Midterm Handouts
Midterm Handouts
LESSON 2.1
CONCEPT
PHYSICAL SECURITY
- is the broadest branch of security which is actually a system of barriers placed between
potential intruders and the matters to be protected.
-It is concerned with the physical measures adopted to prevent unauthorized access to
equipment, facilities, materials, and documents, and to safeguard them against espionage,
sabotage damage and theft.
-Physical security covers other types of security to protect equipment, documents, facilities
and materials against theft damage, sabotage or espionage. It also encompasses protection of
personnel from any criminal act.
A. PRINCIPLES OF PHYSICAL SECURITY
In every establishment, physical measures are needed to deny unauthorized access or intrusion
because of the following:
1. Enemy Agents Must Access- Acquisition of information is the ultimate results, and the
means and form in which the information is obtained.
2. There is No Impenetrable Barrier - For the unfriendly government or organization, they
are willing to devote enough time, money, personnel, material, and imagination in passing
barriers. So physical security attempts to build defense by using a certain barrier.
3. 3. Defense in depth means barrier after barrier. In order that barrier could prevent
unauthorized access and serve its purpose very well, there should be an integration of all
barriers adopted in the installation.
4. 4. Surreptitious versus Non-Surreptitious Entry - The possibility of surreptitious entry is
the greatest hazard from the standpoint of counterintelligence security because it is usually
difficult to determine. that the information has been compromised. No action is taken to
neutralize the act of espionage because surreptitious entry is not usually detected.
Surreptitious entry means not observable while non- surreptitious entry is observable.
Observable or not, intruders usually find the right place and right opportunity to gain access.
Physical security then needed to detect or deny unauthorized entries.
5. 5. Each Installation is Different- Since each installation is different, each will have
different problems to overcome. The security procedures will adequate for all installations.
B. BARRIERS DEFINED
Barriers refer to any physical structure whether natural man-made capable of restricting, deterring,
delaying preventing illegal unauthorized access to an installation.
C. TWO GENERAL TYPES OF PHYSICAL SECURITY BARRIERS
1. Natural Barriers - These are offered by nature which obstruct or delay the passage way of
potential intruder. These also refer to natural structures that serve as deterrents or obstructions to
intruders such as high canyon, desert, or bodies of water.
2. Man-made Barriers - These are structural construction like fences, walls, floors, roofs, grills,
bars, roadblock other physical means to deter or impede penetration.
D. SPECIFIC TYPES OF PHYSICAL SECURITY BARRIERS
1. Natural Barriers include mountains, cliffs, canyons, ravens, seas, marshes, deserts, or terrain
difficult to traverse.
2. Structural Barriers are those features constructed by regardless of their original intent that
tend to delay intruder. Examples of these are: walls; ceilings; door; fences.
3. Human Barriers include guards, charges of quarters office and shop workers, who stand
between the intra and the matter to be protected.
4. Animal Barriers are usually shepherd dogs trained for and used as guards.
5. Energy Barriers are usually electrical and electronic devices that could assist security
personnel in deter intrusions. Examples are: protected lighting, and intrusion devises.
E. LEVELS OF PHYSICAL SECURITY also varies depending on the type and location of facility,
and other factors needing security. The levels of physical security could be any of the following:
1. Minimum Security is a system designed to impede unauthorized external activity such as
simple intrusion to armed attack.
2. Low Level Security is a system designed to impede and detect some unauthorized external
activity such as on small retail store, storage warehouses.
3. Medium Security is designed to impede, detect and assess most external activity and some
unauthorized internal activity that range from simple shoplifting to conspiracy to commit sabotage.
This includes the:
a. Use of advance intrusion alarm system;
b. Establishment of perimeter and perimeter barriers; and
c. Use of an unarmed guard.
4. High Level Security is designed to impede, detect and assess most unauthorized external and
internal activities of certain prisons, defense contractors, pharmaceutical companies and
sophisticated electronic manufacturers. This includes the utilization of the following:
a. Close Circuit Television (CCTV);
b. Perimeter alarm system;
c. High security lighting:
d. Highly trained armed guards;
e. Control designs; and
f. Coordination with local law enforcement agencies.
5. Maximum Security includes the application of the following:
a. Sophisticated alarm system; and
b. On-site response force.
