100% found this document useful (1 vote)
2K views

Midterm Handouts

The document discusses physical security and perimeter barriers. It defines physical security as barriers between potential intruders and protected matters. Perimeter barriers are structures that define the limits of an area and restrict access. Different types of perimeter barriers are described, including solid fences that block visual access and full-view fences that allow guards to monitor the surrounding area but also allow intruders to observe. Openings in perimeter barriers like gates, windows, and utility access points must also be secured.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
100% found this document useful (1 vote)
2K views

Midterm Handouts

The document discusses physical security and perimeter barriers. It defines physical security as barriers between potential intruders and protected matters. Perimeter barriers are structures that define the limits of an area and restrict access. Different types of perimeter barriers are described, including solid fences that block visual access and full-view fences that allow guards to monitor the surrounding area but also allow intruders to observe. Openings in perimeter barriers like gates, windows, and utility access points must also be secured.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 15

MIDTERM HANDOUTS

LESSON 2.1
CONCEPT
PHYSICAL SECURITY

- is the broadest branch of security which is actually a system of barriers placed between
potential intruders and the matters to be protected.
-It is concerned with the physical measures adopted to prevent unauthorized access to
equipment, facilities, materials, and documents, and to safeguard them against espionage,
sabotage damage and theft.
-Physical security covers other types of security to protect equipment, documents, facilities
and materials against theft damage, sabotage or espionage. It also encompasses protection of
personnel from any criminal act.
A. PRINCIPLES OF PHYSICAL SECURITY
In every establishment, physical measures are needed to deny unauthorized access or intrusion
because of the following:
1. Enemy Agents Must Access- Acquisition of information is the ultimate results, and the
means and form in which the information is obtained.
2. There is No Impenetrable Barrier - For the unfriendly government or organization, they
are willing to devote enough time, money, personnel, material, and imagination in passing
barriers. So physical security attempts to build defense by using a certain barrier.
3. 3. Defense in depth means barrier after barrier. In order that barrier could prevent
unauthorized access and serve its purpose very well, there should be an integration of all
barriers adopted in the installation.
4. 4. Surreptitious versus Non-Surreptitious Entry - The possibility of surreptitious entry is
the greatest hazard from the standpoint of counterintelligence security because it is usually
difficult to determine. that the information has been compromised. No action is taken to
neutralize the act of espionage because surreptitious entry is not usually detected.
Surreptitious entry means not observable while non- surreptitious entry is observable.
Observable or not, intruders usually find the right place and right opportunity to gain access.
Physical security then needed to detect or deny unauthorized entries.
5. 5. Each Installation is Different- Since each installation is different, each will have
different problems to overcome. The security procedures will adequate for all installations.
B. BARRIERS DEFINED
Barriers refer to any physical structure whether natural man-made capable of restricting, deterring,
delaying preventing illegal unauthorized access to an installation.
C. TWO GENERAL TYPES OF PHYSICAL SECURITY BARRIERS
1. Natural Barriers - These are offered by nature which obstruct or delay the passage way of
potential intruder. These also refer to natural structures that serve as deterrents or obstructions to
intruders such as high canyon, desert, or bodies of water.
2. Man-made Barriers - These are structural construction like fences, walls, floors, roofs, grills,
bars, roadblock other physical means to deter or impede penetration.
D. SPECIFIC TYPES OF PHYSICAL SECURITY BARRIERS
1. Natural Barriers include mountains, cliffs, canyons, ravens, seas, marshes, deserts, or terrain
difficult to traverse.
2. Structural Barriers are those features constructed by regardless of their original intent that
tend to delay intruder. Examples of these are: walls; ceilings; door; fences.
3. Human Barriers include guards, charges of quarters office and shop workers, who stand
between the intra and the matter to be protected.
4. Animal Barriers are usually shepherd dogs trained for and used as guards.
5. Energy Barriers are usually electrical and electronic devices that could assist security
personnel in deter intrusions. Examples are: protected lighting, and intrusion devises.
E. LEVELS OF PHYSICAL SECURITY also varies depending on the type and location of facility,
and other factors needing security. The levels of physical security could be any of the following:
1. Minimum Security is a system designed to impede unauthorized external activity such as
simple intrusion to armed attack.
2. Low Level Security is a system designed to impede and detect some unauthorized external
activity such as on small retail store, storage warehouses.
3. Medium Security is designed to impede, detect and assess most external activity and some
unauthorized internal activity that range from simple shoplifting to conspiracy to commit sabotage.
This includes the:
a. Use of advance intrusion alarm system;
b. Establishment of perimeter and perimeter barriers; and
c. Use of an unarmed guard.
