C
Cyrano Security
14 min read
Identity Theft Detection Guide

Identity theft detection has a lag problem. The fix is a camera, not a credit bureau.

Search “identity theft detection” and every top result sells you the same product: credit monitoring, SSN alerts, dark web scanning. All of them fire on a financial signal that trails the actual theft by three to forty-five days. But the identity was stolen in a physical place first. A mailbox, a mailroom, a cluster box, a storage locker, a parked car. That moment sits on the building's DVR in real time. This guide is about detecting it there, inside the window where a lock change, a mailbox reseal, or a same-day credit freeze still makes a difference, and how Cyrano runs that detection by tapping the DVR's HDMI multiview output on cameras the property already owns.

See a live mailroom detection event
4.9from 50+ properties
Fires at t = 0, not 3 to 45 days late
One HDMI tap covers up to 25 camera tiles
Zone + dwell + time, no pose classification
Alert lands in an existing WhatsApp thread

The lag between physical theft and the first financial signal

Every identity theft protection service on the first page of the SERP operates on a downstream signal. LifeLock, Aura, IdentityGuard, Experian, and Equifax watch credit inquiries, SSN usage, dark web marketplaces, and new account openings. Those signals are real, and they do surface fraud. But they surface it after the theft is already monetised, which is always days or weeks after the actor physically took the document, card, or mail piece that seeded it.

The gap is the whole ball game. Inside it, a property manager can reseal a pried cluster box, a homeowner can freeze a credit file, USPS Postal Inspectors can open a case with a time-stamped thumbnail, and the victim can get ahead of a pending application. Outside it, the file is already being traded, the charge is already posting, and the recovery workflow starts. A detection system that runs at t = 0 is a different product than a detection system that runs at t plus five days.

0 daysMedian lag, card mail-theft to first fraudulent swipe
0 daysMedian lag, SSN/W-2 theft to synthetic-identity signal
0 sCyrano tile to WhatsApp, end-to-end
t = 0When the camera sees the physical theft

Where the identity actually gets stolen

Seven physical origin points account for most identity theft that hits multifamily and small commercial properties. Every one of them is a defined polygon with a repeating time window. Every one of them sits in a frame on the property's existing DVR.

Cluster mailbox fishing and Arrow key attacks

USPS cluster boxes in apartment mailrooms are the single highest-yield target for identity theft. A 45-second pry at 2 a.m. on a 16-unit cluster yields tax docs, new cards, statements, pre-approved offers. Zone = alcove in front of cluster. Dwell = 20 seconds. Armed = outside 9 a.m. to 8 p.m.

New-card package theft from lobbies

Couriered envelopes and small boxes with activated debit and credit cards sit on lobby shelves for hours. The pre-action pause is the moment an outsider scans the pile.

Amenity locker and storage pry

Renter storage units are where people stash tax records and old W-2 boxes. A locker pry at 3 a.m. is an identity theft event, not a possession theft event.

Vehicle break-ins in lot, 2 to 4 a.m.

Registration cards, insurance cards, wallets left in glove boxes. Dwell near a vehicle during the overnight window clears all three filter layers.

Trash night shred-bag dumpster dive

Compactor and dumpster rooms are a zone. A person inside them the night before pickup, not during scheduled maintenance, is the event.

Leasing office after-hours document access

Copies of driver licenses, SSNs, and bank statements sit in leasing office cabinets. After-hours presence inside that office is an explicit armed zone.

Package room camera shoulder-surf

A person photographing other residents' package labels (address + full name) is dwell inside the package room with a phone raised. A rare but real precursor to change-of-address fraud.

The detection signal. Three filters, one pipeline.

Person detection by itself is useless here. A 16-camera apartment property produces 200 or more raw person detections per day from residents, vendors, couriers, and staff. The signal has to be filtered down to the events a property manager can act on, and that filtering is where the product actually lives.

One HDMI tap, one filter stack, one message

Mailroom camera tile
Lobby camera tile
Parking lot tile
Storage / locker tile
Cyrano edge unit
WhatsApp thumbnail + zone label + dwell + timestamp
Evidence clip URL on existing DVR
Webhook for PMS or ticketing

Filter 1

Person in the polygon

A drawn polygon around the mailroom alcove, the package shelf, the locker rack. Person detection fires only when the actor crosses the polygon boundary. Dog walkers, delivery trucks, and background traffic never enter the shape.

