Protective alarms are security devices used to warn of break-ins or theft attempts. There are various types of intrusion alarm systems that detect unauthorized entry in different ways such as breaking an electrical circuit, interrupting a light beam, detecting sound/vibration, or penetrating an electromagnetic field. A well-designed alarm system has detection units that trigger the alarm upon human intrusion, clearly indicates the location of the incident, and includes fail-safe features to signal problems with the system. Perimeter protection methods include door/window switches, metallic foil on windows, glass break detectors, and protected window screens.
Protective alarms are security devices used to warn of break-ins or theft attempts. There are various types of intrusion alarm systems that detect unauthorized entry in different ways such as breaking an electrical circuit, interrupting a light beam, detecting sound/vibration, or penetrating an electromagnetic field. A well-designed alarm system has detection units that trigger the alarm upon human intrusion, clearly indicates the location of the incident, and includes fail-safe features to signal problems with the system. Perimeter protection methods include door/window switches, metallic foil on windows, glass break detectors, and protected window screens.
Protective alarms are security devices used to warn of break-ins or theft attempts. There are various types of intrusion alarm systems that detect unauthorized entry in different ways such as breaking an electrical circuit, interrupting a light beam, detecting sound/vibration, or penetrating an electromagnetic field. A well-designed alarm system has detection units that trigger the alarm upon human intrusion, clearly indicates the location of the incident, and includes fail-safe features to signal problems with the system. Perimeter protection methods include door/window switches, metallic foil on windows, glass break detectors, and protected window screens.
Protective alarms are security devices used to warn of break-ins or theft attempts. There are various types of intrusion alarm systems that detect unauthorized entry in different ways such as breaking an electrical circuit, interrupting a light beam, detecting sound/vibration, or penetrating an electromagnetic field. A well-designed alarm system has detection units that trigger the alarm upon human intrusion, clearly indicates the location of the incident, and includes fail-safe features to signal problems with the system. Perimeter protection methods include door/window switches, metallic foil on windows, glass break detectors, and protected window screens.
Download as PPTX, PDF, TXT or read online from Scribd
Download as pptx, pdf, or txt
You are on page 1of 29
Protective Alarms
Alarm- is a security device fitted to
property especially a house or car to make a warning sound if a break-in or theft is attempted.
Protective Alarm- it is an aural or
visual signal given by the enunciator to security guard when intruder actuates device in a protected area.
Enunciator- is a visual or audible-
signaling device which initiates condition of associated circuits. Basic Concept of Protective Alarms - Another safeguard used to assist security to complement if not to supplement physical security is an array of alarms. - Alarm systems are designed to alert security personnel to consummated or attempted intrusion into an area. Building or compound. - Are not meant to prevent criminal acts. - Types of alarm is activated in the event that an intruder tampers the circuitry. - In short intrusion alarms can be electrical, mechanical or electronic. Operation and Types of Intrusion Alarm System 1. Breaking an Electrical Circuit through a metallic foil or wire- all possible point of entry can be wired by using electrically charge strips of tinfoil wire. - Any actions that will move the foil or wire break the circuit and activate an alarm. - Metallic foil or wire is used in window or glass surfaces. 2. Interruption of Light Beam of Photo Cell through a photoelectric or Electric Eye Device- an invincible light beam is transmitted at a frequency of several thousand per second to a special receiver. Infrared filter over the light source makes the beam invincible to intruders. 3. The disadvantages of Photo-cell include the beam can be bypassed by crawling underneath or climbing over it. Fog, smoke, dust, rain and other vision obstructions may trigger the alarm. 4. Detecting sound and Vibration through an audio detection device- supersensitive microphone speaker sensors are installed in walls, ceilings and floors of the protected area of any sound caused by attempted forced entry inspected by the sensor. This can be vaults, safes, storage bins, file rooms. These microphones distributed vibrations of sound caused by attempts to entry into the protected area. The main advantage of this detector device is its relatively low cost and easy installation. 5. Vibration Detection Device- the vibration sensitive sensor is attached to walls, ceilings or floors of the protected areas. The sensor detects any vibration caused by attempted forced entry. 6. Space and Motion Detectors- these system derive their operating principle usually from a physical phenomenon known as Doppler Effect. Sound waves in a cubicle disturbed by an object will cause change of frequency and wave motion thereby causing an alarm to trigger. 7. Penetration of an Electron or Electromagnetic Fence- it is an electronic fence consisting of 3 to 5 strands of wire spaced from 9 to inches above one another which serves as antenna, a monitor panel and an electric circuitry. - When the power is on an electric magnetic field is set among the wires from the top to the ground. - This system is suggested to be located inside the chain-link fencing to minimize nuisance alarms caused by animals, debris blown by the wind and harmless trespassers. 8. Foot Rail activator- placing the front of their foot to engage the activation bar placed on the floor in such a position that tellers may activate the alarm.