4. High Level Security is designed to impede, detect and assess most unauthorized external and
internal activities of certain prisons, defense contractors, pharmaceutical companies and
sophisticated electronic manufacturers. This includes the utilization of the following:
a. Close Circuit Television (CCTV);
b. Perimeter alarm system;
c. High security lighting:
d. Highly trained armed guards;
e. Control designs; and
f. Coordination with local law enforcement agencies.
5. Maximum Security includes the application of the following:
a. Sophisticated alarm system; and
b. On-site response force.
LESSON 2.2
PERIMETER BARRIERS

A. CONCEPT OF PERIMETER BARRIERS


Perimeter barrier is a medium of structure which defines the physical limits of an installations or
area to restrict impede access thereto. It is any physical barrier used supplement the protection of
an inside or outside perimeter. Perimeter barrier also includes the utilization of security personnel.
B. LINE OF PHYSICAL DEFENSE
Security managers and security personnel also consider the various lines of defense that could
help delay or stop intruders.
These are:
1. First Line includes all perimeter barriers;
2. Second Line includes the building exterior; and
3. Third Line includes those internal control measures.
C. PERIMETER BARRIER OPENINGS
In determining the appropriate perimeter barriers, security managers should not overlook the
necessity of monitoring perimeter openings that could be used by intruders. The openings are:
1. Gates and doors should also be guarded or locked as much as possible;
2. Windows and similar openings should also be guarded or grills should be installed so as not
to be used by intruder. Whenever possible, windows and openings less than 18 ft above the
ground, roofs, and ledges or less than 14 ft directly or diagonally opposite uncontrolled
windows in other walls, fire escapes, or other openings of 96 sq inches or larger should be
grilled or have steel bar protections;
3. 3. Sidewalks elevators are elevated parts of the land near the perimeter barrier that
provides access to areas within the perimeter barriers and should be locked and guarded;
4. 4. Utilities openings such as sewers, air intakes, exhaust tunnels which penetrate the
barriers and which have cross-sectioned area of 96 sq. inches or more should be protected
by bars, grills, etc.;
5. 5. Clear Zone is an unobstructed area maintained on both sides of the perimeter barrier. A
clear zone of 20 ft. or more is desirable between the barrier and extension structures and
natural covers which may provide concealment or assistance to person seeking
unauthorized entry. Where it is impossible to have clear zones because of property lives or
natural features, an increment in the height of the fencing, increased guard coverage more
security lightings or the use of intrusion device in that portion of the perimeter barrier should
be done.
Whenever possible, clear zones should have the following specifications:
a. A clear zone of 20 ft. or more should exist between the perimeter barriers and exterior
structures, parking areas and natural or man-made features.
b. A clear zone of 50 ft. or more should exist between the perimeter barrier and structures
within the protected areas except when a building wall constitutes part of the perimeter
barrier.
D. TYPES OF PERIMETER BARRIERS
Perimeter barriers include any of the following:
1. FENCES are independent structures designed to control physical and visual access
between outside areas. Types of fences include Solid Fence and Full-View Fence.
a. Solid fence is made of opaque material in such a way that visual access through the fence
structure is denied. Solid fences are constructed with heavy materials such as bricks, stone and
concrete, and usually extended down into the ground to a point view below the frost line.
Advantages of Solid Fence
1) Denies visual access of the installation to the intruder.
2) Denies the intruder the opportunity to become familiar with the personnel, activities, and the
schedule of the movement of the guards.
Disadvantages of Solid Fence
1) Prevents the guards from observing the area around the installation.
2) Creates shadow which may be used by the intruder for cover and concealment.
b. Full-view fence is constructed in such a manner that visual access is permitted such as wire
fence through the fence structure. It is designed pure to control physical access between two
areas.
Advantages of Full-view Fence
1) guards are able to keep the area surrounding the installation under observation
2) does not create any shadow
Disadvantages of Full-view Fence
1) Allows visual access to the installation.
2) Allows the intruder to get familiar with the movements and the time schedule of the guar
patrols.
Wire fence is a type of fence made of chain-link barbed wire concertina design with small opening
no larger than 2 square inches and made of number gauge wires or heavier, twisted and barbed
salvage top and bottom.
Specifications for Using Chain-link Fences
1) It must be constructed of 7-feet material excluding guard.
2) It must be 9 gauge or heavier.
3) Mesh openings are not to be larger than 2 inches per side.
4) It should be twisted and barbed salvage at top bottom.
5) It should be security fastened to rigid metal or reinforced concrete.
6) It must reach below surface enough on soft grounds to compensate for shifting sail or sand.
It must reach within 2 inches of hard ground or paving.
Specifications for Using Barbed Wire
1) Standard barbed wire is twisted, double-stand 12 gauge wire with 4 point barbs spaced on
equal distance apart.