Filter 2

Dwell threshold

A resident checking mail clears in 4 to 8 seconds. A thief working a cluster box dwells for 20 to 90. A 15 second threshold drops three quarters of the incidental traffic without missing any actual pry or fishing attempt.

Filter 3

Time window

Each zone carries its own schedule. The mailroom is armed outside pickup hours. The leasing office is armed outside business hours. The parking lot is armed overnight. Mail fishing at 2:40 a.m. hits an armed window; a resident at 6 p.m. does not.

The 24-hour arc from physical theft to financial signal

Watch the timeline of a real mail-theft incident at an apartment cluster box. The camera sees it at the top of the arc. The credit bureau sees it at the bottom.

From cluster box to credit bureau

01 / 07

t = 0 s. Actor enters the mailroom

An unfamiliar person walks into the cluster box alcove at 2:38 a.m. Person detection fires on camera 4. The dwell timer starts.

Why the capture point is the DVR, not each camera

Most AI-on-video vendors require you to rip and replace cameras, or push every per-camera stream to a cloud inference service. Both assume a modernised stack. Most real apartment properties run a 2015-era DVR with 16 to 32 analog or hybrid cameras wired to it, and a guard monitor displaying the mosaic. That monitor feed is the capture point.

One HDMI cable carries every camera at once. That is the physics of the product: one tap, twenty-five tiles. No per-camera authentication. No firmware version check. No network walk. The property's existing DVR retention policy remains untouched. Compliance posture does not change.

What this avoids

  • Ripping out existing analog cameras
  • Per-camera ONVIF authentication and credential storage
  • Uploading every frame to a cloud inference service
  • Asking IT to open inbound firewall rules per camera
  • Creating a second video retention dataset to audit
  • Any camera firmware update

The overlay masking step most vendors skip

A DVR composite feed is dirty. Every recorder draws three kinds of glyphs into the mosaic before HDMI-out: a clock, a per-tile camera name strip, a channel bug. If the inference model sees those, it will occasionally score bounding boxes on letterforms and colons. In a mailroom, where the ratio of real events to resident traffic is already low, one false positive per night is enough to get the WhatsApp channel muted, which kills the pipeline. Cyrano runs a per-DVR-layout overlay mask at install, once, keyed to the DVR layout id.

Install-time overlay mask for a cluster-box deployment

A real alert payload, anonymised

The message is deliberately boring. No dashboard. No login. Two seconds of reading while walking between units.

WhatsApp event payload · identity theft precursor

What a property does with an alert like this

1

Minute 0. Staff reads the WhatsApp

Thumbnail + zone label is legible on a phone at a glance. No dashboard, no login. Decision to dispatch is made inside one minute.

2

Minute 1 to 10. Dispatch or intercept

On-site courtesy officer, local police non-emergency, or an intercom talkdown. The goal is to interrupt before documents leave the property.

3

Hour 1. Reseal and resident notice

If a cluster box or locker was compromised, seal the door and notify affected residents by close of business. That notification is the trigger for residents to freeze credit files before the lag window closes.

4

Hour 2. USPS Postal Inspectors report

For USPS mail theft, file a report at ecomplaints.uspsoig.gov with the thumbnail and evidence clip URL. Time-stamped camera evidence is what moves a case off the queue.

5

Day 1. Management follow-up

Letter to residents confirming what zone, what time, what was compromised, and what mitigation is in place. Residents who freeze inside this 24-hour window avoid nearly all downstream fraud.

t=0

Credit monitoring tells a homeowner their card was used three days ago. A mailroom camera tells a property manager a stranger is in the cluster box right now. Only one of those two signals can still prevent the loss.

Why physical-first detection is the upstream layer

Physical-first detection vs. credit bureau monitoring

They are complementary. But they are not the same product, and a household or property that only runs the bottom column is always reacting after the fact.

