www.1001TopWords.com |
Security Alarm System Motion Detectors
Passive Infrared Motion Detectors- These detectors are also known as PIR detectors. The technology they utilize is "passive infrared". The device is mounted on a wall or in the corner of a room. It sends invisible fingers out into the covered area in several layers. The top layer goes the furthest and averages about 60 feet straight ahead and 35 feet on the sides. The center layer of beams spreads the area about mid way and the bottom layer sweeps the room closest to the detector. These beams individually measure the infrared temperature of what ever they land on and look for a clash of temperature against that point. For example if a beam lands on your couch and knows what temperature it is, when you walk in front of the couch your temperature is different and causes a violation. You would be hard pressed to match the temperature of everything in your home as you walk about and that makes motion detectors hard to compromise. Passive motion detectors have a microchip in them that will adjust the device for slow and methodical temperature changes. This way as your room warms up and cools down during an armed alarm period, you will not get a false alarm. Some motion detectors are designed to be mounted in the ceiling and spread a 360-degree cone downward. Some are recessed to replicate an electric outlet and various other combinations are available for the James Bond like clients. Most often the device is an aesthetically pleasing small device that is mounted 5-7 feet high in the corner of a room. Passive infrared motion detectors will not see through walls or windows as they will consider touching one of them as their final destination and begin calculating the temperature. The beams project forward only and will not bend around corners. If your device is placed where a beam can go into an area with an opened door, it will protect the interior of that area as well. Once the door is closed the beam will terminate on that door. Motion detectors are not going to protect every square inch of your home or business unless you invest in many of them to accomplish that. Instead you should intelligently place them as an interior trap in an area or areas most likely to be violated by the creep or creeps that want to take your belongings or worst off violate you personally. Usually one placed properly on the main floor and one on the lower level if you have one, will serve as good traps. Stairways are often a good thing to consider when placing the device, due to the fact that you will prevent unauthorized passage from one floor to the next. (HOT TIP!) Dual Technology PIR- Dual means two technologies are used in one device. Both technologies must be violated to cause an alarm. These devices are used in harsh environments such as a garage or sun- room. The first technology is passive infrared and works as explained above. The second technology is most often Doppler and looks for the invisible movement of air. If you walk into a room the air has to move as your body mass pushes it along. The reason you would want a dual technology device is clear when you apply common sense to the desired area of protection. For example let's say you pull your car in to a cool garage, go in the house and turn the alarm on for the night. Your motion detector that you put in your garage will see a dramatic temperature change as the heat from your engine radiates into the cool air. If you had a duel technology motion detector it would not see the air moving because your car is still, so it will refuse to go into an alarm condition. Pet Immune Motion detector- This is a wonderful advancement in motion detection that may work for you if your pet free- roams your house while you are away and have your motion detectors on. Before the introduction of this technology the pet owner had to either confine their pets from the protected area or bypass the motion detector rendering it useless unless the pet was out of the home with them. The technology is the same as the regular passive infrared detectors. On the pet immune version there are two sets of beams that are offset from each other. Your pet must hit two pre- assigned beams simultaneously in order to violate the detector. Pets under a certain amount of weight (up to 85 pounds) are not long enough to hit both beams so it does not see them. A human torso is designed much differently as per a weight to length ratio causing them to violate either a horizontal or vertical pair of beams, depending on their favorite burglarizing posture. On the pet immune detectors the middle and lower span of beams are pet immune but the top layer is not, due to the distance of separation between the farthest-reaching beams. Care must be taken on the placement of these devices restricting the high beams from stairways and high ledges your cat may get up on. (6-7 feet high) A good technician will mask only the beams that hit these trouble spots expanding your coverage options. Remember that even though your device is technically restricted for use by weight of your pet, two or more small animals will have an opportunity to hit the two proper beams while playing with each other. I do not recommend that you use these devices with two or more pets no matter how small they are, unless one of them is rarely moving about. Also one free flying bird will look like a dinosaur entered the room if it flies close to the detector. (They have yet to design the "Dinosaur Immune Detector") If your pets do not fall into the allowances for using a pet immune motion detector then you should consider other options for creating interior traps. The well- designed system protects your perimeter as well as possible and creates interior traps in case the perimeter is circumvented. Matthew Francis Alarms@expertsknow.com 22 year veteran of the alarm industry