2) Barbed wire fencing must be firmly affixed to posts high excluding top guard.
3) Barbed wire fencing should not be less than 7 ft. high excluding top guard.
4) The distance between strands will not exceed 6 inches and midway between parts.
Using concertina wire fence - concertina fences are formed like accordions.
2. BUILDING WALLS include walls, floor, roofs or their combinations serve also as barriers and
they should be of such constructions to provide uniform protection just like wire-fencing.
3. BODIES OF WATER like river, lake, cataract, sea, pond or any bodies of water forming part of
the wall, building or fencing should not be considered an adequate perimeter barrier. Additional
security measures like wire fence, concrete walling, security patrolling and flood lighting at night
may be necessary for the portions of the perimeter.
E. ADDITIONAL PROTECTIVE MEASURES
1. Top Guard- is an additional overhang barbed wire placed on vertical perimeter fences
facing upward and outward with 45 degree angle with three to four strands of barbed wires
spaced 6-inches apart. This will increase protective height and prevent easy access
2. Guard Control Stations- are normally provided at perimeter entrance to secure areas
located out of doors and manned by guards on a full-time basis. Sentry stations should be
near a perimeter for surveillance at the entrance
3. Towers or "Guard towers are house-like structures s the perimeter barriers. It gives a
psychological effect to violators.
4. Signs and Notices or "Control signs should be erected where necessary in the
management of unauthorized ingress, and preclude accidental entry. It includes entry ID,
prohibited and exclusive areas signs.
F. PERIMETER GUARDS are also employed in augmenting existing perimeter security or
perimeter barriers of a certain establishment.
The two (2) types of employing perimeter guards are:
1. Fixed Post - Security guards are assigned in a particular place of the compound to guard
and watch the surrounding; and
2. Patrol (Roving) - In this system, the security guard is required to walk and go around
regularly around company premises.
The most secured system of perimeter guard employment at mutually supporting fixed posts. This
system would require each guard to be visible to each adjacent guard and would provide the
possibility for the area between to be under surveillance of either guard. However, this type of
employment expensive.
A less expensive system is that of employing the guards patrols. The security value of this type of
employment considerably reduced unless a sufficient number of frequent patrols are used to
create essentially the same as that of tower guards.
In conducting patrols, the guards should be instructed to traverse an irregular route, providing
different intervals between visual or actual contact with any given point on the fence.
However, in practice, there are observed disadvantages of roving patrol, to wit
1. Even regular routes, in time, tend to become regular in their irregularity,
2. The use of irregular roving patrol is made for the The economy feature is usually economy
of personnel. carried so far that even the irregular route patrol fails to serve the purpose,
and
3. It is difficult for installation control personnel to determine that the roving patrol is actually
carrying out its functions.
Note: A guard system that cannot be checked on is not a secured guard system.
• Double checking guards could be done by:
a. Personal inspection - Security supervisors conduct on-the-spot and random inspection of
posted guards; or
b. Artificial inspection - This is done through bundy clocks strategically installed around the
perimeter; and reporting through handheld two-way radio or similar communication gadget.

LESSON 2.3
SECURITY LIGHTINGS OR PROTECTIVE LIGHTINGS

CONCEPT
A. BASIC CONCEPTS OF SECURITY OR PROTECTIVE LIGHTING
Protective lighting provides a means of continuing illumination during hours of darkness, a degree
of protection that is maintained during daylight hours. This safeguard also has considerable value
as a deterrent to thieves and vandals and may make the job of the saboteur more difficult. It is an
essential element of an integrated physical security program.
The system must be reliable and designed with overlapping illumination to avoid creating
unprotected area in the event of individual light failure. It must be easy to maintain and it must
secure itself against attack. Poles should be within the barrier power lines and the switch box must
be protected.
B. BASIC REQUIREMENTS
1. Protective or security lighting needs at installations and facilities depend upon each
situation and the areas to be protected. Each situation requires careful study to provide the
best visibility practicable for such security duties as identification of badges and people at
gates, inspection of vehicles, prevention of illegal entry, detection of intruders outside and
inside buildings and other structures, and inspection of unusual or suspicious
circumstances
2. When such lighting provisions are impractical, additional security posts, patrols, sentry dog
patrols, or other security means will be necessary.
3. 3. Protective lighting should not be used as a psychological deterrent only. It should be
used on a perimeter fence line only where the fence is under continuous or periodic
observation. Protective lighting may be unnecessary where the perimeter fence is protected
by a central alarm system.
4. 4. Protective lighting maybe desirable for those sensitive areas or structures within the
perimeter, which are under specific observation. Such areas or structures include pier and
dock areas, vital buildings, storage areas, and vulnerable control points in communications,
power, and water distribution systems. In interior areas where operations are conducted,
adequate lighting of the area facilitates detection of unauthorized persons approaching or
attempting malicious acts within the area.