FeatureCredit bureau / dark web monitoringCyrano, camera-first detection
When it firest + 3 to 45 days, after financial signalt = 0, at the physical theft
Primary signalCredit inquiry, SSN use, dark web listingPerson in zone, dwell, time of day
Data sourceCredit bureau feeds, breach dumpsExisting property DVR, HDMI multiview
CoverageConsumer credit fileMailroom, lobby, lots, lockers, leasing office
Mitigation still possibleDispute, recovery workflowIntercept, reseal, same-day freeze
Evidence chain for police / USPSCredit report entriesTime-stamped thumbnail + DVR clip
Install on existing stackSign-up, SSN enrollmentUnder 2 minutes per DVR
DeliveryEmail digest or app pushWhatsApp thread per property
Replaces the otherNo, runs downstream of itNo, runs upstream of it

DVRs and NVRs the capture point works on

Compatibility is at the recorder level, not the camera level. If the recorder has an HDMI port driving a monitor, the tap works.

Hikvision DS-7xxx
Dahua XVR / NVR
Lorex
Amcrest
Reolink NVR
Uniview
Swann
Night Owl
Q-See
ANNKE
EZVIZ
Honeywell Performance
Bosch DIVAR
Panasonic WJ-NX series
Any DVR with HDMI out

The numbers that define the detection loop

Not marketing benchmarks. Operating constants. Every one of these is a spec the pipeline is held to.

0

Tiles inferred per unit, off a single DVR HDMI output. Covers most mid-size apartment properties end to end.

0s

Tile to WhatsApp, end-to-end. Inside the window where a lock change or intercept still matters.

0+

Raw person detections per day at a 16-camera apartment property. Must be filtered down, not delivered.

0 to 0

Delivered alerts per day after zone, dwell, and time filters. The readable number.

We had a resident whose tax documents were stolen from the cluster box. The theft was on the DVR. Nobody looked until four weeks later, after the refund fraud posted. That is the case that made us install zone detection. Now the alert lands the night it happens, and we freeze the credit bureau before the charge ever shows up.
P
Property manager
Class B multifamily, Denver metro

Close the identity-theft lag window at your property

Fifteen minutes. We connect to a running DVR's HDMI, draw a zone around the cluster mailroom, and walk through a live pre-action alert landing on WhatsApp.

Book a call

Frequently asked questions

Why would a camera system be part of identity theft detection?

Because identity theft almost always begins with a physical act. A mail thief pulls a pre-approved credit card offer out of a mailbox. An intruder walks into an apartment mailroom at 2 a.m. and opens a tenant's cluster box. A package containing a new debit card disappears from a lobby. A wallet gets lifted from a parked car. The financial fraud that a credit monitoring product eventually alerts on is downstream of that event, usually by a week or more. A DVR on a mailroom or parking area is the only system that records the moment the identity was actually compromised. Putting a detection layer on top of that DVR turns the camera into the earliest possible warning.

What is the lag between the physical theft and the first fraudulent charge?

It varies by target. A stolen debit card from a mailroom typically sees its first fraudulent use in 3 to 5 days, after the thief confirms the card activates. A stolen SSN or W-2 fragment takes longer, often 14 to 45 days, because the thief is assembling a synthetic identity. Tax refund fraud from a stolen 1099 can lag months, surfacing only when the victim's own return gets rejected. Credit bureau monitoring and dark web scanning operate on that trailing edge. A camera alert at the moment of physical entry operates at t = 0. The gap is the entire window in which a lock change, a mailbox reseal, a police report filed same-day, and a proactive credit freeze can still stop the loss.

What does Cyrano actually watch for, and how does it not fire on every resident?

Cyrano watches for a person, inside a drawn zone, for longer than the dwell threshold, during a time window that zone is armed. At a cluster mailbox, that zone is the alcove in front of the boxes, the dwell threshold is 15 to 20 seconds, and the time window is outside normal mail pickup hours. A resident walking past in 3 seconds never crosses the line. A resident grabbing their mail at 6 p.m. is outside the armed window. A stranger standing in front of the cluster box for 45 seconds at 2:40 a.m. clears all three filters. The filter stack is zone plus dwell plus time, not pose classification.

How does Cyrano connect to an existing building without replacing cameras?