|
RELATED ARTICLES
Handling Weather Emergencies: Part 2; Home Security, Evacuation, and Emergency Kits Introduction Home Security: Your Yard is the First Line of Defense You may not believe it but most burglars do not plan their break ins. They are crimes of opportunity. They pick what appears to be a simple target. If they see a greater risk than they anticipated, they move onto a safer target. Therefore the more effort you take to keep your home from seeming to be a simple target, the safer you will be. Hurricane Preparedness If you are about to get hit by a Hurricane are you prepared? Do you have enough plywood to board up your windows? Often the local lumber companies will be sold out. In fact if you wait till the last minute Home Depot will be out too. Do you own a portable generator? No? Get one. Do you have enough fuel to keep it powered up? Most generators can use up to 1.5 gallons per hour and thus you need spare fuel tanks as well? If you wait too long the gas stations will be closed and after the Hurricane the power may not be turned back on for up to two-weeks depending on the damage. If you are talking about a direct hit Category III or IV it is entirely possible that it will be at least that long. Alarm Systems & Automobile Tires? What do alarm systems and automobile tires have in common? This may sound like a strange question to the untrained ear, but lend me yours and I will make sense of it. Avoiding Pickpockets Every year, thousands of senior citizens fall prey to the quick and clever tactics of pickpockets and thieves. What may take thieves a moment to "lift" from your pockets (passports, credit cards, and airline tickets) may take weeks to replace. It is difficult to recognize these changeling thieves sometimes the well dressed businessman standing next to you who just dropped some coins, at other times the "friendly" group of young children with newspapers approaching you in a city subway. A thief may be hard to recognize, but their time tested tactics are not. When traveling or in your home area you can prevent the majority of common thefts by arming themselves with the knowledge of typical scams, following some basic travel safety tips. Home Security System, You Are A winner Have you ever been to a local trade show or fair and filled out a raffle and later you find out you have won a Home Security System? Well, you are not alone. Sometimes everyone one wins. That's right you are not as lucky as you think you are. Well you are lucky in one regard; home security systems do work, not only do the little flags out front of the stickers near the front door help prevent crime, but an alarm sends the culprits running big time. Infrared Goggle Pop Down in Hallways for Structure Fires Most people who are killed in structure fires die from the smoke not the flames or fire. Generally they are overcome by the smoke and lack of oxygen as the fire takes all the oxygen and replaces the airspace with smoke. There needs to be a way to get these people out of the fire situation and structure immediately to prevent loss of life, however without good visibility one cannot see to get to a fire escape, stairway or exit. Alarm System: Sirens Alarm Sirens- There is both inside and outside sirens. Many towns have a noise ordinance, which should prevent your installer from putting yours outside, unless you are on a ranch where you need to know what's going on while your out in the barn. You would not want a neighbor running over to your place during an alarm as they might be confronting a dangerous situation. It is better to let the police do that instead. Essentials For Hurricane Season According to the National Oceanic & Atmospheric Administration, the East Pacific expects 15 to 16 tropical storms. Nine of these end up becoming hurricanes with five becoming deadly major hurricanes. If you live in the southeastern part of the U.S. then you know that hurricane season started on June 1st. Are you prepared for Hurricane season? Did you know that Hurricane season lasts until the end of November? Have you gone out and bought all the supplies that you may need? This article is written to help you prepare for any kind of hurricane. It will also provide you with a list of items that are essential for any storm. Life Insurance - Wise Investment to Protect Your Home or Excessive Caution? Life insurance is typically taken out to offer valuable financial protection for your family in the event of your death, upon which a payment is