Electricity theft detection, for the person who owns the panel, not the utility that owns the meter.
Every top-ranked page for this keyword is a paper about smart meter machine learning. Random forests, deep CNNs, gradient boosting over utility telemetry. That stack solves the utility's problem, which is finding customers who under-report consumption. It does not solve the property owner's problem. Owners already know the kWh does not add up. What they cannot say is who pulled the tap, at what second, for how long, standing at which physical point. This guide covers the other half of the detection pair: a timestamped camera zone event that names the person at the panel the moment the theft happens, produced on the cameras the property already owns.
See a live zone entry on a real electrical closetThe SERP is utility-side. The loss is owner-side.
Type “electricity theft detection” into any search box and the first screen is uniform: Nature Scientific Reports, ScienceDirect, Frontiers, patent filings, utility vendors. Every single piece frames theft as a consumption-pattern anomaly to be classified by a model running over smart meter data. Random forest yields ten percent better accuracy than KNN. A CNN on time-series of hourly kWh outperforms a shallow MLP. All of it is true, and all of it is the utility's problem.
If you are a property manager, a VP of Operations, a Regional Manager, or an Asset Manager, the anomaly is not the thing you are missing. Your submetering vendor already reports it. InterSolv, Nextek, Metron-Farnier, eWater, whoever pulls your monthly reads, will show you a unit whose kWh dropped while occupancy stayed steady, or a common-area circuit whose load doubled with no new equipment installed, or a pedestal that drew 30 amps at 02:14 on a Tuesday. You know the anomaly. What you cannot do with any amount of model training on that telemetry is tell a collector, a property lawyer, or a utility investigator who caused it and when.
The gap is not analytics. It is identification. And identification at a physical point inside a building is a camera problem, not a meter problem.
Submeter anomaly alone vs. submeter anomaly plus a zone event
The monthly report shows a 380 kWh overage on the common-area house panel. The house panel feeds the pool pump, the mailroom lights, and an exterior pedestal. There is no way to know which of those accounts for the overage, let alone who used it. Maintenance checks the pump, finds it running normally. The bill gets written off to operations. It recurs the next month. And the month after that.
- kWh delta on a billing report
- No time record, only a monthly aggregate
- No person, no polygon, no dwell
- Not recoverable, not prosecutable
- Indistinguishable from legitimate load drift
The five physical points where owner-side theft actually happens
The SERP is full of abstractions about feeder-level energy balance and non-technical losses. On the ground, electricity theft at a multifamily or commercial property lands at five specific locations. If you point a camera at each one and draw a zone, the detection is close to free.
Exterior 30A and 50A pedestals
Pool equipment bays, RV hookups, courtyard maintenance outlets, irrigation controller pedestals. A cord over a fence into a neighbor's yard for a space heater, a grow tent, or a hot tub pump is the archetype. Zone the pedestal. Dwell 10 to 20 seconds. Armed overnight.
Service panel room
The room with the main breakers and unmetered buses. Unauthorized entry is almost always theft or intent to install a tap. Zone the door from inside.
Submeter closet
Where the per-unit submeters live. Jumpered or bypassed submeters are the classic apartment insider tap. Zone the closet door with a 10 second dwell.
House panel common-area outlet
Outlets in hallways, mechanical rooms, trash rooms, and garages wired to the house panel. Targeted for heaters, window ACs, mining rigs, welders. Zone the outlet wall with a short dwell.
Laundry room 240V outlet
A 240V dryer outlet after hours is a Level 2 EV charger waiting to happen. One resident, five neighbors, and a bill the building pays. Zone the wall. Arm overnight.
Service drop and meter can exterior
Utility-side tap. Worth a zone because when the utility investigates they will ask for your footage and your timestamped events.
What Cyrano actually emits when a zone fires
The anchor of this page: the exact event payload that a collector, a property lawyer, or a utility investigator can drop into a case file next to the submeter's monthly kWh delta. This payload shape is the same one deployed on properties for package theft, UV evidence chains, and trespassing, anonymised from a live deployment.
The payload records which DVR overlays were masked before inference. That matters for evidentiary quality: the detection was not triggered by the DVR clock digits, the camera name strip, or the channel bug. For any event that ends up in a legal or utility investigation, the overlay_mask line is the one that defeats the “your model just detected its own watermark” argument.
How the two records fuse into one chain
The submeter tells a court what was stolen and how much. The zone event tells a court who, when, and for how long. Either one in isolation is a write-off. Connected, they become a recovery document.