9. Bill Traps- currency activation
devices are usually placed in the teller’s cash drawer and connected to the alarm system using a wire connector. When currency removed from the devices the alarm is activated. The advantage of these device is that the robbers frequently removed the currency and activate the alarm. 10. Knee or Thigh Button- these are installed inside the desk or teller station so they can be activated by the knee or thigh pressure. They are commonly found in location where personnel usually perform their duties from a seated position. 11. Foot Button- like the foot rail permit alarm-activation safety while both hands remain clear in view of the robber.
12. Double Squeeze Buttons-
pressure is required on both side of the device and therefore the probability of accidental alarm is reduced. TYPES OF ALARM DETECTION SYSTEM
Central Station System- a type of protective alarm system
where the central station is located outside the installation. It can be located in an agency and the installation is one of the subscriber. A system which the alarm signal is relayed to remote panel located at the facilities of private owned protection service company manned by its personnel. The alarm Signal could be transmitted to any following: a. Direct wire system- used by high-risk locations (banks, jewelers and furriers. b. Circuit party system- has a circuit transmission system where as many as 15 alarm transmitters may send alarm to a single receiving panel at the central station over the same time. c. Multiplex system- reduces leased telephone charges while at the same time providing higher degree of line security than circuit-loop alarms. d. Digital communicator- is a computer based which send signal through the regular switch line telephone network. The alarm signal transmitted series of coded electronic pulses that can only be received on a computer-type terminal at the central station. e. Telephone dialer delivers pre-coded verbal message to a central station, answering service or police department when an alarm is detected. f. Radio signaling transmission- this method takes the alarm signal from the protected premises and sends it via radio or cellular phone to either a central station or police dispatch center.
g. Video verification- a video is
sent to central station. This provides higher level of protection while helping to eliminate false alarms by allowing central station operators to see what is happening inside the protected area. Prepare for the next topic!!!! 2. Propriety System- this function is the same as the central system except that it is owned and leased by the subscriber and operated and located in the facility. Response to all facility’s own security or fire personnel. 3. Local alarm System- consist of rigging up a visual or audible alarm near the object to be protected a bell or lights indicates an attempted or successful intrusion. It also serves to notify burglars that they have been detected. 4. Auxiliary System- this system installation circuit are led into local police or fire department by leased telephone lines usually by special arrangements. There is high incidence of false alarms have made this system unpopular with public fire and police department. 5. Local Alarm-By-Chance System- a local alarm system in which a bell or siren is sounded with no predictable response. These system are use in residence and small retail establishments which cannot afford a response system. 6. Dial Alarm- this system is set to dial a predestined number when the alarm is activated. The number activated might be the police or subscriber’s home number or both. When the phone is answered a recording states that an intrusion is in progress at the location so alarmed. Three Parts of Alarm System
1. Sensor or trigger device
2. Circuits which carries messages to the signaling apparatus 3. Signaling system, sometimes called the enunciator. Desirable Characteristics of Intrusion Alarm System 1. Detection unit should in initiate the alarm upon instruction of a human being in the area or vicinity of the protected object.
2. An enunciator console indicating the audible and or aural
signal and the specific location of incident so that proper action can be made by security and other units. 3. Fail- a safe features give alarms in the enunciator when something is wrong with the system.
4. System should be difficult to tamper or render ineffective
by outsiders, competitors or saboteurs.
5. Panel board central enunciator or operating console
monitoring activities should be removed at all times. Transmission can be physical wires or radio. Perimeter Protection 1. Door switches- are installed in door or window in such way that opening causes magnet to move switch that activates the alarm.
2. Metallic foil (window tape) – widely used to detect glass
breakage in show window. When glass break the foil it interrupts the low voltage electrical circuit and activates the alarm. 3. Glass break detector- attached to the glass and sense the breakage of the glass by shock or sound.
4. Wooden screens- made of wooden dowel sticks in a cage
like fashion not more than 4 inches from each other. A very fine brittle wires runs in a wooden dowel and frame. Burglar must break the dowelling to break low voltage electrical circuit to cause alarm. 5. Window screens- similar to regular wire window screens in a home except that a fine coated wire is a part of the screen, when the burglar cuts the screen causes alarm. 6 lace and paneling- surfaces of the door panels are protected against entry by installing close lacelike. Entry cannot be made without breaking the foil thus activating the alarm.