LESSON 2.2
PERIMETER BARRIERS
LESSON 2.3
SECURITY LIGHTINGS OR PROTECTIVE LIGHTINGS
CONCEPT
A. BASIC CONCEPTS OF SECURITY OR PROTECTIVE LIGHTING
Protective lighting provides a means of continuing illumination during hours of darkness, a degree
of protection that is maintained during daylight hours. This safeguard also has considerable value
as a deterrent to thieves and vandals and may make the job of the saboteur more difficult. It is an
essential element of an integrated physical security program.
The system must be reliable and designed with overlapping illumination to avoid creating
unprotected area in the event of individual light failure. It must be easy to maintain and it must
secure itself against attack. Poles should be within the barrier power lines and the switch box must
be protected.
B. BASIC REQUIREMENTS
1. Protective or security lighting needs at installations and facilities depend upon each
situation and the areas to be protected. Each situation requires careful study to provide the
best visibility practicable for such security duties as identification of badges and people at
gates, inspection of vehicles, prevention of illegal entry, detection of intruders outside and
inside buildings and other structures, and inspection of unusual or suspicious
circumstances
2. When such lighting provisions are impractical, additional security posts, patrols, sentry dog
patrols, or other security means will be necessary.
3. 3. Protective lighting should not be used as a psychological deterrent only. It should be
used on a perimeter fence line only where the fence is under continuous or periodic
observation. Protective lighting may be unnecessary where the perimeter fence is protected
by a central alarm system.
4. 4. Protective lighting maybe desirable for those sensitive areas or structures within the
perimeter, which are under specific observation. Such areas or structures include pier and
dock areas, vital buildings, storage areas, and vulnerable control points in communications,
power, and water distribution systems. In interior areas where operations are conducted,
adequate lighting of the area facilitates detection of unauthorized persons approaching or
attempting malicious acts within the area.
C. CHARACTERISTICS OF PROTECTIVE LIGHTINGS
Using protective lighting is expensive and is an additional cost to the company or establishment.
Therefore, consider the following in planning for protective lighting systems:
1. Protective lighting usually requires less intensity working light, except for identification and
inspection an authorized portals and in emergencies.
2. Lightings needed may vary because each area of an installation or facility presents its
particular problems based on physical layout, terrain, atmospheric and climatic conditions,
and the protective requirements.
3. The data available from the manufacturers of lighting equipment which will assist in
designing a lighting system included in these data are:
a. Descriptions, characteristics, and specification of various incandescent, arc, and gaseous
discharge lamps..
b. Lighting patterns of the various luminaries.
c. Typical layouts showing the most efficient height and spacing of equipment.
d. Minimum protective lighting intensities required by various applications.
D. PROTECTIVE LIGHTINGS’ SIGNIFICANCE TO SECURITY FORCES
When properly employed, protective lightings offers the following:
1. Reduction of the need to for security forces
2. Personal protection for forces by reducing the advantages of concealment and surprise for
a determined intruder
3. Relieved security forces could be used to better advantage elsewhere.
PROTECTIVE LIGHTING PRINCIPLES OR TECHNIQUES
1. Security lighting should enable a guard to observe clearly the activities around and inside
the premises within his jurisdiction.
2. In planning, high contrast between intruder and background should be provided. When
contrast is poor increase the intensity which will improve guard's ability to see. Good
contrast could be achieved by considering the following:
a. With predominantly dark dirty surfaces or camouflage type painted surfaces, more light is
needed to produce the same brightness around installations and buildings than when clean
concrete, light brick, and grass predominate.
b. When the same amount of light falls on an object and its background, the observer must
depend on contrasts in the amount of light reflected. The ability of the observer to
distinguish poor contrasts is significantly improved by increasing the level of illumination.
c. When the intruder is darker than his background, the observer sees primarily the outline or
silhouette. Intruders who depend on dark clothing and even darkened face and hands may be
foiled by using light finishes on the lower parts of buildings and structures.
d. Stripes on walls have also been used effectively, as they provide recognizable breaks in
outlines or silhouettes.
e. Providing broad lighted areas around and within the installation, against which intruders can
be seen, can also create good observation conditions.
