
SCARS Institute’s Encyclopedia of Scams™ Published Continuously for 25 Years

Buried Cell Phones/Smartphones & Hidden Cameras
New Cybercrime – Cyber Surveillance by Local Criminals
The Emergence of Covert Surveillance in Residential Areas
How Cybercriminals Operate – A SCARS Institute Insight
Article Abstract
A chilling new cybercrime emerges. People around the U.S. unearth buried cell phones and hidden cameras in their yards. In one case, a taped Android phone with an exposed camera, hinting at covert surveillance. Reported in early 2025, this incident reveals a growing tactic where burglars plant hidden cameras, including GoPro devices, to spy on homeowners, track routines, and scout valuables across the Tri-State Area, California, Massachusetts, New Jersey, and Scarsdale. These affordable, wireless gadgets, available from retailers like Amazon or Best Buy, blend into yards or bushes, transmitting footage to aid break-ins, showing a pattern probably tied to “burglary tourists,” illegal aliens from South America.
The breach erodes personal security, leaving residents grappling with violated privacy and psychological distress, while the crime’s evolution mirrors accessible technology, prompting a nationwide rise in vigilance. Smartphones offer a defense, detecting infrared lights from these cameras in dark conditions, empowering individuals to spot red or purple dots on their screens, though limitations exist with non-infrared devices or false positives. As criminals refine tactics with potential AI integration, this threat demands constant awareness to protect the sanctity of home life.

Buried Cell Phones & Hidden Cameras – New Cybercrime: The Emergence of Covert Surveillance in Residential Areas
A disturbing trend surfaces when a resident in Queens uncovers a peculiar device buried in a front lawn, marking a new chapter in cybercrime that targets the sanctity of personal spaces. GoPro cameras have also been hidden in people’s yards to spy on them.
Mary Kehoe, a long-time resident of her Forest Hills home for 35 years, stumbles upon an object that resembles an Android phone encased in black tape, its camera lens protruding as if designed solely for observation. The discovery sends a shiver through the community, prompting Kehoe to voice her confusion with “Why us? I had lots of things going through my head as to why they chose our lawn but realized we are in the middle of the block.” This incident, reported in early 2025, highlights a growing tactic where criminals deploy hidden surveillance devices to monitor homeowners, gathering intelligence on daily routines and potential valuables.
The device in question, a low-profile camera likely powered by a battery pack, represents a sophisticated yet accessible tool in the arsenal of modern burglars, cyberstalkers, and anyone spying on people.
Reports indicate these gadgets, often wireless and affordable, emerge from retail outlets like Amazon or Best Buy, making them readily available to anyone with malicious intent. The Queens case mirrors similar occurrences across the Tri-State Area and beyond, with incidents documented in California, Massachusetts, New Jersey, and the tranquil suburbs of Scarsdale. Each discovery reveals a pattern: cameras concealed in bushes, buried in yards, or tucked into planters, all aimed at infiltrating the privacy of unsuspecting households. This cybercrime, blending physical intrusion with digital espionage, exploits the vulnerability of residential spaces in an era where technology permeates every aspect of life.
The Mechanics of the Crime
This cybercrime operates through a deceptively simple mechanism, relying on the strategic placement of surveillance equipment to gather actionable data. Perpetrators select devices that blend into the environment, often disguised with tape, leaves, or artificial grass, ensuring they evade casual notice. The camera in Forest Hills, for instance, featured an exposed lens, suggesting its purpose lay in continuous recording rather than communication. Experts suggest these devices connect to wireless networks, transmitting footage to remote locations where criminals analyze patterns of movement, identifying optimal times for break-ins. The affordability of such technology, with prices ranging from modest to premium depending on quality, lowers the barrier for entry, enabling even amateur thieves to engage in this practice.
Instances across the United States illustrate the breadth of this tactic. In Garden Grove, a resident unearths a camera hidden in a neighbor’s bush, its lens trained on a nearby home, while in Chino Hills, a similar device lurks at the base of a tree. These cases, reported in 2024 and 2025, indicate a coordinated effort, possibly linked to organized groups known as “burglary tourists” from South America. Such individuals enter the country on legitimate visas, using sophisticated yet inexpensive tools to scout affluent or middle-class neighborhoods. The devices typically include battery packs to sustain operation for days or weeks, capturing hours of footage that reveal when homes stand empty, a critical advantage for planning thefts.