C. CHARACTERISTICS OF PROTECTIVE LIGHTINGS
Using protective lighting is expensive and is an additional cost to the company or establishment.
Therefore, consider the following in planning for protective lighting systems:
1. Protective lighting usually requires less intensity working light, except for identification and
inspection an authorized portals and in emergencies.
2. Lightings needed may vary because each area of an installation or facility presents its
particular problems based on physical layout, terrain, atmospheric and climatic conditions,
and the protective requirements.
3. The data available from the manufacturers of lighting equipment which will assist in
designing a lighting system included in these data are:
a. Descriptions, characteristics, and specification of various incandescent, arc, and gaseous
discharge lamps..
b. Lighting patterns of the various luminaries.
c. Typical layouts showing the most efficient height and spacing of equipment.
d. Minimum protective lighting intensities required by various applications.
D. PROTECTIVE LIGHTINGS’ SIGNIFICANCE TO SECURITY FORCES
When properly employed, protective lightings offers the following:
1. Reduction of the need to for security forces
2. Personal protection for forces by reducing the advantages of concealment and surprise for
a determined intruder
3. Relieved security forces could be used to better advantage elsewhere.
PROTECTIVE LIGHTING PRINCIPLES OR TECHNIQUES
1. Security lighting should enable a guard to observe clearly the activities around and inside
the premises within his jurisdiction.
2. In planning, high contrast between intruder and background should be provided. When
contrast is poor increase the intensity which will improve guard's ability to see. Good
contrast could be achieved by considering the following:
a. With predominantly dark dirty surfaces or camouflage type painted surfaces, more light is
needed to produce the same brightness around installations and buildings than when clean
concrete, light brick, and grass predominate.
b. When the same amount of light falls on an object and its background, the observer must
depend on contrasts in the amount of light reflected. The ability of the observer to
distinguish poor contrasts is significantly improved by increasing the level of illumination.
c. When the intruder is darker than his background, the observer sees primarily the outline or
silhouette. Intruders who depend on dark clothing and even darkened face and hands may be
foiled by using light finishes on the lower parts of buildings and structures.
d. Stripes on walls have also been used effectively, as they provide recognizable breaks in
outlines or silhouettes.
e. Providing broad lighted areas around and within the installation, against which intruders can
be seen, can also create good observation conditions.
3. Lighting boundaries and approaches, as well as the areas and structure, is useful to discourage
unauthorized entries and reveal identity of persons.
4. Good lighting should reveal well bordering areas, glaring to intruders and adequate for the
guard to observe his position.
F. TYPES OF SECURITY LIGHTINGS
1. Stationary Luminary (Continuous) - most comm consisting of services of fixed luminous to
flood area continuously with overlap. It may either be:
a. Glare-projection type the intensity is focused to the intruder while the observer or guard remains
the comparative darkness. The lighting is toward the approach, of an entrance to an installation.
Lights with reflectors increase glare. It is a strong deterrent to a potential intruder because it
makes it difficult for him to see the inside of the area. It also protects the guard by keeping him in
com darkness and enabling him to observe intruders at considerable distance beyond the
perimeter. Glare projection or other protective perimeter lighting may not be appropriate in some
instances. In combat tactical perimeter security considerations are given first priority over security
against pilferage. Generally, the tightening of tactical perimeter security strengthens other physical
security efforts. A blending of tactical and physical security principles is required-especially true
with regards to perimeter lighting.
Glare projection appropriate where security troop emplacements may be silhouetted or illuminated
for the enemy to see from the enemy's approach to the secured site Where glare projection is
desired, security troops placed in front of the perimeter fence should be moved, but still be able to
take up effective fields of fire for defense of the perimeter. If such blending of protective lighting
and tactical security cannot be accomplished, perimeter lighting should not be used. Floodlights
that provide a band of light with great horizontal angular dispersal and which directs the glare at a
possible intruder while restricting the downward beam, is preferred in this application
Controlled lighting the width of the lighted-atop can be controlled and adjusted to suit the security
needs. The lighting is focused; sag, on a pile of items rather than on the background
2. Stand-by Lighting - similar to continuous lighting but in turned on manually or by special device
or other automatic means, when there is suspicion of entry.
3. Movable Lighting consists of stationary or portable, manually operated search lights which may
be lighted continuously during hours of darkness or only as needed, and usually supplementary to
either of the first 2 types.