3. Lighting boundaries and approaches, as well as the areas and structure, is useful to discourage
unauthorized entries and reveal identity of persons.
4. Good lighting should reveal well bordering areas, glaring to intruders and adequate for the
guard to observe his position.
F. TYPES OF SECURITY LIGHTINGS
1. Stationary Luminary (Continuous) - most comm consisting of services of fixed luminous to
flood area continuously with overlap. It may either be:
a. Glare-projection type the intensity is focused to the intruder while the observer or guard remains
the comparative darkness. The lighting is toward the approach, of an entrance to an installation.
Lights with reflectors increase glare. It is a strong deterrent to a potential intruder because it
makes it difficult for him to see the inside of the area. It also protects the guard by keeping him in
com darkness and enabling him to observe intruders at considerable distance beyond the
perimeter. Glare projection or other protective perimeter lighting may not be appropriate in some
instances. In combat tactical perimeter security considerations are given first priority over security
against pilferage. Generally, the tightening of tactical perimeter security strengthens other physical
security efforts. A blending of tactical and physical security principles is required-especially true
with regards to perimeter lighting.
Glare projection appropriate where security troop emplacements may be silhouetted or illuminated
for the enemy to see from the enemy's approach to the secured site Where glare projection is
desired, security troops placed in front of the perimeter fence should be moved, but still be able to
take up effective fields of fire for defense of the perimeter. If such blending of protective lighting
and tactical security cannot be accomplished, perimeter lighting should not be used. Floodlights
that provide a band of light with great horizontal angular dispersal and which directs the glare at a
possible intruder while restricting the downward beam, is preferred in this application
Controlled lighting the width of the lighted-atop can be controlled and adjusted to suit the security
needs. The lighting is focused; sag, on a pile of items rather than on the background
2. Stand-by Lighting - similar to continuous lighting but in turned on manually or by special device
or other automatic means, when there is suspicion of entry.
3. Movable Lighting consists of stationary or portable, manually operated search lights which may
be lighted continuously during hours of darkness or only as needed, and usually supplementary to
either of the first 2 types.
4. Emergency Lighting - a stand-by lighting which can be utilized in the event of electrical failure,
either due to local equipment or commercial power failure
GENERAL TYPES OF LIGHTING SOURCES
1. Incandescent lights have low initial cost and provide good color rendition.
2. Mercury Vapor lamps emit a purplish-white color caused by an electric current passing
through a tube of conducting and luminous gas. Considered more efficient and is
widespread in exterior lighting.
3. Metal Halide is similar in physical appearance to mercury vapor, but provides a light source
of higher luminous efficiency and better color rendition.
4. Fluorescent Lamp provides good color rendition. However, it cannot project light over long
distances; thus, it is not desirable as flood type lights.
5. High-pressure Sodium Vapor is introduced in 1965, for exterior lighting of parking areas,
roadways, buildings, and industrial and commercial installation. It emits golden white to pink
color.
6. Low-pressure Sodium Vapor produces yellow color.
Quartz Lamps produce very bright light.
H. TYPES OF LIGHTING EQUIPMENT
1. Floodlights are used for outdoor security lighting including the illumination of boundaries,
fences and buildings.
2. Street lights produce diffused light rather than directional beam. They are widely used in
parking areas
3. Searchlights are incandescent lights that provide a crime-related lighting system.
I. LIGHTING APPLICATIONS/LIGHTING SYSTEMS
1. Fenced Perimeter Lighting is used to illuminate the fence itself and the area beyond it ("the
detection zone objective is to reveal an intruder's approach and pro glare towards him, thus
reducing his ability to see in the site. However, it can be difficult to apply because it may
create nuisance or hazards.
2. Area Lighting is used in a building face perimeters consist of faces of buildings on or within 20
ft. of the property area line to be protected and where the public may approach the building.
Guards may be stationed inside or outside of the building. Doorways or other insets in building's
face should receive special attention for lighting to eliminate shadows.
3. Flood Lighting is used to cast a strong light on the walls of buildings so that intruders are visible
either in silhouette (outline) or by the shadows which they cast.
4. Gate House Lighting is installed on active entrances for pedestrians and vehicles to facilitate
complete inspection of passengers, cars, trucks and freight cars as well as their contents and
passengers.