Two records, one corroborated evidence chain
The anchor numbers
Operating constants of the Cyrano side of the evidence pair, on the DVRs and cameras a property already runs.
The evidence chain, stage by stage
An owner-side electricity theft case that holds up is not one document. It is a chain of five documents from three different systems, each corroborating the next. Break any link and the loss goes back on operations.
From submeter read to collectable case
Stage 1. Submeter anomaly report
The monthly or weekly submetering report showing the kWh delta on a specific circuit, pedestal, unit, or common-area panel. Pulled from the property's submetering system (InterSolv, Nextek, Metron-Farnier, eWater, and similar). This is the number that triggered the investigation.
Stage 2. Zone configuration record
Which polygon was drawn around which physical access point, on which DVR tile, with what dwell threshold, over what armed time window, and who signed off. Stored with the Cyrano unit's config. Proves the zone was armed and correctly scoped at the moment in question.
Stage 3. Zone entry events
The live events themselves. Tile thumbnails, zone name, dwell counts, ISO 8601 timestamps. Delivered to the property's WhatsApp thread within 60 seconds of capture. Archived. These are the "who and when" for each occurrence in the kWh window.
Stage 4. Correlation document
A one-page exhibit that aligns the submeter's kWh delta window against the cluster of zone entry events. Shows the count of events, the dwell distribution, the clock-time pattern. This is the document that explains the two records cannot independently lie.
Stage 5. Recovery or referral
For residents, HOA referral with the correlation document attached. For an unknown intruder, police referral. For a utility-side tap, the file to the utility investigator. The stage that converts the detection into the collection.
“Two independent records, the submeter delta and the camera zone event, is what turns an electricity overage from an operating write-off into a collectable or prosecutable act. Either alone is a report. Together they are a case.”
Cyrano deployment notes, 2026
Where a camera zone wins over smart-meter ML
The academic literature is right that smart meter ML detects consumption anomalies. It is also silent on the three places where owner-side theft does not produce a consumption signature the ML can see at all.
Smart meter ML vs. camera zone event
Same goal, different half of the problem.
| Feature | Smart meter ML alone | Camera zone event |
|---|---|---|
| Upstream tap (before submeter) | No consumption signature on the submeter | Detected at the physical access point |
| Named actor | None | Tile thumbnail of the person |
| Exact time of act | Aggregated per billing interval | ISO 8601 timestamp, to the second |
| Dwell and intent | Not in telemetry | Dwell seconds recorded per event |
| Pattern across events | Smoothed time series, actor anonymous | Event stream, grouped by zone and hour |
| Evidence for HOA or court | kWh chart (not admissible alone) | Thumbnail, zone, dwell, timestamp |
| Utility referral file | Starts the investigation, does not close it | Drop-in attachment |
| Hardware requirement | Smart meters (owner may not have them) | Existing DVR with HDMI multiview |
| Works on pedestals and outlets | Only if metered and instrumented | Yes, zone any physical point |
How a zone entry becomes an event payload
Between the camera seeing a person and the ops thread receiving a thumbnail, there are six stages, each with a specific purpose. This is the same path every Cyrano event follows, regardless of whether the zone is on a mailroom shelf or an electrical closet door.
DVR tile to WhatsApp, a single zone entry
DVR and NVR brands this pairs with
Because the capture is the DVR HDMI multiview, compatibility is at the recorder level, not the camera level. If the recorder has an HDMI port driving a monitor, the zone event works. Cameras can be any age, any brand, analog or IP.
The setup checklist
The pairing only works if both halves are scoped carefully. Loose zones produce noisy events. Over-wide submeter buckets bury the kWh signal. Do these in order.
Configure the camera half to match the meter half
- List every physical power access point (pedestals, panels, closets, 240V outlets)
- Map each access point to a submeter or billing circuit
- Point an existing camera at each access point (or add one, typically $40 to $120)
- Draw a tight zone polygon around the access point
- Set dwell threshold (10 to 60 seconds based on how long the tap takes)
- Set the armed time window (usually after-hours or all day)
- Verify DVR overlays (clock, name strip, channel bug) are masked
- Confirm end-to-end latency from zone entry to WhatsApp is under 60 seconds
- Pair each event cluster with that period's submeter kWh delta
- Keep the correlation document with the billing file for the circuit
The three things defense or a skeptical HOA will challenge
If the case ever leaves the property office, three arguments will come up. They are the same ones that come up for UV powder, package theft, and any other camera-based evidence. Each has a clean rebuttal when the payload is complete.