4. Emergency Lighting - a stand-by lighting which can be utilized in the event of electrical failure,
either due to local equipment or commercial power failure
GENERAL TYPES OF LIGHTING SOURCES
1. Incandescent lights have low initial cost and provide good color rendition.
2. Mercury Vapor lamps emit a purplish-white color caused by an electric current passing
through a tube of conducting and luminous gas. Considered more efficient and is
widespread in exterior lighting.
3. Metal Halide is similar in physical appearance to mercury vapor, but provides a light source
of higher luminous efficiency and better color rendition.
4. Fluorescent Lamp provides good color rendition. However, it cannot project light over long
distances; thus, it is not desirable as flood type lights.
5. High-pressure Sodium Vapor is introduced in 1965, for exterior lighting of parking areas,
roadways, buildings, and industrial and commercial installation. It emits golden white to pink
color.
6. Low-pressure Sodium Vapor produces yellow color.
Quartz Lamps produce very bright light.
H. TYPES OF LIGHTING EQUIPMENT
1. Floodlights are used for outdoor security lighting including the illumination of boundaries,
fences and buildings.
2. Street lights produce diffused light rather than directional beam. They are widely used in
parking areas
3. Searchlights are incandescent lights that provide a crime-related lighting system.
I. LIGHTING APPLICATIONS/LIGHTING SYSTEMS
1. Fenced Perimeter Lighting is used to illuminate the fence itself and the area beyond it ("the
detection zone objective is to reveal an intruder's approach and pro glare towards him, thus
reducing his ability to see in the site. However, it can be difficult to apply because it may
create nuisance or hazards.
2. Area Lighting is used in a building face perimeters consist of faces of buildings on or within 20
ft. of the property area line to be protected and where the public may approach the building.
Guards may be stationed inside or outside of the building. Doorways or other insets in building's
face should receive special attention for lighting to eliminate shadows.
3. Flood Lighting is used to cast a strong light on the walls of buildings so that intruders are visible
either in silhouette (outline) or by the shadows which they cast.
4. Gate House Lighting is installed on active entrances for pedestrians and vehicles to facilitate
complete inspection of passengers, cars, trucks and freight cars as well as their contents and
passengers.
5. Topping-up Lighting is used to illuminate dark areas not adequately lit by area or flood lighting.
Areas and structures within the installation property lines consist of yards, storage spaces, large
open working areas, docks, and other sensitive areas and structures.
LESSON 2.4
PROTECTIVE ALARMS

CONCEPT
DEFINITION OF TERMINOLOGIES As used in this lesson and for uniform understanding, the
following are defined:
1. ALARM (signal) is synonymous to warning of imminent danger. It can also be defined as a:
a. Security device: a security device fitted to property, especially a house or car, to make a
warning sound if a break-in or theft is attempted; or
b. Sound of security or warning device: the sound made by a security or warning device In this
lesson, the first definition of alarm (security device) will be the emphasis of discussion and
learning.
2. PROTECTIVE ALARM - It is an aural or visual signal given by the enunciator to security guard
when intruder actuates device in a protected area.
3. ENUNCIATOR is a visual or audible-signaling device, which initiates condition of associated
circuits.
B. BASIC CONCEPT OF PROTECTIVE ALARMS
Another safeguard used to assist security to complement i not to supplement physical security is
an array of alarms. These alarms of various types and cost can be installed indoors or outdoors.
Basically, alarm systems are designed to alert security personnel to consummated or attempted
intrusion into an area building or compound. Alarms are not meant to prevent criminal acts. Each
type of alarm is activated in the event that an intrude tampers the circuitry, a beam or radiated
waves. In short intrusion, alarms can be electrical, mechanical or electronic
C. OPERATION AND TYPES OF INTRUSION ALARM SYSTEMS
Alarms work in various types and they emit sign through a variety of mechanisms. With their
methods operations, alarms could be classified into the following:
1. Breaking an Electrical Circuit through a Metallic foil or Wire - In building or compound, all
possible entry can be wired by using electrically charge strips of tinfoil wire. Any actions that will
move the foil or wire break the circuit and activate an alarm. Metallic foil or wire is used in window
or glass surfaces. Doors windows can be equipped with magnetic or spring activated contacts,
which will sound an alarm when the door or window is opened. The alarm can be log or near the
area where circuit is broken, or can monitored in a distant enunciator or both. 2. Interruption of
Light Beam of Photo-Cell through a Photoelectric or Electric Eye Device - An invisible light beam is
transmitted at a frequency of several thousand per second to a special receiver. An infrared filter
over the light source makes the beam invisible to intruders. The source of the beam is hidden, and
the rays crisscross a room by the use of reflecting mirrors until they contact sensitive cells in a
receiver. It is connected by a wire to a control station and when an intruder crosses the beam he
makes contact with the photo electronic coil which thus activates the alarm.