5. Topping-up Lighting is used to illuminate dark areas not adequately lit by area or flood lighting.
Areas and structures within the installation property lines consist of yards, storage spaces, large
open working areas, docks, and other sensitive areas and structures.
LESSON 2.4
PROTECTIVE ALARMS
CONCEPT
DEFINITION OF TERMINOLOGIES As used in this lesson and for uniform understanding, the
following are defined:
1. ALARM (signal) is synonymous to warning of imminent danger. It can also be defined as a:
a. Security device: a security device fitted to property, especially a house or car, to make a
warning sound if a break-in or theft is attempted; or
b. Sound of security or warning device: the sound made by a security or warning device In this
lesson, the first definition of alarm (security device) will be the emphasis of discussion and
learning.
2. PROTECTIVE ALARM - It is an aural or visual signal given by the enunciator to security guard
when intruder actuates device in a protected area.
3. ENUNCIATOR is a visual or audible-signaling device, which initiates condition of associated
circuits.
B. BASIC CONCEPT OF PROTECTIVE ALARMS
Another safeguard used to assist security to complement i not to supplement physical security is
an array of alarms. These alarms of various types and cost can be installed indoors or outdoors.
Basically, alarm systems are designed to alert security personnel to consummated or attempted
intrusion into an area building or compound. Alarms are not meant to prevent criminal acts. Each
type of alarm is activated in the event that an intrude tampers the circuitry, a beam or radiated
waves. In short intrusion, alarms can be electrical, mechanical or electronic
C. OPERATION AND TYPES OF INTRUSION ALARM SYSTEMS
Alarms work in various types and they emit sign through a variety of mechanisms. With their
methods operations, alarms could be classified into the following:
1. Breaking an Electrical Circuit through a Metallic foil or Wire - In building or compound, all
possible entry can be wired by using electrically charge strips of tinfoil wire. Any actions that will
move the foil or wire break the circuit and activate an alarm. Metallic foil or wire is used in window
or glass surfaces. Doors windows can be equipped with magnetic or spring activated contacts,
which will sound an alarm when the door or window is opened. The alarm can be log or near the
area where circuit is broken, or can monitored in a distant enunciator or both. 2. Interruption of
Light Beam of Photo-Cell through a Photoelectric or Electric Eye Device - An invisible light beam is
transmitted at a frequency of several thousand per second to a special receiver. An infrared filter
over the light source makes the beam invisible to intruders. The source of the beam is hidden, and
the rays crisscross a room by the use of reflecting mirrors until they contact sensitive cells in a
receiver. It is connected by a wire to a control station and when an intruder crosses the beam he
makes contact with the photo electronic coil which thus activates the alarm.
3. The disadvantages of photo-cell include the beam can be bypassed by crawling underneath or
climbing over it, its requirement of a rigid base and permanent installation, it is not fit for external
or outdoor installations because fog, smoke, dust, rain and other vision obstructions when devise
enough can intern the light and trigger false alarms.
4. Detecting Sound and Vibration through an Au Detection Device - Supersensitive microphone
speaker sensors are installed in walls; ceilings and floors of protected area of any sound caused
by attempted forced entry inspected by the sensor. This can utilized effectively to safeguard
enclosed areas, vaults safes, storage bins, file rooms, warehouse, and similar enclosures. These
microphones distributed evenly can detect sound or vibrations of sound caused by attempts to
entry into the protected area. The main advantage of this detector device is its relatively low cost
and easy installation. The amplifier which monitors the sound from the microphone can be
adjusted to suit the sensitivity level requirements. The obvious disadvantage is its limited
application to enclosed vaults, and depositories where minimum external sounds exist. It is not
satisfactory where high ambient noise levels are encountered proximate to construction sites,
aircraft, traffic and vehicular movements.
5. Vibration Detection Device - The vibration sensitive sensor is attached to walls, ceilings or floors
of the protected areas. The sensor detects any vibration caused by attempted forced entry.
6. Space and Motion Detectors - These systems derive their operating principle usually from a
physical phenomenon known as "Doppler Effect". Constant sound waves in a cubicle disturbed by
an object will cause change of frequency and wave motion thereby causing an alarm to trigger.