Challenge 1
Time drift
“Was the DVR clock right?” Rebutted by: ISO 8601 timestamp from the Cyrano unit (NTP-synced), independent of the DVR's on-screen clock which is masked out of the inference anyway.
Challenge 2
Inference artefact
“The model just saw text on screen.” Rebutted by: overlay_mask field in the payload listing which DVR elements were masked before inference, plus the thumbnail showing a real human in the zone.
Challenge 3
Correlation, not causation
“The kWh could have come from anything.” Rebutted by: a cluster of eleven zone entry events in the same billing window, at the same polygon, with consistent dwell, at nighttime hours. Pattern is the argument.
Own the panel. Want the record of who touched it.
15-minute demo. We connect to a running DVR's HDMI, draw a zone over a test electrical access point, and show a real zone entry event landing on WhatsApp with a thumbnail and an ISO timestamp. That is the record that pairs with your submeter kWh delta.
Book a demo →Frequently asked questions
What is electricity theft detection for a property owner versus a utility?
Utilities detect electricity theft by running machine learning over smart meter telemetry. Random forests, gradient boosting, and deep CNNs flag accounts whose consumption drops without a matching drop in downstream load. That is the academic SERP for this keyword, and it is solving the utility's problem: finding customers who under-report. A property owner has a different problem. The anomaly is already visible on the monthly bill or the submeter report. What is missing is who plugged into the exterior pedestal outside unit 312, who opened the service-panel room at 02:14, who jumpered the submeter in the electrical closet on the 3rd floor. That is not a telemetry problem. It is an identification problem at a physical point, which is what a camera zone event solves.
What does electricity theft actually look like at a multifamily or commercial property?
Five patterns account for almost every case. First, exterior 30A and 50A pedestals (pool equipment power, RV hookups, courtyard outlets) used by neighbors running a cord across a fence for a space heater, a hot tub pump, or a grow tent. Second, 240V laundry outlets tapped after hours for EV charging or a window AC fed into a non-resident unit. Third, bypassed or jumpered submeters in the electrical closet, where a contractor or resident clips around the submeter so load reads zero while a unit or sub-space still consumes. Fourth, opened service-panel rooms where a tap is pulled off an unmetered bus. Fifth, common-area outlets on house panels used for heavy loads (mining rigs, welders, electric smokers) that never appear on any tenant bill. The common factor: each happens at a known physical point the owner already has a camera looking at or can point one at.
How does Cyrano actually detect this on existing cameras?
Cyrano is an edge AI device that taps the DVR or NVR's HDMI multiview output. That output is the same composite the guard monitor already shows, with up to 25 camera tiles mosaiced in one frame. Cyrano pulls the HDMI signal, runs per-tile person detection and zone classification locally, and emits a zone entry event when someone enters a drawn polygon and dwells longer than the configured threshold. For electricity theft, the zones are: meter_bank_access_door, submeter_closet_3rd_floor, exterior_pedestal_bay_17, service_panel_room, house_panel_common_area_outlet, laundry_240v_outlet_wall. The detection runs on-site, the event lands on the property's WhatsApp thread in seconds, and the payload pairs one-to-one with the kWh anomaly on the same submeter.
Do I have to replace cameras or change my DVR?
No. The capture point is the DVR's HDMI output driving the guard monitor. That composite already has every camera on the recorder. One HDMI tap gives inference access to every feed at once. Works on analog cameras, IP cameras, any DVR brand including Hikvision, Dahua, Lorex, Amcrest, Reolink, Uniview, Swann, Night Owl, Q-See, and most rebrands. No camera firmware involvement, no ONVIF negotiation, no credentials to coordinate. Physical install on a running DVR is under 2 minutes: HDMI in, HDMI out to the monitor, network, power. One unit handles up to 25 tiles.
Why do smart meter ML models miss this?
Smart meter models detect non-technical losses by comparing consumption patterns against neighbors, against historical baselines, or against feeder-level energy balance. They work well for utilities catching end customers who under-report. They fail for property owners for three reasons. First, the tap is often upstream of the submeter (exterior pedestal, house panel, service entrance) so the submeter reading is already correct and no anomaly appears in that meter's data. Second, the theft signature is dwarfed by legitimate load variation in multifamily and commercial buildings. Third, and most importantly, even when the ML correctly flags an anomaly, it produces a number on a dashboard, not a person at a specific second. The dashboard tells you something happened. The camera zone event tells you who. Without the who, the submeter anomaly is a billing dispute with no defendant.