3. The disadvantages of photo-cell include the beam can be bypassed by crawling underneath or
climbing over it, its requirement of a rigid base and permanent installation, it is not fit for external
or outdoor installations because fog, smoke, dust, rain and other vision obstructions when devise
enough can intern the light and trigger false alarms.
4. Detecting Sound and Vibration through an Au Detection Device - Supersensitive microphone
speaker sensors are installed in walls; ceilings and floors of protected area of any sound caused
by attempted forced entry inspected by the sensor. This can utilized effectively to safeguard
enclosed areas, vaults safes, storage bins, file rooms, warehouse, and similar enclosures. These
microphones distributed evenly can detect sound or vibrations of sound caused by attempts to
entry into the protected area. The main advantage of this detector device is its relatively low cost
and easy installation. The amplifier which monitors the sound from the microphone can be
adjusted to suit the sensitivity level requirements. The obvious disadvantage is its limited
application to enclosed vaults, and depositories where minimum external sounds exist. It is not
satisfactory where high ambient noise levels are encountered proximate to construction sites,
aircraft, traffic and vehicular movements.
5. Vibration Detection Device - The vibration sensitive sensor is attached to walls, ceilings or floors
of the protected areas. The sensor detects any vibration caused by attempted forced entry.
6. Space and Motion Detectors - These systems derive their operating principle usually from a
physical phenomenon known as "Doppler Effect". Constant sound waves in a cubicle disturbed by
an object will cause change of frequency and wave motion thereby causing an alarm to trigger.
7. Penetration of an Electron or Electromagnetic Fence - It is an electronic fence consisting of 3 to
5 strands of wire spaced from 9 to 24 inches above one another which serves as antenna, a
monitor panel, and an electric circuitry. When power is put on, an Electro- magnetic field is set
among the wires from the top to the ground. An intruder about two feet from this field will trigger an
alarm. The fence is zoned to pinpoint areas of intrusion to a monitor located in the operation room
of security. This system is suggested to be located inside the chain-link fencing to minimize
nuisance alarms caused by animals, debris blown by the wind, and harmless trespassers.
8. Foot Rail Activator - Placing the front of their foot to engage the activation bar placed on the
floor in such a position that tellers may activate do not acquire any obvious use of the teller's hand
and their hands may be kept in full view of the robbers for reason of safety. Because foot rail can
be activated very obtrusively and safely, it is frequently found in the banks where tellers normally
operate while standing up.
9. Bill traps - Bill traps or currency activation devices are usually placed in the teller's cash drawer
and connected to the alarm system using a wire connector. When currency is removed from the
devices, the alarm is activated. The advantage of these devices is that the robbers frequently
remove the currency and activate the alarm. This is particularly helpful when the employees are
immediately forced to leave their station without having an opportunity to activate the alarm.
safely.
10. Knee or Thigh Button - These are installed inside the desk or teller station so they can be
activated by knees or thigh pressure. They are commonly found in location where personnel
usually perform their duties from a seated position.
11. Foot Button - Like the foot rail permit alarm activation safety while both hands remain clear in
view of the robber.
12.Double Squeeze Buttons - Pressure is required on both side of the device and therefore the
probability d accidental alarm is reduced.
D. TYPES OF ALARM DETECTION SYSTEM
1. Central Station System - A type of protective alarm system where the central station is
located outside the installation. It can be located in an agency and the installation is one of
the subscribers. A system in which the alarm signal is relayed to remote panel located at
the facilities of private owned protection Service Company manned by its personnel.
Alarm signal is transmitted over telephone lines to the central station. Here, operator on duty is 24-
hours to supervise, record, and maintain alarms. Several separate compounds tie their alarm
system to a central station so that in case of need, the central station calls for assistance to the
police, fire department, and hospital or with other government assistance units. The alarm signal
could be transmitted to any of the following:
a. Direct wire systems - Used by high-risks locations (banks, jewelers, furriers)
b. Circuit party systems - This has a circuit transmission system where as many as 15 alarm
transmitters may send alarm to a single receiving panel at the central station over the same
time. Each alarm has a distinct code.
c. Multiplex system - This reduces leased telephone charges while at the same time providing
higher degree of line security than circuit-loop alarms.
d. Digital communicator is a computer-based which sends its signal through the regular switch
line telephone network. The alarm signal transmitted series of coded electronic pulses that
can only be received on a computer-type terminal at the central station.
e. Telephone Dialer delivers pre-recorded verbal message to a central station, answering
service, or police department when an alarm is detected.
f. Radio signal transmission - This method takes the alarm signal from the protected premises
and sends it via radio or cellular phone to either a central station or police dispatch center.
g. Video verification A video is sent to central station. This provides higher level of protection while
helping to eliminate false alarms by allowing central station operators to see what is happening
inside the protected area.