7. Penetration of an Electron or Electromagnetic Fence - It is an electronic fence consisting of 3 to
5 strands of wire spaced from 9 to 24 inches above one another which serves as antenna, a
monitor panel, and an electric circuitry. When power is put on, an Electro- magnetic field is set
among the wires from the top to the ground. An intruder about two feet from this field will trigger an
alarm. The fence is zoned to pinpoint areas of intrusion to a monitor located in the operation room
of security. This system is suggested to be located inside the chain-link fencing to minimize
nuisance alarms caused by animals, debris blown by the wind, and harmless trespassers.
8. Foot Rail Activator - Placing the front of their foot to engage the activation bar placed on the
floor in such a position that tellers may activate do not acquire any obvious use of the teller's hand
and their hands may be kept in full view of the robbers for reason of safety. Because foot rail can
be activated very obtrusively and safely, it is frequently found in the banks where tellers normally
operate while standing up.
9. Bill traps - Bill traps or currency activation devices are usually placed in the teller's cash drawer
and connected to the alarm system using a wire connector. When currency is removed from the
devices, the alarm is activated. The advantage of these devices is that the robbers frequently
remove the currency and activate the alarm. This is particularly helpful when the employees are
immediately forced to leave their station without having an opportunity to activate the alarm.
safely.
10. Knee or Thigh Button - These are installed inside the desk or teller station so they can be
activated by knees or thigh pressure. They are commonly found in location where personnel
usually perform their duties from a seated position.
11. Foot Button - Like the foot rail permit alarm activation safety while both hands remain clear in
view of the robber.
12.Double Squeeze Buttons - Pressure is required on both side of the device and therefore the
probability d accidental alarm is reduced.
D. TYPES OF ALARM DETECTION SYSTEM
1. Central Station System - A type of protective alarm system where the central station is
located outside the installation. It can be located in an agency and the installation is one of
the subscribers. A system in which the alarm signal is relayed to remote panel located at
the facilities of private owned protection Service Company manned by its personnel.
Alarm signal is transmitted over telephone lines to the central station. Here, operator on duty is 24-
hours to supervise, record, and maintain alarms. Several separate compounds tie their alarm
system to a central station so that in case of need, the central station calls for assistance to the
police, fire department, and hospital or with other government assistance units. The alarm signal
could be transmitted to any of the following:
a. Direct wire systems - Used by high-risks locations (banks, jewelers, furriers)
b. Circuit party systems - This has a circuit transmission system where as many as 15 alarm
transmitters may send alarm to a single receiving panel at the central station over the same
time. Each alarm has a distinct code.
c. Multiplex system - This reduces leased telephone charges while at the same time providing
higher degree of line security than circuit-loop alarms.
d. Digital communicator is a computer-based which sends its signal through the regular switch
line telephone network. The alarm signal transmitted series of coded electronic pulses that
can only be received on a computer-type terminal at the central station.
e. Telephone Dialer delivers pre-recorded verbal message to a central station, answering
service, or police department when an alarm is detected.
f. Radio signal transmission - This method takes the alarm signal from the protected premises
and sends it via radio or cellular phone to either a central station or police dispatch center.
g. Video verification A video is sent to central station. This provides higher level of protection while
helping to eliminate false alarms by allowing central station operators to see what is happening
inside the protected area.
2. Proprietary System- this functions in the same way as the central system except that it is owned
and leased by the subscriber, and operated and located in the facility. Response to all alarms is by
facility's own security or fire personnel. Since this system is monitored locally, the response time to
an alarm is considerably reduced. Usually, the control console is located at the security control
center where operators are on continuous duty. Any triggering information on fire, intrusion, or
violation security rules is monitored by security and appropriate action is initiated.
3. Local Alarm System - Consists of rigging up a visual audible alarm near the object to be
protected, a bell light indicates an attempted or successful intrusion. case of alarm, response will
be made by the local guard and other personnel within sight or hearing. Its success relies on
someone hearing or seeing the signal and calling authorities. It also serves to notify the
responsible burglars that they have been detected. In this case, the sensor activates the circuit,
which in turn activates a ho or siren or even flashing light located in the immediate vicinity of the
alarmed area.