made to your financial beneficiaries, heirs or family members. The extent of this payment will depend on your insured sum and earnings. Life insurance and life assurance may be interlinked in advertisements, though bear in mind the two policies are different. Life assurance is a form of financial protection which is also an investment, as you should always get a pay-out at the end of the term of the policy. Life insurance on the other hand is simply financial protection for your family, avoiding the issue of debt in the event of your death. Alarm System: Wireless Remotes WIRELESS ALARM SYSTEM REMOTES Organizing an Arson Watch Program A wide variety of participants are needed to launch a successful Neighborhood Arson Mobile Watch program. In this section, necessary participants are listed, along with a description of the kind of support needed from each. As many of you know, implementing a community-based project requires the interest, cooperation, and support from many people. But it all is definitely worthwhile! Eavesdropping and Counter-Measures: Technology and Techniques You need to know how to protect yourself, since your security department or any consultant may not be truly aware of these threats and therefore not dependable. Since September 11th, a number of businesses entered the security field with little to no knowledge of the trade itself; only of its profit potential. Even outfits that have been around for some time and well-established have not been able to stay current with the latest innovations.Realistically, viewing your threat level has to be considered since everyone should expect some sort of impending privacy issue no matter how small. Thanks largely to the Internet you can arm yourself with much of the knowledge and equipment that the so-called experts use. If a respected agent of computer crimes for the Secret Service in NYC had his T-Mobile Sidekick hacked, who knows what else happens out there to others in any business.Realistically, viewing your threat level has to be considered since everyone should expect some sort of impending privacy issue no matter how small. Thanks largely to the Internet you can arm yourself with much of the knowledge and equipment that the so-called experts use. If a respected agent of computer crimes for the Secret Service in NYC had his T-Mobile Sidekick hacked, who knows what else happens out there to others in any business.We'll start acoustic ducting evaluation is the inspection of air ducts, baseboard heaters, coffee rooms, lounges, bathrooms or any way the architecture of a building can transfer sound. A simple example is to put your ear to a wall and listen. Basically anything that requires the use of the naked ear is called an acoustic bug. Softer surfaces can help muffle sounds but there are more efficient means out there. So be aware that the way an office site is designed can act as a conduit for conversations. Also, be aware of any changes can have adverse affects. Simply playing music can do wonders for masking conversations.Inspection of telephone equipment and wiring is called line analysis. This is trickier than it seems since sometimes a possible weakness has an actual purpose to the telecommunication system. Especially if it requires constant maintenance and software upgrades.All instruments should be opened and inspected. Ideally they should be compared with a known safe phone or device. If you're not sure, just remove that piece of loose components and wiring and see if the phone still works. The wiring can be modified in a switch within the handset that essentially turns it into a microphone. If you bypass this hook switch, you can listen in from anywhere on the landline. Technicalequipment won't be able to detect this. Time Domain Reflectometry is the sending of a pulse down a telephone line. If there is some sort of disruption; a wall outlet or wiretap; a portion of the pulse will besent back to the device called a Time Domain Reflectometer (TDR). Then the time difference between the reflection and the continuous run is measured. This helps in determining the distance to the anomaly.These devices can perform all sorts of diagnostics including mapping a wire network. That can be useful in locating a hidden phone. Hidden phones have several obvious uses such as making long distance phone calls to being placed in an office across the street to receive betting requests by bookies; a practice called back strapping. If you open up the modular jacks where you connect your phone, you'll usually see four wires. In most cases only two wires are connected; commonly known as ring and tip. If you see all four connected, be aware that is not usually consistent for most wiring situations, especially in homes. The other two wires could be used for a bugging device.For instance, the microphone you use in a voice recorder can be cut in half. Connect the mike head to one set of unused wires anywhere on the phone wire. Then, so long as there are no breaks in the wire, connect the other end to the jack that connects to your recorder. Now place your recorder to be VOX (voice) activated and now you have an extremely reliable bug. By the way, this