The Scope and Impact
The scope of this cybercrime extends beyond isolated incidents, reflecting a nationwide surge in covert surveillance. Reports from Southern California, including Orange County and Temecula, document multiple discoveries, with law enforcement noting a rise in prosecutions tied to these activities. The impact strikes at the core of personal security, eroding the sense of safety within one’s own property. Homeowners like Kehoe experience a profound violation, grappling with the realization that their private moments—morning routines, family gatherings—fall under scrutiny. The financial toll remains secondary to the psychological distress, as residents question their surroundings and alter daily habits to counter the threat.
This crime’s evolution parallels the accessibility of technology, where off-the-shelf cameras become weapons in the hands of criminals. The lack of uniform reporting complicates efforts to quantify the prevalence but anecdotal evidence suggests hundreds of cases annually across urban and suburban areas. Neighborhoods once considered secure, such as Scarsdale, now face the same risks, indicating a democratization of surveillance tools that challenges traditional crime prevention methods. The emotional aftermath leaves residents vigilant, inspecting yards and reporting suspicious objects, a shift that reshapes community dynamics.
The Broader Context
This cybercrime fits into a larger landscape of digital threats, where the line between physical and virtual offenses blurs. Burglars adapt to advancements in home security by leveraging the same technology—cameras and wireless connectivity—that homeowners use for protection. The trend gains traction as global cybercrime losses soar, with the FBI estimating over $16 billion in damages in 2024 alone, a figure that encompasses diverse attacks. Hidden surveillance represents a niche yet growing segment, exploiting the trust people place in their immediate environment. The involvement of international groups adds complexity, as perpetrators move fluidly across borders, leaving local authorities to piece together fragmented evidence.
Communities respond with heightened awareness, encouraged to inspect properties regularly and report findings promptly. The simplicity of the devices—often detectable by unusual shapes or unexpected lights—empowers residents to act as first responders. Yet, the challenge persists, as criminals refine their methods, potentially integrating motion sensors or longer-lasting batteries. This ongoing cat-and-mouse game underscores the need for vigilance, transforming the quiet act of tending a lawn into a moment of potential discovery.
Connection to Scams
The influx of millions of illegal immigrants into the United States over the past four years brings an unfortunate reality that surprises few: among them lurk tens of thousands of scammers originating from West Africa and Asia. This migration amplifies a sophisticated cybercrime trend, where individuals exploit vulnerable communities with increasing audacity. Notably, scammers operating from overseas often collaborate with local associates, tasking them with the covert placement of surveillance cameras at the homes of scam victims. These devices, discreetly hidden in yards or bushes, monitor daily routines, providing critical insights into when residences stand empty or when valuables remain accessible. The breach extends beyond potential financial loss, invading the sanctity of personal space with relentless precision. Authorities urge anyone who suspects involvement in a scam to conduct a meticulous scan of their property, examining every corner for unusual objects or suspicious wiring that might indicate a hidden camera. As this issue gains traction, the need for heightened awareness and vigilance becomes paramount in safeguarding homes across the nation.
The Future of This Threat
The trajectory of this cybercrime suggests an escalation in sophistication and frequency. As technology advances, perpetrators may incorporate artificial intelligence to analyze footage in real time, identifying patterns with greater precision. The proliferation of affordable gadgets ensures the tactic remains accessible, while the anonymity of wireless transmission complicates tracking. Homeowners face a future where privacy demands constant defense, prompting innovations in security that detect unauthorized devices. The incident in Forest Hills serves as a stark reminder, urging a proactive stance against a threat that lurks beneath the surface of everyday life.
Detecting Hidden Cameras with a Smartphone
Individuals seeking to safeguard their homes can leverage the technology already in their possession, specifically their smartphones, to detect the presence of hidden cameras emitting infrared lights. This method offers a practical and immediate solution, particularly in light of the growing prevalence of covert surveillance devices. The process begins with understanding that many hidden cameras, especially those used by burglars for night vision, utilize infrared LEDs to capture footage in low-light conditions. These LEDs emit a light invisible to the naked eye but detectable under certain conditions, making a smartphone a valuable tool for uncovering such threats.