What exactly is in the Cyrano event payload?
event.class (pre_action_zone_entry), property identifier, tile.label (camera name), zone name (for electricity theft, typically meter_bank_access_door, submeter_closet_X, exterior_pedestal_N, service_panel_room, laundry_240v_outlet, house_panel_outlet), zone.armed_window, dwell_seconds (integer), timestamp (ISO 8601 with timezone offset, to the second), a tile thumbnail URL (480x270 crop centered on the event), overlay_mask identifier (which DVR overlays were masked before inference), delivery channel (WhatsApp group or SMS fallback), and latency_ms (capture to delivery). The payload is deliberately minimal and deliberately machine-readable. It is the exhibit that pairs with the submeter's monthly kWh delta on the recovery ticket.
What does a complete property-owner electricity theft case file look like?
Five documents. Stage 1, submeter reading showing the kWh anomaly on a specific circuit or unit, pulled from the building's submetering system (InterSolv, Nextek, Metron-Farnier, eWater, or the owner's chosen vendor). Stage 2, the zone configuration showing which camera polygon was drawn around which physical access point, with what dwell threshold and armed window. Stage 3, the Cyrano zone entry event itself (tile thumbnail, zone name, dwell count, ISO timestamp). Stage 4, a correlation document showing the event timestamp inside the kWh anomaly window. Stage 5, for recovery, a signed application log (for exterior pedestals, a ledger of who has access cards, for service panel rooms, an access-control log). That is the file that converts an unrecoverable billing loss into a collectable or prosecutable case.
Is this useful for small properties or only big ones?
The pattern holds from 20-unit single buildings up to 400-unit garden-style portfolios. Small properties actually see the clearest signal because the population of legitimate users at any given physical point (the service panel room, the pool equipment pedestal, the laundry 240V outlet) is small, so every event is meaningful. A 30-unit property with one exterior RV pedestal and one service-panel room is an ideal deployment: two zones, one camera unit, and the monthly submeter anomaly is already known. Large sites need more zones and better camera placement but the economics are the same: a $450 one-time hardware unit plus $200/month handles up to 25 camera tiles, versus a $3,000 to $5,000 monthly guard that cannot be in the electrical closet at 02:14 anyway.
What about the utility's own meter? Can this catch theft upstream of my main?
If the theft is upstream of the building main (a clip on the utility service drop, a bypass at the meter can before it reaches your panel), then yes, the camera event is the evidence the utility will actually accept. Utilities run their own ML on consumption data and will flag the anomaly. When they open an investigation, the document they need is a timestamped record of a person at the meter can or service entrance. That is exactly the zone entry event. Utilities in Georgia, Louisiana, and Texas routinely accept this kind of evidence as part of the investigation file, and some cooperatives have standing requests for any property with repeat theft to add a camera zone on the meter can for this reason.
Does the camera work in the dark electrical closet?
If the camera already there is IR-capable (most current PoE cameras are), yes. Cyrano works off whatever image the DVR is recording. For unlit spaces, the fix is a low-lux or IR-illuminated camera on the electrical closet, submeter cabinet, or service panel room door. The detection itself is image-based and does not care about lighting source, only whether a human is visible in the frame. For exterior pedestals, standard IR flood coverage works. For an interior closet, adding a small IR LED bar if the existing camera is not IR-capable is typically a $40 fix.
Worth saying plainly
Electricity theft detection is a real technical field. Smart meter ML is a legitimate and productive area of research. The Nature paper, the ScienceDirect reviews, the Frontiers overview, all of it solves an actual problem, which is how a utility identifies customers whose consumption data does not reconcile with upstream measurements.
None of it is what a property owner needs. An owner needs the other half of the pair: a record of a specific person at a specific physical access point at a specific second with a specific dwell, that can be dropped next to the already-known kWh delta on the billing report. That record is not spectroscopy, not telemetry, not a smart meter model. It is a tile thumbnail, a zone name, a dwell count, and an ISO 8601 timestamp. With an explicit list of the DVR overlays that were masked before inference.
If you already have the cameras and the DVR, you already have the hardware. What Cyrano adds is the inference, the zone classifier, the overlay masking, and the payload that names the act. The submeter continues to report the number. The camera finally gets to report the name.
Under 0s
End-to-end latency from zone entry to WhatsApp delivery. The identification half of the electricity theft evidence pair, on the cameras you already own.
Comments (••)
Leave a comment to see what others are saying.Public and anonymous. No signup.