4. Auxiliary System - In this system installation circuits a led into local police or fire department by
leased telephone The du lines usually by special arrangements. responsibility for circuits and the
high incidence of false alarms have made this system unpopular with public fin and police
personnel.
5. Local Alarm-By-Chance System - This is a local alarm system in which a bell or siren is
sounded with m predictable response. These systems are used in residence or small retail
establishments, which cannot afford respond system. The hope is that a neighbor or passing will
reach to the alarm and call for police assistance, bu such a call is purely a matter of chance.
6. Dial Alarm System - This system is set to dial predestined number when the alarm is activated.
Th number selected might be the police or the subscriber home number, or both. When the phone
is answered, recording states that an intrusion is in progress at the location so alarmed. This
system is relatively inexpensive to install and operate, but since it is dependent on general phone
circuits, it could fail if line were busy or if the phone connection were cut.
E. THREE PARTS OF AN ALARM SYSTEM
Generally all alarming devices have these three (3) basic parts:
1. Sensor or Trigger Device
2. Circuits which carries messages to the signaling apparatus
3. Signaling system, sometimes called the enunciator
F. DESIRABLE CHARACTERISTICS OF INTRUSION ALARM SYSTEMS
The primary considerations on the choice of a particular alarm system include stability, durability
and reliability. Desirable characteristics, furthermore, should include:
1. A detection unit should initiate the alarm upon instruction of a human being in the area or
vicinity of the protected object.
2. An enunciator console indicating the audible and or aural signal and the specific location of
incident so that proper action can be made by security and other units.
3. Fail - A safe features give alarms in the enunciator when something is wrong with the
system.
4. System should be difficult to tamper or render ineffective by outsiders, competitors or
saboteurs.
5. Panel board central enunciators or operating console- monitoring activities should be
removed at all times. Transmission can be by physical wires or by radio.
G. PERIMETER PROTECTION This is the first line of defense to detect the intruders. This
could be done through any of the following intrusion alarming devices:
1. Door switches - these are installed on a door or window in such a way that opening the
door or window causes a magnet to move from a contact switch that activates the alarm.
2. Metallic foil (window tape) - It is widely used to detect glass breakage in show windows,
doors and transom casement). When the glass cracks and breaks the foil, the low voltage
electrical circuit and activates the alarm.
3. Glass break detectors - These are attached to the glass and sense the breakage of the
glass by shock or sound
4. Wooden screens - These are made of wooden dowel sticks in a cage like fashion not
more than 4 inches from each other. A very fine, brittle wire runs in a wooden dowels and
frame. The burglar must break the dowelling to gain and thus break the low voltage
electrical circuit, causing the alarm. These are primarily used in commercial applications
5. Window screens - These are similar to regular wire window screens in a home except
that a fine, wire is a part of the screen, and when the burglar cuts the screen to gain entry,
the flow of low- voltage electricity is interrupted and causes the alarm. These are primarily
for residential applications.
6. Lace and paneling - The surfaces of the door panels and safes are protected against
entry by installing a close lacelike pattern of metallic foil or a fine brittle wire on the surface.
Entry cannot be made without first breaking the foil or wire thus activating alarm. A panel of
wood is placed over the lacing to protect it.
H. AREA/SPACE PROTECTION
This involves detection of intrusions inside the building Indoor Detection Devices work
through Motion Detector Motion Detectors have the following characteristics:
1. This is a type of electronic security device that movement and usually triggers an alarm.
2. Many types of motion detectors can sense motion in total darkness, without an intruder
becoming aware that an alarm has been triggered.
3. Motion detectors are important part of most burglar alarm situations where no obvious
break-in has occurred. For instance, if an intruder steals a key to gain access to a protected
site or hides within the site during normal business hours, the intruder’s entrance or
presence could go unnoticed.
4. A motion detector will detect the intruder's movements as soon as he or she walks or
otherwise moves within the area protected by the detector.
I. TYPES AND OPERATION OF MOTION DETECTORS
Generally, motion detectors operate through any of the following:
1. Infrared Rays (beyond the red spectrum) - Infrared rays work in two ways:
2. Passive infrared motion detectors - sensitive to infrared wavelengths of energy, which are
invisible to human eye. Infrared energy can be detected as heat, and this type senses the
heat that a human or other animal emits.