2. Proprietary System- this functions in the same way as the central system except that it is owned
and leased by the subscriber, and operated and located in the facility. Response to all alarms is by
facility's own security or fire personnel. Since this system is monitored locally, the response time to
an alarm is considerably reduced. Usually, the control console is located at the security control
center where operators are on continuous duty. Any triggering information on fire, intrusion, or
violation security rules is monitored by security and appropriate action is initiated.
3. Local Alarm System - Consists of rigging up a visual audible alarm near the object to be
protected, a bell light indicates an attempted or successful intrusion. case of alarm, response will
be made by the local guard and other personnel within sight or hearing. Its success relies on
someone hearing or seeing the signal and calling authorities. It also serves to notify the
responsible burglars that they have been detected. In this case, the sensor activates the circuit,
which in turn activates a ho or siren or even flashing light located in the immediate vicinity of the
alarmed area.
4. Auxiliary System - In this system installation circuits a led into local police or fire department by
leased telephone The du lines usually by special arrangements. responsibility for circuits and the
high incidence of false alarms have made this system unpopular with public fin and police
personnel.
5. Local Alarm-By-Chance System - This is a local alarm system in which a bell or siren is
sounded with m predictable response. These systems are used in residence or small retail
establishments, which cannot afford respond system. The hope is that a neighbor or passing will
reach to the alarm and call for police assistance, bu such a call is purely a matter of chance.
6. Dial Alarm System - This system is set to dial predestined number when the alarm is activated.
Th number selected might be the police or the subscriber home number, or both. When the phone
is answered, recording states that an intrusion is in progress at the location so alarmed. This
system is relatively inexpensive to install and operate, but since it is dependent on general phone
circuits, it could fail if line were busy or if the phone connection were cut.
E. THREE PARTS OF AN ALARM SYSTEM
Generally all alarming devices have these three (3) basic parts:
1. Sensor or Trigger Device
2. Circuits which carries messages to the signaling apparatus
3. Signaling system, sometimes called the enunciator
F. DESIRABLE CHARACTERISTICS OF INTRUSION ALARM SYSTEMS
The primary considerations on the choice of a particular alarm system include stability, durability
and reliability. Desirable characteristics, furthermore, should include:
1. A detection unit should initiate the alarm upon instruction of a human being in the area or
vicinity of the protected object.
2. An enunciator console indicating the audible and or aural signal and the specific location of
incident so that proper action can be made by security and other units.
3. Fail - A safe features give alarms in the enunciator when something is wrong with the
system.
4. System should be difficult to tamper or render ineffective by outsiders, competitors or
saboteurs.
5. Panel board central enunciators or operating console- monitoring activities should be
removed at all times. Transmission can be by physical wires or by radio.
G. PERIMETER PROTECTION This is the first line of defense to detect the intruders. This
could be done through any of the following intrusion alarming devices:
1. Door switches - these are installed on a door or window in such a way that opening the
door or window causes a magnet to move from a contact switch that activates the alarm.
2. Metallic foil (window tape) - It is widely used to detect glass breakage in show windows,
doors and transom casement). When the glass cracks and breaks the foil, the low voltage
electrical circuit and activates the alarm.
3. Glass break detectors - These are attached to the glass and sense the breakage of the
glass by shock or sound
4. Wooden screens - These are made of wooden dowel sticks in a cage like fashion not
more than 4 inches from each other. A very fine, brittle wire runs in a wooden dowels and
frame. The burglar must break the dowelling to gain and thus break the low voltage
electrical circuit, causing the alarm. These are primarily used in commercial applications
5. Window screens - These are similar to regular wire window screens in a home except
that a fine, wire is a part of the screen, and when the burglar cuts the screen to gain entry,
the flow of low- voltage electricity is interrupted and causes the alarm. These are primarily
for residential applications.
6. Lace and paneling - The surfaces of the door panels and safes are protected against
entry by installing a close lacelike pattern of metallic foil or a fine brittle wire on the surface.
Entry cannot be made without first breaking the foil or wire thus activating alarm. A panel of
wood is placed over the lacing to protect it.
H. AREA/SPACE PROTECTION
This involves detection of intrusions inside the building Indoor Detection Devices work
through Motion Detector Motion Detectors have the following characteristics:
1. This is a type of electronic security device that movement and usually triggers an alarm.
2. Many types of motion detectors can sense motion in total darkness, without an intruder
becoming aware that an alarm has been triggered.
3. Motion detectors are important part of most burglar alarm situations where no obvious
break-in has occurred. For instance, if an intruder steals a key to gain access to a protected
site or hides within the site during normal business hours, the intruder’s entrance or
presence could go unnoticed.