Cyrano taps the DVR or NVR's HDMI multiview output. That is the signal that already drives the guard monitor and already has every camera on the recorder mosaiced into tiles. One HDMI cable in, one HDMI cable out to the monitor, one network cable, one power plug. Under two minutes of physical install on a running DVR. There is no ONVIF negotiation, no per-camera credential, no firmware change. It works on analog cameras, IP cameras, and any brand of DVR or NVR that outputs HDMI, which covers Hikvision, Dahua, Lorex, Amcrest, Reolink, Uniview, Swann, Night Owl, and every rebrand of those.

Why the DVR overlay masking step matters for identity theft detection specifically

A DVR composite signal is not a clean feed. Every recorder draws a clock, a per-tile camera name strip, and a channel bug onto the mosaic before output. A detection model without overlay masking will occasionally score a bounding box on the camera name text or fire a spurious detection at the colon glyph inside the clock. In a mailroom context, where the ratio between real incidents and resident traffic is already low, one false positive a night is enough to get the WhatsApp thread muted, and a muted thread is a dead detection system. Cyrano runs an overlay mask per DVR layout id, once at install time, so the model only sees the scene inside each tile.

What is actually inside the alert a property manager receives?

A cropped thumbnail of the offending tile, the camera label, the zone name, how long the actor has been in the zone, and a timestamp. That is it. No dashboard, no login. The message lands in the same WhatsApp thread staff already use for maintenance tickets and vendor coordination. For identity theft scenarios the label is explicit: mail_alcove_after_2200, package_lobby_overnight, amenity_locker_pry. The payload is intentionally boring so it can be read in two seconds while walking between units.

Does Cyrano replace credit monitoring?

No. They operate on different timelines and different signals, and a household or property should run both. Credit monitoring is a backstop that fires when fraud has already been attempted. Cyrano is a front-stop that fires when the physical precursor happens. For multifamily properties in particular, the physical-first detection layer also sets up a clean evidence chain: a time-stamped thumbnail of the zone entry, tied to the DVR recording, gives USPS Postal Inspectors and local police a starting point that credit bureau logs do not provide. The two layers are complements, not substitutes.

What kinds of identity theft precursors does this reliably catch?

The categories where the physical event is geometric and scheduled: cluster mailbox fishing in apartment mailrooms, package theft of items containing new cards or statements, overnight cluster box pry attempts at the curb, USPS Arrow key attacks, storage locker pry at amenity rooms and basements, vehicle break-ins in apartment parking at 2 to 4 a.m., and dumpster dives of paper shred bags on trash night. Every one of these has a defined polygon, a repeating time window, and a dwell threshold. Credit bureau alerts do not watch any of these. A camera pointed at the zone does.

How many cameras can one Cyrano unit cover for this use case?

Up to 25 tiles per unit off a single DVR multiview. A mid-size apartment property typically has 16 to 24 cameras on one DVR, so a single unit covers the entire site: mailroom, lobby, amenity rooms, parking entries. If the DVR is set to a 4x4 grid the unit runs inference across 16 tiles in parallel. If the operator switches the DVR to fullscreen on the mailroom camera during an active incident, the unit re-scopes to that single camera at full resolution for higher per-tile accuracy.

Is the captured video stored anywhere we have to audit?

No frames are uploaded for the normal event path. Inference runs on the edge unit, and only the thumbnail of an alert-level event is attached to the WhatsApp message. The full video remains on the existing DVR under the existing retention schedule the property is already operating. That keeps the compliance posture identical to what property ownership already has in place: DVR retention policy, existing camera policy, existing guard procedures. No additional cloud dataset is created.

One plain sentence

If your entire identity theft detection strategy is a credit monitoring subscription, you are running a lagging indicator on a problem that starts in a physical place. The place is almost always inside a camera frame on a DVR you already own.

Cyrano is the layer that turns that frame into a 60-second WhatsApp message, every time someone who should not be in the mailroom is in the mailroom. The credit bureau alert still shows up later, for the cases that slip through. But most of them do not have to.

🛡️CyranoEdge AI Security for Apartments
© 2026 Cyrano. All rights reserved.

How did this page land for you?

React to reveal totals

Comments ()

Leave a comment to see what others are saying.

Public and anonymous. No signup.