should be manually inspected for since using a specialized bug detector may see nothing wrong or inconsistent. A bug such as this that connects to a wire is called a direct tap. The other general type is called an inductive tap. This is when an instrument is outside a wire but can still distinguish what's transacting over a wire. They are harder to detect since they don't draw power from the line such a standard telephone would. These are referred to as snuffle bugs. A simple probe used in hunting wire signals has a speaker, which can display sounds. Byaccident one day I was working on an apartment intercom system while using a probe. I could hear conversations throughout the building quite clearly just through the intercom boxes mounted on walls from the master unit in the basement.If you're using wireless headsets or cordless phones, the radio signals can be intercepted. A cordless phone acts like a radio, but depending on the frequency and a few other factors, can make interception extremely difficult. With some manufacturers, you can buy the same model as your neighbors or the office and have it join their phone system. Double check Caller ID boxes to see if they also record numbers dialed besides obviously those being received. If you're using VOIP (Voice Over IP), remember that calls can be recorded in a fashion identical to intercepting data between two computers. These packets of data can reassemble an audio file. Obviously electronic devices possess semiconductor components such as diodes, resistors and such. The method to hunt for these components is called Non-Linear Junction Detection (NLJD). The NLJD unit emits a radio signal while listening for the return signal from an electronic device. This becomes very useful when a bug is embedded in a picture frame or wall. The eavesdropping device doesn't have to be active for it to be discovered. If a device is active and transmitting wirelessly (or even on a wire), you can detect it with a Radio Frequency Spectrum Analyzer. Depending on the detection device used, you can determine whether voice, data or video is being sent, and possibly listen to the data. Try to use different size antennas or buy one that collapses. Different frequencies can be detected more efficiently by using various sizes. The use of filters with antennas can also help pinpoint devices on specific frequencies. Electronics such as computers, FAX machines and especially CRT monitors can radiate electromagnetic signals or pulses that can be received by other equipment. This is known TEMPEST. One way to complicate the surveillance of this is to use certain fonts and line walls or equipment with different gauges of copper mesh wire. You can further enhance this posture by using special paints, which block radio transmissions. Radio waves will look for a leak or break, so be careful of defensive applications. One-way window tints can help in blocking signals. Since an electronic device could generate some heat they can be detected in another way. The use of a thermal imagery device can detect and actually see minute amounts of heat radiated for your viewing. You can hide the heat signatures by using creams or neoprene. Technology exists to collect information from blinking LEDs of modems, routers, print servers and similar devices. You can only see some general blinking but with the use of properly tuned optics, filters, oscilloscopes and good timing you can discern much more. One of the LEDs on your keyboard can be altered to blink while you are typing in a fashion similar to Morse Code. You can also use a tap in the keyboard that sends out radio waves again similar to Morse Code and no anti-virus software will ever be able to find it. Even when a CRT computer monitor is facing a wall the light can be in a sense read by its flickering emanations from some distance. A good defensive measure is to buy new LCD flat panel types.Another approach to attacking FAX machines is to simply record the noises it makes and play it back to another machine. I used to do this for a client so they could keep a record of all the faxes they made and received. There are creative and potentially illegal defenses against wiretappers and Peeping Toms. One is to transmit an extremely high pitch down the wire, thereby rupturing the listener's eardrums. I knew someone who once sent a powerful electrical spike down his phone wire thereby destroying his divorced wife's recorder. By the way, this leads to another topic-expect the device to be discovered someday. Don't leave your fingerprints on it. He found it and had it dusted, thereby producing some prints. My friend used this as leverage against the Private Investigator that planted it. Advice to Private Investigators, a word to the wise: if you do this part-time, hire someone who does this full-time. This P.I. lost his license and almost went to jail. The lawyer who recommended him got into a lot of trouble as well. He received some unwanted attention from the Feds because of his telephone dealings went across state lines and also happened to involve the Post Office. There is another budding field related to this topic called Protective Intelligence. Currently