4. A motion detector will detect the intruder's movements as soon as he or she walks or
otherwise moves within the area protected by the detector.
I. TYPES AND OPERATION OF MOTION DETECTORS
Generally, motion detectors operate through any of the following:
1. Infrared Rays (beyond the red spectrum) - Infrared rays work in two ways:
2. Passive infrared motion detectors - sensitive to infrared wavelengths of energy, which are
invisible to human eye. Infrared energy can be detected as heat, and this type senses the
heat that a human or other animal emits.
3. Active infrared motion detectors - These detectors project a beam of infrared energy from
one unit (transmitter) to another (receiver). When an intruder moves through the beam
breaks a circuit in the receiver, triggering an alarm.
4. Ultrasonic - This uses ultrasound (sound of very high frequency) to detect motion. In such a
detector, a transmitter sends out sound of a frequency that is too high for the human ear to
hear. A receiver picks up the sound waves reflected from the room or area under protection.
An intruder's motion will cause a change, or shift in the frequency of sound. A circuit in the
device detects any unusual frequency shift. A small shift such as that produced by insect or
rodent is ignored. A large shift caused by human is detected. These detectors are extremely
sensitive and can sometimes be triggered by loud noises or air gusts from an open vent.
5. Microwave This uses a Doppler effect to detect motion (as discussed earlier).
6. Video - This detector senses changes in ambient light, or the light that is normally present in a
space. A video camera views an area, and sends the image to a monitor; the motion detector's
computer reads the pixels, or the tiny picture elements. The detector notes whether pixels are light
or dark. When an intruder moves across the field of view, the monitor displays the movement,
changing the lightness or darkness of the individual pixels.
J. REDUCING FALSE ALARMS A burglar can initiate a considerable response by polices private
security personnel, who may leave other important d to race to the scene of the alarm. Therefore,
it is important to prevent false alarms when designing and installing systems by using any of the
following:
1. Passive infrared detectors - can be programmed to ignore the first movement detected and
to sound the alarm when the movement passes through two or more detection zones within
a specified period of time.
2. Dual-technology motion detector - It combines a passive infrared device and a microwave
device in one small The passive infrared sees many detection zones measures the change
in background temperature target moves across them. At the same time, the detector
projects microwaves and measures the Doppler shift when a target moves through the
protected space. An infrared detector will detect motion regardless whether tar moving
across the field of view or toward the detector. But such a detector is more sensitive to
movement a its field of view.
K. INTRUDERS DETECTION SYSTEMS (IDS). These electronic devices for detecting entry, or
in some c attempted entry, of an intruder and signaling an alarm
1. Advantages of IDS: provides 24 hour surveillance used with CCTV, permit guards to remain
in protected positions; reduce the need of patrolling; manpower; and detect intruders at
unmanned sit 2. Limitations of IDS: if not carefully selected installed, they can be circumvented
or unacceptable false alarm rates; and they skilled maintenance.
L. PERIMETER INTRUDER DETECTION SYSTEM (PIDS) These electronic devices for
detecting entry or attempted entry across the external perimeter of a key point d point and
signaling an alarm. They provide similar advantages as in IDS but have the following
limitations:
1. liable to high false alarm rates
2. costly to maintain and install
3. may be vulnerable to deliberate alarming
4. can sometimes be circumvented by knowledgeable intruders.
5. Types of Sensors for Perimeter Intruder Detection Systems (PIDS):
1. Linear Microwave System (microwave fences) - a cigar shaped microwave beam is
established between a transmitter and a receiver. Range is theoretically up to 200m between
units but in practice is 100m to 150m.
2. Radiating Cable System - a.k.a. "buried cables', usually invisible to intruders. To coaxial
cables are buried about 2m apart. Radio frequency is transmitted along one cable and leaked
through apertures cut in the cable to similar apertures in the receiving cable. Disturbance of the
radio frequency field by intrusion causes an alarm signal.
3. Vibration Sensors provide indication of forced entry through walls, ceilings, doors, window
grills, and other rigid structures. These sensors operate through any of the following:
4. Inertia switches - a capsule encloses or small gold plated supported on the electrical contact
pins. Vibration causes the ball to lift off the contacts, producing an alarm.
5. Geophones a capsule encloses a spring loaded magnet suspended inside a coil. Vibration
causes movement of the magnet relative to the coil and induces a current, producing an alarm.

6. Crystal vibration sensor - a phezo-electric crystal compressed by vibration and produces a
current causing an alarm.
7. Personal Attack Alarm - This allows a door keeper or guard to give a covert warning that he
is under attack or threat of attack, by operating a push-button, kick bar or "panic strip". This
device continues to signal an alarm until released by a key.

You might also like