most companies about their future technology plans and the answers will most likely include AI. Then ask how they plan to deploy it, and that is where the responses may start to vary. Every company has unique surveillance requirements that are based on market focus, scale, scope, risk tolerance, geographic area and, of course, budget. Those factors all play a role in deciding how to configure a surveillance system, and how to effectively implement technologies like AI. Read Now

  • 6 Ways Security Awareness Training Empowers Human Risk Management

    Organizations are realizing that their greatest vulnerability often comes from within – their own people. Human error remains a significant factor in cybersecurity breaches, making it imperative for organizations to address human risk effectively. As a result, security awareness training (SAT) has emerged as a cornerstone in this endeavor because it offers a multifaceted approach to managing human risk. Read Now

  • The Stage is Set

    The security industry spans the entire globe, with manufacturers, developers and suppliers on every continent (well, almost—sorry, Antarctica). That means when regulations pop up in one area, they often have a ripple effect that impacts the entire supply chain. Recent data privacy regulations like GDPR in Europe and CPRA in California made waves when they first went into effect, forcing businesses to change the way they approach data collection and storage to continue operating in those markets. Even highly specific regulations like the U.S.’s National Defense Authorization Act (NDAA) can have international reverberations – and this growing volume of legislation has continued to affect global supply chains in a variety of different ways. Read Now

  • Access Control Technology

    As we move swiftly toward the end of 2024, the security industry is looking at the trends in play, what might be on the horizon, and how they will impact business opportunities and projections. Read Now

Featured Cybersecurity

Webinars

New Products

  • Compact IP Video Intercom

    Viking’s X-205 Series of intercoms provide HD IP video and two-way voice communication - all wrapped up in an attractive compact chassis. 3

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area. 3

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure. 3