The technique hinges on the smartphone camera’s ability to pick up infrared light, a feature present in most modern devices due to their sensor capabilities. To start, individuals turn off all ambient lights in the room to minimize interference, creating a dark environment that enhances visibility of infrared emissions. Next, they open the camera app on their smartphone and switch to the front-facing camera, as this often proves more sensitive to infrared wavelengths. Slowly, they scan the area—corners, plants, furniture, or any spot where a camera might hide—while observing the screen closely. If a hidden camera operates nearby, small red or purple dots or flares appear on the display, indicating the presence of infrared light.
Enhancing this method requires a few additional steps to ensure accuracy. Individuals hold the smartphone steady, moving it methodically across the space to avoid missing subtle signals. Adjusting the brightness and contrast settings on the camera can amplify the visibility of infrared dots, making them stand out against the dark background. Some find success by using the video recording mode, allowing a frame-by-frame review to catch fleeting emissions. Patience plays a key role, as the process demands careful attention to detail, especially in larger rooms or outdoor areas like front lawns where devices might blend into the surroundings.
Detecting hidden cameras typically works best in the dark.
The effectiveness of this approach stems from the widespread availability of smartphones, equipping nearly every household with a detection tool. Research indicates that infrared LEDs, common in budget surveillance equipment, operate at wavelengths around 850 nanometers, which many smartphone cameras can detect despite filters designed to block such light for human photography. This quirk, an unintended byproduct of camera design, empowers individuals to act proactively. For instance, a resident in a quiet neighborhood might discover a suspicious device buried in a bush, confirming its purpose with this method before taking further action.
Limitations exist, requiring individuals to approach the task with realistic expectations. Not all hidden cameras rely on infrared, and some use alternative technologies that evade this detection. Environmental factors, such as reflections from glass or metal, can create false positives, necessitating a discerning eye to differentiate between artifacts and genuine signals. Repeating the scan from multiple angles helps verify findings, reducing the risk of misinterpretation. Additionally, older smartphone models might lack the sensitivity needed, though most devices manufactured after 2015 perform adequately.
This technique empowers individuals to take control of their security, transforming a routine device into a shield against intrusion. The process fosters a sense of agency, encouraging regular checks of living spaces to maintain privacy. As technology evolves, criminals may adapt their methods, but for now, this smartphone-based approach offers a frontline defense against the covert surveillance plaguing residential areas. The simplicity of the method, requiring no specialized equipment, ensures accessibility, making it a vital skill in an era where privacy faces constant challenges.
-/ 30 /-
What do you think about this?
Please share your thoughts in a comment below!
Article Rating
Table of Contents
POPULAR ARTICLES
ARTICLE META
RATE THIS ARTICLE?
LEAVE A COMMENT?
Thank you for your comment. You may receive an email to follow up. We never share your data with marketers.