3. Active infrared motion detectors - These detectors project a beam of infrared energy from
one unit (transmitter) to another (receiver). When an intruder moves through the beam
breaks a circuit in the receiver, triggering an alarm.
4. Ultrasonic - This uses ultrasound (sound of very high frequency) to detect motion. In such a
detector, a transmitter sends out sound of a frequency that is too high for the human ear to
hear. A receiver picks up the sound waves reflected from the room or area under protection.
An intruder's motion will cause a change, or shift in the frequency of sound. A circuit in the
device detects any unusual frequency shift. A small shift such as that produced by insect or
rodent is ignored. A large shift caused by human is detected. These detectors are extremely
sensitive and can sometimes be triggered by loud noises or air gusts from an open vent.
5. Microwave This uses a Doppler effect to detect motion (as discussed earlier).
6. Video - This detector senses changes in ambient light, or the light that is normally present in a
space. A video camera views an area, and sends the image to a monitor; the motion detector's
computer reads the pixels, or the tiny picture elements. The detector notes whether pixels are light
or dark. When an intruder moves across the field of view, the monitor displays the movement,
changing the lightness or darkness of the individual pixels.
J. REDUCING FALSE ALARMS A burglar can initiate a considerable response by polices private
security personnel, who may leave other important d to race to the scene of the alarm. Therefore,
it is important to prevent false alarms when designing and installing systems by using any of the
following:
1. Passive infrared detectors - can be programmed to ignore the first movement detected and
to sound the alarm when the movement passes through two or more detection zones within
a specified period of time.
2. Dual-technology motion detector - It combines a passive infrared device and a microwave
device in one small The passive infrared sees many detection zones measures the change
in background temperature target moves across them. At the same time, the detector
projects microwaves and measures the Doppler shift when a target moves through the
protected space. An infrared detector will detect motion regardless whether tar moving
across the field of view or toward the detector. But such a detector is more sensitive to
movement a its field of view.
K. INTRUDERS DETECTION SYSTEMS (IDS). These electronic devices for detecting entry, or
in some c attempted entry, of an intruder and signaling an alarm
1. Advantages of IDS: provides 24 hour surveillance used with CCTV, permit guards to remain
in protected positions; reduce the need of patrolling; manpower; and detect intruders at
unmanned sit 2. Limitations of IDS: if not carefully selected installed, they can be circumvented
or unacceptable false alarm rates; and they skilled maintenance.
L. PERIMETER INTRUDER DETECTION SYSTEM (PIDS) These electronic devices for
detecting entry or attempted entry across the external perimeter of a key point d point and
signaling an alarm. They provide similar advantages as in IDS but have the following
limitations:
1. liable to high false alarm rates
2. costly to maintain and install
3. may be vulnerable to deliberate alarming
4. can sometimes be circumvented by knowledgeable intruders.
5. Types of Sensors for Perimeter Intruder Detection Systems (PIDS):
1. Linear Microwave System (microwave fences) - a cigar shaped microwave beam is
established between a transmitter and a receiver. Range is theoretically up to 200m between
units but in practice is 100m to 150m.
2. Radiating Cable System - a.k.a. "buried cables', usually invisible to intruders. To coaxial
cables are buried about 2m apart. Radio frequency is transmitted along one cable and leaked
through apertures cut in the cable to similar apertures in the receiving cable. Disturbance of the
radio frequency field by intrusion causes an alarm signal.
3. Vibration Sensors provide indication of forced entry through walls, ceilings, doors, window
grills, and other rigid structures. These sensors operate through any of the following:
4. Inertia switches - a capsule encloses or small gold plated supported on the electrical contact
pins. Vibration causes the ball to lift off the contacts, producing an alarm.
5. Geophones a capsule encloses a spring loaded magnet suspended inside a coil. Vibration
causes movement of the magnet relative to the coil and induces a current, producing an alarm.
–
6. Crystal vibration sensor - a phezo-electric crystal compressed by vibration and produces a
current causing an alarm.
7. Personal Attack Alarm - This allows a door keeper or guard to give a covert warning that he
is under attack or threat of attack, by operating a push-button, kick bar or "panic strip". This
device continues to signal an alarm until released by a key.