Guide / Ebook

State of Construction Site Security Report

2026 State of Construction Site Security Report | TrueLook × Noonlight State of Construction Site Security Report
2026 Industry Report

The State of Construction Site Security

What 2,000+ Break-Ins Reveal About When, How, and Why Theft Happens on Jobsites and What Actually Stops It.

Data Period January – December 2025
Source TrueLook × Noonlight
Sites Covered Thousands of active U.S. jobsites
2,639
confirmed break-ins monitored in 2025
170K+
total alarms processed by monitoring teams
40%+
of all incidents occur on weekends

Theft Is Not a Minor Line Item

Every general contractor knows the feeling. You get a call at 6 a.m. The site was hit over the weekend. Copper wire, gone. Tools from the Conex box, gone. Maybe a generator. Maybe a skid of materials that won’t be replaced for two weeks.

The theft itself is bad enough. But the real cost is what comes next: the insurance claim, the schedule delay, the conversation with the owner about why you’re two weeks behind before you’ve even poured the slab. The subcontractors who can’t work. The crew standing around while you wait on materials. The paperwork.

Construction site theft costs the U.S. industry an estimated $1 billion annually, according to the National Equipment Register. But that number understates the real damage. Equipment and material losses are recoverable — the schedule impact often isn’t.

“Everyone in this industry has a theft story. The question is whether you have a system that stops the next one — or just a better story to tell afterward.”

To better understand the scope of the problem, TrueLook analyzed monitoring data from thousands of active jobsites across 2024 and 2025, in partnership with Noonlight. What we found confirms what contractors already feel: theft is getting worse, the patterns are predictable, and most sites are most vulnerable exactly when no one is watching.

About This Report

This report is based on data collected through TrueLook’s jobsite monitoring service, in partnership with Noonlight, across thousands of active construction sites in 2025.

The findings reflect real alarm events, verified incidents, authority dispatches, and monitoring outcomes from live commercial construction projects.

What our Monitoring Data Reveals

The numbers are straightforward, and they’re moving in the wrong direction.

1,750+
break-ins monitored in 2024
2,639
break-ins monitored in 2025
800+
break-ins already in early 2026
50% increase year over year

In 2025, TrueLook and Noonlight monitored 2,639 confirmed break-ins across active commercial construction sites. To understand what that number means, here’s the context: in 2024, that figure was under 1,750, which is a 50% increase year over year. And with 2026 barely underway, the early trajectory suggests the trend isn’t slowing down.

This isn’t noise. This is a consistent, accelerating pattern across hundreds of real commercial projects.

The rise isn’t explained by more cameras on more sites alone. The rate of incidents per monitored site is also increasing. Criminals are getting bolder, and unprotected sites are easy targets.

Why the Growth Matters

  • Material costs are high, making copper wire, lumber, and equipment more valuable to steal and easier to resell.
  • The construction boom has created more sites, and more sites mean more targets, particularly in suburban and exurban markets where law enforcement response times are longer.
  • Many sites still rely on passive deterrents: fencing, signage, padlocks. These slow determined criminals down by minutes.
  • The gap between sites with verified monitoring and those without is widening.

When Criminals Show Up

One of the most actionable findings in our 2025 data is how predictable the timing of construction site theft actually is.

Weekends Are the High-Risk Window

40%+
of all break-ins occur on weekends

More than 40% of all incidents occurred on Saturdays and Sundays. Sites are empty, no crew is present, and response time is minimal. Weekend theft is especially damaging because damage isn’t discovered until Monday morning, which burns time before materials can be reordered.

Peak Hours

11 PM – 3 AM
the four-hour window when most incidents occur

The majority of confirmed break-ins fall between 11 p.m. and 3 a.m. — after late-night foot traffic dies down and well before early morning activity begins. This is the window where live monitoring makes the most difference.

If your site’s security plan doesn’t account for what happens between 11 p.m. and 3 a.m. on a Saturday, it’s not a security plan; it’s documentation after the fact.

Seasonal Spikes

🌱

April Spike

Warmer weather means criminals stay out later. Longer evening daylight also gives thieves better visibility to scope sites before dark.

☀️

July–December Surge

The sustained second-half spike reflects peak construction season — more active sites, more materials staged, more opportunity.

If you’re ramping up a project in spring or heading into the summer construction season, your site’s risk profile is meaningfully higher. This is exactly when coverage gaps should be closed, not after the first incident.

How Criminals Get In and What They Take

Understanding the method matters as much as knowing the timing.

The Most Common Entry Method: Just Driving In

The majority of construction site break-ins don’t involve bolt cutters, fence climbing, or sophisticated tactics. The most common scenario is significantly simpler: a truck pulls onto the site.

Many commercial construction sites don’t have locked gates, or have gates left open at end of shift. For criminals who have scouted the site, an unlocked gate is an open invitation.

Most theft isn’t a smash-and-grab. It’s a truck backing up to a Conex box or laydown area, loading up in 10–15 minutes, and driving away. Without active monitoring, there’s nothing to stop it.

The Fence Problem

Unlocked or unsecured gates are the most common enabler of construction site theft. End-of-day gate checks should be a documented close-out procedure, not an assumption.

Even when gates are locked, perimeter fencing alone isn’t a deterrent for some people. We’ve seen people slide under fences and climb over fences you’d never think were possible to climb. The fence stops some, but not someone determined.

The sites that hold up best are those where physical controls, such as gates, locks, and lighting, are combined with cameras with strobes, sirens, and active monitoring that creates a real-time response capability.

