They Researched Their Victims on Zillow Before Kicking Down the Door
Organized burglary crews are using publicly available data to stalk and rob homeowners. The privacy gaps they exploit are ones most people share.
In December 2024, a home in Cascade Township, Michigan was burglarized while the owners were at work. Hundreds of thousands of dollars in cash, jewelry, and personal documents were taken.
Initially it looked like a one-off crime. Turns out it wasn’t.
Federal investigators eventually connected that break-in to at least 19 other burglaries across the United States, spanning both coasts, with total losses exceeding $1.6 million. Ten suspects were arrested in Michigan, California, New Jersey, and Wisconsin. According to federal court documents, the group had conducted weeks of surveillance on each target, researching victims through internet searches, open-source databases, and social media to study the layouts of their homes and identify items of value.
They didn’t pick their targets randomly. They built profiles on them, using tools that are freely available to anyone with an internet connection.
The Digital Casing Playbook
Think of traditional burglary as a physical operation. A thief drives through a wealthy neighborhood, looks for an unlocked door or an empty driveway, and takes their chances.
What federal prosecutors described in this case is fundamentally different. It’s a research operation that follows a repeatable playbook, one I’d call “digital casing.”
The playbook works in four stages.
Stage 1 — Identify. Find a target through business directories, social media, or community visibility. In this case, the group focused on immigrant business owners, particularly those running restaurants, jewelry stores, and other enterprises where cash and gold might be kept at home.
Stage 2 — Locate. Use people-search websites, open-source databases, and property records to connect a business owner’s name to a home address. These sites aggregate data from voting registries, property filings, motor vehicle records, and more. Many provide a home address for free.
Stage 3 — Surveil. Study the home using real estate listing photos (which often remain online for years after a sale), Google Street View, and social media posts that reveal layouts, valuables, routines, and travel patterns. In one case tied to this ring, a neighbor of a victim in Kentucky found a camera hidden in the bushes, rigged with fake foliage and a wireless hotspot.
Stage 4 — Execute. Time the break-in using GPS trackers placed on vehicles, knowledge of the family’s schedule, and even estimates of local police response times.
This four-stage process is what transformed a burglary into something closer to an intelligence operation. And every tool used in stages 1 through 3 is legal, commercially available, and accessible from a phone right now.
This is Not an Isolated Case
The Kent County case is part of a much larger pattern. The FBI has identified what it calls “South American Theft Groups” (SATGs) as a significant and growing criminal threat. These aren’t a single organization. According to Kent County Sheriff’s Sgt. Scott Dietrich, there are “tens, maybe hundreds of these groups all over the United States” that target specific people or specific things. (source)
The scope is larger than you would think.
In Houston, law enforcement linked over 60 home burglaries to SATG-connected crews. West University Place Police Chief Gary Ratliff told Fox News Digital that these groups used signal jammers to disable Wi-Fi security cameras and alarm systems during break-ins, rendering wireless home security effectively useless. (source)
A separate Chilean burglary ring targeted the homes of professional athletes, including Patrick Mahomes, Travis Kelce, and Joe Burrow, using public social media posts and game schedules to time their break-ins for when the players were away. The FBI released a podcast episode in February 2025 specifically warning about this tactic ahead of the Super Bowl, noting that SATGs use “a combination of internet research, surveillance, and commercially available camera and tracking technologies to scope out their targets.” (source and source)
In Pennsylvania, a theft ring targeting Asian business owners led to six convictions, with suspects sentenced to up to 10 years in prison. (source)
And police in Riverside, California have confirmed that detectives routinely find Zillow and Redfin searches on phones seized from arrested burglary suspects. (source)
That last detail deserves a moment. Zillow covers over 160 million homes. Listing photos, which often include every room, every entry point, and the exact locations of security cameras, frequently remain online for years after a home is sold. A former NYPD detective told Fox News Digital that modern burglars can now gather more useful intelligence from a real estate listing than they ever could sitting outside a house with binoculars. (source)
This Is a Privacy Story More Than a Crime Story
Most coverage of these burglary rings focuses on the criminal element.
And that’s understandable.
But the reason I’m writing about it is because the vulnerability these criminals exploited isn’t a broken lock or an open window. It’s the fact that an enormous amount of actionable intelligence about where you live, what you own, and when you’re home is publicly available by default.
Consider what a motivated person can assemble about you, right now, without breaking any laws.
From people-search sites like Spokeo, WhitePages, and BeenVerified, they can get your full name, home address, phone number, email, names of relatives, and sometimes estimated income or net worth. Many of these sites provide actionable results for free.
From real estate platforms like Zillow, Redfin, and Realtor.com, they can view interior photos of your home, floor plans, entry points, window types, and camera placements.
From Google Street View, they can study your property from multiple angles, check vehicles in your driveway, scope out fences and access points, and assess escape routes.
From social media, they can learn your daily routines, track when you’re on vacation, identify expensive purchases, and piece together your family structure.
From business registrations and licensing databases, they can connect you to a business and make assumptions about cash or inventory you might keep at home.
None of this requires hacking. None of it requires specialized skills. And critically, none of it requires the criminal to be anywhere near your home until they’re ready to act.
The court documents in the Kent County case put it plainly.
These were not crimes of opportunity based on an unlocked door. Victims were targeted and stalked. The court noted that the “shadowing sense of fear that someone is coming after you is not unrealistic.”
The immigrants who were victimized in this case had done most things right. They built businesses, followed the law, saved diligently. What they hadn’t done, and what almost nobody does, is manage their digital footprint. Because most people don’t realize there’s anything to manage.
That’s the gap. And it’s one that organized criminals have figured out how to exploit with industrial efficiency. The question is whether the rest of us are going to keep pretending this information is harmless just because it’s technically “public.”
The good news is that this is a solvable problem. Not perfectly, but meaningfully.
Most of the data these groups rely on during the “identify” and “locate” phases of their playbook can be removed or significantly reduced. And the surveillance tools they use during the “execute” phase, particularly Wi-Fi signal jammers, have known countermeasures that most homeowners haven’t implemented because they don’t know the threat exists.
Below I’ll walk you through exactly how to close each stage of the digital casing playbook, starting with the single most impactful step you can take in the next 10 minutes.
How to Close Each Stage of the Digital Casing Playbook
The digital casing playbook has four stages. Each one has countermeasures. I’ll walk through them in reverse order of difficulty, starting with the steps you can take today.