there are only a few experts who do this kind of work.A laser or an infrared beam can be used at a considerable distance from a target building. Conversational sounds can vibrate unto solid objects such as windows. The beam's reflection varies in relation to the movement to the window, which is received and converted back into something audible. To mask the sounds, you could attach a vibrating device (basically an altered electric razor) to the window.Of course if the window is open, then a laser can target another object instead of the window. A beam of light or laser can be directed to go through a window onto a solid object thereby nullifying such defensive measures again. Generally you really can't detect such attacks unless the laser, infrared or light beam is being used that moment. Certain materials can be used to detect IR emissions, as well as the use of passive night vision gear. Certain fabrics or even a curtain may actually show the spot where a beam of light or laser is being focused. Unless the room is dusty or you have an artificial can smoke, you can follow the beam up to a point and guesstimate it's location. One type of optical bug is an infrared transmitter. When placed in the area of interest for transmission of the conversation to an infrared receiver which will then translate the conversation into an audible format.Many of these same procedures used can be applied to locating hidden cameras. A relatively new device uses a series of lasers to seek out optics. This wasoriginally intended to locate snipers by bodyguards.I have listed the techniques, counter-measures and then the counter to the counter-measures to prevent any false sense of security. Usually constant vigilance is your best weapon besides knowing what to look for. Even if you find a "bug sweeper" with good credentials, certifications and experience, ask them detailed questions. Not just to test them but also for your own peace-of-mind. This makes our job easier and we appreciate greatly when dealing with knowledgeable customers. Six Common Criminal Types And How To Avoid Them "An ounce of prevention is worth a pound of cure" that saying is as true for crime, as it is for health. After taking literally thousands of reports over the years I spent as a police officer; I found that a lot of crimes that had happened could have been prevented. The easiest and most effective way of dealing with crime is not be a victim of it in the first place. This is easier said then done, and no matter how cautious you are you can still be a victim. Nothing will give you a 100% guarantee; however, there are things you can do to at least limit your odds of being a victim. But first; you have to know what you are preventing yourself from, in order to know how to prevent against it. This article will in general show you some of the common criminal types, and give some suggestions on how to avoid them. I have made up my own classifications for these people based upon my experience as a police officer. Katrina: Lessons Learned on the Nature of Man For many years, novels and films have given us apocalyptic views of how easily mankind could disintegrate into ruthless barbarity once removed from the constraints of law and order, and the comfortable smooth machinery of "civilization". But all that was just fiction, right? Not really. The reality is in the news. Who Abducted the Missing Child? What is going on with these people who feel they can walk onto your property or in front of your home and abduct your child? If those parents had installed a hidden camera in their home, the police could use the recordings from the camera and have a quick lead to find the child and return them safely. Being prepared for the unthinkable act of your child being abducted by installing hidden cameras is much better than wishing later you had installed cameras! Where Does Safety & Security Begin? Security Expert Explains Personal safety begins with you. It is widely accepted that a wide-ranging personal safety strategy must incorporate prevention, deterrence and defiance. Handling Weather Emergencies: Part 1 - Forward Planning Makes The Difference Introduction Home Security After An Earthquake After an Earthquake you need to do an immediate damage assessment. First go turn off the gas if you smell anything, a leaky gas line could explode and take out your entire home and your cats nine lives. Look for cracks in the slab or any areas where the house carpet is lifted up. Then walk around the exterior of the house, what do you see? Do you see downed fences, retaining walls, support structures holding up the garage at weird angles or any areas where your house was knocked off its foundation? Look also for water pipes which have been broken, if so shut off the main water line coming into the house. If there is extensive damage then that means the other neighbors have also and the entire area. Estate and Mega-Yacht Security Systems and Safe Rooms Why do I need a "safe room? I really don't need one; I'm not that high profile". This is typical V.I.P. client frame of reference or attitude concerning security systems and safe rooms. |
© Athifea Distribution LLC - 2013 |