What They’re After
  • Conex boxes and storage containers — particularly when locks are visible but not reinforced
  • Laydown areas with staged materials: copper wire, conduit, lumber, roofing materials
  • Heavy equipment left on-site overnight — especially if keys are accessible or can be turned on with multiple key types
  • Generators and temporary power equipment
  • Tools and smaller equipment staged near active work areas

Insider Theft: The Problem No One Talks About

External theft gets the headlines. Insider theft gets ignored until it’s too late.

In talking with customers, we’ve found that insider theft is one of the most prevalent security issues in the industry.

Our monitoring teams regularly flag after-hours activity by credentialed workers. It is our most common occurrence for review. The access that happens outside normal work hours and without a documented reason is more common than most project managers want to admit, and it almost never gets reported as “theft” in post-incident reviews.

The same monitoring system that catches an outside break-in at 1 a.m. will also flag a crew member loading materials into a personal vehicle at 7 p.m. The technology doesn’t distinguish between authorized and unauthorized — that’s exactly the point.
Reducing Insider Theft Exposure
  • Log all after-hours access, such as who accessed what area, at what time, and for what documented reason.
  • Use camera coverage that includes material staging areas, not just perimeter entry points.
  • Establish a clear policy that after-hours site presence requires supervisor authorization.
  • Review monitoring logs after any material shortage, not just after confirmed external break-ins.
The goal isn’t to create a culture of suspicion. It’s to create a system where accountability is built into the site, and where the documentation exists if a question ever arises.

What Actually Works

A layered approach, combining site practices, hardware, and human monitoring, is what separates sites that get hit once from sites that get hit repeatedly.

Start With the Basics (That Most Sites Skip)

  1. Gate check at close of every shiftMake it a documented, signed step in the daily close-out process.
  2. Lighting in high-value areasMotion-activated strobe lights around Conex boxes and laydown areas raise the risk of exposure significantly.
  3. Stage materials strategicallyDon’t make it easy for a truck to back up directly to high-value materials.
  4. Lock Conex boxes with reinforced haspsStandard padlocks are cut in seconds. Hardened steel hasps and puck locks significantly slow entry.
  5. Remove and lock up keys from equipmentThis sounds obvious. It’s routinely skipped.

The Monitoring Team: Where Cameras Become a Response System

Cameras record. Monitoring teams respond. The difference matters at 1 a.m. on a Saturday when no one from your team is checking a phone.

1
Motion triggers an alert

A trained Noonlight agent reviews footage in real time — not an algorithm, not an automated email.

2
Two-way audio challenge

If a talkdown unit is installed, a real voice lets the intruder know they’re being watched and recorded.

3
Strobes & sirens activate

If the unit is equipped, visual and audio deterrents fire immediately on the site.

4
Your primary contact is notified

They can request emergency services or dismiss the alert based on context.

5
Law enforcement dispatched if verified

Police are called only when motion is confirmed as a real threat.

“The 24/7 monitoring was the deciding factor for us. We wanted real protection against break-ins and theft, not just a camera recording after the fact. And because we own the equipment, we take it right to the next jobsite. The live updates and service have been outstanding.”

— Jason Price, Price Development Team

170,000 Alarms. 2,000 Dispatches.

One of the most important, and least discussed, aspects of jobsite security monitoring is what happens to all the alarms that aren’t real threats.

170K+
total alarms monitored
2,000
times authorities were called
29%
caused by routine employee activity

What Triggers a False Alarm

The most common cause of a false alarm is an employee doing something completely normal, such as a super checking on something after hours, a foreman dropping off equipment, or a site manager doing a walk. These account for 29% of all alarm events in our dataset.

Without a human reviewing each alert, these would generate the same response as a genuine break-in. With verified monitoring, a trained agent distinguishes between a foreman checking in and a stranger loading a truck and responds accordingly.

“You can set the level of monitoring that you would like and the hours you want, all from your phone or computer. Therefore, you do not get a lot of nuisance calls, while at the same time you have the safety of the site being monitored and protecting your property.”

— Dominic Summers, Vice President, Kirlin Way

Reasons for Dispatch

Incidents
Active break-in or burglary in progress
Unknown person taking items from outside business
Unknown person inside business, not actively taking or damaging property
Unknown person outside business, not actively taking or damaging property
Other / unclear situation requiring officer presence

Police departments track false alarm rates by address. Verified monitoring, where a trained human reviews footage before escalating, protects that relationship and ensures that when authorities are called, it’s for a real reason.

Your next project deserves better than a padlock and a recording of theft happening.

TrueLook works with project teams to design security coverage that fits the site, not a generic camera-on-a-pole solution.

01

Site Security Audit

Work with our specialists who will design a camera placement plan for your next project before mobilization.

02

Choose Your Hardware

Explore cameras and security solutions that meet your project’s specific needs and risk profile.

03

Add Live Monitoring

Get verified monitoring set up on your current project with a team that creates detection zones to reduce false alarms.

About TrueLook

TrueLook Construction Cameras is the industry’s leading provider of jobsite visibility and security solutions for construction. TrueLook combines enterprise-grade camera hardware with cloud software and professional monitoring to deliver real-time visibility, automated documentation, and intelligent security — built for the way construction teams actually work. Headquartered in Winston-Salem, NC, with a US-based support team available to every customer.

www.truelook.com →

About Noonlight

Noonlight combines advanced technology with real humans to protect and comfort people so they can live freely. Launched in 2013, Noonlight has grown into a connected safety platform delivering modern, affordable 24/7 professional monitoring, video verification, false alarm filtering, and data-rich emergency response. Noonlight protects over 3.5 million people and has handled 3.2 million real alarms and 27 million video verification events.

www.noonlight.com →