Recent Comments
On Other Articles
on Nigeria – [EFCC] Economic & Financial Crimes Commission: “Thank you for your comment, but this is patently false. China is the source for the most scammers. Brazil has…” Jul 9, 06:20
on Nigeria – [EFCC] Economic & Financial Crimes Commission: “NIgeria has produced more scammers than the whole world produced. Seems like their law enforcement is pretty incompetent.” Jul 8, 02:51
on Self-Pity & Scam Victim Recovery: “I like how this article incorporates gratitude as an antidote to self-pity. I also like how the writer corelates that…” Jul 7, 19:48
on Victim Psychology – Managing Your Emotional 5 Saboteurs: “It is so possible to stand in our own way during our recovery. That self-doubt about what happened, even feeling…” Jul 5, 12:51
on Romance Scams – Crime Typology Overview / Victim Impact Analysis – 2025: “Excellent compendium of knowledge on romance scams . Thank you Dr. Tim” Jul 5, 07:43
on Romance Scams – Crime Typology Overview / Victim Impact Analysis – 2025: “Dr. Tim, in the couple of hours you took to pull this information together into a victim impact analysis, is…” Jul 4, 18:56
on The Normalcy Bias: Understanding the Cognitive Bias that Can Put You in Danger – 2022 [UPDATED 2025]: “The article has been reviewed and updated. Thank you.” Jul 2, 07:31
on Victims As Activists & Why Many Scam Victims Should Delay Or Not Become One: “This article is clear in the ways that survivors can put themselves off track trying to help before they are…” Jul 1, 20:05
on Victim Vulnerability After The Scam – Physical Risks: “Thank you for this article. I had no idea that after a crime we walk differently, or use smaller gestures.…” Jul 1, 19:41
on Stolen Face / Stolen Identity – Stephen Murphy: Do You Know Him?: “He contacted me on Facebook as General Henry Martinez from Dallas Texas but currently stationed in Syria. He was a…” Jul 1, 17:40
Important Information for New Scam Victims
- Please visit www.ScamVictimsSupport.org – a SCARS Website for New Scam Victims & Sextortion Victims
- Enroll in FREE SCARS Scam Survivor’s School now at www.SCARSeducation.org
- Please visit www.ScamPsychology.org – to more fully understand the psychological concepts involved in scams and scam victim recovery
If you are looking for local trauma counselors please visit counseling.AgainstScams.org or join SCARS for our counseling/therapy benefit: membership.AgainstScams.org
If you need to speak with someone now, you can dial 988 or find phone numbers for crisis hotlines all around the world here: www.opencounseling.com/suicide-hotlines
A Note About Labeling!
We often use the term ‘scam victim’ in our articles, but this is a convenience to help those searching for information in search engines like Google. It is just a convenience and has no deeper meaning. If you have come through such an experience, YOU are a Survivor! It was not your fault. You are not alone! Axios!
A Question of Trust
At the SCARS Institute, we invite you to do your own research on the topics we speak about and publish, Our team investigates the subject being discussed, especially when it comes to understanding the scam victims-survivors experience. You can do Google searches but in many cases, you will have to wade through scientific papers and studies. However, remember that biases and perspectives matter and influence the outcome. Regardless, we encourage you to explore these topics as thoroughly as you can for your own awareness.
Statement About Victim Blaming
Some of our articles discuss various aspects of victims. This is both about better understanding victims (the science of victimology) and their behaviors and psychology. This helps us to educate victims/survivors about why these crimes happened and to not blame themselves, better develop recovery programs, and to help victims avoid scams in the future. At times this may sound like blaming the victim, but it does not blame scam victims, we are simply explaining the hows and whys of the experience victims have.
These articles, about the Psychology of Scams or Victim Psychology – meaning that all humans have psychological or cognitive characteristics in common that can either be exploited or work against us – help us all to understand the unique challenges victims face before, during, and after scams, fraud, or cybercrimes. These sometimes talk about some of the vulnerabilities the scammers exploit. Victims rarely have control of them or are even aware of them, until something like a scam happens and then they can learn how their mind works and how to overcome these mechanisms.
Articles like these help victims and others understand these processes and how to help prevent them from being exploited again or to help them recover more easily by understanding their post-scam behaviors. Learn more about the Psychology of Scams at www.ScamPsychology.org
Psychology Disclaimer:
All articles about psychology and the human brain on this website are for information & education only
The information provided in this article is intended for educational and self-help purposes only and should not be construed as a substitute for professional therapy or counseling.
While any self-help techniques outlined herein may be beneficial for scam victims seeking to recover from their experience and move towards recovery, it is important to consult with a qualified mental health professional before initiating any course of action. Each individual’s experience and needs are unique, and what works for one person may not be suitable for another.
Additionally, any approach may not be appropriate for individuals with certain pre-existing mental health conditions or trauma histories. It is advisable to seek guidance from a licensed therapist or counselor who can provide personalized support, guidance, and treatment tailored to your specific needs.
If you are experiencing significant distress or emotional difficulties related to a scam or other traumatic event, please consult your doctor or mental health provider for appropriate care and support.
Also read our SCARS Institute Statement about Professional Care for Scam Victims – click here to go to our ScamsNOW.com website.
This is beyond concerning. To be tracked at your home is obviously a huge violation of privacy.
Thank you for sharing this information.